咨询与建议

限定检索结果

文献类型

  • 465 篇 期刊文献
  • 320 篇 会议

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 498 篇 工学
    • 364 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 97 篇 生物工程
    • 77 篇 信息与通信工程
    • 69 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 52 篇 电气工程
    • 48 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 18 篇 机械工程
    • 17 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 网络空间安全
  • 303 篇 理学
    • 120 篇 生物学
    • 116 篇 数学
    • 92 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 29 篇 化学
    • 18 篇 地球物理学
    • 18 篇 系统科学
  • 116 篇 管理学
    • 61 篇 图书情报与档案管...
    • 60 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 63 篇 医学
    • 55 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 15 篇 法学
  • 11 篇 农学
  • 9 篇 经济学
  • 7 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 28 篇 machine learning
  • 26 篇 deep neural netw...
  • 25 篇 semantics
  • 22 篇 deep learning
  • 18 篇 training
  • 16 篇 computational mo...
  • 12 篇 memory managemen...
  • 12 篇 feature extracti...
  • 11 篇 task analysis
  • 10 篇 data models
  • 8 篇 scalability
  • 8 篇 generative adver...
  • 8 篇 graph neural net...
  • 8 篇 predictive model...
  • 7 篇 parallel process...
  • 7 篇 magnetic resonan...
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency

机构

  • 102 篇 national enginee...
  • 56 篇 school of comput...
  • 50 篇 school of cyber ...
  • 36 篇 national enginee...
  • 31 篇 services computi...
  • 31 篇 hubei engineerin...
  • 28 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 20 篇 hiroshima astrop...
  • 20 篇 department of ph...
  • 19 篇 school of softwa...
  • 18 篇 university of ch...
  • 17 篇 department of ph...
  • 16 篇 berkeley institu...
  • 16 篇 secure computing...
  • 16 篇 zhejiang lab
  • 15 篇 department of ph...
  • 15 篇 physics division...
  • 15 篇 national energy ...

作者

  • 112 篇 hai jin
  • 112 篇 jin hai
  • 42 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 21 篇 haikun liu
  • 20 篇 liao xiaofei
  • 19 篇 long zheng
  • 18 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 nachman benjamin
  • 16 篇 wu baoyuan
  • 15 篇 bastieri d.
  • 15 篇 green d.
  • 15 篇 orlando e.
  • 15 篇 lubrano p.
  • 15 篇 gargano f.
  • 15 篇 spinelli p.
  • 15 篇 kuss m.
  • 15 篇 mikuni vinicius
  • 15 篇 yu zhang

