咨询与建议

限定检索结果

文献类型

  • 855 篇 会议
  • 815 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,671 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,005 篇 工学
    • 710 篇 计算机科学与技术...
    • 576 篇 软件工程
    • 226 篇 信息与通信工程
    • 164 篇 电气工程
    • 147 篇 生物工程
    • 126 篇 控制科学与工程
    • 110 篇 电子科学与技术(可...
    • 100 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 53 篇 机械工程
    • 49 篇 仪器科学与技术
    • 45 篇 动力工程及工程热...
    • 38 篇 化学工程与技术
    • 36 篇 交通运输工程
    • 34 篇 安全科学与工程
    • 33 篇 土木工程
  • 592 篇 理学
    • 299 篇 数学
    • 170 篇 生物学
    • 157 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 52 篇 化学
    • 52 篇 地球物理学
    • 41 篇 系统科学
  • 257 篇 管理学
    • 155 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 96 篇 医学
    • 81 篇 临床医学
    • 60 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 49 篇 法学
    • 38 篇 社会学
  • 38 篇 农学
  • 25 篇 经济学
  • 15 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 60 篇 semantics
  • 60 篇 feature extracti...
  • 52 篇 deep learning
  • 47 篇 training
  • 46 篇 computational mo...
  • 43 篇 accuracy
  • 35 篇 predictive model...
  • 32 篇 machine learning
  • 29 篇 graph neural net...
  • 29 篇 data models
  • 27 篇 convolution
  • 26 篇 image segmentati...
  • 26 篇 neural networks
  • 24 篇 task analysis
  • 24 篇 data mining
  • 20 篇 federated learni...
  • 19 篇 contrastive lear...
  • 18 篇 memory managemen...
  • 18 篇 convolutional ne...
  • 17 篇 transformers

机构

  • 102 篇 national enginee...
  • 68 篇 school of comput...
  • 58 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 40 篇 national enginee...
  • 39 篇 university of ch...
  • 37 篇 beijing advanced...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 huazhong univers...
  • 28 篇 hubei key labora...
  • 22 篇 henan key labora...
  • 22 篇 school of softwa...
  • 21 篇 engineering rese...
  • 20 篇 research center ...
  • 19 篇 college of infor...
  • 19 篇 college of compu...

作者

  • 124 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 18 篇 zhang jie
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 yu zhang
  • 17 篇 zhao weisheng
  • 16 篇 yu huang
  • 15 篇 deqing zou
  • 14 篇 li yang
  • 14 篇 zhou ziqi
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng

