咨询与建议

限定检索结果

文献类型

  • 456 篇 期刊文献
  • 318 篇 会议

馆藏范围

  • 774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 497 篇 工学
    • 359 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 98 篇 生物工程
    • 76 篇 信息与通信工程
    • 69 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 50 篇 电气工程
    • 46 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 18 篇 机械工程
    • 16 篇 仪器科学与技术
    • 16 篇 安全科学与工程
    • 14 篇 土木工程
    • 14 篇 核科学与技术
    • 13 篇 建筑学
  • 301 篇 理学
    • 119 篇 生物学
    • 116 篇 数学
    • 92 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 29 篇 化学
    • 18 篇 地球物理学
    • 18 篇 系统科学
  • 115 篇 管理学
    • 61 篇 图书情报与档案管...
    • 59 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 60 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 15 篇 法学
  • 11 篇 农学
  • 9 篇 经济学
  • 7 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 26 篇 deep neural netw...
  • 25 篇 machine learning
  • 23 篇 semantics
  • 21 篇 deep learning
  • 18 篇 training
  • 16 篇 computational mo...
  • 12 篇 memory managemen...
  • 11 篇 task analysis
  • 11 篇 feature extracti...
  • 10 篇 data models
  • 8 篇 scalability
  • 8 篇 generative adver...
  • 8 篇 graph neural net...
  • 8 篇 predictive model...
  • 7 篇 parallel process...
  • 7 篇 magnetic resonan...
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency

机构

  • 101 篇 national enginee...
  • 56 篇 school of comput...
  • 51 篇 school of cyber ...
  • 36 篇 national enginee...
  • 31 篇 services computi...
  • 31 篇 hubei engineerin...
  • 28 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 22 篇 hiroshima astrop...
  • 21 篇 department of ph...
  • 19 篇 school of softwa...
  • 18 篇 university of ch...
  • 17 篇 department of ph...
  • 16 篇 berkeley institu...
  • 16 篇 secure computing...
  • 16 篇 zhejiang lab
  • 15 篇 department of ph...
  • 15 篇 physics division...
  • 15 篇 national energy ...

作者

  • 113 篇 hai jin
  • 108 篇 jin hai
  • 42 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 18 篇 liao xiaofei
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 nachman benjamin
  • 16 篇 wu baoyuan
  • 15 篇 bastieri d.
  • 15 篇 green d.
  • 15 篇 orlando e.
  • 15 篇 lubrano p.
  • 15 篇 gargano f.
  • 15 篇 spinelli p.
  • 15 篇 kuss m.
  • 15 篇 mikuni vinicius
  • 15 篇 yu zhang

语言

  • 620 篇 英文
  • 149 篇 其他
  • 8 篇 中文
检索条件"机构=Cognitive Computing and Data Science Research Lab"
774 条 记 录,以下是261-270 订阅
排序:
A General Offloading Approach for Near-DRAM Processing-In-Memory Architectures
A General Offloading Approach for Near-DRAM Processing-In-Me...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Dan Chen Hai Jin Long Zheng Yu Huang Pengcheng Yao Chuangyi Gui Qinggang Wang Haifeng Liu Haiheng He Xiaofei Liao Ran Zheng National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Clusters and Grid Computing Lab Huazhong University of Science and Technology China
Processing-in-memory (PIM) is promising to solve the well-known data movement challenge by performing in-situ computations near the data. Leveraging PIM features is pretty profitable to boost the energy efficiency of ... 详细信息
来源: 评论
GANTEE: Generative Adversatial Network for Taxonomy Entering Evaluation
arXiv
收藏 引用
arXiv 2023年
作者: Gu, Zhouhong Jiang, Sihang Liu, Jingping Xiao, Yanghua Feng, Hongwei Li, Zhixu Liang, Jiaqing Zhong, Jian Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Information Science and Engineering East China University of Science and Technology China Fudan-Aishu Cognitive Intelligence Joint Research Center China School of Data Science Fudan University China HUAWEI CBG Edu AI Lab. China
Taxonomy is formulated as directed acyclic concepts graphs or trees that support many downstream tasks. Many new coming concepts need to be added to an existing taxonomy. The traditional taxonomy expansion task aims o... 详细信息
来源: 评论
Fast and Scalable Gate-Level Simulation in Massively Parallel Systems
Fast and Scalable Gate-Level Simulation in Massively Paralle...
收藏 引用
IEEE International Conference on Computer-Aided Design
作者: Haichuan Hu Zichen Xu Yuhao Wang Fangming Liu Services Computing Technology and System Lab Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Mathematics and Computer Science Nanchang University Nanchang China Pengcheng Laboratory Shenzhen China
The natural bijection between a proposed circuit design and its graph representation shall allow any graph optimization algorithm deploying into many-core systems efficiently. However, this process suffers from the ex...
来源: 评论
Deep Kernel Embedded Clustering Network
SSRN
收藏 引用
SSRN 2024年
作者: Ren, Lina Huang, Ruizhang Chen, Yanping Lin, Chuan Qin, Yongbin State Key Laboratory of Public Big Data Text Computing and Cognitive Intelligence Engineering Research Center of National Education Ministry College of Computer Science and Technology Guizhou University Guiyang550025 China Department of Information Engineering Guizhou Light Industry Technical College Guiyang550025 China
In this paper, we propose a deep kernel embedded clustering network, namely DKEC, which learns data partitions with kernelized semantic embeddings of data samples via a self-supervised deep neural network. A kernelize... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
A Deep Penetration Network for Sentence Classification
SSRN
收藏 引用
SSRN 2023年
作者: Chen, Yanping Zhong, Xinyang Liu, Yijun Dong, Bo Zheng, Qinghua The College of Computer Science and Technology The Engineering Research Center of Text Computing and Cognitive Intelligence Lab Guizhou University Guizhou Guiyang550025 China Department of Computer Science and Technology Xi’an Jiaotong University Shanxi Xi’an710049 China
Sentence classification is an important task in natural language processing. In deep architectures, the task suffers from a serious semantic vanishing problem when stacking a large number of networks. To address this ... 详细信息
来源: 评论
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Reducing data Redundancy
GeckoDAG: Towards a Lightweight DAG-Based Blockchain via Red...
收藏 引用
International Conference on Distributed computing Systems
作者: Xiaohai Dai Yifan Zhou Jiang Xiao Feng Cheng Xia Xie Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Technology Hainan University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
To overcome the scaling and performance limitations, the Directed Acyclic Graph (DAG) is utilized as the underlying storage model of blockchain systems, which enables concurrent transaction processing and confirmation...
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论
TARGETED ATTACK AGAINST DEEP NEURAL NETWORKS VIA FLIPPING LIMITED WEIGHT BITS  9
TARGETED ATTACK AGAINST DEEP NEURAL NETWORKS VIA FLIPPING LI...
收藏 引用
9th International Conference on Learning Representations, ICLR 2021
作者: Bai, Jiawang Wu, Baoyuan Zhang, Yong Li, Yiming Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University China PCL Research Center of Networks and Communications Peng Cheng Laboratory China School of Data Science The Chinese University of HongKong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
Temporal Knowledge Graph Reasoning via Time-Distributed Representation Learning
Temporal Knowledge Graph Reasoning via Time-Distributed Repr...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Kangzheng Liu Feng Zhao Guandong Xu Xianzhi Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Temporal knowledge graph (TKG) reasoning has attracted significant attention. Recent approaches for modeling historical information have led to great advances. However, the problems of time variability and unseen enti... 详细信息
来源: 评论