咨询与建议

限定检索结果

文献类型

  • 838 篇 会议
  • 816 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,655 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 987 篇 工学
    • 697 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 221 篇 信息与通信工程
    • 161 篇 电气工程
    • 145 篇 生物工程
    • 117 篇 控制科学与工程
    • 110 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 51 篇 机械工程
    • 47 篇 仪器科学与技术
    • 45 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 33 篇 安全科学与工程
    • 32 篇 土木工程
  • 579 篇 理学
    • 291 篇 数学
    • 169 篇 生物学
    • 153 篇 物理学
    • 92 篇 统计学(可授理学、...
    • 51 篇 地球物理学
    • 50 篇 化学
    • 42 篇 系统科学
  • 254 篇 管理学
    • 156 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 93 篇 医学
    • 77 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 46 篇 法学
    • 35 篇 社会学
  • 38 篇 农学
  • 25 篇 经济学
  • 15 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 60 篇 semantics
  • 60 篇 feature extracti...
  • 49 篇 deep learning
  • 46 篇 computational mo...
  • 46 篇 training
  • 43 篇 accuracy
  • 34 篇 predictive model...
  • 32 篇 machine learning
  • 29 篇 data models
  • 26 篇 neural networks
  • 26 篇 convolution
  • 26 篇 graph neural net...
  • 25 篇 image segmentati...
  • 24 篇 task analysis
  • 24 篇 data mining
  • 20 篇 federated learni...
  • 19 篇 memory managemen...
  • 19 篇 contrastive lear...
  • 18 篇 convolutional ne...
  • 17 篇 transformers

机构

  • 100 篇 national enginee...
  • 66 篇 school of comput...
  • 58 篇 shandong provinc...
  • 51 篇 school of cyber ...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 37 篇 national enginee...
  • 36 篇 university of ch...
  • 36 篇 beijing advanced...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 huazhong univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 22 篇 henan key labora...
  • 21 篇 college of compu...
  • 20 篇 engineering rese...
  • 20 篇 school of softwa...
  • 20 篇 zhejiang lab
  • 20 篇 research center ...

作者

  • 126 篇 jin hai
  • 125 篇 hai jin
  • 43 篇 xiaofei liao
  • 27 篇 liao xiaofei
  • 23 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 17 篇 zou deqing
  • 17 篇 yu zhang
  • 17 篇 zhao weisheng
  • 16 篇 zhang leo yu
  • 16 篇 yu huang
  • 15 篇 deqing zou
  • 15 篇 zhang jie
  • 13 篇 li yang
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng
  • 13 篇 jiang xiao

