咨询与建议

限定检索结果

文献类型

  • 750 篇 期刊文献
  • 722 篇 会议
  • 8 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 753 篇 计算机科学与技术...
    • 625 篇 软件工程
    • 181 篇 信息与通信工程
    • 179 篇 生物工程
    • 109 篇 控制科学与工程
    • 89 篇 电气工程
    • 85 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 电子科学与技术(可...
    • 51 篇 机械工程
    • 49 篇 化学工程与技术
    • 38 篇 动力工程及工程热...
    • 32 篇 交通运输工程
    • 24 篇 网络空间安全
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 534 篇 理学
    • 281 篇 数学
    • 197 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 103 篇 物理学
    • 51 篇 化学
    • 42 篇 系统科学
  • 264 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 74 篇 医学
    • 62 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
  • 59 篇 法学
    • 50 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 6 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 43 篇 training
  • 39 篇 deep learning
  • 32 篇 deep neural netw...
  • 31 篇 computational mo...
  • 29 篇 feature extracti...
  • 29 篇 machine learning
  • 25 篇 big data
  • 24 篇 graph neural net...
  • 23 篇 data models
  • 22 篇 task analysis
  • 22 篇 data mining
  • 22 篇 forecasting
  • 21 篇 neural networks
  • 20 篇 contrastive lear...
  • 17 篇 object detection
  • 16 篇 convolution
  • 15 篇 memory managemen...
  • 15 篇 recommender syst...
  • 15 篇 optimization

机构

  • 103 篇 national enginee...
  • 55 篇 school of comput...
  • 53 篇 school of cyber ...
  • 52 篇 shenzhen researc...
  • 39 篇 zhejiang lab
  • 37 篇 national enginee...
  • 36 篇 big data researc...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 31 篇 huazhong univers...
  • 29 篇 tencent ai lab
  • 29 篇 cluster and grid...
  • 29 篇 school of data s...
  • 28 篇 hubei key labora...
  • 26 篇 peng cheng labor...
  • 23 篇 national univers...
  • 23 篇 school of comput...
  • 22 篇 fujian provincia...
  • 21 篇 school of softwa...
  • 20 篇 university of sc...

作者

  • 137 篇 jin hai
  • 130 篇 hai jin
  • 43 篇 xiaofei liao
  • 30 篇 liao xiaofei
  • 28 篇 liu jun
  • 26 篇 chen enhong
  • 25 篇 wu baoyuan
  • 25 篇 hu shengshan
  • 23 篇 liu qi
  • 22 篇 zhou tao
  • 21 篇 haikun liu
  • 20 篇 li haizhou
  • 20 篇 pan jeng-shyang
  • 19 篇 long zheng
  • 19 篇 zou deqing
  • 18 篇 deqing zou
  • 17 篇 li chen
  • 17 篇 zhang leo yu
  • 16 篇 wang shuai
  • 16 篇 yu zhang

语言

  • 1,353 篇 英文
  • 118 篇 其他
  • 10 篇 中文
  • 2 篇 西班牙文
检索条件"机构=Data Science and Big Data Lab"
1480 条 记 录,以下是311-320 订阅
排序:
Exploiting Modality-Invariant Feature for Robust Multimodal Emotion Recognition with Missing Modalities
Exploiting Modality-Invariant Feature for Robust Multimodal ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haolin Zuo Rui Liu Jinming Zhao Guanglai Gao Haizhou Li Inner Mongolia University Hohhot China Qiyuan Lab Beijing China National University of Singapore Singapore Shenzhen Research Institute of Big Data School of Data Science The Chinese University of Hong Kong Shenzhen China
Multimodal emotion recognition leverages complementary information across modalities to gain performance. However, we cannot guarantee that the data of all modalities are always present in practice. In the studies to ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
AEFNet: Adaptive Scale Feature Based on Elastic-and-Funnel Neural Network for Healthcare Representation
AEFNet: Adaptive Scale Feature Based on Elastic-and-Funnel N...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Liu, Yang Wu, Jialun Wei, Yuhua Mao, Bing Li, Chen Gong, Tieliang Xi'An Jiaotong University School of Computer Science and Technology National Engineering Lab for Big Data Analytics Shaanxi Xi'an710049 China
Healthcare Representation learning has been a key element to achieving state-of-the-art performance on healthcare prediction. Recent advances based Electronic Healthcare Records(EHRs) are mostly devoted to extracting ... 详细信息
来源: 评论
EdgeMove: Pipelining Device-Edge Model Training for Mobile Intelligence  23
EdgeMove: Pipelining Device-Edge Model Training for Mobile I...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Dong, Zeqian He, Qiang Chen, Feifei Jin, Hai Gu, Tao Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia School of Computing Macquarie University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Training machine learning (ML) models on mobile and Web-of-Things (WoT) has been widely acknowledged and employed as a promising solution to privacy-preserving ML. However, these end-devices often suffer from constrai... 详细信息
来源: 评论
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
PipeEdge: A Trusted Pipelining Collaborative Edge Training based on Blockchain  23
PipeEdge: A Trusted Pipelining Collaborative Edge Training b...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Yuan, Liang He, Qiang Chen, Feifei Dou, Ruihan Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Mathematics University of Waterloo Canada National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Powered by the massive data generated by the blossom of mobile and Web-of-Things (WoT) devices, Deep Neural Networks (DNNs) have developed both in accuracy and size in recent years. Conventional cloud-based DNN traini... 详细信息
来源: 评论
Global Green Digital Economy: Challenges and Development: Preface for ITQM 2022
收藏 引用
Procedia Computer science 2022年 第C期214卷 1-3页
作者: Shi, Yong Li, Jianping Kou, Gang Berg, Daniel Tien, James College of Information Science and Technology University of Nebraska at Omaha OmahaNE68182 United States Research Centre on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China Key Lab of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China School of Economics and Management University of Chinese Academy of Sciences Beijing100190 China School of Business Administration Southwestern University of Finance and Economics Chengdu611130 China College of Engineering University of Miami Coral GablesFL33124 United States
来源: 评论
Non-salient region erasure for time series augmentation
收藏 引用
Frontiers of Computer science 2022年 第6期16卷 203-205页
作者: Pin LIU Xiaohui GUO Bin SHI Rui WANG Tianyu WO Xudong LIU State Key Lab of Software Development Environment(SKLSDE) Beihang UniversityBeijing100191China Beijing Advanced Innovation Center for Big Data and Brain Computing(BDBC) Beijing100191China Hangzhou Innovation Institute Beihang UniversityHangzhou310052China School of Computer Science and Technology Xi’an Jiaotong UniversityXi’an710049China
1 Introduction Time seriesaugmentationis an essential approachto solvethe overfitting problem on the time series classification(TSC)task[1,2].Although existing approaches perform better in mitigating this problem,none... 详细信息
来源: 评论
Totally Asymmetric Simple Exclusion Process on a Dynamic Lattice with Local Inhomogeneity
SSRN
收藏 引用
SSRN 2024年
作者: C., Lin Y., Huang Z., Xu Y., Zhang School of Mathematics and Statistics Huazhong University of Science and Technology China Hubei Key Lab of Engineering Modelling and Scientific Huazhong University of Science and Technology China School of Mathematics and Big Data Anhui University of Science and Technology China
In this manuscript we introduce a totally asymmetric simple exclusion process on a dynamic lattice with inhomogeneity to model the long-range transport along microtubules (MTs), which exhibit cycles of growth, shorten... 详细信息
来源: 评论