咨询与建议

限定检索结果

文献类型

  • 745 篇 期刊文献
  • 702 篇 会议
  • 8 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 950 篇 工学
    • 733 篇 计算机科学与技术...
    • 620 篇 软件工程
    • 180 篇 信息与通信工程
    • 179 篇 生物工程
    • 92 篇 控制科学与工程
    • 87 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 59 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 48 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
    • 20 篇 建筑学
  • 530 篇 理学
    • 280 篇 数学
    • 195 篇 生物学
    • 105 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 50 篇 化学
    • 42 篇 系统科学
  • 263 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 72 篇 医学
    • 62 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 19 篇 经济学
  • 15 篇 农学
  • 9 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 semantics
  • 42 篇 training
  • 38 篇 deep learning
  • 31 篇 deep neural netw...
  • 30 篇 computational mo...
  • 29 篇 feature extracti...
  • 28 篇 machine learning
  • 25 篇 big data
  • 23 篇 graph neural net...
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 22 篇 data models
  • 21 篇 neural networks
  • 18 篇 contrastive lear...
  • 17 篇 object detection
  • 15 篇 memory managemen...
  • 15 篇 convolution
  • 14 篇 recommender syst...
  • 14 篇 optimization

机构

  • 100 篇 national enginee...
  • 53 篇 school of comput...
  • 51 篇 shenzhen researc...
  • 50 篇 school of cyber ...
  • 39 篇 zhejiang lab
  • 36 篇 big data researc...
  • 34 篇 national enginee...
  • 31 篇 huazhong univers...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 29 篇 school of data s...
  • 28 篇 tencent ai lab
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 22 篇 national univers...
  • 20 篇 data science and...
  • 19 篇 university of sc...

作者

  • 134 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 25 篇 wu baoyuan
  • 25 篇 liu jun
  • 25 篇 chen enhong
  • 23 篇 liu qi
  • 23 篇 hu shengshan
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 19 篇 li haizhou
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 16 篇 wang shuai
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang

语言

  • 1,381 篇 英文
  • 65 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science&Big Data Lab"
1455 条 记 录,以下是151-160 订阅
排序:
Leveraging Foundation Models for Crafting Narrative Visualization: A Survey
arXiv
收藏 引用
arXiv 2024年
作者: He, Yi Xu, Ke Cao, Shixiong Shi, Yang Chen, Qing Cao, Nan Intelligent Big Data Visualization Lab Tongji University China School of Intelligence Science and Technology Nanjing University China
Narrative visualization transforms data into engaging stories, making complex information accessible to a broad audience. Foundation models, with their advanced capabilities such as natural language processing, conten... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Logic-Aware Knowledge Graph Reasoning for Structural Sparsity under Large Language Model Supervision  25
Logic-Aware Knowledge Graph Reasoning for Structural Sparsit...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Pan, Yudai Hong, Jiajie Zhao, Tianzhe Song, Lingyun Liu, Jun Shang, Xuequn School of Computer Science Northwest Polytechnical University Shaanxi Xi’an China Key Laboratory of Big Data Storage and Management Northwestern Polytechnical University Shaanxi Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an China Research & Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen China National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Shaanxi Xi’an China
Knowledge Graph (KG) reasoning aims to predict missing entities in incomplete triples, which requires adequate structural information to derive accurate embeddings. However, KGs in the real world are not as dense as t... 详细信息
来源: 评论
Reversible data Hiding Using Convolutional Neural Network and Digital Signal Processing Techniques  12
Reversible Data Hiding Using Convolutional Neural Network an...
收藏 引用
12th International Conference on Information Technology in Medicine and Education, ITME 2022
作者: Qingmei, Peng Shaozi, Li Yaojin, Lin Xiehua, Yu University of Fujian Province Key Laboratory of Big Data and Artificial Intelligence MinNan Science and Technology University Quanzhou China Xiamen University School of Informatics Xiamen China Minnan Normal University School of Computer Science Lab of Data Science and Intelligence Application Zhangzhou China
Reversible data hiding is a data hiding process in which data is encrypted into an image as a means of authentication, and hidden data is used to hide the original image, and RDH is often used in areas where data auth... 详细信息
来源: 评论
M-Vec: Matryoshka Speaker Embeddings with Flexible Dimensions
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Shuai Zhu, Pengcheng Li, Haizhou Shenzhen Research Institute of Big Data China School of Data Science Chinese University of Hong Kong Shenzhen China Fuxi AI Lab NetEase Inc. Hangzhou China
Fixed-dimensional speaker embeddings have become the dominant approach in speaker modeling, typically spanning hundreds to thousands of dimensions. These dimensions are hyperparameters that are not specifically picked... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
TDID: Transparent and Efficient Decentralized Identity Management with Blockchain
TDID: Transparent and Efficient Decentralized Identity Manag...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Hao, Jiakun Gao, Jianbo Xiang, Peng Zhang, Jiashuo Chen, Ziming Hu, Hao Chen, Zhong School of Computer Science Peking University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China Nanjing University State Key Lab for Novel Software Technology Jiangsu Nanjing China
Decentralized identity (DID) is an identity management framework aiming to return the ownership of an identity to its corresponding user. Recent studies propose to store the identifiers of DID issuers and implement id... 详细信息
来源: 评论
Inhibition of ALDH2 by disulfiram leads to synthetic lethality via ROS strikes twice in ARID1A-deficient cholangiocarcinoma
收藏 引用
Genes & Diseases 2023年 第1期10卷 69-71页
作者: Tingming Liang Lin Jia Rui Duan Lulu Shen Dekang Ren Yujie Ren Yuyang Dou Li Guo Jiangsu Key Laboratory for Molecular and Medical Biotechnology School of Life ScienceNanjing Normal UniversityNanjingJiangsu210023China Department of Bioinformatics Smart Health Big Data Analysis and Location Services Engineering Lab of Jiangsu ProvinceSchool of Geographic and Biologic InformationNanjing University of Posts and TelecommunicationsNanjingJiangsu 210023China
Synthetic lethality describes an interaction whereby the co-occurrence of two mutations leads to cell death but one mutation alone does not,which can be exploited for cancer therapeutics.1 Due to lacking effective non... 详细信息
来源: 评论
ES-Mask: Evolutionary Strip Mask for Explaining Time Series Prediction  37
ES-Mask: Evolutionary Strip Mask for Explaining Time Series ...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Sun, Yifei Song, Cheng Lu, Feng Li, Wei Jin, Hai Zomaya, Albert Y. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Centre for Distributed and High Performance Computing School of Computer Science University of Sydney Australia
Machine learning models are increasingly used in time series prediction with promising results. The model explanation of time series prediction falls behind the model development and makes less sense to users in under... 详细信息
来源: 评论