咨询与建议

限定检索结果

文献类型

  • 456 篇 期刊文献
  • 318 篇 会议

馆藏范围

  • 774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 497 篇 工学
    • 359 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 98 篇 生物工程
    • 76 篇 信息与通信工程
    • 69 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 50 篇 电气工程
    • 46 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 18 篇 机械工程
    • 16 篇 仪器科学与技术
    • 16 篇 安全科学与工程
    • 14 篇 土木工程
    • 14 篇 核科学与技术
    • 13 篇 建筑学
  • 301 篇 理学
    • 119 篇 生物学
    • 116 篇 数学
    • 92 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 29 篇 化学
    • 18 篇 地球物理学
    • 18 篇 系统科学
  • 115 篇 管理学
    • 61 篇 图书情报与档案管...
    • 59 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 60 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 15 篇 法学
  • 11 篇 农学
  • 9 篇 经济学
  • 7 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 26 篇 deep neural netw...
  • 25 篇 machine learning
  • 23 篇 semantics
  • 21 篇 deep learning
  • 18 篇 training
  • 16 篇 computational mo...
  • 12 篇 memory managemen...
  • 11 篇 task analysis
  • 11 篇 feature extracti...
  • 10 篇 data models
  • 8 篇 scalability
  • 8 篇 generative adver...
  • 8 篇 graph neural net...
  • 8 篇 predictive model...
  • 7 篇 parallel process...
  • 7 篇 magnetic resonan...
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency

机构

  • 101 篇 national enginee...
  • 56 篇 school of comput...
  • 51 篇 school of cyber ...
  • 36 篇 national enginee...
  • 31 篇 services computi...
  • 31 篇 hubei engineerin...
  • 28 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 22 篇 hiroshima astrop...
  • 21 篇 department of ph...
  • 19 篇 school of softwa...
  • 18 篇 university of ch...
  • 17 篇 department of ph...
  • 16 篇 berkeley institu...
  • 16 篇 secure computing...
  • 16 篇 zhejiang lab
  • 15 篇 department of ph...
  • 15 篇 physics division...
  • 15 篇 national energy ...

作者

  • 113 篇 hai jin
  • 108 篇 jin hai
  • 42 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 18 篇 liao xiaofei
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 nachman benjamin
  • 16 篇 wu baoyuan
  • 15 篇 bastieri d.
  • 15 篇 green d.
  • 15 篇 orlando e.
  • 15 篇 lubrano p.
  • 15 篇 gargano f.
  • 15 篇 spinelli p.
  • 15 篇 kuss m.
  • 15 篇 mikuni vinicius
  • 15 篇 yu zhang

语言

  • 620 篇 英文
  • 149 篇 其他
  • 8 篇 中文
检索条件"机构=Cognitive Computing and Data Science Research Lab"
774 条 记 录,以下是211-220 订阅
排序:
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast
LightDAG: A Low-latency DAG-based BFT Consensus through Ligh...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Xiaohai Dai Guanxiong Wang Jiang Xiao Zhengxuan Guo Rui Hao Xia Xie Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Artificial Intelligence Wuhan University of Technology China School of Computer Science and Technology Hainan University China
To improve the throughput of Byzantine Fault Tolerance (BFT) consensus protocols, the Directed Acyclic Graph (DAG) topology has been introduced to parallel data processing, leading to the development of DAG-based BFT ... 详细信息
来源: 评论
Neural TTS-Based Dynamic data Augmentation for Improved Speech Separation
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2457-2470页
作者: Kai Wang Cuicui Zhu Lili Yin Sheng Li Madina Mansurova Hao Huang School of Computer Science and Technology Xinjiang University Urumqi China Joint International Research Laboratory of Silk Road Multilingual Cognitive Computing Urumqi China Xinjiang Key Laboratory of Multilingual Information Technology Urumqi China School of Engineering Institute of Science Tokyo Kanagawa Japan Department of Artificial Intelligence and Big Data Al-Farabi Kazakh National University Almaty Kazakhstan
Text-to-speech (TTS) synthetic data augmentation has been widely used in various speech processing tasks, but its effectiveness in speech separation remains understudied. In this paper, we present SpeakerAugment+ (SA+... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis
Gradient Boosting-Accelerated Evolution for Multiple-Fault D...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Hongfei Wang Chenliang Luo Deqing Zou Hai Jin Wenjie Cai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China College of Public Administration Wuhan China
Logic diagnosis is a key step in yield learning. Multiple faults diagnosis is challenging because of several reasons, including error masking, fault reinforcement, and huge search space for possible fault combinations... 详细信息
来源: 评论
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lowe...
收藏 引用
Reliable Distributed Systems
作者: Xiaohai Dai Zhaonan Zhang Jiang Xiao Jingtao Yue Xia Xie Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China
To enable parallel processing, the Directed Acyclic Graph (DAG) structure is introduced to the design of asyn-chronous Byzantine Fault Tolerant (BFT) consensus protocols, known as DAG-based BFT. Existing DAG-based BFT...
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
MeG2: In-Memory Acceleration for Genome Graphs Analysis
MeG2: In-Memory Acceleration for Genome Graphs Analysis
收藏 引用
Design Automation Conference
作者: Yu Huang Long Zheng Haifeng Liu Zhuoran Zhou Dan Chen Pengcheng Yao Qinggang Wang Xiaofei Liao Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Laboratory Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China
Genome graphs analysis has emerged as an effective means to enable mapping DNA fragments (known as reads) to the reference genome. It replaces the traditional linear reference with a graph-based representation to augm...
来源: 评论
Comparative Analysis of Image Enhancement Techniques Based on Fundus Image for Diabetic Retinopathy  11th
Comparative Analysis of Image Enhancement Techniques Based o...
收藏 引用
11th International Conference on Robotics, Vision, Signal Processing and Power Applications, RoViSP 2021
作者: Meh, Noor Halawati Binti Che Sharif, Nurul Atikah Binti Mohd Harun, Nor Hazlyna Binti Embong, Zunaina Binti Politeknik Tuanku Syed Sirajuddin Arau Perlis02600 Malaysia Data Science Research Lab School of Computing Universiti Utara Malaysia Sintok Kedah06010 Malaysia Universiti Sains Malaysia Kubang Kerian Kelantan Malaysia
Enhancement of images plays significant role in certain aspects of sci- entific research. One of the main task is analyzing the abnormal features in retinal fundus image for detection of diabetic retinopathy. However,... 详细信息
来源: 评论
Comprehensive Architecture Search for Deep Graph Neural Networks
收藏 引用
IEEE Transactions on Big data 2025年
作者: Dong, Yukang Pan, Fanxing Gui, Yi Jiang, Wenbin Wan, Yao Zheng, Ran Jin, Hai National Engineering Research Center for Big Data Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Service Computing Technology and System Laboratory Wuhan430074 China Huazhong University of Science and Technology Cluster and Grid Computing Laboratory Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
In recent years, Neural Architecture Search (NAS) has emerged as a promising approach for automatically discovering superior model architectures for deep Graph Neural Networks (GNNs). Different methods have paid atten... 详细信息
来源: 评论