咨询与建议

限定检索结果

文献类型

  • 358 篇 期刊文献
  • 328 篇 会议

馆藏范围

  • 686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 295 篇 计算机科学与技术...
    • 247 篇 软件工程
    • 95 篇 信息与通信工程
    • 56 篇 生物工程
    • 50 篇 电气工程
    • 49 篇 控制科学与工程
    • 33 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 交通运输工程
    • 26 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 13 篇 网络空间安全
    • 12 篇 材料科学与工程(可...
    • 12 篇 土木工程
  • 242 篇 理学
    • 119 篇 数学
    • 74 篇 生物学
    • 48 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 21 篇 化学
    • 16 篇 系统科学
  • 108 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 25 篇 医学
    • 19 篇 基础医学(可授医学...
    • 18 篇 临床医学
    • 12 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 21 篇 法学
    • 17 篇 社会学
  • 12 篇 农学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 25 篇 feature extracti...
  • 22 篇 training
  • 16 篇 semantics
  • 16 篇 accuracy
  • 14 篇 deep learning
  • 14 篇 computational mo...
  • 12 篇 machine learning
  • 11 篇 object detection
  • 11 篇 signal processin...
  • 11 篇 contrastive lear...
  • 11 篇 predictive model...
  • 11 篇 robustness
  • 10 篇 speech processin...
  • 10 篇 adaptation model...
  • 9 篇 deep neural netw...
  • 9 篇 task analysis
  • 9 篇 visualization
  • 8 篇 face recognition
  • 8 篇 convolution
  • 8 篇 codes

机构

  • 133 篇 national enginee...
  • 73 篇 college of compu...
  • 57 篇 hubei key labora...
  • 47 篇 school of cyber ...
  • 44 篇 school of comput...
  • 30 篇 national enginee...
  • 27 篇 hubei key labora...
  • 27 篇 hubei engineerin...
  • 27 篇 shenzhen univers...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 17 篇 school of inform...
  • 16 篇 huazhong univers...
  • 15 篇 guangdong provin...
  • 14 篇 huazhong univers...
  • 14 篇 college of big d...
  • 14 篇 hubei province k...
  • 14 篇 big data science...

作者

  • 40 篇 jin hai
  • 37 篇 shen linlin
  • 36 篇 hai jin
  • 23 篇 li jianqiang
  • 19 篇 hu shengshan
  • 16 篇 zhou pan
  • 16 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 li minghui
  • 12 篇 zhou ziqi
  • 11 篇 wang jinbao
  • 10 篇 gao can
  • 10 篇 wang haoyu
  • 9 篇 long zheng
  • 9 篇 zhang zhe
  • 9 篇 jie chen
  • 9 篇 deng xianjun
  • 8 篇 ji junkai
  • 8 篇 lu songfeng