语言

  • 1,504 篇 英文
  • 148 篇 其他
  • 39 篇 中文
检索条件"机构=Big Data and Intelligent Computing Research Center"
1671 条 记 录,以下是641-650 订阅
排序:
Multimodal Stacked Cross Attention Network for Fine-Grained Fake News Detection
Multimodal Stacked Cross Attention Network for Fine-Grained ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhongqiang Huang Yuxue Hu Zhi Zeng Xiang Li Ying Sha College of Informatics Huazhong Agricultural University Wuhan China Key Laboratory of Smart Farming for Agricultural Animals Wuhan China Hubei Engineering Technology Research Center of Agricultural Big Data Wuhan China Engineering Research Center of Intelligent Technology for Agriculture Ministry of Education Wuhan China
Fake news is usually disseminated in a multimodal form, which incorporates natural language, visual language, and so on. Therefore, many deep learning approaches are proposed to detect multimodal fake news. However, a...
来源: 评论
Predicting circRNA-disease associations using similarity assessing graph convolution from multi-source information networks
Predicting circRNA-disease associations using similarity ass...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yang Li Xue-Gang Hu Pei-Pei Li Lei Wang Zhu-Hong You School of Computer Science and Information Engineering Hefei University of Technology Hefei China Big Data and Intelligent Computing Research Center Guangxi Academy of Sciences) Nanning China School of Computer Science Northwestern Polytechnical University Xi’an China
Circular RNA (circRNA), a novel endogenous noncoding RNA molecule with a closed-loop structure, can be used as a biomarker for many complex human diseases. Determining the relationship between circRNAs and diseases he... 详细信息
来源: 评论
A data-Driven Approach Towards Software Regression Testing Quality Optimization  25
A Data-Driven Approach Towards Software Regression Testing Q...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Moubayed, Abdallah Alhindawi, Nouh Alsakran, Jamal Injadat, MohammadNoor Kanan, Mohammad King Fahd University of Petroleum & Minerals Computer Engineering Department Interdisciplinary Research Center for Intelligent Secure Systems Dhahran Saudi Arabia Arizona State University School of Computing and Augmented Intelligence GilbertAZ United States Jadara University Department of Software Engineering Irbid Jordan Fairleigh Dickinson University Canada Zarqa University Data Science & Artificial Intelligence Department Zarqa Jordan University of Business and Technology Department of Industrial Engineering Jeddah Saudi Arabia
Software testing is very important in software development to ensure its quality and reliability. As software systems have become more complex, the number of test cases has increased, which presents the challenge of e... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Oriented Object Detection in Aerial Images with Double Midpoint Vectors
Oriented Object Detection in Aerial Images with Double Midpo...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiaoke Zhu Qi Hu Xiaopan Chen Caihong Yuan Minghao Li School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
In recent years, oriented object detection technology has made significant progress. Most oriented object detectors represent oriented bounding boxes by adding additional angle information to the horizontal bounding b...
来源: 评论
Temporal Transformation Network Based On Scale Sequences for Cloth-Changing Person Re-Identification in Video datasets
Temporal Transformation Network Based On Scale Sequences for...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiaoke Zhu Bo Zhao Zhiwei Dong Lingyun Dong Danyang Li School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
This paper introduces the Temporal Transform Network based on Scale Sequences (TTS) for cloth-changing person re-identification in video datasets. The TTS network is designed to capture multi-scale temporal cues withi...
来源: 评论
STSE-xLSTM: A Deep Learning Framework for Automated Seizure Detection in Long Video Sequences Using Spatio-Temporal and Attention Mechanisms  10
STSE-xLSTM: A Deep Learning Framework for Automated Seizure ...
收藏 引用
10th International Conference on Computer and Communications, ICCC 2024
作者: Ding, Lihui Wang, Hongliang Fu, Lijun Shenyang Institute of Computing Technology University of Chinese Academy of Sciences Shenyang China Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shandong University Laboratory of Big Data and Artificial Intelligence Technology Beijing China
A detailed analysis of seizure semiology, the symptoms and signs that occur during a seizure, is crucial for the management of epilepsy patients. The inter-rater reliability of qualitative visual analysis is often low... 详细信息
来源: 评论
Social Internet of Tings Trust Management Based on Implicit Social Relationship  5th
Social Internet of Tings Trust Management Based on Implicit ...
收藏 引用
5th International Conference on Security and Privacy in New computing Environments, SPNCE 2022
作者: Zhang, Hongbin Fan, Fan Zhao, Dongmei Liu, Bin Wang, Yanxia Liu, Jian School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang China Hebei Geological Workers’ University Shijiazhuang050081 China
The "Social Internet of Things (SIoT)" is a combination of the Internet of Things (IoT) and social networks to form a new paradigm. The SIoT promotes the development of smart cities, smart transportation, an... 详细信息
来源: 评论
Self-supervised fast reconstruction method for diffusion MRI based on multi-directional assistance
Self-supervised fast reconstruction method for diffusion MRI...
收藏 引用
International Conference on Signal Processing Proceedings (ICSP)
作者: Yuxin Wu Jian Zhang Lihui Wang Ying Cao Linhai Wu Yunjia Wu Chen Ye Yuemin Zhu State Key Laboratory of Public Big Data College of Computer Science and Technology Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Guizhou University Guiyang China INSA Lyon CNRS Inserm CREATIS UMR 5220 U1206 Univ Lyon France
Diffusion MRI (dMRI) is widely used for the detection and diagnosis of various pathologies due to its non-invasive nature. However, its signal acquisition process is relatively slow and susceptible to motions. In orde... 详细信息
来源: 评论
A Stepwise Path Selection Scheme Based on Multiple QoS Parameters Evaluation in SDN  17th
A Stepwise Path Selection Scheme Based on Multiple QoS Param...
收藏 引用
17th EAI International Conference on Collaborative computing: Networking, Applications, and Worksharing, CollaborateCom 2021
作者: Liu, Lin Zhou, Jian-Tao Xing, Hai-Feng Guo, Xiao-Yong College of Computer Science Ecological Big Data Engineering Research Center of the Ministry of Education Cloud Computing and Service Software Engineering Laboratory of Inner Mongolia Autonomous Region National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Social Computing and Data Processing Key Laboratory of Inner Mongolia Autonomous Region Big Data Analysis Technology Engineering Research Center of Inner Mongolia Autonomous Region Inner Mongolia University Inner Mongolia Hohhot China College of Computer Science and Technology Inner Mongolia Normal University Inner Mongolia Hohhot China College of Computer Information and Management Inner Mongolia University of Finance and Economics Inner Mongolia Hohhot China
Nowadays, the best-effort service can not guarantee the quality of service (QoS) for all kinds of services. QoS routing is an important method to guarantee QoS requirements. It involves path selection for flows based ... 详细信息
来源: 评论