咨询与建议

限定检索结果

文献类型

  • 360 篇 期刊文献
  • 285 篇 会议
  • 7 册 图书

馆藏范围

  • 652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 432 篇 工学
    • 342 篇 计算机科学与技术...
    • 298 篇 软件工程
    • 90 篇 生物工程
    • 80 篇 信息与通信工程
    • 77 篇 生物医学工程(可授...
    • 66 篇 光学工程
    • 50 篇 控制科学与工程
    • 43 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 18 篇 安全科学与工程
    • 13 篇 化学工程与技术
    • 12 篇 建筑学
    • 12 篇 土木工程
    • 12 篇 交通运输工程
  • 240 篇 理学
    • 115 篇 数学
    • 101 篇 生物学
    • 57 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 16 篇 化学
  • 130 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 71 篇 医学
    • 64 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 29 篇 公共卫生与预防医...
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 16 篇 法学
    • 15 篇 社会学
  • 8 篇 教育学
  • 8 篇 农学
  • 2 篇 艺术学

主题

  • 29 篇 deep learning
  • 26 篇 accuracy
  • 21 篇 machine learning
  • 21 篇 training
  • 19 篇 semantics
  • 17 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 image segmentati...
  • 14 篇 data models
  • 13 篇 federated learni...
  • 12 篇 reinforcement le...
  • 12 篇 optimization
  • 12 篇 convolutional ne...
  • 11 篇 predictive model...
  • 10 篇 artificial intel...
  • 9 篇 object detection
  • 9 篇 real-time system...
  • 9 篇 decision making
  • 9 篇 multiobjective o...
  • 8 篇 transformers

机构

  • 34 篇 college of compu...
  • 18 篇 school of big da...
  • 16 篇 department of co...
  • 15 篇 national enginee...
  • 13 篇 shenzhen researc...
  • 10 篇 university of sc...
  • 10 篇 college of compu...
  • 10 篇 school of comput...
  • 9 篇 university of ch...
  • 9 篇 state key labora...
  • 9 篇 artificial intel...
  • 9 篇 school of big da...
  • 8 篇 college of intel...
  • 8 篇 iconix software ...
  • 8 篇 college of compu...
  • 7 篇 national enginee...
  • 7 篇 institute of art...
  • 7 篇 department of co...
  • 7 篇 moe key lab of a...
  • 7 篇 shenzhen institu...

作者

  • 12 篇 seifedine kadry
  • 12 篇 xiaofei wang
  • 11 篇 victor c. m. leu...
  • 11 篇 xiong hui
  • 11 篇 jin hai
  • 10 篇 xiuhua li
  • 10 篇 leung victor c. ...
  • 8 篇 wang shuai
  • 8 篇 jungeun kim
  • 8 篇 shuai wang
  • 8 篇 r. saravanakumar
  • 7 篇 niyato dusit
  • 7 篇 qilin fan
  • 7 篇 timofte radu
  • 7 篇 gao can
  • 7 篇 hai jin
  • 6 篇 wang xiaofei
  • 6 篇 tian chunwei
  • 6 篇 zou deqing
  • 6 篇 wang yan

