咨询与建议

限定检索结果

文献类型

  • 745 篇 期刊文献
  • 702 篇 会议
  • 8 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 950 篇 工学
    • 733 篇 计算机科学与技术...
    • 620 篇 软件工程
    • 180 篇 信息与通信工程
    • 179 篇 生物工程
    • 92 篇 控制科学与工程
    • 87 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 59 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 48 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
    • 20 篇 建筑学
  • 530 篇 理学
    • 280 篇 数学
    • 195 篇 生物学
    • 105 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 50 篇 化学
    • 42 篇 系统科学
  • 263 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 72 篇 医学
    • 62 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 19 篇 经济学
  • 15 篇 农学
  • 9 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 semantics
  • 42 篇 training
  • 38 篇 deep learning
  • 31 篇 deep neural netw...
  • 30 篇 computational mo...
  • 29 篇 feature extracti...
  • 28 篇 machine learning
  • 25 篇 big data
  • 23 篇 graph neural net...
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 22 篇 data models
  • 21 篇 neural networks
  • 18 篇 contrastive lear...
  • 17 篇 object detection
  • 15 篇 memory managemen...
  • 15 篇 convolution
  • 14 篇 recommender syst...
  • 14 篇 optimization

机构

  • 100 篇 national enginee...
  • 53 篇 school of comput...
  • 51 篇 shenzhen researc...
  • 50 篇 school of cyber ...
  • 39 篇 zhejiang lab
  • 36 篇 big data researc...
  • 34 篇 national enginee...
  • 31 篇 huazhong univers...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 29 篇 school of data s...
  • 28 篇 tencent ai lab
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 22 篇 national univers...
  • 20 篇 data science and...
  • 19 篇 university of sc...

作者

  • 134 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 29 篇 liao xiaofei
  • 25 篇 wu baoyuan
  • 25 篇 liu jun
  • 25 篇 chen enhong
  • 23 篇 liu qi
  • 23 篇 hu shengshan
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 19 篇 li haizhou
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 16 篇 wang shuai
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang

语言

  • 1,381 篇 英文
  • 65 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science&Big Data Lab"
1455 条 记 录,以下是321-330 订阅
排序:
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Semantic-Preserving Abstractive Text Summarization with Siamese Generative Adversarial Net
Semantic-Preserving Abstractive Text Summarization with Siam...
收藏 引用
2022 Findings of the Association for Computational Linguistics: NAACL 2022
作者: Sheng, Xin Xu, Linli Xu, Yinlong Jiang, Deqiang Ren, Bo School of Computer Science and Technology University of Science and Technology of China. China Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China IFLYTEK Co. Ltd. China Tencent Youtu Lab China
We propose a novel siamese generative adversarial net for abstractive text summarization (SSPGAN), which can preserve the main semantics of the source text. Different from previous generative adversarial net based met... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kang Chen Ming Wen Haoxiang Jia Rongxin Wu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology (HRUST) Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Jin YinHu Laboratory Wuhan China School of Informatics Xiamen University Xiamen China School of Computer Science and Technology HUST Wuhan China Cluster and Grid Computing Lab
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Siyue Feng Wenqi Suo Yueming Wu Deqing Zou Yang Liu Hai Jin Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab Jinyinhu Laboratory Wuhan China School of Cyber Science and Engineering HUST Wuhan China Nanyang Technological University Singapore School of Computer Science and Technology HUST Wuhan China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
ICH-SCNet: Intracerebral Hemorrhage Segmentation and Prognosis Classification Network Using CLIP-guided SAM mechanism
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Xinlei Jin, Hui Wu, Qing Elazab, Ahmed Jiang, Xinchen Shi, Qinglei Ge, Ruiquan Jia, Gangyong Wang, Changmiao School of Computer Science Hangzhou Dianzi University Hangzhou China School of Biomedical Engineering Shenzhen University Shenzhen China School of Management and Economics The Chinese University of Hong Kong Shenzhen Shenzhen China School of Medicine The Chinese University of Hong Kong Shenzhen Shenzhen China Medical Big Data Lab Shenzhen Research Institute of Big Data Shenzhen China
Intracerebral hemorrhage (ICH) is the most fatal subtype of stroke and is characterized by a high incidence of disability. Accurate segmentation of the ICH region and prognosis prediction are critically important for ... 详细信息
来源: 评论
Chinese Emergency Event Extraction Based on Contrastive Learning with Event Semantic Features  19
Chinese Emergency Event Extraction Based on Contrastive Lear...
收藏 引用
19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2023
作者: Sheng, Xinyi Gu, Jinguang Yan, Youcheng Xu, Fangfang Wuhan University of Science and Technology College of Computer Science and Technology Wuhan430065 China Institute of Big Data Science and Engineering Wuhan University of Science and Technology Wuhan430065 China The Key Lab. of Rich-Media Knowledge Org. and Serv. of Digit. Publ. Content Inst. of Sci. and Tech. Info. of China Beijing100038 China
Extracting emergency events from a large amount of unstructured information is essential for improving early warning and emergency response. Existing event extraction methods for specialist fields often rely on well-d... 详细信息
来源: 评论
Environment-aware dynamic graph learning for out-of-distribution generalization  23
Environment-aware dynamic graph learning for out-of-distribu...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Haonan Yuan Qingyun Sun Xingcheng Fu Ziwei Zhang Cheng Ji Hao Peng Jianxin Li Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University and School of Computer Science and Engineering Beihang University Key Lab of Education Blockchain and Intelligent Technology Guangxi Normal University Department of Computer Science and Technology Tsinghua University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University
Dynamic graph neural networks (DGNNs) are increasingly pervasive in exploiting spatio-temporal patterns on dynamic graphs. However, existing works fail to generalize under distribution shifts, which are common in real...
来源: 评论
Fraud Detection of Electricity Consumption Using Robust Exponential and Holt-Winters Smoothing Method
Fraud Detection of Electricity Consumption Using Robust Expo...
收藏 引用
International Conference on Advanced Systems and Electric Technologies (IC_ASET)
作者: Dalila Azzouguer Abderrazak Sebaa Dalil Hadjout Francisco Martínez–Álvarez Laboratoire LITAN École supérieure en Sciences et Technologies de l'Informatique et du Numérique Bejaia Algérie Data Science & Big Data Lab Pablo de Olavide University Spain
Non-technical losses (NTL), especially fraud detection is very important for electricity distribution enterprises. Fraud detection allows for maximizing the effective economic return for such enterprises. This paper p...
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
A Survey on Cross-Domain Sequential Recommendation
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Shu Xu, Zitao Pan, Weike Yang, Qiang Ming, Zhong College of Computer Science and Software Engineering Shenzhen University China WeBank AI Lab WeBank China The Hong Kong University of Science and Technology China College of Big Data and Internet Shenzhen Technology University China
Cross-domain sequential recommendation (CDSR) shifts the modeling of user preferences from flat to stereoscopic by integrating and learning interaction information from multiple domains at different granularities (ran... 详细信息
来源: 评论