咨询与建议

限定检索结果

文献类型

  • 1,023 篇 会议
  • 724 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,748 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,094 篇 工学
    • 864 篇 计算机科学与技术...
    • 738 篇 软件工程
    • 258 篇 信息与通信工程
    • 192 篇 生物工程
    • 132 篇 控制科学与工程
    • 103 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 82 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 68 篇 机械工程
    • 65 篇 化学工程与技术
    • 46 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 32 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 仪器科学与技术
    • 29 篇 材料科学与工程(可...
  • 591 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 100 篇 物理学
    • 70 篇 化学
    • 55 篇 系统科学
  • 339 篇 管理学
    • 194 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 54 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 18 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 70 篇 training
  • 69 篇 semantics
  • 64 篇 feature extracti...
  • 63 篇 deep learning
  • 40 篇 predictive model...
  • 36 篇 neural networks
  • 36 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 31 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 federated learni...
  • 28 篇 reinforcement le...
  • 28 篇 graph neural net...
  • 27 篇 conferences
  • 27 篇 optimization
  • 27 篇 contrastive lear...
  • 27 篇 cloud computing
  • 25 篇 costs

机构

  • 265 篇 school of big da...
  • 125 篇 school of big da...
  • 109 篇 college of compu...
  • 107 篇 national enginee...
  • 67 篇 shenzhen researc...
  • 58 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 34 篇 college of compu...
  • 31 篇 college of big d...
  • 31 篇 peng cheng labor...
  • 30 篇 key laboratory o...
  • 30 篇 state key labora...
  • 29 篇 chongqing univer...
  • 26 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 25 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 52 篇 shi qingjiang
  • 39 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 19 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 yan meng
  • 17 篇 hongyu zhang
  • 17 篇 li liu
  • 17 篇 hu chunqiang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,459 篇 英文
  • 275 篇 其他
  • 17 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1748 条 记 录,以下是931-940 订阅
排序:
A self-supervised CNN for image watermark removal
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Chunwei Zheng, Menghua Jiao, Tiancai Zuo, Wangmeng Zhang, Yanning Lin, Chia-Wen the School of Software Northwestern Polytechnical University Shaanxi Xi’an710129 China the National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Xi’an710129 China the School of Computer Science and Technology Harbin Institute of Technology Heilongjiang Harbin150001 China the Peng Cheng Laboratory Laboratory Guangdong Shenzhen518055 China the School of Computer Science Northwestern Polytechnical University the National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Xi’an710129 China the Department of Electrical Engineering the Institute of Communications Engineering National Tsing Hua University Hsinchu300 Taiwan
Popular convolutional neural networks mainly use paired images in a supervised way for image watermark removal. However, watermarked images do not have reference images in the real world, which results in poor robustn... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Researching of the Mongolian word encoding method based on Transformer Mongolian speech recognition  21
Researching of the Mongolian word encoding method based on T...
收藏 引用
21st Chinese National Conference on Computational Linguistic, CCL 2022
作者: Xiaoxu, Zhang Zhiqiang, Ma Zhiqiang, Liu Caijilahu, Bao Inner Mongolia University of Technology Huhhot010000 China Inner Mongolia Autonomous Region Software Service Engineering Technology Research Center Based on Big Data Huhhot010000 China
In view of the fact that the Transformer model cannot learn the correspondence between Mongolian words with control symbols and the speech in the Mongolian speech recognition task, which causes the model to not adapt ... 详细信息
来源: 评论
Attention based Mongolian Speaker Feature Extraction  21
Attention based Mongolian Speaker Feature Extraction
收藏 引用
21st Chinese National Conference on Computational Linguistic, CCL 2022
作者: Fangyuan, Zhu Zhiqiang, Ma Zhiqiang, Liu Caijilahu, Bao Hongbin, Wang Inner Mongolia University of Technology Huhhot010000 China Inner Mongolia Autonomous Region Software Service Engineering Technology Research Center Based on Big Data Huhhot010000 China