语言

  • 511 篇 英文
  • 138 篇 其他
  • 3 篇 中文
检索条件"机构=Big Data Intelligence Lab Department of Computer Science and Software Engineering"
652 条 记 录,以下是261-270 订阅
排序:
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wen, Xin-Cheng Chen, Yupan Gao, Cuiyun Zhang, Hongyu Zhang, Jie M. Liao, Qing School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Big Data and Software Engineering Chongqing University China Department of Informatics King’s College London United Kingdom Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China Peng Cheng Laboratory China
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source... 详细信息
来源: 评论
F2A2: flexible fully-decentralized approximate actor-critic for cooperative multi-agent reinforcement learning
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 8447-8521页
作者: Wenhao Li Bo Jin Xiangfeng Wang Junchi Yan Hongyuan Zha School of Data Science The Chinese University of Hong Kong Shenzhen Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China School of Software Engineering Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China School of Computer Science and Technology Key Laboratory of Mathematics and Engineering Applications Ministry of Education East China Normal University Shanghai China Department of Computer Science and Engineering Key Laboratory of Artificial Intelligence Ministry of Education Shanghai Jiao Tong University Shanghai China
Traditional centralized multi-agent reinforcement learning (MARL) algorithms are sometimes unpractical in complicated applications due to non-interactivity between agents, the curse of dimensionality, and computation ... 详细信息
来源: 评论
EFFICIENT ONLINE labEL CONSISTENT HASHING FOR LARGE-SCALE CROSS-MODAL RETRIEVAL
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CR...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Yi, Jinhan Liu, Xin Cheung, Yiu-Ming Xu, Xing Fan, Wentao He, Yi Department of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Lab. of Computer Vision and Pattern Recognition Fujian Key Lab. of Big Data Intelligence and Security China Department of Computer Science Hong Kong Baptist University Kowloon Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Existing cross-modal hashing still faces three challenges: (1) Most batch-based methods are unsuitable for processing large-scale and streaming data. (2) Current online methods often suffer from insufficient semantic ... 详细信息
来源: 评论
Boosting Fine-Grained Visual Anomaly Detection with Coarse-Knowledge-Aware Adversarial Learning
arXiv
收藏 引用
arXiv 2024年
作者: Fang, Qingqing Su, Qinliang Lv, Wenxi Xu, Wenchao Yu, Jianxing School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Department of Computing The Hong Kong Polytechnic University Hong Kong School of Artificial Intelligence Sun Yat-sen University Guangdong China Pazhou Lab Guangzhou510330 China
Many unsupervised visual anomaly detection methods train an auto-encoder to reconstruct normal samples and then leverage the reconstruction error map to detect and localize the anomalies. However, due to the powerful ... 详细信息
来源: 评论
Quantus: An Explainable AI Toolkit for Responsible Evaluation of Neural Network Explanations and Beyond
收藏 引用
Journal of Machine Learning Research 2023年 24卷
作者: Hedström, Anna Weber, Leander Bareeva, Dilyara Krakowczyk, Daniel Motzkus, Franz Samek, Wojciech Lapuschkin, Sebastian Höhne, Marina M.-C. Understandable Machine Intelligence Lab TU Berlin Berlin10587 Germany Department of Electrical Engineering and Computer Science TU Berlin Berlin10587 Germany Department of Artificial Intelligence Fraunhofer Heinrich-Hertz-Institute Berlin10587 Germany Department of Computer Science University of Potsdam Potsdam14476 Germany BIFOLD – Berlin Institute for the Foundations of Learning and Data Berlin10587 Germany
The evaluation of explanation methods is a research topic that has not yet been explored deeply, however, since explainability is supposed to strengthen trust in artificial intelligence, it is necessary to systematica... 详细信息
来源: 评论
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Vulnerability Detection with Graph Simplification and Enhanc...
收藏 引用
International Conference on software engineering (ICSE)
作者: Xin-Cheng Wen Yupan Chen Cuiyun Gao Hongyu Zhang Jie M. Zhang Qing Liao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory and Guangdong Provincial Key Laboratory Novel Security Intelligence Technologies School of Big Data and Software Engineering Chongqing University China Department of Informatics King's College London UK Peng Cheng Laboratory
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
来源: 评论
Implicit Supervision-Assisted Graph Collaborative Filtering for Third-Party Library Recommendation
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1459-1471页
作者: Lianrong Chen Mingdong Tang Naidan Mei Fenfang Xie Guo Zhong Qiang He School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China Unicom (Guangdong) Industry Internet Company Guangzhou China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing Technologies Swinburne University of Technology Melbourne VIC Australia
Third-party libraries (TPLs) play a crucial role in software development. Utilizing TPL recommender systems can aid software developers in promptly finding useful TPLs. A number of TPL recommendation approaches have b... 详细信息
来源: 评论
Empirical Study of Computational intelligence Approaches for the Early Detection of Autism Spectrum Disorder  5th
Empirical Study of Computational Intelligence Approaches for...
收藏 引用
5th International Conference on Intelligent Computing and Applications, ICICA 2019
作者: Khatun, Mst. Arifa Ali, Md. Asraf Ahmed, Md. Razu Noori, Sheak Rashed Haider Sahayadhas, Arun Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Software Engineering Daffodil International University Dhaka Bangladesh Artificial Intelligence Research Lab Vels Institute of Science Technology and Advanced Studies Chennai India
The objective of the research is to develop a predictive model that can significantly enhance the detection and monitoring performance of Autism Spectrum Disorder (ASD) using four supervised learning techniques. In th... 详细信息
来源: 评论
LF-YOLOv7: Improved YOLOv7 Based on Lightweight Modules and Novel Feature Fusion for Object Detection on Drone-Captured Scenarios
LF-YOLOv7: Improved YOLOv7 Based on Lightweight Modules and ...
收藏 引用
International Conference on Computational science and Computational intelligence (CSCI)
作者: Wangyu Jiang Le Wang Guojun Mao Meng Sun Fayaz Ali Dharejo Ghulam Ali Mallah Fujian Provincial Key Lab of Big Data Mining&Applications Fujian University of Technology Fuzhou Fujian Province China Department of Electrical Engineering and Computer Science Khalifa Univeristy AbuDhabi UAE Department of Computer Science Shah Abdul Latif University Khairpur Pakistan
To address challenges in drone-captured images, including small-sized objects, multiple scales, and object diversity, we propose a novel lightweight and feature fusion based object detection model, called LF-YOLOv7. F... 详细信息
来源: 评论
Hierarchical Reverse Games for the Resource Ecosystem in Cloud-Edge Computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Pei, Manlin Wang, Chenyu Wang, Xia Zheng, Zhigao Huang, Jianhui Wang, Shengling Guo, Yufei School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Computer Science Georgia State University United States Beijing University of Technology School of Statistics and Data Science Faculty of Science Beijing China Institute of Artificial Intelligence School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Hubei Luojia Laboratory Wuhan University Wuhan China Chinese Academy of Sciences Institute of Computing Technology Beijing China Beijing Normal University School of Artificial Intelligence Beijing China George Washington University Department of Statistics United States
Edge computing has emerged as a killer technology for a hyper-connected world due to its distributed architecture and customer-proximity property. Combined edge nodes with the cloud data center, a cloud-edge computing... 详细信息
来源: 评论