咨询与建议

限定检索结果

文献类型

  • 1,023 篇 会议
  • 724 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,748 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,094 篇 工学
    • 864 篇 计算机科学与技术...
    • 738 篇 软件工程
    • 258 篇 信息与通信工程
    • 192 篇 生物工程
    • 132 篇 控制科学与工程
    • 103 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 82 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 68 篇 机械工程
    • 65 篇 化学工程与技术
    • 46 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 32 篇 建筑学
    • 30 篇 土木工程
    • 29 篇 仪器科学与技术
    • 29 篇 材料科学与工程(可...
  • 591 篇 理学
    • 343 篇 数学
    • 201 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 100 篇 物理学
    • 70 篇 化学
    • 55 篇 系统科学
  • 339 篇 管理学
    • 194 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 54 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 54 篇 法学
    • 44 篇 社会学
  • 24 篇 经济学
  • 18 篇 教育学
  • 15 篇 农学
  • 4 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 70 篇 training
  • 69 篇 semantics
  • 64 篇 feature extracti...
  • 63 篇 deep learning
  • 40 篇 predictive model...
  • 36 篇 neural networks
  • 36 篇 data models
  • 33 篇 machine learning
  • 31 篇 computational mo...
  • 31 篇 accuracy
  • 29 篇 big data
  • 29 篇 convolution
  • 29 篇 federated learni...
  • 28 篇 reinforcement le...
  • 28 篇 graph neural net...
  • 27 篇 conferences
  • 27 篇 optimization
  • 27 篇 contrastive lear...
  • 27 篇 cloud computing
  • 25 篇 costs

机构

  • 265 篇 school of big da...
  • 125 篇 school of big da...
  • 109 篇 college of compu...
  • 107 篇 national enginee...
  • 67 篇 shenzhen researc...
  • 58 篇 school of softwa...
  • 56 篇 school of softwa...
  • 35 篇 key laboratory o...
  • 34 篇 college of compu...
  • 31 篇 college of big d...
  • 31 篇 peng cheng labor...
  • 30 篇 key laboratory o...
  • 30 篇 state key labora...
  • 29 篇 chongqing univer...
  • 26 篇 college of compu...
  • 26 篇 school of comput...
  • 26 篇 school of softwa...
  • 25 篇 school of inform...
  • 24 篇 school of cyber ...
  • 23 篇 big data institu...

作者

  • 52 篇 shi qingjiang
  • 39 篇 shen linlin
  • 30 篇 qingjiang shi
  • 26 篇 huang sheng
  • 23 篇 zhang hongyu
  • 22 篇 xiuhua li
  • 22 篇 gao min
  • 21 篇 junhao wen
  • 19 篇 li leixiao
  • 19 篇 meng yan
  • 19 篇 li jianqiang
  • 18 篇 dai fei
  • 18 篇 yan meng
  • 17 篇 hongyu zhang
  • 17 篇 li liu
  • 17 篇 hu chunqiang
  • 16 篇 hu shengshan
  • 16 篇 huang joshua zhe...
  • 16 篇 liu li
  • 16 篇 xiaohong zhang

