咨询与建议

限定检索结果

文献类型

  • 750 篇 期刊文献
  • 722 篇 会议
  • 8 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 753 篇 计算机科学与技术...
    • 625 篇 软件工程
    • 181 篇 信息与通信工程
    • 179 篇 生物工程
    • 109 篇 控制科学与工程
    • 89 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 49 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 534 篇 理学
    • 281 篇 数学
    • 197 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 51 篇 化学
    • 42 篇 系统科学
  • 264 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 74 篇 医学
    • 62 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 43 篇 training
  • 39 篇 deep learning
  • 32 篇 deep neural netw...
  • 31 篇 computational mo...
  • 29 篇 feature extracti...
  • 29 篇 machine learning
  • 25 篇 big data
  • 24 篇 graph neural net...
  • 23 篇 data models
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 21 篇 neural networks
  • 20 篇 contrastive lear...
  • 17 篇 object detection
  • 16 篇 convolution
  • 15 篇 memory managemen...
  • 15 篇 recommender syst...
  • 15 篇 optimization

机构

  • 103 篇 national enginee...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 52 篇 shenzhen researc...
  • 39 篇 zhejiang lab
  • 37 篇 national enginee...
  • 36 篇 big data researc...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 31 篇 huazhong univers...
  • 29 篇 tencent ai lab
  • 29 篇 cluster and grid...
  • 29 篇 school of data s...
  • 28 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 national univers...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 21 篇 school of softwa...
  • 20 篇 university of sc...

作者

  • 137 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 28 篇 liu jun
  • 26 篇 chen enhong
  • 25 篇 wu baoyuan
  • 25 篇 hu shengshan
  • 23 篇 liu qi
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 li haizhou
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 17 篇 zhang leo yu
  • 16 篇 wang shuai
  • 16 篇 yu zhang