The speaker features extracted by the speaker feature extraction model have low discrimination, which makes the Mongolian acoustic model unable to learn the discrimination information, resulting in the model unable to... 详细信息
来源: 评论
Rethinking WMMSE: Can Its Complexity Scale Linearly With the Number of BS Antennas?
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Xiaotong Lu, Siyuan Shi, Qingjiang Luo, Zhi-Quan The School of Software Engineering Tongji University Shanghai201804 China Shenzhen Research Institute of Big Data Shenzhen518172 China The Chinese University of Hong Kong Shenzhen518172 China
Precoding design for maximizing weighted sum-rate (WSR) is a fundamental problem for downlink of massive multi-user multiple-input multiple-output (MU-MIMO) systems. It is well-known that this problem is generally NP-... 详细信息
来源: 评论
A Topology Independent Fast Rerouting Scheme with Hop-by-Hop Forwarding Can Achieve a Full Protection
SSRN
收藏 引用
SSRN 2022年
作者: Geng, Haijun Meng, Zhuo Zhang, Han Shi, Xingang Wang, Zhiliang Yin, Xia Chen, Meng Guo, Yingya The School of Automation and Software Engineering Shanxi University School of Computer and Information Technology China The Institute for Network Sciences and Cyberspace Tsinghua University China The Department of Computer Science and Technology Tsinghua University China The School of Big Data and Software Engineering Chongqing University China The College of Computer and Data Science Fuzhou University China
To support critical applications or guarantee a high quality of service, Internet Service Providers (ISPs) generally deploy a technique called routing protection algorithm for local fast rerouting. Alternate next hops... 详细信息
来源: 评论
A Uniform Representation Model for Oct-Based Fingerprint Presentation Attack Detection and Reconstruction
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Wentian Liu, Haozhe Liu, Feng Ramachandra, Raghavendra The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society China Gjøvik2818 Norway
The technology of optical coherence tomography (OCT) to fingerprint imaging opens up a new research potential for fingerprint recognition owing to its ability to capture depth information of the skin layers. Developin... 详细信息
来源: 评论
Deconfound Semantic Shift and Incompleteness in Incremental Few-shot Semantic Segmentation  39
Deconfound Semantic Shift and Incompleteness in Incremental ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wu, Yirui Xia, Yuhang Li, Hao Yuan, Lixin Chen, Junyang Liu, Jun Lu, Tong Wan, Shaohua Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computing and Communication Lancaster University Lancaster United Kingdom National Key Lab for Novel Software Technology Nanjing University Nanjing China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen China
Incremental few-shot semantic segmentation (IFSS) expands segmentation capacity of the trained model to segment new-class images with few samples. However, semantic meanings may shift from background to object class o... 详细信息
来源: 评论
Recommender System Combining Popularity and Novelty Based on One-Mode Projection of Weighted Bipartite Network
收藏 引用
Computers, Materials & Continua 2020年 第4期63卷 489-507页
作者: Yong Yu Yongjun Luo Tong Li Shudong Li Xiaobo Wu Jinzhuo Liu Yu Jiang School of Software Key Laboratory in Software Engineering of Yunnan ProvinceYunnan UniversityKunming650091China School of Big Data Yunnan Agricultural UniversityKunming650201China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China
Personalized recommendation algorithms,which are effective means to solve information overload,are popular topics in current *** this paper,a recommender system combining popularity and novelty(RSCPN)based on one-mode... 详细信息
来源: 评论
Non-Intrusive Load Monitoring for Multi-objects in Smart Building  4
Non-Intrusive Load Monitoring for Multi-objects in Smart Bui...
收藏 引用
4th International Balkan Conference on Communications and Networking, BalkanCom 2021
作者: Li, Dandan Li, Jiangfeng Zeng, Xin Stankovic, Vladimir Stankovic, Lina Shi, Qingjiang Tongji University School of Software Engineering Shanghai China University of Strathclyde Department of Electronic and Electrical Engineering GlasgowG1 1XW United Kingdom Tongji University College of Electronic and Information Engineering Shanghai China Shenzhen Research Institute of Big Data Shenzhen China
The rapidly expansion of Internet of Things (IoT) has ignited renewed interest in energy disaggregation via non-intrusive load monitoring (NILM). Compared to the more frequent NILM approach of training one model for e... 详细信息
来源: 评论