咨询与建议

限定检索结果

文献类型

  • 1,015 篇 会议
  • 738 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,108 篇 工学
    • 879 篇 计算机科学与技术...
    • 737 篇 软件工程
    • 264 篇 信息与通信工程
    • 192 篇 生物工程
    • 148 篇 控制科学与工程
    • 106 篇 电气工程
    • 88 篇 电子科学与技术(可...
    • 83 篇 生物医学工程(可授...
    • 72 篇 光学工程
    • 67 篇 机械工程
    • 66 篇 化学工程与技术
    • 48 篇 动力工程及工程热...
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 29 篇 仪器科学与技术
    • 29 篇 交通运输工程
    • 28 篇 材料科学与工程(可...
  • 594 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 101 篇 物理学
    • 71 篇 化学
    • 55 篇 系统科学
  • 340 篇 管理学
    • 195 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 60 篇 医学
    • 52 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 17 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 72 篇 training
  • 69 篇 semantics
  • 65 篇 feature extracti...
  • 64 篇 deep learning
  • 39 篇 predictive model...
  • 36 篇 neural networks
  • 34 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 31 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 graph neural net...
  • 28 篇 reinforcement le...
  • 28 篇 optimization
  • 27 篇 conferences
  • 27 篇 federated learni...
  • 26 篇 cloud computing
  • 25 篇 contrastive lear...
  • 25 篇 costs

机构

  • 265 篇 school of big da...
  • 125 篇 school of big da...
  • 112 篇 college of compu...
  • 109 篇 national enginee...
  • 68 篇 shenzhen researc...
  • 57 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 35 篇 college of compu...
  • 32 篇 college of big d...
  • 31 篇 key laboratory o...
  • 31 篇 peng cheng labor...
  • 29 篇 chongqing univer...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 24 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 53 篇 shi qingjiang
  • 38 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 20 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 li liu
  • 18 篇 yan meng
  • 17 篇 hu chunqiang
  • 16 篇 hongyu zhang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,565 篇 英文
  • 173 篇 其他
  • 18 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1754 条 记 录,以下是491-500 订阅
排序:
Source Code Summarization in the Era of Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Weisong Miao, Yun Li, Yuekang Zhang, Hongyu Fang, Chunrong Liu, Yi Deng, Gelei Liu, Yang Chen, Zhenyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing China College of Computing and Data Science Nanyang Technological University Singapore Singapore School of Computer Science and Engineering University of New South Wales Sidney Australia School of Big Data and Software Engineering Chongqing University Chongqing China
To support software developers in understanding and maintaining programs, various automatic (source) code summarization techniques have been proposed to generate a concise natural language summary (i.e., comment) for ... 详细信息
来源: 评论
Research and development of two-factor authentication methods using neural networks  4
Research and development of two-factor authentication method...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Darbek, Temirkhan Mukasheva, Assel Bissembayev, Alibek Gnatyuk, Sergiy Mukammejanova, Dinargul The Department of Information Systems and Cybersecurity Almaty university of power engineering and telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The School of Information Technology and Engineering Kazakh British Technical University Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering at National Aviation University National Aviation University Kyiv Ukraine The Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论
big-Moe: Bypassing Isolated Gating For Generalized Multimodal Face Anti-Spoofing
Big-Moe: Bypassing Isolated Gating For Generalized Multimoda...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yingjie Ma Zitong Yu Xun Lin Weicheng Xie Linlin Shen College of Computer Science and Software Engineering Shenzhen University Great Bay University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing
In the domain of facial recognition security, multimodal Face Anti-Spoofing (FAS) is essential for countering presentation attacks. However, existing technologies encounter challenges due to modality biases and imbala... 详细信息
来源: 评论
Learning with Open-world Noisy data via Class-independent Margin in Dual Representation Space
arXiv
收藏 引用
arXiv 2025年
作者: Pan, Linchao Gao, Can Zhou, Jie Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Learning with Noisy Labels (LNL) aims to improve the model generalization when facing data with noisy labels, and existing methods generally assume that noisy labels come from known classes, called closed-set noise. H... 详细信息
来源: 评论
Learned Video Compression with Spatial-Temporal Optimization
Learned Video Compression with Spatial-Temporal Optimization
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yiming Wang Qian Huang Bin Tang Wenting Liu Wenchao Shan Qian Xu College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China
Previous optical flow based video compression is gradually replaced by unsupervised deformable convolution (DCN) based method. This is mainly due to the fact that the motion vector (MV) estimated by the existing optic...
来源: 评论
Establish a smart healthcare system with AIoT for Chinese Medicine  10
Establish a smart healthcare system with AIoT for Chinese Me...
收藏 引用
10th International Conference on Orange Technology, ICOT 2022
作者: Wei, Chun-Cheng Chen, Ching-Wen Hung, Lon-Chen School of Software and Big Data Changzhou College of Information Technology China Lunghwa University of Science and Technology Department of Multimedia and Game Science Taoyuan Taiwan Lunghwa University of Science and Technology Department of Electronic Engineering Taiwan
This study establishes an intelligent medical system for diagnosis and treatment of Chinese medicine. Temperature and heart rate were measured using a variety of Internet of things technologies, including the WeMos D1... 详细信息
来源: 评论
Domain Adaptation Random Vector Functional Link for White Blood Cell Classification
Domain Adaptation Random Vector Functional Link for White Bl...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Qin Wang Xi-Zhao Wang Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
There's growing recognition of how machine learning can revolutionize the precision and swiftness of clinical diagnoses by improving the classification of white blood cells. However, a machine learning model speci... 详细信息
来源: 评论
Deep Wavelet Frequency Laplacian Pyramid Network for Vehicle Logo Super-Resolution  5
Deep Wavelet Frequency Laplacian Pyramid Network for Vehicle...
收藏 引用
5th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2022
作者: Yu, Yue She, Kun Kang, Jian Jackson, Jehoiada Shaukat, Hayat Li, Yang University of Electronic Science and Technology of China Information and Software Engineering Chengdu China Sichuan Provincial Big Data Technology Services Center Chengdu China Iqra National University Department of Computer Science Peshawar Pakistan
In intelligent transportation systems, generated high-resolution images promote high-level version tasks compared to captured low-resolution vehicle logo images, which lack adequate details. However, the resolution of... 详细信息
来源: 评论
A new generation method of basic probability assignment based on the normal membership function
A new generation method of basic probability assignment base...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Fu, Yun Tang, Yongchuan Zhou, Deyun Chongqing University College of Computer Science Chongqing400030 China Chongqing University School of Big Data and Software Engineering Chongqing401331 China Northwestern Polytechnical University School of Microelectronics Shaanxi Xi'an710072 China
Dempster-Shafer evidence theory is an important technique to fuse uncertain information and make decisions. As the first step of applying the evidence theory in practical applications, the generation of basic probabil... 详细信息
来源: 评论
Learning with Open-world Noisy data via Class-independent Margin in Dual Representation Space  39
Learning with Open-world Noisy Data via Class-independent Ma...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Pan, Linchao Gao, Can Zhou, Jie Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Learning with Noisy Labels (LNL) aims to improve the model generalization when facing data with noisy labels, and existing methods generally assume that noisy labels come from known classes, called closed-set noise. H... 详细信息
来源: 评论