语言

  • 1,532 篇 英文
  • 102 篇 其他
  • 40 篇 中文
检索条件"机构=Big Data and Intelligent Computing Research Center"
1655 条 记 录,以下是411-420 订阅
排序:
AsT: An Asymmetric-Sensitive Transformer for Osteonecrosis of the Femoral Head Detection  37
AsT: An Asymmetric-Sensitive Transformer for Osteonecrosis o...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Chen, Haoyang Liu, Shuai Lu, Feng Li, Wei Sheng, Bin Li, Mi Jin, Hai Zomaya, Albert Y. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Centre for Distributed and High Performance Computing School of Computer Science The University of Sydney Australia Department of Computer Science and Engineering Shanghai Jiao Tong University China Tongji Hospital Tongji Medical College Huazhong University of Science and Technology China
Early diagnosis of osteonecrosis of the femoral head (ONFH) can inhibit the progression and improve femoral head preservation. The radiograph difference between early ONFH and healthy ones is not apparent to the naked... 详细信息
来源: 评论
SCRN: A Spectrogram Convolutional Recurrent Network for AoA Estimation Using Bluetooth 5
SCRN: A Spectrogram Convolutional Recurrent Network for AoA ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wentao Shi Baoqi Huang Bing Jia Engineering Research Center of Ecological Big Data Ministry of Education China Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer Science Inner Mongolia University Hohhot China
Bluetooth 5 employs Constant Tone Extension (CTE) signals to simulate arrival times of a common signal at multiple antennas, but incurs limited accuracy due to inevitable frequency offsets caused by Gaussian frequency...
来源: 评论
Symptom Dimensions and Cognitive Impairments in Individuals at Clinical High Risk for Psychosis
收藏 引用
Biological Psychiatry: Cognitive Neuroscience and Neuroimaging 2024年 第6期10卷 646-655页
作者: Zhang, TianHong Xu, LiHua Wei, YanYan Cui, HuiRu Tang, XiaoChen Hu, YeGang Liu, HaiChun Wang, ZiXuan Chen, Tao Yi, ZhengHui Li, ChunBo Wang, JiJun Shanghai Mental Health Center Shanghai Jiaotong University School of Medicine Shanghai Engineering Research Center of Intelligent Psychological Evaluation and Intervention Shanghai Key Laboratory of Psychotic Disorders Shanghai China Department of Automation Shanghai Jiao Tong University Shanghai China Department of Psychology Shanghai Xinlianxin Psychological Counseling Center Shanghai China Big Data Research Laboratory University of Waterloo Waterloo ON Canada Labor and Worklife Program Harvard University Cambridge Massachusetts United States Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences Shanghai China Institute of Psychology and Behavioral Science Shanghai Jiao Tong University Shanghai China
Background: Understanding the intricate relationships between symptom dimensions, clusters, and cognitive impairments is crucial for early detection and intervention in individuals at clinical high risk for psychosis.... 详细信息
来源: 评论
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
Synthesis of Decoherence-Free Modes in Linear Quantum Passive Systems via Robust Pole Placement
Synthesis of Decoherence-Free Modes in Linear Quantum Passiv...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Miao, Zibo Pan, Yu Gao, Qing School of Mechanical Engineering and Automation Adaptive Robotics Harbin Institute of Technology Guangdong Key Laboratory of Intelligent Morphing Mechanisms Shenzhen518055 China The Institute of Cyber-Systems and Control College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China The School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
In this paper we extend our previous research on coherent observer-based pole placement approach to study the synthesis of robust decoherence-free (DF) modes for linear quantum passive systems, which is aimed at prese... 详细信息
来源: 评论
A Survey of Non-Volatile Main Memory Technologies:State-of-the-Arts,Practices,and Future Directions
收藏 引用
Journal of Computer Science & Technology 2021年 第1期36卷 4-32页
作者: Hai-Kun Liu Di Chen Hai Jin Xiao-Fei Liao Binsheng He Kan Hu Yu Zhang National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan 430074China Cluster and Grid Computing Laboratory Huazhong University of Science and TechnologyWuhan 430074China School of Computing Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Computing National University of SingaporeSingapore 117418Singapore
Non-Volatile Main Memories (NVMMs) have recently emerged as a promising technology for future memory systems. Generally, NVMMs have many desirable properties such as high density, byte-addressability, non-volatility, ... 详细信息
来源: 评论
Prompt-based Unifying Inference Attack on Graph Neural Networks
arXiv
收藏 引用
arXiv 2024年
作者: Wei, Yuecen Fu, Xingcheng Liu, Lingyun Sun, Qingyun Peng, Hao Hu, Chunming School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China
Graph neural networks (GNNs) provide important prospective insights in applications such as social behavior analysis and financial risk analysis based on their powerful learning capabilities on graph data. Nevertheles... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
U-Star: AN Asymmetric U-Shaped Network Based on Element-Wise Multiplication to Segment Nuclei in H&E Stained Histological Images
U-Star: AN Asymmetric U-Shaped Network Based on Element-Wise...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Guangzhengao Yang Li Zhang Jie Zhao Zifan Chen Haoshen Li Bin Dong Center for Data Science Peking University China National Engineering Laboratory for Big Data Analysis and Applications Peking University China Peking University Changsha Institute for Computing and Digital Economy China Beijing International Center for Mathematical Research Peking University China Center for Machine Learning Research Peking University China National Biomedical Imaging Center Peking University China
Nuclei segmentation in Hematoxylin and Eosin (H&E) stained images plays a crucial role in cancer diagnosis and pathological evaluation, enabling pathologists to identify abnormal cells and assess their morphology ... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论