咨询与建议

限定检索结果

文献类型

  • 541 篇 会议
  • 494 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 510 篇 计算机科学与技术...
    • 420 篇 软件工程
    • 143 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 88 篇 生物工程
    • 85 篇 电气工程
    • 64 篇 化学工程与技术
    • 49 篇 电子科学与技术(可...
    • 49 篇 生物医学工程(可授...
    • 42 篇 机械工程
    • 30 篇 光学工程
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 28 篇 动力工程及工程热...
    • 21 篇 网络空间安全
  • 336 篇 理学
    • 191 篇 数学
    • 98 篇 生物学
    • 75 篇 统计学(可授理学、...
    • 51 篇 物理学
    • 38 篇 化学
    • 33 篇 系统科学
  • 203 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 46 篇 工商管理
  • 61 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 26 篇 法学
    • 19 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 17 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 feature extracti...
  • 38 篇 training
  • 37 篇 deep learning
  • 35 篇 accuracy
  • 32 篇 data models
  • 27 篇 computational mo...
  • 26 篇 semantics
  • 25 篇 cloud computing
  • 22 篇 predictive model...
  • 21 篇 big data
  • 21 篇 optimization
  • 21 篇 federated learni...
  • 19 篇 convolutional ne...
  • 17 篇 visualization
  • 17 篇 machine learning
  • 16 篇 internet of thin...
  • 16 篇 contrastive lear...
  • 15 篇 conferences
  • 15 篇 security
  • 14 篇 image segmentati...

机构

  • 144 篇 college of compu...
  • 85 篇 national enginee...
  • 40 篇 school of big da...
  • 37 篇 college of compu...
  • 37 篇 school of big da...
  • 32 篇 college of compu...
  • 30 篇 key laboratory o...
  • 27 篇 college of compu...
  • 26 篇 college of compu...
  • 23 篇 big data institu...
  • 22 篇 college of data ...
  • 19 篇 college of compu...
  • 17 篇 state key labora...
  • 17 篇 college of big d...
  • 17 篇 shenzhen univers...
  • 16 篇 school of data a...
  • 16 篇 shenzhen univers...
  • 15 篇 guangdong provin...
  • 14 篇 college of big d...
  • 14 篇 college of scien...

作者

  • 22 篇 shen linlin
  • 20 篇 li jianqiang
  • 18 篇 huang joshua zhe...
  • 18 篇 lan li
  • 15 篇 li leixiao
  • 15 篇 victor c. m. leu...
  • 13 篇 gao can
  • 13 篇 xiaofei wang
  • 12 篇 niyato dusit
  • 12 篇 jianqiang li
  • 12 篇 leung victor c.m...
  • 11 篇 xiuhua li
  • 10 篇 tao dacheng
  • 10 篇 leung victor c. ...
  • 10 篇 jie chen
  • 9 篇 zhou jie
  • 9 篇 shi qingjiang
  • 9 篇 li xiuhua
  • 9 篇 wang jinbao
  • 9 篇 zhong ming

语言

  • 907 篇 英文
  • 124 篇 其他
  • 14 篇 中文
检索条件"机构=College of Data Science and Software Engineering"
1040 条 记 录,以下是511-520 订阅
排序:
Improving Transformers with Probabilistic Attention Keys  39
Improving Transformers with Probabilistic Attention Keys
收藏 引用
39th International Conference on Machine Learning, ICML 2022
作者: Nguyen, Tam Nguyen, Tan M. Le, Dung D. Nguyen, Duy Khuong Tran, Viet-Anh Baraniuk, Richard G. Ho, Nhat Osher, Stanley J. FPT Software AI Center Ha Noi Viet Nam Department of Mathematics University of California Los Angeles United States College of Engineering and Computer Science VinUniversity Ha Noi Viet Nam Deezer Research France Department of Electrical and Computer Engineering Rice University Houston United States Department of Statistics and Data Sciences The University of Texas Austin United States
Multi-head attention is a driving force behind state-of-the-art transformers, which achieve remarkable performance across a variety of natural language processing (NLP) and computer vision tasks. It has been observed ...
来源: 评论
Learning dynamics of kernel-based deep neural networks in manifolds
收藏 引用
science China(Information sciences) 2021年 第11期64卷 105-119页
作者: Wei WU Xiaoyuan JING Wencai DU Guoliang CHEN School of Computer Science Wuhan University Institute of Deep-sea Science and Engineering Chinese Academy of Sciences School of Computer Guangdong University of Petrochemical Technology Institute of Data Science City University of Macau College of Computer Science and Software Engineering Shenzhen University
Convolutional neural networks(CNNs) obtain promising results via layered kernel convolution and pooling operations, yet the learning dynamics of the kernel remain obscure. We propose a continuous form to describe kern... 详细信息
来源: 评论
A Revocable Fast and Lightweight Parallel Encryption Scheme for IIoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Lu, Junze Hu, Chunqiang Chen, Jiajun Xia, Hui Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education China Chongqing University School of Big Data and Software Engineering Chongqing 400030 China Ocean University of China College of Computer Science and Technology China
As the Industrial Internet of Things (IIoT) expands, the number of stakeholders increases. Many entities require significant amounts of data from industrial devices. These data streams improve information sharing and ... 详细信息
来源: 评论
Visitors Vis: Interactive Mining of Suspected Medical Insurance Fraud Groups  18th
Visitors Vis: Interactive Mining of Suspected Medical Insura...
收藏 引用
18th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023
作者: Dong, Rixin Liu, Hanlin Guo, Xu Zhou, Jiantao College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
As medical insurance continues to grow in size, the losses caused by medical insurance fraud cannot be underestimated. Current data mining and predictive techniques have been applied to analyze and explore the health ... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hanlin Liu Jiantao Zhou Hua Li College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i...
来源: 评论
A Graph Sequence Generator and Multi-head Self-attention Mechanism based Knowledge Graph Reasoning Architecture
A Graph Sequence Generator and Multi-head Self-attention Mec...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yuejia Wu Jian-Tao Zhou College of Computer Science Inner Mongolia University National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Knowledge Graph (KG) is an essential research direction that involves storing and managing knowledge data, but its incompleteness and sparsity hinder its development in various applications. Knowledge Graph Reasoning ...
来源: 评论
Blockchain-Based Multi-Cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Feiyu Wang Jian-tao Zhou College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
VMeta: A QoS dataset for Metaverse Services  6th
VMeta: A QoS Dataset for Metaverse Services
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Ge, Zhiyuan Jin, Huiying Dong, Hai Ji, Shunhui Li, Jiajia Yang, Shuhan Wang, Qi Zhang, Pengcheng Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing210000 China College of Computer Science and Software Engineering Hohai University Nanjing210000 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210000 China School of Computing Technologies RMIT University Melbourne3000 Australia
The metaverse is undergoing repaid evolution with metaverse services emerging as a significant focal point of research across virtual reality, augmented reality, and metaverse social networking. However, a key challen... 详细信息
来源: 评论
An Uncovered Neurons Information-Based Fuzzing Method for DNN
An Uncovered Neurons Information-Based Fuzzing Method for DN...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kecheng Tang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Fuzzing is increasingly being utilized as a method to test the reliability of Deep Learning (DL) systems. In order to detect more errors in DL systems, exploring the internal logic of more DNNs has become the main obj... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Feiyu Wang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
来源: 评论