咨询与建议

限定检索结果

文献类型

  • 1,032 篇 会议
  • 731 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,764 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,103 篇 工学
    • 874 篇 计算机科学与技术...
    • 744 篇 软件工程
    • 260 篇 信息与通信工程
    • 192 篇 生物工程
    • 137 篇 控制科学与工程
    • 109 篇 电气工程
    • 85 篇 电子科学与技术(可...
    • 83 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 68 篇 机械工程
    • 65 篇 化学工程与技术
    • 46 篇 动力工程及工程热...
    • 34 篇 网络空间安全
    • 32 篇 建筑学
    • 31 篇 交通运输工程
    • 30 篇 土木工程
    • 29 篇 仪器科学与技术
  • 593 篇 理学
    • 343 篇 数学
    • 202 篇 生物学
    • 130 篇 统计学(可授理学、...
    • 99 篇 物理学
    • 71 篇 化学
    • 55 篇 系统科学
  • 342 篇 管理学
    • 196 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 64 篇 医学
    • 55 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 31 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 18 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 70 篇 semantics
  • 70 篇 training
  • 67 篇 feature extracti...
  • 63 篇 deep learning
  • 40 篇 predictive model...
  • 36 篇 neural networks
  • 36 篇 data models
  • 34 篇 machine learning
  • 34 篇 accuracy
  • 32 篇 computational mo...
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 federated learni...
  • 28 篇 reinforcement le...
  • 28 篇 graph neural net...
  • 27 篇 conferences
  • 27 篇 optimization
  • 27 篇 contrastive lear...
  • 27 篇 cloud computing
  • 26 篇 adaptation model...

机构

  • 269 篇 school of big da...
  • 126 篇 school of big da...
  • 112 篇 college of compu...
  • 108 篇 national enginee...
  • 67 篇 shenzhen researc...
  • 58 篇 school of softwa...
  • 56 篇 school of softwa...
  • 36 篇 college of compu...
  • 35 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 31 篇 college of big d...
  • 31 篇 peng cheng labor...
  • 30 篇 state key labora...
  • 29 篇 chongqing univer...
  • 27 篇 college of compu...
  • 27 篇 school of comput...
  • 27 篇 school of softwa...
  • 26 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 52 篇 shi qingjiang
  • 39 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 24 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 19 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 yan meng
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 17 篇 hongyu zhang
  • 17 篇 li liu
  • 17 篇 zhang xiaohong
  • 17 篇 hu chunqiang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li

语言

  • 1,368 篇 英文
  • 383 篇 其他
  • 18 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1764 条 记 录,以下是871-880 订阅
排序:
Can Large Language Models Understand Intermediate Representations?
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Hailong Zhu, Jianfeng Wan, Yao Fang, Bo Zhang, Hongyu Jin, Ruoming Guan, Qiang Department of Computer Science Kent State University Kent United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Pacific Northwest National Laboratory Richland United States School of Big Data and Software Engineering Chongqing University Chongqing China
Intermediate Representations (IRs) are essential in compiler design and program analysis, yet their comprehension by Large Language Models (LLMs) remains underexplored. This paper presents a pioneering empirical study... 详细信息
来源: 评论
Optimized Dynamic Watermarking for Audio DNNs with Adaptive Embedding and Boundary Sampling
Optimized Dynamic Watermarking for Audio DNNs with Adaptive ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hao Fei Hewang Nie Siqi Sun Songfeng Lu Ting Luo Ling Qian Dunbo Cai Zhiguo Huang Runqing Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China China Mobile (Suzhou) Software Technology Company Limited Suzhou China
The intensified concerns arising from the widespread adoption of deep learning have led to increased scrutiny of intellectual property protection in DNN models. Existing audio watermarking techniques, predominantly ba... 详细信息
来源: 评论
PicT: A SlimWeakly Supervised Vision Transformer for Pavement Distress Classification
arXiv
收藏 引用
arXiv 2022年
作者: Tang, Wenhao Huang, Sheng Zhang, Xiaoxian Huangfu, Luwen School of Big Data & Software Engineering Chongqing University Chongqing China School of Big Data & Software Engineering Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Chongqing China Fowler College of Business Center for Human Dynamics in the Mobile Age San Diego State University San DiegoCA United States
Automatic pavement distress classification facilitates improving the efficiency of pavement maintenance and reducing the cost of labor and resources. A recently influential branch of this task divides the pavement ima... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
Edge computing service deployment and task offloading based on multi-task high-dimensional multi-objective optimization
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Yanheng Zhang, Yan Wu, Linjie Li, Mengxia Cai, Xingjuan Chen, Jinjun Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Shanxi Taiyuan030024 China State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
The Mobile Edge Computing (MEC) system located close to the client allows mobile smart devices to offload their computations onto edge servers, enabling them to benefit from low-latency computing services. Both cloud ... 详细信息
来源: 评论
EG-KGR: A Knowledge Graph Reasoning Model Based on Enhanced Graph Sample and Aggregate Inductive Learning Algorithm
EG-KGR: A Knowledge Graph Reasoning Model Based on Enhanced ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yuejia Wu Jian-Tao Zhou Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing College of Computer Science Inner Mongolia University National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Knowledge Graph is an important research field that involves the storage and management of knowledge, but the incompleteness and sparsity of Knowledge Graphs hinder their application in many fields. Knowledge Graph Re... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
Category-Prompt Refined Feature Learning for Long-Tailed Multi-Label Image Classification
arXiv
收藏 引用
arXiv 2024年
作者: Yan, Jiexuan Huang, Sheng Mu, NanKun Huangfu, Luwen Liu, Bo School of Big Data & Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China Fowler College of Business San Diego State University San DiegoCA United States School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Real-world data consistently exhibits a long-tailed distribution, often spanning multiple categories. This complexity underscores the challenge of content comprehension, particularly in scenarios requiring Long-Tailed... 详细信息
来源: 评论
Dual Latent State Learning: Exploiting Regional Network Similarities for QoS Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Ziliang Zhang, Xiaohong Zhang, Kechi Li, Ze Shi Yan, Meng Ministry of Education School of Computer Science Peking University Beijing China Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing401331 China The Department of Computer Science the University of Victoria Canada
Individual objects (users or services) within a region usually have similar network states to each other because they usually come from the same region. Despite the similarity within regional networks, many existing t... 详细信息
来源: 评论