咨询与建议

限定检索结果

文献类型

  • 1,015 篇 会议
  • 738 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,108 篇 工学
    • 879 篇 计算机科学与技术...
    • 737 篇 软件工程
    • 264 篇 信息与通信工程
    • 192 篇 生物工程
    • 148 篇 控制科学与工程
    • 106 篇 电气工程
    • 88 篇 电子科学与技术(可...
    • 83 篇 生物医学工程(可授...
    • 72 篇 光学工程
    • 67 篇 机械工程
    • 66 篇 化学工程与技术
    • 48 篇 动力工程及工程热...
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 29 篇 仪器科学与技术
    • 29 篇 交通运输工程
    • 28 篇 材料科学与工程(可...
  • 594 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 101 篇 物理学
    • 71 篇 化学
    • 55 篇 系统科学
  • 340 篇 管理学
    • 195 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 60 篇 医学
    • 52 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 17 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 72 篇 training
  • 69 篇 semantics
  • 65 篇 feature extracti...
  • 64 篇 deep learning
  • 39 篇 predictive model...
  • 36 篇 neural networks
  • 34 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 31 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 graph neural net...
  • 28 篇 reinforcement le...
  • 28 篇 optimization
  • 27 篇 conferences
  • 27 篇 federated learni...
  • 26 篇 cloud computing
  • 25 篇 contrastive lear...
  • 25 篇 costs

