咨询与建议

限定检索结果

文献类型

  • 374 篇 期刊文献
  • 331 篇 会议

馆藏范围

  • 705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 303 篇 计算机科学与技术...
    • 250 篇 软件工程
    • 103 篇 信息与通信工程
    • 61 篇 电气工程
    • 56 篇 生物工程
    • 53 篇 控制科学与工程
    • 33 篇 机械工程
    • 33 篇 电子科学与技术(可...
    • 31 篇 光学工程
    • 28 篇 交通运输工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 14 篇 网络空间安全
    • 12 篇 材料科学与工程(可...
    • 12 篇 土木工程
  • 249 篇 理学
    • 121 篇 数学
    • 76 篇 生物学
    • 48 篇 物理学
    • 37 篇 统计学(可授理学、...
    • 21 篇 化学
    • 16 篇 系统科学
    • 12 篇 大气科学
  • 110 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 19 篇 工商管理
  • 24 篇 医学
    • 18 篇 基础医学(可授医学...
    • 17 篇 临床医学
    • 12 篇 药学(可授医学、理...
  • 22 篇 法学
    • 17 篇 社会学
  • 13 篇 农学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 25 篇 feature extracti...
  • 22 篇 training
  • 16 篇 semantics
  • 16 篇 accuracy
  • 15 篇 deep learning
  • 14 篇 computational mo...
  • 13 篇 machine learning
  • 12 篇 predictive model...
  • 11 篇 object detection
  • 11 篇 signal processin...
  • 11 篇 robustness
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 adaptation model...
  • 9 篇 deep neural netw...
  • 9 篇 task analysis
  • 9 篇 visualization
  • 9 篇 biological syste...
  • 8 篇 face recognition
  • 8 篇 convolution

机构

  • 135 篇 national enginee...
  • 74 篇 college of compu...
  • 58 篇 hubei key labora...
  • 47 篇 school of cyber ...
  • 44 篇 school of comput...
  • 30 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei key labora...
  • 27 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 huazhong univers...
  • 15 篇 guangdong provin...
  • 14 篇 hubei province k...
  • 14 篇 big data science...
  • 13 篇 college of big d...

作者

  • 40 篇 jin hai
  • 38 篇 shen linlin
  • 36 篇 hai jin
  • 24 篇 li jianqiang
  • 19 篇 hu shengshan
  • 17 篇 linlin shen
  • 16 篇 zhou pan
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang jinbao
  • 10 篇 gao can
  • 10 篇 wang haoyu
  • 10 篇 deng xianjun
  • 9 篇 long zheng
  • 9 篇 zou deqing
  • 9 篇 zhang zhe
  • 9 篇 jie chen
  • 8 篇 ji junkai

语言

  • 648 篇 英文
  • 50 篇 其他
  • 6 篇 中文
检索条件"机构=Big Data Technology and System Laboratory"
705 条 记 录,以下是471-480 订阅
排序:
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem
A Large-Scale Empirical Study on Semantic Versioning in Gola...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Wenke Li Feng Wu Cai Fu Fan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Platform and Content Group Tencent Technology (Shenzhen) Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien...
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
Cyber Security and Information Engineering (ICCSIE), International Conference on
作者: Jianhua Huang Yunlong Tang Yongjun Wei Huan Wang Haifeng Zhang Bing Zhang Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center School of Computer Science and Technology (School of Software) Guangxi University of Science and Technology Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem  23
A Large-Scale Empirical Study on Semantic Versioning in Gola...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering
作者: Wenke Li Feng Wu Cai Fu Fan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China AND Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Platform and Content Group Tencent Technology (Shenzhen) Co.Ltd Shenzhen China
Third-party libraries (TPLs) have become an essential component of software, accelerating development and reducing maintenance costs. However, breaking changes often occur during the upgrades of TPLs and prevent clien... 详细信息
来源: 评论
Identifying Users Transferring between Transportation Modes: A Stable Matching Approach
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Hongtai Liu, Zheng Kondor, Daniel Han, Ke He, Zhengbing School of Transportation and Logistics National Engineering Laboratory of Integrated Transportation Big Data Application Technology National United Engineering Laboratory of Integrated and Intelligent Transportation Institute of System Science and Engineering Southwest Jiaotong University Chengdu China Complexity Science Hub Vienna Austria Beijing Key Laboratory of Traffic Engineering Beijing University of Technology Beijing China
Travel data containing personal identification information needs to be anonymized before being shared and analyzed for privacy considerations. In a multi-modal transport system with different operators covering one se... 详细信息
来源: 评论
STSE-xLSTM: A Deep Learning Framework for Automated Seizure Detection in Long Video Sequences Using Spatio-Temporal and Attention Mechanisms
STSE-xLSTM: A Deep Learning Framework for Automated Seizure ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Lihui Ding Hongliang Wang Lijun Fu Shenyang Institute of Computing Technology University of Chinese Academy of Sciences Shenyang China Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Laboratory of Big Data and Artificial Intelligence Technology Shandong University Beijing China
A detailed analysis of seizure semiology, the symptoms and signs that occur during a seizure, is crucial for the management of epilepsy patients. The inter-rater reliability of qualitative visual analysis is often low... 详细信息
来源: 评论
DPP-HSS: Towards Fast and Scalable Hypervolume Subset Selection for Many-objective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Gong, Cheng Nan, Yang Shang, Ke Guo, Ping Ishibuchi, Hisao Zhang, Qingfu City University of Hong Kong Department of Computer Science Hong Kong City University of Hong Kong Shenzhen Research Institute Shenzhen China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Hypervolume subset selection (HSS) has received significant attention since it has a strong connection with evolutionary multi-objective optimization (EMO), such as environment selection and post-processing to identif... 详细信息
来源: 评论
FELSDiff: Image Super-Resolution Based on Diffusion Model Fusing Feature Extraction with Latent Space
FELSDiff: Image Super-Resolution Based on Diffusion Model Fu...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Cancan Wu Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan Hubei China
In addressing issues like an excessive number of network parameters and the loss of fine texture details in image super-resolution reconstruction approaches based on diffusion models, this passage introduces a novel i... 详细信息
来源: 评论
Video-Based 3D Human Pose Estimation Research
Video-Based 3D Human Pose Estimation Research
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Siting Tao Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China China
At present, most of the video-based 3D human pose estimation methods process the video frame by frame, ignoring the timing information of the upper and lower frames of the video. When there is a single-frame estimatio... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-Grained Adaptive Anomaly Diagnosis of Industrial Cyber-Physical systems
SSRN
收藏 引用
SSRN 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
Fingerprint Presentation Attack Detector Using Global-Local Model
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haozhe Zhang, Wentian Liu, Feng Wu, Haoqian Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society The National Engineering Laboratory for Big Data System Computing Technology The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by inform... 详细信息
来源: 评论