语言

  • 634 篇 英文
  • 46 篇 其他
  • 6 篇 中文
检索条件"机构=Big Data Technology and System Laboratory"
686 条 记 录,以下是601-610 订阅
排序:
Acoustic and Kinematic Examination of Dysarthria in Cantonese Patients of Parkinson’s Disease
Acoustic and Kinematic Examination of Dysarthria in Cantones...
收藏 引用
International Symposium on Chinese Spoken Language Processing
作者: Yue Sun Manwa L. Ng Chongyuan Lian Lan Wang Feng Yang Nan Yan College of Big Data and Information Engineering Guizhou University Guiyang China Speech Science Laboratory University of Hong Kong Hong Kong China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China Department of Speech Therapy Shenzhen Children’s Hospital Shenzhen China Guangdong Provincial Key Laboratory of Robotics and Intelligent System Shenzhen Instimtes of Advanced Technology Chinese Academy of Sciences Shenzhen China
Hypokinetic dysarthria is one of the core symptoms of Parkinson's disease, characterized by reduced loudness, slurred speech and distorted consonant productions. Dopaminergic medication for Parkinson's disease... 详细信息
来源: 评论
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Feng Li, Shaofei Jiang, Peng Li, Ding Wang, Haoyu Huang, Liangyi Xiao, Xusheng Chen, Jiedong Luo, Xiapu Guo, Yao Chen, Xiangqun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science Peking University China Arizona State University United States Sangfor Technologies Inc. China The Hong Kong Polytechnic University Hong Kong
Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial for future APT defenses. Despite the fact that numerous new techniques to improve P-EDR systems have been proposed in academia, it is...
来源: 评论
Modeling Multiple Views via Implicitly Preserving Global Consistency and Local Complementarity
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jiangmeng Qiang, Wenwen Zheng, Changwen Su, Bing Razzak, Farid Wen, Ji-Rong Xiong, Hui The University of Chinese Academy of Sciences Beijing China The Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China The New York University Columbia University New York United States The Beijing Key Laboratory of Big Data Management and Analysis Methods Gaoling School of Artificial Intelligence Renmin University of China Beijing100872 China Guangzhou China Department of Computer Science & Engineering The Hong Kong University of Science and Technology Hong Kong
While self-supervised learning techniques are often used to mine hidden knowledge from unlabeled data via modeling multiple views, it is unclear how to perform effective representation learning in a complex and incons... 详细信息
来源: 评论
A novel TomoSAR imaging method with few observations based on nested array
arXiv
收藏 引用
arXiv 2022年
作者: Jiang, Pengyu Zhang, Zhe Zhang, Bingchen Xu, Zhongqiu Key Laboratory of Technology in Geo-Spatial Information Processing and Application System Chinese Academy of Sciences Beijing100190 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China Suzhou Aerospace Information Research Institute Suzhou215000 China Key Laboratory of Intelligent Aerospace Big Data Application Technology Suzhou21500 China
Synthetic aperture radar tomography (TomoSAR) baseline optimization technique is capable of reducing system complexity and improving the temporal coherence of data, which has become an important research in the field ... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
NODLINK: An Online system for Fine-Grained APT Attack Detection and Investigation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shaofei Dong, Feng Xiao, Xusheng Wang, Haoyu Shao, Fei Chen, Jiedong Guo, Yao Chen, Xiangqun Li, Ding School of Computer Science Peking University China Arizona State University United States Case Western Reserve University United States Sangfor Technologies Inc. China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios... 详细信息
来源: 评论
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optimization in Intelligent Transportation IoT
Hybrid Cat-Artificial Fish Swarm Based Node Deployment Optim...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Lingzhi Yi Bin Luo Chenlu Zhu Xianjun Deng Yunzhi Xia Hengshan Wu School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China School of Civil Engineering University of South China Hengyang China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Chutian Expressway Digital Technology Co. Ltd Wuhan China
The integration of Internet of Things (IoT)-based highway bridge structural health monitoring (HBSHM) and intelligent transportation systems (ITS) plays an essential role in detecting damage for large and complex brid...
来源: 评论
TRUST: A Toolkit for TEE-Assisted Secure Outsourced Computation over Integers
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Bowen Li, Jiuhui Xu, Peiming Li, Xiaoguo Pei, Qingqi Shen, Yulong Guangzhou Institute of Technology Xidian University Guangzhou510555 China State Key Laboratory of Public Big Data Guizhou University Guiyang550025 China Electric Power Research Institute CSG Guangdong Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou510663 China The College of Computer Science Chongqing University Chongqing400044 China The State Key Laboratory of Integrated Service Networks Xidian University Xi’an710126 China
Secure outsourced computation (SOC) provides secure computing services by taking advantage of the computation power of cloud computing and the technology of privacy computing (e.g., homomorphic encryption). Expanding ... 详细信息
来源: 评论
Joint resource management for MC-NOMA: A deep reinforcement learning approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Shaoyang Lv, Tiejun Ni, Wei Beaulieu, Norman C. Guo, Y. Jay Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Sydney2122 Australia Beijing Key Laboratory for Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Global Big Data Technologies Centre University of Technology Sydney UltimoNSW2007 Australia
This paper presents a novel and effective deep reinforcement learning (DRL)-based approach to addressing joint resource management (JRM) in a practical multi-carrier non-orthogonal multiple access (MC-NOMA) system, wh... 详细信息
来源: 评论
Stvanet: A Spatio-Temporal Visual Attention Framework with Large Kernel Attention Mechanism for Citywide Traffic Dynamics Prediction
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Hongtai Jiang, Junbo Zhao, Zhan Pan, Renbin School of Transportation and Logistics National Engineering Laboratory of Integrated Transportation Big Data Application Technology National United Engineering Laboratory of Integrated and Intelligent Transportation Institute of System Science and Engineering Southwest Jiaotong University Chengdu611756 China Department of Urban Planning and Design The University of Hong Kong Hong Kong Special Administrative Region Hong Kong School of Business Administration Southwestern University of Finance and Economics Chengdu611130 China
Enhancing the efficiency and safety of the Intelligent Transportation system requires effective modeling and prediction of citywide traffic dynamics. Most studies employ convolutional neural networks (CNNs) with a 3D ... 详细信息
来源: 评论