咨询与建议

限定检索结果

文献类型

  • 774 篇 期刊文献
  • 756 篇 会议
  • 1 册 图书

馆藏范围

  • 1,531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 998 篇 工学
    • 750 篇 计算机科学与技术...
    • 618 篇 软件工程
    • 231 篇 信息与通信工程
    • 139 篇 生物工程
    • 136 篇 控制科学与工程
    • 128 篇 电气工程
    • 83 篇 生物医学工程(可授...
    • 69 篇 机械工程
    • 69 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 38 篇 交通运输工程
    • 36 篇 网络空间安全
    • 29 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
  • 540 篇 理学
    • 314 篇 数学
    • 156 篇 生物学
    • 102 篇 统计学(可授理学、...
    • 88 篇 物理学
    • 54 篇 系统科学
    • 47 篇 化学
  • 309 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 154 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 74 篇 医学
    • 61 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 48 篇 法学
    • 40 篇 社会学
  • 27 篇 经济学
    • 26 篇 应用经济学
  • 27 篇 农学
  • 13 篇 教育学
  • 3 篇 艺术学
  • 1 篇 文学

主题

  • 68 篇 semantics
  • 68 篇 feature extracti...
  • 58 篇 training
  • 46 篇 deep learning
  • 38 篇 predictive model...
  • 35 篇 computational mo...
  • 33 篇 accuracy
  • 31 篇 convolution
  • 31 篇 machine learning
  • 30 篇 data models
  • 27 篇 graph neural net...
  • 25 篇 contrastive lear...
  • 21 篇 federated learni...
  • 20 篇 task analysis
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 20 篇 visualization
  • 19 篇 convolutional ne...
  • 18 篇 deep neural netw...
  • 17 篇 object detection

机构

  • 72 篇 beijing advanced...
  • 58 篇 shandong provinc...
  • 52 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 41 篇 national enginee...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 34 篇 chongqing key la...
  • 32 篇 key laboratory o...
  • 31 篇 guangdong key la...
  • 29 篇 school of big da...
  • 29 篇 university of ch...
  • 29 篇 peng cheng labor...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 24 篇 school of comput...
  • 23 篇 college of compu...

作者

  • 32 篇 jin hai
  • 27 篇 wang guoyin
  • 22 篇 huang qingming
  • 22 篇 hai jin
  • 20 篇 shen linlin
  • 20 篇 xu qianqian
  • 18 篇 hu shengshan
  • 17 篇 chen yanping
  • 15 篇 yang zhiyong
  • 15 篇 chen huajun
  • 15 篇 liu ya-feng
  • 14 篇 huang sheng
  • 14 篇 wu di
  • 14 篇 zhang leo yu
  • 13 篇 li jianxin
  • 13 篇 li minghui
  • 13 篇 yanping chen
  • 13 篇 zhou yipeng
  • 12 篇 shang mingsheng
  • 12 篇 xia shuyin

