咨询与建议

限定检索结果

文献类型

  • 864 篇 会议
  • 830 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,695 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,028 篇 工学
    • 732 篇 计算机科学与技术...
    • 583 篇 软件工程
    • 232 篇 信息与通信工程
    • 172 篇 电气工程
    • 150 篇 生物工程
    • 138 篇 控制科学与工程
    • 115 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 96 篇 光学工程
    • 54 篇 机械工程
    • 48 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 39 篇 交通运输工程
    • 35 篇 安全科学与工程
    • 32 篇 土木工程
  • 599 篇 理学
    • 300 篇 数学
    • 170 篇 生物学
    • 159 篇 物理学
    • 94 篇 统计学(可授理学、...
    • 56 篇 化学
    • 52 篇 地球物理学
    • 42 篇 系统科学
  • 261 篇 管理学
    • 159 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 99 篇 医学
    • 82 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 47 篇 法学
    • 36 篇 社会学
  • 38 篇 农学
  • 25 篇 经济学
  • 15 篇 教育学
  • 5 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 60 篇 semantics
  • 60 篇 feature extracti...
  • 53 篇 deep learning
  • 47 篇 training
  • 46 篇 computational mo...
  • 43 篇 accuracy
  • 35 篇 predictive model...
  • 32 篇 machine learning
  • 30 篇 graph neural net...
  • 29 篇 data models
  • 27 篇 convolution
  • 26 篇 neural networks
  • 25 篇 image segmentati...
  • 24 篇 task analysis
  • 24 篇 data mining
  • 20 篇 contrastive lear...
  • 20 篇 federated learni...
  • 19 篇 memory managemen...
  • 18 篇 convolutional ne...
  • 17 篇 transformers

机构

  • 103 篇 national enginee...
  • 68 篇 school of comput...
  • 58 篇 shandong provinc...
  • 54 篇 school of cyber ...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 40 篇 national enginee...
  • 38 篇 university of ch...
  • 37 篇 beijing advanced...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 huazhong univers...
  • 28 篇 hubei key labora...
  • 22 篇 henan key labora...
  • 22 篇 school of softwa...
  • 21 篇 engineering rese...
  • 21 篇 college of compu...
  • 20 篇 zhejiang lab
  • 20 篇 research center ...

作者

  • 129 篇 jin hai
  • 125 篇 hai jin
  • 43 篇 xiaofei liao
  • 28 篇 liao xiaofei
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 yu zhang
  • 17 篇 zhao weisheng
  • 16 篇 zhang jie
  • 16 篇 yu huang
  • 15 篇 deqing zou
  • 14 篇 zhou ziqi
  • 13 篇 li yang
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng

语言

  • 1,500 篇 英文
  • 174 篇 其他
  • 41 篇 中文
检索条件"机构=Big Data and Intelligent Computing Research Center"
1695 条 记 录,以下是551-560 订阅
排序:
SAV-SE: Scene-aware Audio-Visual Speech Enhancement with Selective State Space Model
arXiv
收藏 引用
arXiv 2024年
作者: Qian, Xinyuan Gao, Jiaran Zhang, Yaodan Zhang, Qiquan Liu, Hexin Garcia, Leibny Paola Li, Haizhou The School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China The School of Electrical Engineering and Telecommunications The University of New South Wales Sydney2052 Australia The College of Computing and Data Science Nanyang Technological University Singapore The Center for Language and Speech Processing Johns Hopkins University United States The Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big data Shenzhen51872 China
Speech enhancement plays an essential role in various applications, and the integration of visual information has been demonstrated to bring substantial advantages. However, the majority of current research concentrat... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
Two-Stage Multi-modal Multi-objective Algorithm Based on Dynamic Niche Updating  11th
Two-Stage Multi-modal Multi-objective Algorithm Based on Dy...
收藏 引用
11th International Joint Conference on Rough Sets, IJCRS 2025
作者: Ji, Haonian Chen, Hongmei Mi, Yong Institute of Artificial Intelligence School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu 611756 China National Engering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu 611756 China Engering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education Southwest Jiaotong University Chengdu 611756 China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Southwest Jiaotong University Chengdu 611756 China
In solving multi-modal multi-objective optimization problems (MMOPs), objective and decision space changes need to be considered. However, many multi-modal multi-objective evolutionary algorithms (MMOEAs) tend to prio... 详细信息
来源: 评论
Quantum-Inspired Portfolio Optimization In The QUBO Framework
arXiv
收藏 引用
arXiv 2024年
作者: Lu, Ying-Chang Fu, Chao-Ming Yu, Lien-Po Chang, Yen-Jui Chang, Ching-Ray Department of Physics National Taiwan University Taipei Taiwan Institute for Information Industry Taipei Taiwan Master Program in Intelligent Computing and Big Data Chung Yuan Christian University Taoyuan City Taiwan Quantum Information Center Chung Yuan Christian University Taoyuan City Taiwan
A quantum-inspired optimization approach is proposed to study the portfolio optimization aimed at selecting an optimal mix of assets based on the risk-return trade-off to achieve the desired goal in investment. By int... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Incomplete Multi-view Clustering Based on Joint Concept Decomposition and Anchor Graph Learning  11th
Incomplete Multi-view Clustering Based on Joint Concept Dec...
收藏 引用
11th International Joint Conference on Rough Sets, IJCRS 2025
作者: Li, Zhuowen Chen, Hongmei Xiang, Biao Yuan, Zhong Luo, Chuan Li, Tianrui School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu 611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu 611756 China Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education Chengdu 611756 China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Southwest Jiaotong University Chengdu 611756 China College of Computer Science Sichuan University Chengdu 610065 China
The main objective of incomplete multi-view clustering is to effectively utilize the existing view information to fill in the missing data and to mine the complementary information and potential associations between m... 详细信息
来源: 评论
Privacy Protection Multi-copy Provable data Possession Supporting data Reliability  5th
Privacy Protection Multi-copy Provable Data Possession Suppo...
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Zhang, Feng Wen, Bin Yan, Yifei Zeng, Zhaowu Zhou, Wei School of Information Science and Technology Hainan Normal University Haikou571158 China Cloud Computing and Big Data Research Center Hainan Normal University Haikou571158 China Key Laboratory of Data Science and Smart Education Ministry of Education Hainan Normal University Haikou571158 China
With the development of technology, a massive amount of data continues to emerge, and there is still a strong demand for data storage. Outsourcing data to cloud service providers has become a common practice. Although... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
A Self-Supervised Transfer Learning Framework for Gland Segmentation in Colorectal Cancer Histopathology with Limited Labeled data  2nd
A Self-Supervised Transfer Learning Framework for Gland Segm...
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Wen, Huer Wu, Yan Huang, De-Shuang Institute for Regenerative Medicine Medical Innovation Center and State Key Laboratory of Cardiology Shanghai East Hospital School of Medicine Tongji University Shanghai200123 China Big Data and Intelligent Computing Research Center Guangxi Academy of Science Nanning530007 China Ningbo Institute of Digital TwinEastern Institute of Technology No. 568 Tongxin Road Zhuangshi Street Zhejiang Ningbo315201 China
Accurate gland segmentation in colorectal cancer histopathology images is crucial for diagnosis and grading but is hampered by the limited availability of annotated data. To develop a robust and accurate gland segment... 详细信息
来源: 评论
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Challenges and Approaches for Mitigating Byzantine Attacks i...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Junyu Shi Wei Wan Shengshan Hu Jianrong Lu Leo Yu Zhang School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Information Technology Deakin University
Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the tra... 详细信息
来源: 评论