咨询与建议

限定检索结果

文献类型

  • 750 篇 期刊文献
  • 722 篇 会议
  • 8 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 753 篇 计算机科学与技术...
    • 625 篇 软件工程
    • 181 篇 信息与通信工程
    • 179 篇 生物工程
    • 109 篇 控制科学与工程
    • 89 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 49 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 534 篇 理学
    • 281 篇 数学
    • 197 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 51 篇 化学
    • 42 篇 系统科学
  • 264 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 74 篇 医学
    • 62 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 43 篇 training
  • 39 篇 deep learning
  • 32 篇 deep neural netw...
  • 31 篇 computational mo...
  • 29 篇 feature extracti...
  • 29 篇 machine learning
  • 25 篇 big data
  • 24 篇 graph neural net...
  • 23 篇 data models
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 21 篇 neural networks
  • 20 篇 contrastive lear...
  • 17 篇 object detection
  • 16 篇 convolution
  • 15 篇 memory managemen...
  • 15 篇 recommender syst...
  • 15 篇 optimization

机构

  • 103 篇 national enginee...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 52 篇 shenzhen researc...
  • 39 篇 zhejiang lab
  • 37 篇 national enginee...
  • 36 篇 big data researc...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 31 篇 huazhong univers...
  • 29 篇 tencent ai lab
  • 29 篇 cluster and grid...
  • 29 篇 school of data s...
  • 28 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 national univers...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 21 篇 school of softwa...
  • 20 篇 university of sc...

作者

  • 137 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 28 篇 liu jun
  • 26 篇 chen enhong
  • 25 篇 wu baoyuan
  • 25 篇 hu shengshan
  • 23 篇 liu qi
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 li haizhou
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 17 篇 zhang leo yu
  • 16 篇 wang shuai
  • 16 篇 yu zhang

语言

  • 1,353 篇 英文
  • 118 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science&Big Data Lab"
1480 条 记 录,以下是401-410 订阅
排序:
Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach
arXiv
收藏 引用
arXiv 2024年
作者: Wan, Yao Wan, Guanghua Zhang, Shijie Zhang, Hongyu Zhou, Pan Jin, Hai Sun, Lichao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Huazhong University of Science and Technology China University of Leigh United States
Recent years have witnessed significant progress in developing deep learning-based models for automated code completion. Examples of such models include CodeGPT and StarCoder. These models are typically trained from a... 详细信息
来源: 评论
E1 TTS: Simple and Fast Non-Autoregressive TTS
E1 TTS: Simple and Fast Non-Autoregressive TTS
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhijun Liu Shuai Wang Pengcheng Zhu Mengxiao Bi Haizhou Li School of Data Science The Chinese University of Hong Kong Shenzhen P.R. China Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen P.R. China Fuxi AI Lab NetEase Inc. Hangzhou China Department of Electrical and Computer Engineering National University of Singapore Singapore
This paper introduces Easy One-Step Text-to-Speech (E1 TTS), an efficient non-autoregressive zero-shot text-to-speech system based on denoising diffusion pretraining and distribution matching distillation. The trainin... 详细信息
来源: 评论
SharDAG: Scaling DAG-Based Blockchains Via Adaptive Sharding
SharDAG: Scaling DAG-Based Blockchains Via Adaptive Sharding
收藏 引用
International Conference on data Engineering
作者: Feng Cheng Jiang Xiao Cunyang Liu Shijie Zhang Yifan Zhou Bo Li Baochun Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Hong Kong University of Science and Technology Hong Kong University of Toronto Canada
Directed Acyclic Graph (DAG)-based blockchain (a.k.a distributed ledger) has become prevalent for supporting highly concurrent applications. Its inherent parallel data structure accelerates block generation significan... 详细信息
来源: 评论
Association between centrality and flourishing trait: analyzing student co-occurrence networks drawn from dining activities
arXiv
收藏 引用
arXiv 2024年
作者: Cao, Yi Cai, Shimin Shen, Xiaorong Zhou, Tao CompleX Lab University of Electronic Science and Technology of China Chengdu611731 China Big Data Research Center University of Electronic Science and Technology of China Chengdu611731 China i-Large Model Innovation Lab of Ideological and Political Science University of Electronic Science and Technology of China Chengdu611731 China
Comprehending the association between social capabilities and individual psychological traits is paramount for educational administrators. Presently, many studies heavily depend on online questionnaires and self-repor... 详细信息
来源: 评论
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensiona...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Haoxiang Jia Ming Wen Zifan Xie Xiaochen Guo Rongxin Wu Maolin Sun Kang Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab. Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System School of Informatics Xiamen University China School of Computer Science and Technology Huazhong University of Science and Technology China
Java Virtual Machine (JVM) is the fundamental software system that supports the interpretation and execution of Java bytecode. To support the surging performance demands for the increasingly complex and large-scale Ja...
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Fast and Accurate Cooperative Radio Map Estimation Enabled by GAN
Fast and Accurate Cooperative Radio Map Estimation Enabled b...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Zezhong Zhang Guangxu Zhu Junting Chen Shuguang Cui Future Network of Intelligent Institute (FNii) School of Science and Engineering (SSE) The Chinese University of Hong Kong (Shenzhen) Shenzhen China Shenzhen Research Institute of Big Data Shenzhen China Pengcheng Lab Shenzhen China
In the 6G era, real-time radio resource monitoring and management are urged to support diverse wireless-empowered applications. This calls for fast and accurate estimation on the distribution of the radio resources, w... 详细信息
来源: 评论
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation
arXiv
收藏 引用
arXiv 2022年
作者: Qin, Zeyu Fan, Yanbo Liu, Yi Shen, Li Zhang, Yong Wang, Jue Wu, Baoyuan School of Data Science Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China Tencent AI Lab United States JD Explore Academy China
Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples, which can produce erroneous predictions by injecting imperceptible perturbations. In this work, we study the transferability of adv... 详细信息
来源: 评论