语言

  • 1,353 篇 英文
  • 118 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science&Big Data Lab"
1480 条 记 录,以下是491-500 订阅
排序:
OpenKG Chain:A Blockchain Infrastructure for Open Knowledge Graphs
收藏 引用
data Intelligence 2021年 第2期3卷 205-227页
作者: Huajun Chen Ning Hu Guilin Qi Haofen Wang Zhen Bi Jie Li Fan Yang College of Computer Science&AZFT Knowledge Engine Lab Zhejiang UniversityHangzhou 310058China Ontology Foundation Venture Drive#11-31Vision ExchangeSingapore 608526Singapore School of Computer Science and Engineering Southeast UniversityNanjing 211189China Intelligent Big Data Visualization Lab Tongji UniversityShanghai 200092China
The early concept of knowledge graph originates from the idea of the semantic Web,which aims at using structured graphs to model the knowledge of the world and record the relationships that exist between *** publishin... 详细信息
来源: 评论
Coresets for near-convex functions  34
Coresets for near-convex functions
收藏 引用
34th Conference on Neural Information Processing Systems, NeurIPS 2020
作者: Tukan, Murad Maalouf, Alaa Feldman, Dan The Robotics and Big Data Lab. Department of Computer Science University of Haifa Haifa Israel
Coreset is usually a small weighted subset of n input points in Rd, that provably approximates their loss function for a given set of queries (models, classifiers, etc.). Coresets become increasingly common in machine... 详细信息
来源: 评论
Multiclass Classification of Ocular Toxoplasmosis from Fundus Images with Residual Neural Networks
Multiclass Classification of Ocular Toxoplasmosis from Fundu...
收藏 引用
Iberian Conference on Information Systems and Technologies (CISTI)
作者: José Luis Vázquez Noguera Rodrigo Parra Verena Ojeda Miguel García-Torres Julio César Mello-Román Cynthia Villaba Olivia Cardozo Universidad Americana Asunción Paraguay Data Science and Big Data Lab Universidad Pablo de Olavide Spain Facultad Politécnica Universidad Nacional de Asunción San Lorenzo Paraguay Department of Ophthalmology Hospital General Pediátrico Niños de AcostaÑu Paraguay
Ocular toxoplasmosis (OT) is usually diagnosed by a specialist through the analysis of fundus images of the eye. Deep learning has been used to perform binary classification of the disease; however, to the best of our...
来源: 评论
IMAGINENET: TARGET SPEAKER EXTRACTION WITH INTERMITTENT VISUAL CUE THROUGH EMBEDDING INPAINTING
arXiv
收藏 引用
arXiv 2022年
作者: Pan, Zexu Wang, Wupeng Borsdorf, Marvin Li, Haizhou Singapore Department of Electrical and Computer Engineering Nus Singapore Machine Listening Lab University of Bremen Germany Shenzhen Research Institute of Big Data School of Data Science The Chinese University of Hong Kong Shenzhen China
The speaker extraction technique seeks to single out the voice of a target speaker from the interfering voices in a speech mixture. Typically an auxiliary reference of the target speaker is used to form voluntary atte... 详细信息
来源: 评论
Teaching resource recommendation for OBE based on kernel canonical correlation analysis
Teaching resource recommendation for OBE based on kernel can...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Wu Changqian Li Shaozi Lin Yaojin Yu Xiehua Key Laboratory of Big Data and Artificial Intelligence in University of Fujian Province MinNan Science and Technology University José Rizal University Quanzhou China School of Informatics Xiamen University Xiamen China School of Computer Science Lab of Data Science and Intelligence Application Minnan Normal University Zhangzhou China Key Laboratory of Big Data and Artificial Intelligence in University of Fujian Province MinNan Science and Technology University Quanzhou China
data mining is used to extract information from OBE teaching resources, then the teaching resources and user personality database are established to improve the effectiveness of resources recommendation on the online ... 详细信息
来源: 评论
From General to Specific: Tailoring Large Language Models for Personalized Healthcare
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Ruize Huang, Hong Zhou, Wei Yin, Kehan Zhao, Kai Zhao, Yun Huazhong University of Science and Technology Wuhan China Tongji Medical College China Hubei Maternity and Child Health Care Hospital China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The rapid development of large language models (LLMs) has transformed many industries, including healthcare. However, previous medical LLMs have largely focused on leveraging general medical knowledge to provide respo... 详细信息
来源: 评论
Container Anomaly Detection System Based on Rule Mining and Matching
Container Anomaly Detection System Based on Rule Mining and ...
收藏 引用
2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022
作者: Yu, Daisong Xie, Yulai Long, Huachao Jin, Minpeng Li, Xuan School of Cyber Science and Engineering Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China Wuhan National Lab for Optoelectronics F311 Wuhan China School of Computer Science Huazhong University of Science and Technology Wuhan China Nsfocus Inc. A9-3/F Optical Valley Software Park Wuhan China
Compared with virtual machine technology, container technology is more and more popular by virtue of its excellent convenience and reliable security isolation. Containers will encounter various anomalies during operat... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
Multimodal Learning Approach for Multi-Topic Twitter Summarization  7
Multimodal Learning Approach for Multi-Topic Twitter Summari...
收藏 引用
7th International Conference on Cloud Computing and big data Analytics, ICCCBDA 2022
作者: Cao, Yangyang Wu, Yanmin Qi, Jinli Chen, Zizhong Chongqing Key Lab. of Compl. Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China ChongQing College of Electronic Engineering Department of Artificial Intelligence and Big Data ChongQing401331 China University of California Riverside Department of Computer Science and Engineering RiversideCA United States
Twitter summary is designed to filter out the content summary from lots of noisy tweets, which can be used for Twitter search, public opinion analysis, hot topic discovery, etc. But the existing Twitter summary method... 详细信息
来源: 评论
Generalizable Black-Box Adversarial Attack with Meta Learning
arXiv
收藏 引用
arXiv 2023年
作者: Yin, Fei Zhang, Yong Wu, Baoyuan Feng, Yan Zhang, Jingyi Fan, Yanbo Yang, Yujiu Tsinghua Shenzhen International Graduate School Tsinghua University Beijing100190 China The School of Data Science Shenzhen Research Institute of Big Data Chinese University of Hong Kong Shenzhen518172 China Tencent AI Lab Guangdong Shenzhen518057 China The Center for Future Media The School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610056 China
In the scenario of black-box adversarial attack, the target model's parameters are unknown, and the attacker aims to find a successful adversarial perturbation based on query feedback under a query budget. Due to ... 详细信息
来源: 评论