语言

  • 1,433 篇 英文
  • 81 篇 其他
  • 35 篇 中文
检索条件"机构=Hebei Key Laboratory of Big Data Computing"
1531 条 记 录,以下是21-30 订阅
排序:
Unsupervised AoA Estimation Based on Dual-Path Knowledge-Aware Auto-Encoders
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第5期24卷 4425-4439页
作者: Guo, Zhiheng Xiao, Yuanzhang Wang, Xijun Chen, Xiang University of Hawaii Hawaii Advanced Wireless Technologies Institute HonoluluHI United States Sun Yat-sen University School of Electronics and Information Technology Guangzhou510275 China The Chinese University of Hong Kong Hong Kong Guangdong Provincial Key Laboratory of Big Data Computing Shenzhen China
In this paper, an unsupervised deep learning-based framework based on dual-path model-driven auto-encoders (AE) is proposed for angle-of-arrivals (AoAs) estimation in massive MIMO systems. Specifically designed for Ao... 详细信息
来源: 评论
Network intrusion detection based on feature fusion of attack dimension
收藏 引用
Journal of Supercomputing 2025年 第6期81卷 1-33页
作者: Sun, Xiaolong Gu, Zhengyao Zhang, Hao Gu, Jason Liu, Yanhua Dong, Chen Ye, Junwei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou350116 China Department of Electrical and Computer Engineering Dalhousie University HalifaxNSB3J 1Z1 Canada
Network traffic anomaly detection involves the rapid identification of intrusions within a network through the detection, analysis, and classification of network traffic data. The variety of cyberattacks encompasses d... 详细信息
来源: 评论
Controlled-source electromagnetic noise attenuation via a deep convolutional neural network and high-quality sounding curve screening mechanism
收藏 引用
Geophysics 2025年 第3期90卷 WA125-WA140页
作者: Liu, Yecheng Li, Diquan Li, Jin Zhang, Xian Central South University Monitoring Ministry of Education Key Laboratory of Metallogenic Prediction of Nonferrous Metals and Geological Environment Changsha China Hunan Provincial Key Laboratory of Non-ferrous Resources and Geological Hazard Detection Changsha China Central South University School of Geoscience and Info-physics Changsha China Hunan Normal University College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha China Hunan University of Finance and Economics School of Information Technology and Management Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology Changsha China
Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation... 详细信息
来源: 评论
DMC-Watermark: A backdoor richer watermark for dual identity verification by dynamic mask covering
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-15页
作者: Zhu, Yujia Wang, Ruoxi Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Advanced Computing Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the increasing use of neural networks, the importance of copyright protection for these models has gained significant attention. Backdoor watermarking is one of the key methods for protecting copyright. However, ... 详细信息
来源: 评论
ApriDS: An evidence linkage network construction model for judgment documents
收藏 引用
Journal of King Saud University - Computer and Information Sciences 2025年 第1期37卷 1-13页
作者: Zhou, Yulin Qin, Yongbin Lin, Chuan Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou University Guiyang 550025 China State Key Laboratory of Public Big Data Guizhou University Guiyang 550025 China College of Computer Science & Technology Guizhou University Guiyang 550025 China
Evidence serves as the basis for determining facts in the judicial trial process, and exploring the correlation between evidence has become an essential task. However, there is uncertainty and unreliability of evidenc... 详细信息
来源: 评论
Extraction and Area Calculation of Chicken Comb and Wattle Based on YOLO v7 and Optimized U-Net Network
收藏 引用
Nongye Jixie Xuebao/Transactions of the Chinese Society for Agricultural Machinery 2025年 第4期56卷 415-426页
作者: Yang, Duanli Shen, Hongshuo Chen, Hui Gao, Yuan College of Information Science and Technology Hebei Agricultural University Baoding071001 China Hebei Key Laboratory of Agricultural Big Data Baoding071001 China College of Animal Science and Technology Hebei Agricultural University Baoding071001 China Key Laboratory of Broiler and Layer Facilities Engineering Ministry of Agriculture and Rural Affairs Baoding071001 China
Traditional manual measurement of poultry comb and wattle areas poses contact-induced stress risks, zoonotic disease transmission hazards, and substantial measurement errors. A non-contact measurement system integrati... 详细信息
来源: 评论
IMPRESS: an importance-informed multi-tier prefix KV storage system for large language model inference  25
IMPRESS: an importance-informed multi-tier prefix KV storage...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Weijian Chen Shuibing He Haoyang Qu Ruidong Zhang Siling Yang Ping Chen Yi Zheng Baoxing Huai Gang Chen The State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security and Zhejiang Key Laboratory of Big Data Intelligent Computing The State Key Laboratory of Blockchain and Data Security Zhejiang University Huawei Cloud
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
OmniThink: Expanding Knowledge Boundaries in Machine Writing through Thinking
arXiv
收藏 引用
arXiv 2025年
作者: Xi, Zekun Yin, Wenbiao Fang, Jizhan Wu, Jialong Fang, Runnan Zhang, Ningyu Jiang, Yong Xie, Pengjun Huang, Fei Chen, Huajun Zhejiang University China Tongyi Lab Alibaba Group China Zhejiang Key Laboratory of Big Data Intelligent Computing China
Machine writing with large language models often relies on retrieval-augmented generation. However, these approaches remain confined within the boundaries of the model’s predefined scope, limiting the generation of c... 详细信息
来源: 评论
Functional Testing and Repair for ReRAM-Based Deep-Learning Accelerators
IEEE Design and Test
收藏 引用
IEEE Design and Test 2025年 第3期42卷 66-73页
作者: Li, Wen Wang, Ying Li, Huawei Li, Xiaowei Zou, Kaiwei Shanxi University School of Computer and Information Technology Shanxi Taiyuan030006 China Institute of Big Data Science and Industry Shanxi University Shanxi Taiyuan030006 China State Key Laboratory of Processors Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Tsinghua University Department of Electronic Engineering Beijing100084 China
Editor’s notes: This article offers an overview of the RRAMedy framework, designed to perform online testing, fault diagnosis, and fault mitigation in resistive random-access memory (ReRAM) devices, specifically in t... 详细信息
来源: 评论
MSMAE-Net: multi-semantic and multi-attention enhanced network for image forgery localization
收藏 引用
Signal, Image and Video Processing 2025年 第7期19卷 1-11页
作者: Liao, Jianjun Su, Lichao Lu, Menghan Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
The popularization of modern digital image technology has brought convenience to us, but it also poses many risks. The advancement of image editing software allows anyone to modify image content effortlessly. If these...
来源: 评论