咨询与建议

限定检索结果

文献类型

  • 541 篇 会议
  • 494 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 510 篇 计算机科学与技术...
    • 420 篇 软件工程
    • 143 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 88 篇 生物工程
    • 85 篇 电气工程
    • 64 篇 化学工程与技术
    • 49 篇 电子科学与技术(可...
    • 49 篇 生物医学工程(可授...
    • 42 篇 机械工程
    • 30 篇 光学工程
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 28 篇 动力工程及工程热...
    • 21 篇 网络空间安全
  • 336 篇 理学
    • 191 篇 数学
    • 98 篇 生物学
    • 75 篇 统计学(可授理学、...
    • 51 篇 物理学
    • 38 篇 化学
    • 33 篇 系统科学
  • 203 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 46 篇 工商管理
  • 61 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 26 篇 法学
    • 19 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 17 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 feature extracti...
  • 38 篇 training
  • 37 篇 deep learning
  • 35 篇 accuracy
  • 32 篇 data models
  • 27 篇 computational mo...
  • 26 篇 semantics
  • 25 篇 cloud computing
  • 22 篇 predictive model...
  • 21 篇 big data
  • 21 篇 optimization
  • 21 篇 federated learni...
  • 19 篇 convolutional ne...
  • 17 篇 visualization
  • 17 篇 machine learning
  • 16 篇 internet of thin...
  • 16 篇 contrastive lear...
  • 15 篇 conferences
  • 15 篇 security
  • 14 篇 image segmentati...

机构

  • 144 篇 college of compu...
  • 85 篇 national enginee...
  • 40 篇 school of big da...
  • 37 篇 college of compu...
  • 37 篇 school of big da...
  • 32 篇 college of compu...
  • 30 篇 key laboratory o...
  • 27 篇 college of compu...
  • 26 篇 college of compu...
  • 23 篇 big data institu...
  • 22 篇 college of data ...
  • 19 篇 college of compu...
  • 17 篇 state key labora...
  • 17 篇 college of big d...
  • 17 篇 shenzhen univers...
  • 16 篇 school of data a...
  • 16 篇 shenzhen univers...
  • 15 篇 guangdong provin...
  • 14 篇 college of big d...
  • 14 篇 college of scien...

作者

  • 22 篇 shen linlin
  • 20 篇 li jianqiang
  • 18 篇 huang joshua zhe...
  • 18 篇 lan li
  • 15 篇 li leixiao
  • 15 篇 victor c. m. leu...
  • 13 篇 gao can
  • 13 篇 xiaofei wang
  • 12 篇 niyato dusit
  • 12 篇 jianqiang li
  • 12 篇 leung victor c.m...
  • 11 篇 xiuhua li
  • 10 篇 tao dacheng
  • 10 篇 leung victor c. ...
  • 10 篇 jie chen
  • 9 篇 zhou jie
  • 9 篇 shi qingjiang
  • 9 篇 li xiuhua
  • 9 篇 wang jinbao
  • 9 篇 zhong ming

