咨询与建议

限定检索结果

文献类型

  • 750 篇 期刊文献
  • 722 篇 会议
  • 8 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 753 篇 计算机科学与技术...
    • 625 篇 软件工程
    • 181 篇 信息与通信工程
    • 179 篇 生物工程
    • 109 篇 控制科学与工程
    • 89 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 49 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 534 篇 理学
    • 281 篇 数学
    • 197 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 51 篇 化学
    • 42 篇 系统科学
  • 264 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 74 篇 医学
    • 62 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 43 篇 training
  • 39 篇 deep learning
  • 32 篇 deep neural netw...
  • 31 篇 computational mo...
  • 29 篇 feature extracti...
  • 29 篇 machine learning
  • 25 篇 big data
  • 24 篇 graph neural net...
  • 23 篇 data models
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 21 篇 neural networks
  • 20 篇 contrastive lear...
  • 17 篇 object detection
  • 16 篇 convolution
  • 15 篇 memory managemen...
  • 15 篇 recommender syst...
  • 15 篇 optimization

机构

  • 103 篇 national enginee...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 52 篇 shenzhen researc...
  • 39 篇 zhejiang lab
  • 37 篇 national enginee...
  • 36 篇 big data researc...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 31 篇 huazhong univers...
  • 29 篇 tencent ai lab
  • 29 篇 cluster and grid...
  • 29 篇 school of data s...
  • 28 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 national univers...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 21 篇 school of softwa...
  • 20 篇 university of sc...

作者

  • 137 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 28 篇 liu jun
  • 26 篇 chen enhong
  • 25 篇 wu baoyuan
  • 25 篇 hu shengshan
  • 23 篇 liu qi
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 li haizhou
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 17 篇 zhang leo yu
  • 16 篇 wang shuai
  • 16 篇 yu zhang

语言

  • 1,353 篇 英文
  • 118 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science&Big Data Lab"
1480 条 记 录,以下是481-490 订阅
排序:
Generating Action-conditioned Prompts for Open-vocabulary Video Action Recognition  24
Generating Action-conditioned Prompts for Open-vocabulary Vi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Jia, Chengyou Luo, Minnan Chang, Xiaojun Dang, Zhuohang Han, Mingfei Wang, Mengmeng Dai, Guang Dang, Sizhe Wang, Jingdong School of Computer Science and Technology MOEKLINNS Lab Xi'an Jiaotong University Shaanxi Xi'an China University of Science and Technology of China Anhui Hefei China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China ReLER Lab AAII University of Technology Sydney SydneyNSW Australia Zhejiang University of Technology College of Computer Science and Technology China SGIT AI Lab State Grid Corporation of China Beijing China Baidu Inc Beijing China United Arab Emirates Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China SGIT AI Lab State Grid Corporation of China China School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China
Exploring open-vocabulary video action recognition is a promising venture, which aims to recognize previously unseen actions within any arbitrary set of categories. Existing methods typically adapt pretrained image-te... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Analysis of Moving Target Defense in Unbalanced and Multiphase Distribution Systems Considering Voltage Stability
Analysis of Moving Target Defense in Unbalanced and Multipha...
收藏 引用
2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021
作者: Liu, Mengxiang Zhao, Chengcheng Zhang, Zhenyong Deng, Ruilong Cheng, Peng College of Control Science and Engineering Zhejiang University State Key Lab. of Industrial Control Technology Hangzhou China College of Computer Science and Technology Guizhou University State Key Lab. of Public Big Data Guiyang China
Moving Target Defense (MTD) is a new technology to defend against the false data injection attack (FDIA) on distribution system state estimation (DSSE). It works by proactively perturbing the branch reactance. However... 详细信息
来源: 评论
Metadata-Driven Federated Learning of Connectional Brain Templates in Non-IID Multi-Domain Scenarios
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Geng Wang, Qingyue Rekik, Islem National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University China BASIRA Lab Imperial-X Department of Computing Imperial College London United Kingdom
A connectional brain template (CBT) is a holistic representation of a population of multi-view brain connectivity graphs, encoding shared patterns and normalizing typical variations across individuals. The federation ... 详细信息
来源: 评论
Routing over Best Links is not necessarily Better in Wireless Multi-hop Networks
Routing over Best Links is not necessarily Better in Wireles...
收藏 引用
International Workshop on Quality of Service
作者: Shutao Lu Wuyungerile Li Yintu Bao Alvin C. Valera Winston K.G. Seah Baoqi Huang Inner Mongolia Key Lab. of Wireless Networking & Mobile Computing Engineering Research Center of Ecological Big Data Ministry of Education School of Computer Science Inner Mongolia University Hohhot China School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
The conventional approach of choosing the best route to carry network traffic in wireless multi-hop networks does not maximize the overall network throughput and can lead to short-term instabilities in network state w... 详细信息
来源: 评论
Comprehensive Architecture Search for Deep Graph Neural Networks
收藏 引用
IEEE Transactions on big data 2025年
作者: Dong, Yukang Pan, Fanxing Gui, Yi Jiang, Wenbin Wan, Yao Zheng, Ran Jin, Hai National Engineering Research Center for Big Data Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Service Computing Technology and System Laboratory Wuhan430074 China Huazhong University of Science and Technology Cluster and Grid Computing Laboratory Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
In recent years, Neural Architecture Search (NAS) has emerged as a promising approach for automatically discovering superior model architectures for deep Graph Neural Networks (GNNs). Different methods have paid atten... 详细信息
来源: 评论
Heterogeneous differential privacy for vertically partitioned databases
Heterogeneous differential privacy for vertically partitione...
收藏 引用
作者: Xia, Yang Zhu, Tianqing Ding, Xiaofeng Jin, Hai Zou, Deqing National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Deakin University Victoria Australia
Existing privacy-preserving approaches are generally designed to provide privacy guarantee for individual data in a database, which reduces the utility of the database for data analysis. In this paper, we propose a no... 详细信息
来源: 评论
Enhancing Subject-Independent EEG-Based Auditory Attention Decoding with WGAN and Pearson Correlation Coefficient
Enhancing Subject-Independent EEG-Based Auditory Attention D...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Saurav Pahuja Gabriel Ivucic Felix Putze Siqi Cai Haizhou Li Tanja Schultz Machine Listening Lab (MLL) University of Bremen Germany Cognitive Systems Lab (CSL) University of Bremen Germany Department of Electrical and Computer Engineering National University of Singapore Singapore Shenzhen Research Institute of Big Data School of Data Science The Chinese University of Hong Kong Shenzhen China Kriston AI Xiamen China CSL and hosts MLL
Electroencephalography (EEG) related research faces a significant challenge of subject independence due to the variation in brain signals and responses among individuals. While deep learning models hold promise in add...
来源: 评论
Backdoor Defense via Deconfounded Representation Learning
Backdoor Defense via Deconfounded Representation Learning
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zaixi Zhang Qi Liu Zhicai Wang Zepu Lu Qingyong Hu Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China State Key Laboratory of Cognitive Intelligence Hefei Anhui China University of Science and Technology of China Hong Kong University of Science and Technology
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by injecting a few poisoned examples into the training dataset. While extens...
来源: 评论
Layered Structure Aware Dependent Microservice Placement Toward Cost Efficient Edge Clouds
Layered Structure Aware Dependent Microservice Placement Tow...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Deze Zeng Hongmin Geng Lin Gu Zhexiong Li School of Computer Science China University of Geosciences Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Although the containers are featured by light-weightness, it is still resource-consuming to pull and startup a large container image, especially in relatively resource-constrained edge cloud. Fortunately, Docker, as t...
来源: 评论