咨询与建议

限定检索结果

文献类型

  • 750 篇 期刊文献
  • 722 篇 会议
  • 8 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 753 篇 计算机科学与技术...
    • 625 篇 软件工程
    • 181 篇 信息与通信工程
    • 179 篇 生物工程
    • 109 篇 控制科学与工程
    • 89 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 49 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 534 篇 理学
    • 281 篇 数学
    • 197 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 51 篇 化学
    • 42 篇 系统科学
  • 264 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 74 篇 医学
    • 62 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 43 篇 training
  • 39 篇 deep learning
  • 32 篇 deep neural netw...
  • 31 篇 computational mo...
  • 29 篇 feature extracti...
  • 29 篇 machine learning
  • 25 篇 big data
  • 24 篇 graph neural net...
  • 23 篇 data models
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 21 篇 neural networks
  • 20 篇 contrastive lear...
  • 17 篇 object detection
  • 16 篇 convolution
  • 15 篇 memory managemen...
  • 15 篇 recommender syst...
  • 15 篇 optimization

机构

  • 103 篇 national enginee...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 52 篇 shenzhen researc...
  • 39 篇 zhejiang lab
  • 37 篇 national enginee...
  • 36 篇 big data researc...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 31 篇 huazhong univers...
  • 29 篇 tencent ai lab
  • 29 篇 cluster and grid...
  • 29 篇 school of data s...
  • 28 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 national univers...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 21 篇 school of softwa...
  • 20 篇 university of sc...

作者

  • 137 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 28 篇 liu jun
  • 26 篇 chen enhong
  • 25 篇 wu baoyuan
  • 25 篇 hu shengshan
  • 23 篇 liu qi
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 li haizhou
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 17 篇 zhang leo yu
  • 16 篇 wang shuai
  • 16 篇 yu zhang

