咨询与建议

限定检索结果

文献类型

  • 2,632 篇 期刊文献
  • 1,492 篇 会议
  • 3 册 图书

馆藏范围

  • 4,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,530 篇 工学
    • 1,685 篇 计算机科学与技术...
    • 1,382 篇 软件工程
    • 587 篇 信息与通信工程
    • 378 篇 生物工程
    • 344 篇 电气工程
    • 296 篇 生物医学工程(可授...
    • 276 篇 电子科学与技术(可...
    • 274 篇 控制科学与工程
    • 244 篇 光学工程
    • 185 篇 化学工程与技术
    • 137 篇 机械工程
    • 98 篇 仪器科学与技术
    • 89 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 63 篇 土木工程
    • 63 篇 安全科学与工程
  • 1,801 篇 理学
    • 728 篇 数学
    • 692 篇 物理学
    • 474 篇 生物学
    • 277 篇 统计学(可授理学、...
    • 223 篇 化学
    • 119 篇 系统科学
  • 592 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 306 篇 医学
    • 252 篇 临床医学
    • 183 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 106 篇 法学
    • 85 篇 社会学
  • 79 篇 农学
  • 58 篇 经济学
  • 33 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 107 篇 deep learning
  • 101 篇 semantics
  • 91 篇 feature extracti...
  • 89 篇 training
  • 74 篇 hadrons
  • 71 篇 machine learning
  • 69 篇 computational mo...
  • 68 篇 data models
  • 55 篇 accuracy
  • 50 篇 hadron colliders
  • 49 篇 predictive model...
  • 46 篇 hadronic decays
  • 44 篇 graph neural net...
  • 44 篇 federated learni...
  • 41 篇 image segmentati...
  • 40 篇 data mining
  • 38 篇 bottom mesons
  • 38 篇 optimization
  • 36 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 392 篇 school of physic...
  • 391 篇 cavendish labora...
  • 378 篇 university of ch...
  • 377 篇 yandex school of...
  • 363 篇 department of ph...
  • 354 篇 imperial college...
  • 344 篇 stfc rutherford ...
  • 340 篇 center for high ...
  • 335 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 303 篇 nikhef national ...
  • 293 篇 school of physic...
  • 293 篇 physik-institut ...
  • 293 篇 oliver lodge lab...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 221 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 214 篇 amato s.
  • 212 篇 boettcher t.
  • 210 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 206 篇 braun s.
  • 203 篇 borisyak m.
  • 199 篇 bizzeti a.
  • 192 篇 bencivenni g.
  • 185 篇 back j.j.
  • 181 篇 bay a.
  • 172 篇 bjørn m.