语言

  • 1,459 篇 英文
  • 275 篇 其他
  • 17 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Big Data and Software Engineering"
1748 条 记 录,以下是961-970 订阅
排序:
SMOG: Accelerating Subgraph Matching on GPUs
SMOG: Accelerating Subgraph Matching on GPUs
收藏 引用
IEEE Conference on High Performance Extreme Computing (HPEC)
作者: Zhibin Wang Ziheng Meng Xue Li Xi Lin Long Zheng Chen Tian Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University Alibaba Group“ National Engineering Research Center for Big Data Technology and System/ Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Zhejiang Lab
Subgraph matching is a crucial problem in graph theory with diverse applications in fields, such as bioinformatics, social networks and recommendation systems. Accelerating subgraph matching can be greatly facilitated...
来源: 评论
software Vulnerabilities Detection Based on a Pre-trained Language Model
Software Vulnerabilities Detection Based on a Pre-trained La...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wenlin Xu Tong Li Jinsong Wang Haibo Duan Yahui Tang School of Information Science and Engineering Yunnan University Kunming China School of Big Data Yunnan Agricultural University Kunming China Information Management Center Yunnan University of Finance and Economics Kunming China School of Software Chongqing University of Posts and Telecommunications Chongqing China
software vulnerabilities detection is crucial in cyber security which protects the software systems from malicious attacks. The majority of earlier techniques relied on security professionals to provide software featu... 详细信息
来源: 评论
Modality Decoupling is All You Need: A Simple Solution for Unsupervised Hyperspectral Image Fusion
arXiv
收藏 引用
arXiv 2024年
作者: Du, Songcheng Zou, Yang Wang, Zixu Li, Xingyuan Li, Ying Shen, Qiang School of Computer Science Northwestern Polytechnical University China School of Software Technology Dalian University of Technology China Institute of Mathematics Physics and Computer Science Aberystwyth University United Kingdom The National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical University China
Hyperspectral Image Fusion (HIF) aims to fuse low-resolution hyperspectral images (LR-HSIs) and high-resolution multispectral images (HR-MSIs) to reconstruct high spatial and high spectral resolution images. Current m... 详细信息
来源: 评论
BIM: Improving Graph Neural Networks with Balanced Influence Maximization
BIM: Improving Graph Neural Networks with Balanced Influence...
收藏 引用
International Conference on data engineering
作者: Wentao Zhang Xinyi Gao Ling Yang Meng Cao Ping Huang Jiulong Shan Hongzhi Yin Bin Cui Center for Machine Learning Research Peking University Institute of Advanced Algorithms Research Shanghai National Engineering Labratory for Big Data Analytics and Applications The University of Queensland Australia Key Lab of High Confidence Software Technologies Peking University Apple Inc. Institute of Computational Social Science Peking University Qingdao
The imbalanced data classification problem has aroused lots of concerns from both academia and industry since data imbalance is a widespread phenomenon in many real-world scenarios. Although this problem has been well... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
Towards overfitting avoidance: Tuning-free tensor-aided multi-user channel estimation for 3D massive MIMO communications
arXiv
收藏 引用
arXiv 2021年
作者: Cheng, Lei Shi, Qingjiang Shenzhen Research Institute of Big Data Shenzhen Guangdong China School of Software Engineering Tongji University Shanghai201804 China Shenzhen Research Institute of Big Data Shenzhen518172 China
Channel estimation has long been deemed as one of the most critical problems in three-dimensional (3D) massive multiple-input multiple-output (MIMO), which is recognized as the leading technology that enables 3D spati... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Graph Attention Multi-Layer Perceptron
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Wentao Yin, Ziqi Sheng, Zeang Li, Yang Ouyang, Wen Li, Xiaosen Tao, Yangyu Yang, Zhi Cui, Bin School of CS & Key Laboratory of High Confidence Software Technologies Peking University China Center for Data Science Peking University National Engineering Laboratory for Big Data Analysis and Applications China Tencent Inc China Beijing Institute of Technology China
Graph neural networks (GNNs) have achieved great success in many graph-based applications. However, the enormous size and high sparsity level of graphs hinder their applications under industrial scenarios. Although so... 详细信息
来源: 评论
VMeta: A QoS dataset for Metaverse Services  6th
VMeta: A QoS Dataset for Metaverse Services
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Ge, Zhiyuan Jin, Huiying Dong, Hai Ji, Shunhui Li, Jiajia Yang, Shuhan Wang, Qi Zhang, Pengcheng Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing210000 China College of Computer Science and Software Engineering Hohai University Nanjing210000 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210000 China School of Computing Technologies RMIT University Melbourne3000 Australia
The metaverse is undergoing repaid evolution with metaverse services emerging as a significant focal point of research across virtual reality, augmented reality, and metaverse social networking. However, a key challen... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论