语言

  • 1,353 篇 英文
  • 118 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science&Big Data Lab"
1480 条 记 录,以下是1171-1180 订阅
排序:
Classification of hypertension in pregnancy based on random forest and Xgboost fusion model  3
Classification of hypertension in pregnancy based on random ...
收藏 引用
3rd International Conference on Biological Information and Biomedical Engineering, BIBE 2019
作者: Lan, Xinke Wu, Wei Peng, Danhong Xu, Tian Wang, Jun Wang, Gongdao Hou, Fengzhen Smart Health Big Data Analysis and Location Services Engineering Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing China Department of Psychiatry Affiliated Brain Hospital of Nanjing Medical University Nanjing China Department of Obstetrics and Gynecology Zhongda Hospital Southeast University Nanjing China School of Science China Pharmaceutical University Nanjing China
Hypertension and its complications during pregnancy are the second most important factors affecting maternal mortality, posing a serious threat to pregnant women and newborns. The pathogenesis and influencing factors ... 详细信息
来源: 评论
Unsupervised neural machine translation with SMT as posterior regularization
arXiv
收藏 引用
arXiv 2019年
作者: Ren, Shuo Zhang, Zhirui Liu, Shujie Zhou, Ming Ma, Shuai SKLSDE Lab Beihang University Beijing Advanced Innovation Center for Big Data and Brain Computing China University of Science and Technology of China Hefei China Microsoft Research Asia
Without real bilingual corpus available, unsupervised Neural Machine Translation (NMT) typically requires pseudo parallel data generated with the back-translation method for the model training. However, due to weak su... 详细信息
来源: 评论
Corrigendum to “Understanding the urban mobility community by taxi travel trajectory” [Commun. Nonlinear Sci. Numer. Simul. 101(2021) 105863/6]
收藏 引用
Communications in Nonlinear science and Numerical Simulation 2022年 104卷
作者: Wei-Peng Nie Zhi-Dan Zhao Shi-Min Cai Tao Zhou Complex Lab School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu 610054 China Big Data Research Center University of Electronic Science and Technology of China Chengdu 610054 China Complexity Computation Laboratory Department of Computer Science School of Engineering Shantou University Shantou 515063 China Key Laboratory of Intelligent Manufacturing Technology (Ministry of Education) Shantou University Shantou 515063 China
来源: 评论
GIscience in the Era of Artificial Intelligence: A Research Agenda Towards Autonomous GIS
arXiv
收藏 引用
arXiv 2025年
作者: Li, Zhenlong Ning, Huan Gao, Song Janowicz, Krzysztof Li, Wenwen Arundel, Samantha T. Yang, Chaowei Bhaduri, Budhendra Wang, Shaowen Zhu, A. Xing Gahegan, Mark Shekhar, Shashi Ye, Xinyue McKenzie, Grant Cervone, Guido Hodgson, Michael E. Geoinformation and Big Data Research Lab Department of Geography The Pennsylvania State University University ParkPA United States Department of Geography University of Wisconsin – Madison WI United States STKO Lab Department of Geography and Regional Research University of Vienna Vienna Austria Spatial Analysis Research Center School of Geographical Sciences and Urban Planning Arizona State University AZ United States Center of Excellence for Geospatial Information Science U.S. Geological Survey VA United States NSF Spatiotemporal Innovation Center Department of Geography & Geoinformation Science George Mason University VA United States TN United States CyberGIS Center for Advanced Digital and Spatial Studies Department of Geography and Geographic Information Science University of Illinois Urbana-Champaign IL United States School of Computer Science University of Auckland New Zealand Department of Computer Science & Engineering University of Minnesota MN United States Department of Landscape Architecture & Urban Planning Center for Geospatial Sciences Applications & Technology Texas A&M University TX United States Platial Analysis Lab Department of Geography McGill University Quebec Canada Institute for Computational and Data Sciences Department of Geography The Pennsylvania State University University ParkPA United States Department of Geography University of South Carolina SC United States
The advent of generative AI exemplified by large language models (LLMs) opens new ways to represent and compute geographic information and transcends the process of geographic knowledge production, driving geographic ... 详细信息
来源: 评论
Distraction-aware feature learning for human attribute recognition via coarse-to-fine attention mechanism
arXiv
收藏 引用
arXiv 2019年
作者: Wu, Mingda Huang, Di Guo, Yuanfang Wang, Yunhong Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China IRIP Lab School of Computer Science and Engineering Beihang University Beijing China
Recently, Human Attribute Recognition (HAR) has become a hot topic due to its scientific challenges and application potentials, where localizing attributes is a crucial stage but not well handled. In this paper, we pr... 详细信息
来源: 评论
Unsupervised image super-resolution with an indirect supervised path
arXiv
收藏 引用
arXiv 2019年
作者: Han, Zhen Dai, Enyan Jia1y, Xu Ren, Xiaoying Chen, Shuaijun Xu, Chunjing Liu, Jianzhuang Tian, Qi Huawei Noah's Ark Lab Institute of Statistics and Big Data Renmin University of China College of Information Science and Technology Pennsylvania State University School of Computer Science and Technology University of Science and Technology of China
The task of single image super-resolution (SISR) aims at reconstructing a high-resolution (HR) image from a low-resolution (LR) image. Although significant progress has been made by deep learning models, they are trai... 详细信息
来源: 评论
A simple image encryption algorithm based on logistic map  5th
A simple image encryption algorithm based on logistic map
收藏 引用
5th Euro-China Conference on Intelligent data Analysis and Applications, ECC 2018
作者: Wu, Tsu-Yang Wang, King-Hang Chen, Chien-Ming Wu, Jimmy Ming-Tai Pan, Jeng-Shyang Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong Shenzhen518055 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Based on the better properties of chaotic maps, the studies of chaotic-based image encryption have received much attentions by researchers in recent years. In this paper, an image encryption algorithm based on logisti... 详细信息
来源: 评论
Hierarchical semantic approximate multi-keyword ranked search over encrypted data  2nd
Hierarchical semantic approximate multi-keyword ranked searc...
收藏 引用
2nd International Conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2018
作者: Chen, Chien-Ming Zhang, Wenhao Wu, Tsu-Yang Wang, King-Hang Wu, Jimmy Ming-Tai Pan, Jeng-Shyang Shenzhen518055 China Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
With the rapid development of Cloud Computing, how to improve users search experience over encrypted data just like plaintext search has become a challenging task. In this paper, we propose a hierarchical semantic app... 详细信息
来源: 评论
A Public Auditing Scheme with data Recovery  12th
A Public Auditing Scheme with Data Recovery
收藏 引用
12th International Conference on Genetic and Evolutionary Computing, ICGEC 2018
作者: Wu, Tsu-Yang Chen, Chien-Ming Wang, King-Hang Wu, Jimmy Ming-Tai Pan, Jeng-Shyang Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
In order to solve the integrity verification of outsourced file in cloud, we based on the concept of regenerating code (RC) to propose a new public auditing scheme with data recovery in this paper. With the advantage ... 详细信息
来源: 评论
Security analysis of a public key authenticated encryption with keyword search scheme  14th
Security analysis of a public key authenticated encryption w...
收藏 引用
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018
作者: Wu, Tsu-Yang Chen, Chien-Ming Wang, King-Hang Wu, Jimmy Ming-Tai Pan, Jeng-Shyang Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Hong Kong College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
In order to solve the security problem that off-line keyword guessing attacks existed in PEKS or dPEKS scheme, Huang and Li introduced a new security model called PAEKS. In this paper, we show that their scheme didn’... 详细信息
来源: 评论