语言

  • 3,761 篇 英文
  • 310 篇 其他
  • 69 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Research Center and School of Computer Science and Engineering"
4127 条 记 录,以下是671-680 订阅
排序:
Mining User–Item Interactions via Knowledge Graph for Recommendation
收藏 引用
ACM Transactions on Recommender Systems 2025年 第3期3卷 1-19页
作者: Shenghao Liu Lingyun Lu Bang Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology (HUST) Wuhan China
Introducing a Knowledge Graph (KG) to facilitate a recommender system has become a tendency in recent years. Many existing methods leverage KGs to obtain side information of items to promote item representation learni... 详细信息
来源: 评论
research of mask wearing detection method using Improved YOLO network
Research of mask wearing detection method using Improved YOL...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Fei Xiao Zixi Liu Shengbin Zhao Shuai Yuan School of Computer Science and Engineering Shenyang Jianzhu University Shenyang China Daqing Oilfield Limited Company DaQing China School of Computer Science and Engineering Shenyang Jianzhu University Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang China
Mask wearing detection technology is a practical and research-oriented area within object detection. Due to the complexity of mask wearing detection scenarios, issues such as small target detection and low image clari... 详细信息
来源: 评论
Passenger Waiting Time Prediction Based on Density Spatiotemporal Clustering and Time Series Feature Processing  6
Passenger Waiting Time Prediction Based on Density Spatiotem...
收藏 引用
6th International Conference on Electronic engineering and Informatics, EEI 2024
作者: Huang, Ruixi Xia, Dawen Geng, Jian Zhang, Wenyong Hu, Yang Li, Yantao Li, Huaqing College of Data Science and Information Engineering Guizhou Minzu University Guiyang550025 China Engineering Research Center of Micro-nano and Intelligent Manufacturing Ministry of Education Kaili University Kaili556011 China College of Big Data Engineering College of Microelectronics and Artificial Intelligence Kaili University Kaili556011 China Party School of the Anshun Municipal Committee of C.P.C Anshun561000 China Guizhou Traffic Technician and Transportation College Department of Automotive Engineering Guiyang550008 China College of Computer Science Chongqing University Chongqing400044 China College of Electronic and Information Engineering Southwest University Chongqing400715 China
Accurate passenger waiting time prediction addresses the taxi supply-demand imbalance in Intelligent Transport Systems (ITS). To capture the dependencies of passenger waiting time on urban taxi distribution, we propos... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
Artificial Intelligence and Intelligent Manufacturing (AIIM), International Symposium on
作者: Jincheng Zhou Yue Li Yujie Shen Dan Tang Hongliang Cai Jing Gong Ningchao Bai School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Jiaqi Zhai Xuanhua Shi Kaiyi Huang Chencheng Ye Weifang Hu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
Robust Federated Learning in Unreliable Wireless Networks: A Client Selection Approach
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yanmeng Ji, Wenkai Zhou, Jian Xiao, Fu Chang, Tsung-Hui School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Science and Engineering The Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China
Federated learning (FL) has emerged as a promising distributed learning paradigm for training deep neural networks (DNNs) at the wireless edge, but its performance can be severely hindered by unreliable wireless trans... 详细信息
来源: 评论
Hard-Label Black-Box Attacks on 3D Point Clouds
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Tao, Yunbo Zhou, Pan Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the maturity of depth sensors in various 3D safety-critical applications, 3D point cloud models have been shown to be vulnerable to adversarial attacks. Almost all existing 3D attackers simply follow the white-bo... 详细信息
来源: 评论
Lightweight Transformer Network and Self-supervised Task for Kinship Verification  8
Lightweight Transformer Network and Self-supervised Task for...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Zhu, Xiaoke Li, Yunwei Li, Danyang Dong, Lingyun Chen, Xiaopan School of Computer and Information Engineering Henan University Kaifeng China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University China
Kinship verification is one of the interesting and critical problems in computer vision research, with significant progress in the past decades. Meanwhile, Vision Transformer (VIT) has recently achieved impressive suc... 详细信息
来源: 评论
Semi-supervised Segmentation and Quantization Algorithm for Infarct Size Measurement of Rat Heart Sections  8
Semi-supervised Segmentation and Quantization Algorithm for ...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Zhu, Xiaoke Cai, Yulong Chen, Xiaopan Hu, Qi Dong, Lingyun Yuan, Caihong School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University China
Segmentation of rat heart section images and infarct area quantization are essential components of infarct size measurement in processing data from animal experiments on ischemic heart disease. Previously, the task of... 详细信息
来源: 评论
How graph neural networks learn: lessons from training dynamics  24
How graph neural networks learn: lessons from training dynam...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Chenxiao Yang Qitian Wu David Wipf Ruoyu Sun Junchi Yan School of Artificial Intelligence & Department of Computer Science and Engineering & MoE Lab of AI Shanghai Jiao Tong University Amazon Web Services School of Data Science The Chinese University of Hong Kong Shenzhen and Shenzhen International Center for Industrial and Applied Mathematics Shenzhen Research Institute of Big Data
A long-standing goal in deep learning has been to characterize the learning behavior of black-box models in a more interpretable manner. For graph neural networks (GNNs), considerable advances have been made in formal...
来源: 评论