咨询与建议

限定检索结果

文献类型

  • 871 篇 会议
  • 804 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 996 篇 工学
    • 703 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 224 篇 信息与通信工程
    • 161 篇 电气工程
    • 147 篇 生物工程
    • 123 篇 控制科学与工程
    • 108 篇 电子科学与技术(可...
    • 100 篇 光学工程
    • 97 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 49 篇 仪器科学与技术
    • 45 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 交通运输工程
    • 33 篇 土木工程
    • 33 篇 安全科学与工程
  • 586 篇 理学
    • 299 篇 数学
    • 167 篇 生物学
    • 157 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 52 篇 化学
    • 52 篇 地球物理学
    • 40 篇 系统科学
  • 252 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 94 篇 医学
    • 81 篇 临床医学
    • 57 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 49 篇 法学
    • 38 篇 社会学
  • 37 篇 农学
  • 25 篇 经济学
  • 15 篇 教育学
  • 4 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 66 篇 feature extracti...
  • 64 篇 semantics
  • 54 篇 deep learning
  • 51 篇 computational mo...
  • 50 篇 accuracy
  • 48 篇 training
  • 36 篇 predictive model...
  • 32 篇 data models
  • 31 篇 machine learning
  • 30 篇 graph neural net...
  • 29 篇 data mining
  • 29 篇 federated learni...
  • 28 篇 convolution
  • 26 篇 image segmentati...
  • 26 篇 neural networks
  • 24 篇 task analysis
  • 23 篇 contrastive lear...
  • 21 篇 transformers
  • 18 篇 memory managemen...
  • 18 篇 convolutional ne...

机构

  • 101 篇 national enginee...
  • 68 篇 school of comput...
  • 58 篇 shandong provinc...
  • 56 篇 key laboratory o...
  • 53 篇 school of cyber ...
  • 52 篇 shandong enginee...
  • 40 篇 national enginee...
  • 38 篇 university of ch...
  • 37 篇 beijing advanced...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 huazhong univers...
  • 28 篇 hubei key labora...
  • 23 篇 henan key labora...
  • 22 篇 school of softwa...
  • 21 篇 engineering rese...
  • 20 篇 research center ...
  • 20 篇 college of compu...
  • 18 篇 college of infor...

作者

  • 124 篇 hai jin
  • 119 篇 jin hai
  • 43 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 17 篇 zhang leo yu
  • 17 篇 zhang jie
  • 17 篇 yu zhang
  • 16 篇 zou deqing
  • 16 篇 yu huang
  • 16 篇 zhao weisheng
  • 15 篇 deqing zou
  • 14 篇 zhou ziqi
  • 13 篇 li yang
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng

语言

  • 1,366 篇 英文
  • 291 篇 其他
  • 39 篇 中文
检索条件"机构=Big Data and Intelligent Computing Research Center"
1676 条 记 录,以下是1001-1010 订阅
排序:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Shengshan Zhang, Junwei Liu, Wei Hou, Junhui Li, Minghui Zhang, Leo Yu Jin, Hai Sun, Lichao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China Cluster and Grid Computing Lab China National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Services Computing Technology and System Lab China City University of Hong Kong Hong Kong Deakin University Australia Lehigh University United States
Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models ... 详细信息
来源: 评论
基于污点和概率的逃逸恶意软件多路径探索
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution ***,malware can emp... 详细信息
来源: 评论
Grace: An Efficient Parallel SPARQL Query System over Large-Scale RDF data
Grace: An Efficient Parallel SPARQL Query System over Large-...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiang Kang Yuying Zhao Pingpeng Yuan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
As a markup language for describing web resources, RDF is often used to represent graph data. SPARQL is a standard query language for RDF data, which is convenient in querying RDF. As RDF data grows rapidly, how to de... 详细信息
来源: 评论
Multi-task representation learning with multi-view graph convolutional networks
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Hong Song, Yu Wu, Yao Shi, Jia Xie, Xia Jin, Hai National Engineering Research Center for Big Data Technology Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Link prediction and node classification are two important downstream tasks of network representation learning. Existing methods have achieved acceptable results but they perform these two tasks separately, which requi... 详细信息
来源: 评论
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
arXiv
收藏 引用
arXiv 2021年
作者: Bai, Jiawang Wu, Baoyuan Zhang, Yong Li, Yiming Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University China PCL Research Center of Networks and Communications Peng Cheng Laboratory China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab United States
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Semantic and syntactic enhanced aspect sentiment triplet extraction
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Zhexue Huang, Hong Liu, Bang Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Huazhong University of Science and Technology China RALI & Mila University of Montreal
Aspect Sentiment Triplet Extraction (ASTE) aims to extract triplets from sentences, where each triplet includes an entity, its associated sentiment, and the opinion span explaining the reason for the sentiment. Most e... 详细信息
来源: 评论
Text-augmented long-term relation dependency learning for knowledge graph representation
High-Confidence Computing
收藏 引用
High-Confidence computing 2025年
作者: Quntao Zhu Mengfan Li Yuanjun Gao Yao Wan Xuanhua Shi Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Knowledge graph (KG) representation learning aims to map entities and relations into a low-dimensional representation space, showing significant potential in many tasks. Existing approaches follow two categories: (1) ... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
Effects of winter weather on traffic operations and optimization of signalized intersections
收藏 引用
Journal of Traffic and Transportation Engineering(English Edition) 2019年 第2期6卷 196-208页
作者: Zhengyang Lu Tae J.Kwon Liping Fu Big Data Research Center Jianghan University Department of Civil and Environmental Engineering University of Alberta Department of Civil and Environmental Engineering University of Waterloo Intelligent Transportation Systems Research Center Wuhan University of Technology
Adverse winter weather has always been a cause of traffic congestion and road *** mitigate the negative impacts of winter weather, transportation agencies are under increasing pressure to introduce weather responsive ... 详细信息
来源: 评论