语言

  • 907 篇 英文
  • 124 篇 其他
  • 14 篇 中文
检索条件"机构=College of Data Science and Software Engineering"
1040 条 记 录,以下是521-530 订阅
排序:
Question generation based on chat-response conversion
Question generation based on chat-response conversion
收藏 引用
作者: Zhong, Sheng-Hua Peng, Jianfeng Liu, Peiqi College of Computer Science and Software Engineering Shenzhen University Shenzhen China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
Today, thanks to the major breakthrough of sequences to sequences model in the field of natural language, most of the dialogue generation tasks are focused on generating more effective responses. However, the response... 详细信息
来源: 评论
QoE-oriented Soft Caching with Content Recommendation for Edge Computing Networks
QoE-oriented Soft Caching with Content Recommendation for Ed...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Chenyang Wang Yan Chen Chuan Sun Bosen Jia Xiaofei Wang Tarik Taleb Victor C. M. Leung College of Computer Science & Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen China Faculty of Electrical Engineering and Information Technology Ruhr University Bochum Bochum Germany College of Computing and Data Science Nanyang Technological University Singapore China Unicom Digital Technology Co. Ltd Beijing China College of Intelligence and Computing Tianjin University Tianjin China University of British Columbia Vancouver Canada
Mobile Edge Caching (MEC) can potentially alleviate Internet transmission congestion by delivering content at the network edge. However, current MEC solutions suffer from low resource utilization efficiency and often ... 详细信息
来源: 评论
Low-altitude Friendly-Jamming for Satellite-Maritime Communications via Generative AI-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Jiawei Wang, Aimin Sun, Geng Li, Jiahui Wang, Jiacheng Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channel... 详细信息
来源: 评论
RSP-Hist: Approximate Histograms for Big data Exploration on Hadoop Clusters
RSP-Hist: Approximate Histograms for Big Data Exploration on...
收藏 引用
International Conference on High Performance Computing
作者: Salman Salloum Joshua Zhexue Huang Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China
We propose a sampling-based method, called RSP-Hist, to construct approximate equi-width histograms and help data scientists explore the probability distribution of big data on Hadoop clusters. In RSP- Hist, the Rando... 详细信息
来源: 评论
Analysis of Virtualization Based Approach for Detecting Computer Network and its Applications
Analysis of Virtualization Based Approach for Detecting Comp...
收藏 引用
Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT), International Conference on
作者: Arshadh Ariff Mohamed Abuthahir Riazulhameed Nune Sreenivas S. Usha Gundala Venkata Rama Lakshmi Nithyananthi Subramaniam G. Ramachandran Blackstraw Technologies Pvt Ltd Architect - Data Engineer Chennai Tamil Nadu Department of CSE Adama Science and Technology University Adama Ethiopia Department of MBA S.A. Engineering College Thiruverkadu Chennai Department of CSE CVR College of Engineering Hyderabad Bosch Global Software Technologies Coimbatore Tamilnadu ECE Vinayaka Mission's Kirupananda Variyar Engineering College Vinayaka Mission's Research Foundation Deemed to be University Salem India
The Research presents a virtualization-based method and system for establishing network security services. It includes the following steps: acquiring host devices and computing node sets. based on the host's equip... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Evolutionary Multiobjective Feature Selection Assisted by Unselected Features
Evolutionary Multiobjective Feature Selection Assisted by Un...
收藏 引用
Congress on Evolutionary Computation
作者: Xuan Duan Songbai Liu Junkai Ji Lingjie Li Qiuzhen Lin Kay Chen Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR
To enhance the generalization of multi-objective feature selection (MOFS) in classification, this paper proposes an evolutionary multitasking algorithm, diverging from previous approaches that exclusively target selec... 详细信息
来源: 评论
An Energy-Aware UAVs Path Coverage for Critical Infrastructure Inspections
An Energy-Aware UAVs Path Coverage for Critical Infrastructu...
收藏 引用
International Conference on Advanced Cloud and Big data (CBD)
作者: Yifan Wang Wei Zeng Guanyu Li Chenglong Xiong Zicheng Wang Yingchi Mao College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China Huaneng Lancang River Hydropower Co. CHINA HUANENG Group Kunming China Power China Kunming Engineering Co. Yunnan China
Critical infrastructures increasingly rely on unmanned aerial vehicles (UAVs) for inspection tasks. The significance of different components within these infrastructures is subject to variability and can be influenced... 详细信息
来源: 评论
Neural Combinatorial Optimization Algorithms for Solving Vehicle Routing Problems: A Comprehensive Survey with Perspectives
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xuan Wang, Di Wen, Lijie Xiao, Yubin Wu, Chunguo Wu, Yuesong Yu, Chaoyu Maskell, Douglas L. Zhou, You Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin university Changchun130012 China Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly Nanyang Technological University 639798 Singapore School of Software Tsinghua University Beijing100084 China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Although several surveys on Neural Combinatorial Optimization (NCO) solvers specifically designed to solve Vehicle Routing Problems (VRPs) have been conducted, they did not cover the state-of-the-art (SOTA) NCO solver... 详细信息
来源: 评论
Pointsurface: Discriminative Point Cloud Surface Feature Extraction for 3d Face Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Junpeng Li, Qiufu Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Guangdong Shenzhen518172 China
3D face recognition performs better than 2D face recognition, in terms of robustness against lighting and digital attacks. Compared to 2D data, the rich geometric information in 3D data could be very useful to improve... 详细信息
来源: 评论