语言

  • 591 篇 英文
  • 189 篇 其他
  • 10 篇 中文
检索条件"机构=Cognitive Computing and Data Science Research Lab"
785 条 记 录,以下是491-500 订阅
排序:
Unsupervised Editing for Counterfactual Stories
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Jiangjie Gan, Chun Cheng, Sijie Zhou, Hao Xiao, Yanghua Li, Lei Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China ByteDance AI Lab *** China University of California Santa Barbara United States Fudan-Aishu Cognitive Intelligence Joint Research Center China
Creating what-if stories requires reasoning about prior statements and possible outcomes of the changed conditions. One can easily generate coherent endings under new conditions, but it would be challenging for curren... 详细信息
来源: 评论
Score-based Generative Models for Calorimeter Shower Simulation
arXiv
收藏 引用
arXiv 2022年
作者: Mikuni, Vinicius Nachman, Benjamin National Energy Research Scientific Computing Center Berkeley Lab BerkeleyCA94720 United States Physics Division Lawrence Berkeley National Laboratory BerkeleyCA94720 United States Berkeley Institute for Data Science University of California BerkeleyCA94720 United States
Score-based generative models are a new class of generative algorithms that have been shown to produce realistic images even in high dimensional spaces, currently surpassing other state-of-the-art models for different... 详细信息
来源: 评论
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
arXiv
收藏 引用
arXiv 2021年
作者: Bai, Jiawang Wu, Baoyuan Zhang, Yong Li, Yiming Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University China PCL Research Center of Networks and Communications Peng Cheng Laboratory China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab United States
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2021年
作者: Shi, Junyu Wan, Wei Hu, Shengshan Lu, Jianrong Zhang, Leo Yu School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China School of Information Technology Deakin University Australia
Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the tra... 详细信息
来源: 评论
Sparse online relative similarity learning
arXiv
收藏 引用
arXiv 2021年
作者: Yao, Dezhong Zhao, Peilin Yu, Chen Jin, Hai Li, Bin Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Data Analytics Department Institute for Infocomm Research A*STAR 138632 Singapore Economics and Management School Wuhan University Wuhan430072 China
For many data mining and machine learning tasks, the quality of a similarity measure is the key for their performance. To automatically find a good similarity measure from datasets, metric learning and similarity lear... 详细信息
来源: 评论
Optimizing non-coalesced memory access for irregular applications with GPU computing
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2020年 第9期21卷 1285-1301页
作者: Ran ZHENG Yuan-dong LIU Hai JIN National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China
General purpose graphics processing units(GPGPUs)can be used to improve computing performance considerably for regular ***,irregular memory access exists in many applications,and the benefits of graphics processing un... 详细信息
来源: 评论
Exploring bilingual parallel corpora for syntactically controllable paraphrase generation  29
Exploring bilingual parallel corpora for syntactically contr...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Liu, Mingtong Yang, Erguang Xiong, Deyi Zhang, Yujie Sheng, Chen Hu, Changjian Xu, Jinan Chen, Yufeng School of Computer Science and Information Technology & Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China College of Intelligence and Computing Tianjin University Tianjin China Lenovo Research AI Lab Beijing China
Paraphrase generation is of great importance to many downstream tasks in natural language processing. Recent efforts have focused on generating paraphrases in specific syntactic forms, which, generally, heavily relies... 详细信息
来源: 评论
Mathematical capabilities of ChatGPT  23
Mathematical capabilities of ChatGPT
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Simon Frieder Luca Pinchetti Alexis Chevalier Ryan-Rhys Griffiths Tommaso Salvatori Thomas Lukasiewicz Philipp Petersen Julius Berner Department of Computer Science University of Oxford Oxford UK School of Mathematics Institute for Advanced Study Princeton Department of Physics University of Cambridge Cambridge UK VERSES AI Research Lab Los Angeles and Institute of Logic and Computation Vienna University of Technology Vienna Austria Institute of Logic and Computation Vienna University of Technology Vienna Austria and Department of Computer Science University of Oxford Oxford UK Faculty of Mathematics University of Vienna Vienna Austria and Research Network Data Science University of Vienna Vienna Austria Department of Computing and Mathematical Sciences Caltech Pasadena
We investigate the mathematical capabilities of two versions of ChatGPT (released 9-January-2023 and 30-January-2023) and of GPT-4 by testing them on publicly available datasets, as well as hand-crafted ones, using a ...
来源: 评论
Online-compatible unsupervised nonresonant anomaly detection
收藏 引用
Physical Review D 2022年 第5期105卷 055006-055006页
作者: Vinicius Mikuni Benjamin Nachman David Shih National Energy Research Scientific Computing Center Berkeley Lab Berkeley California 94720 USA Physics Division Lawrence Berkeley National Laboratory Berkeley California 94720 USA Berkeley Institute for Data Science University of California Berkeley California 94720 USA NHETC Department of Physics & Astronomy Rutgers University Piscataway New Jersey 08854 USA
There is a growing need for anomaly detection methods that can broaden the search for new particles in a model-agnostic manner. Most proposals for new methods focus exclusively on signal sensitivity. However, it is no... 详细信息
来源: 评论
HomDroid: Detecting android covert malware by social-network homophily analysis
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Zou, Deqing Yang, Wei Li, Xiang Jin, Hai Huazhong University of Science and Technology China University of Texas at Dallas United States Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Hust Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hust Wuhan430074 China Shenzhen Hust Research Institute Shenzhen518057 China Cluster and Grid Computing Lab School of Computer Science and Technology Hust Wuhan430074 China
Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of mal... 详细信息
来源: 评论