机构

  • 265 篇 school of big da...
  • 125 篇 school of big da...
  • 112 篇 college of compu...
  • 109 篇 national enginee...
  • 68 篇 shenzhen researc...
  • 57 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 35 篇 college of compu...
  • 32 篇 college of big d...
  • 31 篇 key laboratory o...
  • 31 篇 peng cheng labor...
  • 29 篇 chongqing univer...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 24 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 53 篇 shi qingjiang
  • 38 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 20 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 li liu
  • 18 篇 yan meng
  • 17 篇 hu chunqiang
  • 16 篇 hongyu zhang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,565 篇 英文
  • 173 篇 其他
  • 18 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1754 条 记 录,以下是471-480 订阅
排序:
DCML: Boosting Applying Experience of NILM with Dilated Convolution and Multi-Task Learning
DCML: Boosting Applying Experience of NILM with Dilated Conv...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: ZhangMengru Zhao Fan Wu Huaqing Wu Tong Liu Conghao Zhou Jun Ma Yongmin Zhang Feng Lyu School of Computer Science and Engineering Central South University Changsha China Department of Electrical and Software Engineering University of Calgary Calgary AB Canada Big Data Institute Central South University Changsha China Department of Electrical and Computer Engineering University of Waterloo Waterloo Ontario Canada Hunan Energy Big Data Intelligence Limited Changsha China
Non-intrusive load monitoring (NILM) is a promising approach for recognizing various electrical equipment energy usage patterns from aggregate load data. In this paper, we investigate the development of an NILM model ... 详细信息
来源: 评论
Research and Design of Remote Online Supervision System of Coal Mine Electromechanical Equipment  3
Research and Design of Remote Online Supervision System of C...
收藏 引用
2021 3rd International Conference on Computer, Communications and Mechatronics engineering, CCME 2021
作者: Chen, Yunqi Xu, Jin China Coal Technology Engineering Group Chongqing Research Institute No. 6 Kecheng Road Jiulongpo District Chongqing China School of Big Data and Software Enginecring Chongqing University Chongqing400000 China
Increasing the supervision of coal mine electromechanical equipment is an urgent need to ensure the safe production of coal mines. This paper designs and develops a coal mine electromechanical equipment supervision sy... 详细信息
来源: 评论
Robust Network Optimization by Deep Generative Models and Stochastic Optimization
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Zhang, Shutao Xue, Ye Tang, Zhiwei Wang, Hao Shen, Chao Shi, Qingjiang Chang, Tsung-Hui The Chinese University of Hon g Kong School of Science and Engineering Shenzhen China Shenzhen Research Institute of Big Data Shenzhen China The Chinese University of Hon g Kong School of Data Science Shenzhen China Shenzhen Research Institute of Big Data Shenzhen International Center for Industrial and Applied Mathematics China Guangdong Provincial Engineering Technology Research Center for Intelligent Industrial Digital Twin and Optimization Shenzhen518172 China Tongji University School of Software Engineering Shanghai China
Wireless network optimization is essential for improving the network performance in mobile communications. However, due to the stochastic nature of wireless networks, existing schemes based on analytical models and de... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
Evaluate-and-Purify: Fortifying Code Language Models Against Adversarial Attacks Using LLM-as-a-Judge
arXiv
收藏 引用
arXiv 2025年
作者: Mu, Wenhan Xu, Ling Pei, Shuren Mi, Le Zhou, Huichi School of Big Data and Software Engineering Chongqing University Chongqing China Imperial College London Exhibition Road LondonSW7 2AZ United Kingdom
The widespread adoption of code language models in software engineering tasks has exposed vulnerabilities to adversarial attacks, especially the identifier substitution attacks. Although existing identifier substituti... 详细信息
来源: 评论
Optimization of a Deep Learning Algorithm for Security Protection of big data from Video Images
收藏 引用
Computational Intelligence and Neuroscience 2022年 第0期2022卷 3394475页
作者: Geng, Qiang Yan, Huifeng Lu, Xingru School of Big Data and Software Engineering Chongqing College of Mobile Communication Chongqing401520 China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420 China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China
With the rapid development of communication technology, digital technology has been widely used in all walks of life. Nevertheless, with the wide dissemination of digital information, there are many security problems.... 详细信息
来源: 评论
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach  22
Reentrancy Vulnerability Detection and Localization: A Deep ...
收藏 引用
Proceedings of the 37th IEEE/ACM International Conference on Automated software engineering
作者: Zhuo Zhang Yan Lei Meng Yan Yue Yu Jiachi Chen Shangwen Wang Xiaoguang Mao School of Big Data & Software Chongqing University China College of Computer National University of Defense Technology China School of Software Engineering Sun Yat-sen University China
Smart contracts have been widely and rapidly used to automate financial and business transactions together with blockchains, helping people make agreements while minimizing trusts. With millions of smart contracts dep... 详细信息
来源: 评论
PFME: A Modular Approach for Fine-grained Hallucination Detection and Editing of Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kunquan Huang, Zeyu Li, Chen Lin, Chenghua Gao, Min Rong, Wenge SCSE Beihang University China ILCC The University of Edinburgh United Kingdom DCS University of Manchester United Kingdom School of Big Data and Software Engineering Chongqing University China
Large Language Models (LLMs) excel in fluency but risk producing inaccurate content, called "hallucinations." This paper outlines a standardized process for categorizing fine-grained hallucination types (Mis... 详细信息
来源: 评论
BIM: Improving Graph Neural Networks with Balanced Influence Maximization  40
BIM: Improving Graph Neural Networks with Balanced Influence...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Zhang, Wentao Gao, Xinyi Yang, Ling Cao, Meng Huang, Ping Shan, Jiulong Yin, Hongzhi Cui, Bin Peking University Center for Machine Learning Research China Institute of Advanced Algorithms Research Shanghai China National Engineering Labratory for Big Data Analytics and Applications The University of Queensland Australia Peking University Key Lab of High Confidence Software Technologies China Apple Inc. Institute of Computational Social Science Peking University Qingdao China
The imbalanced data classification problem has aroused lots of concerns from both academia and industry since data imbalance is a widespread phenomenon in many real-world scenarios. Although this problem has been well... 详细信息
来源: 评论
Why not Just Look for Answers? Using a More Direct Way for API Recommendation
Why not Just Look for Answers? Using a More Direct Way for A...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Changxin Liu Ling Xu Wenhan Mu Rui Qin Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China
Automated API recommendation technology can help developers quickly find target APIs that meet their require-ments. Some retrieval-based API recommendation approaches, such as BIKER and CLEAR, adopt an indirect API re... 详细信息
来源: 评论