咨询与建议

限定检索结果

文献类型

  • 1,014 篇 会议
  • 727 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,742 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,097 篇 工学
    • 867 篇 计算机科学与技术...
    • 741 篇 软件工程
    • 260 篇 信息与通信工程
    • 192 篇 生物工程
    • 132 篇 控制科学与工程
    • 105 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 82 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 机械工程
    • 66 篇 化学工程与技术
    • 47 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 32 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 仪器科学与技术
    • 29 篇 交通运输工程
  • 595 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 100 篇 物理学
    • 71 篇 化学
    • 55 篇 系统科学
  • 338 篇 管理学
    • 194 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 18 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 71 篇 training
  • 69 篇 semantics
  • 63 篇 deep learning
  • 63 篇 feature extracti...
  • 39 篇 predictive model...
  • 36 篇 neural networks
  • 34 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 graph neural net...
  • 28 篇 reinforcement le...
  • 27 篇 conferences
  • 27 篇 optimization
  • 27 篇 federated learni...
  • 26 篇 cloud computing
  • 25 篇 contrastive lear...
  • 25 篇 costs

机构

  • 263 篇 school of big da...
  • 125 篇 school of big da...
  • 111 篇 college of compu...
  • 108 篇 national enginee...
  • 68 篇 shenzhen researc...
  • 56 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 34 篇 college of compu...
  • 31 篇 college of big d...
  • 31 篇 peng cheng labor...
  • 30 篇 key laboratory o...
  • 29 篇 chongqing univer...
  • 29 篇 state key labora...
  • 26 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 24 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 53 篇 shi qingjiang
  • 38 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 20 篇 li leixiao
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 meng yan
  • 18 篇 yan meng
  • 17 篇 li liu
  • 17 篇 hu chunqiang
  • 16 篇 hongyu zhang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,572 篇 英文
  • 154 篇 其他
  • 18 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1742 条 记 录,以下是731-740 订阅
排序:
An Optimal Network Coverage-oriented Operators Network Automatic Planning Strategy  5
An Optimal Network Coverage-oriented Operators Network Autom...
收藏 引用
5th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2022
作者: Gou, Haosong Su, Ling Zhang, Gaoyi Huang, Wei Yang, Yang Rao, Yunbo China Mobile Communications Group Sichuan Co. Ltd. Chengdu China Chengdu Aerospace Science and Industry Big Data Research Institute Co. Ltd. Chengdu China University of Electronic Science and Technology of China School of Information and Software Engineering China
With the constant expansion of the scale of the operators' network, the difficulty of network planning is also significantly increased. The traditional way of manual network planning highly depends on engineers... 详细信息
来源: 评论
DarkFed: A data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Enhance Learning Efficiency of Oblique Decision Tree via Feature Concatenation
arXiv
收藏 引用
arXiv 2025年
作者: Lyu, Shen-Huan He, Yi-Xiao Wang, Yanyan Qu, Zhihao Tang, Bin Ye, Baoliu Key Laboratory of Water Big Data Technology of Ministry of Water Resources College of Computer Science and Software Engineering Hohai University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China
Oblique Decision Tree (ODT) separates the feature space by linear projections, as opposed to the conventional Decision Tree (DT) that forces axis-parallel splits. ODT has been proven to have a stronger representation ... 详细信息
来源: 评论
BADROBOT: JAILBREAKING EMBODIED LLMS IN THE PHYSICAL WORLD
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Zhu, Chenyu Wang, Xianlong Zhou, Ziqi Yin, Changgan Li, Minghui Xue, Lulu Wang, Yichen Hu, Shengshan Liu, Aishan Guo, Peijin Zhang, Leo Yu National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Beihang University China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facil... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
A Study Of Voiceprint Recognition Technology Based on Deep Learning
A Study Of Voiceprint Recognition Technology Based on Deep L...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Jingyi Li Qin Xu Michel Kadoch School of Big Data and Software Chongqing College of Mobile Telecommunications Chongqing China Department of Electrical Engineering ETS University of Quebec Canada
Voiceprint recognition technology is a high-quality identification technology, which is currently widely used in all walks of life and brings great convenience to our lives. In order to better promote the actual appli... 详细信息
来源: 评论
An improved conflict evidence management approach using base belief function for uncertain prior information modeling
An improved conflict evidence management approach using base...
收藏 引用
第42届中国控制会议
作者: Yongchuan Tang Yonghao Zhou Ying Zhou Shuang Ni Yubo Huang Deyun Zhou School of Microelectronics Northwestern Polytechnical University School of Computer Science Northwestern Polytechnical University School of Electronics and Information Northwestern Polytechnical University School of Big Data and Software Engineering Chongqing University School of Engineering University of Warwick
Due to the complexity in practical environment,there are a variety of interference resulting in inaccurate information which will directly affect the final result of data *** the era of big data,as the number of fusin...
来源: 评论
Geographic-Semantic-Temporal Hypergraph Convolutional Network for Traffic Flow Prediction
Geographic-Semantic-Temporal Hypergraph Convolutional Networ...
收藏 引用
International Conference on Pattern Recognition
作者: Kesu Wang Jing Chen Shijie Liao Jiaxin Hou Qingyu Xiong School of Big Data & Software Engineering Chongqing University Chongqing China
Traffic flow forecasting has become an increasingly important part of intelligent traffic control and management. This task is challenging due to (1) complex geographic and non-geographic spatial correlations; (2) tem... 详细信息
来源: 评论
Dependency-Aware Hybrid Task Offloading in Mobile Edge Computing Networks  27
Dependency-Aware Hybrid Task Offloading in Mobile Edge Compu...
收藏 引用
27th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2021
作者: Ming, Zhao Li, Xiuhua Sun, Chuan Fan, Qilin Wang, Xiaofei Leung, Victor C. M. School of Big Data and Software Engineering Chongqing University Chongqing China TKLAN College of Intelligence and Computing Tianjin University Tianjin China College of Computer Science and Software Engineering Shenzhen University Shenzhen China The University of British Columbia Department of Electrical and Computer Engineering Vancouver Canada
With the rapid increase of data in mobile edge computing (MEC) networks, mobile devices (MDs) have been generating many computation-latency-sensitive tasks. As the MDs are limited by resources in terms of storage, com... 详细信息
来源: 评论