咨询与建议

限定检索结果

文献类型

  • 376 篇 会议
  • 236 篇 期刊文献

馆藏范围

  • 612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 318 篇 计算机科学与技术...
    • 280 篇 软件工程
    • 98 篇 信息与通信工程
    • 60 篇 生物工程
    • 37 篇 电子科学与技术(可...
    • 34 篇 控制科学与工程
    • 32 篇 电气工程
    • 30 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 化学工程与技术
    • 24 篇 生物医学工程(可授...
    • 18 篇 土木工程
    • 17 篇 建筑学
    • 15 篇 仪器科学与技术
    • 15 篇 材料科学与工程(可...
  • 220 篇 理学
    • 131 篇 数学
    • 61 篇 生物学
    • 53 篇 物理学
    • 38 篇 统计学(可授理学、...
    • 25 篇 化学
    • 16 篇 系统科学
  • 111 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 26 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
  • 21 篇 法学
    • 18 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 15 篇 农学
    • 12 篇 作物学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 21 篇 semantics
  • 20 篇 training
  • 18 篇 deep learning
  • 16 篇 feature extracti...
  • 14 篇 object detection
  • 12 篇 neural networks
  • 11 篇 synthetic apertu...
  • 10 篇 convolution
  • 10 篇 computational mo...
  • 9 篇 big data
  • 9 篇 anomaly detectio...
  • 9 篇 remote sensing
  • 9 篇 machine learning
  • 9 篇 accuracy
  • 8 篇 reinforcement le...
  • 8 篇 knowledge graph
  • 8 篇 predictive model...
  • 8 篇 forecasting
  • 7 篇 task analysis
  • 6 篇 semantic segment...

机构

  • 143 篇 guangdong key la...
  • 95 篇 henan key labora...
  • 69 篇 school of comput...
  • 51 篇 school of comput...
  • 38 篇 school of data a...
  • 32 篇 school of artifi...
  • 29 篇 sun yat-sen univ...
  • 22 篇 school of comput...
  • 20 篇 college of compu...
  • 19 篇 microsoft resear...
  • 18 篇 xi'an key labora...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 peng cheng labor...
  • 14 篇 luoyang normal u...
  • 13 篇 henan university...
  • 13 篇 henan engineerin...
  • 11 篇 henan key labora...
  • 11 篇 shaanxi key labo...
  • 11 篇 school of data a...

作者

  • 49 篇 yin jian
  • 22 篇 wu di
  • 20 篇 su qinliang
  • 18 篇 yu jianxing
  • 16 篇 xu hongsheng
  • 15 篇 zuo xianyu
  • 14 篇 zhang lei
  • 14 篇 liu yang
  • 14 篇 duan nan
  • 14 篇 jian yin
  • 14 篇 li ning
  • 13 篇 tang duyu
  • 13 篇 lei zhang
  • 13 篇 zhou yipeng
  • 12 篇 xiaoke zhu
  • 12 篇 zhu xiaoke
  • 11 篇 xiaopan chen
  • 11 篇 zhou ming
  • 11 篇 dang lanxue
  • 11 篇 liu wei

语言

  • 585 篇 英文
  • 23 篇 其他
  • 3 篇 中文
检索条件"机构=Henan Key Laboratory of Big Data Analysis and Processing"
612 条 记 录,以下是161-170 订阅
排序:
Characterizing the Performance of Deep Learning Inference for Edge Video Analytics  9th
Characterizing the Performance of Deep Learning Inference fo...
收藏 引用
9th CCF Conference on big data, bigdata 2021
作者: Luo, Zhenxiao Wang, Xinglong Zhang, Yuxiao Wang, Zelong Hu, Miao Wu, Di School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou510006 China
Real-time video analytics is a killer application for edge computing, however, it has not been fully understood how much edge resource is required to support compute-intensive video analytics tasks at the edge. In thi... 详细信息
来源: 评论
3d-Usanet:A Spatio-Temporal Coupled Based Transformer for Video Anomaly Detection Method
SSRN
收藏 引用
SSRN 2024年
作者: Mu, Huiyu Wang, Luhui Yin, Hongjian Li, Yonggan Dang, Lanxue Liu, Yang Zuo, Xianyu School of Computer and Information Engineering Henan University Kaifeng475004 China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China Fair Competition Review Transaction Center of Henan Province Zhengzhou450008 China
Video anomaly detection aims to detect incidental and sudden patterns of events in complex scenes, which plays an essential role for maintaining public security and averting potential risks. Unsupervised learning is p... 详细信息
来源: 评论
A Model robustness optimization method based on adversarial sample detection  5
A Model robustness optimization method based on adversarial ...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Sun, Jiaze Long, Siyuan Ma, Xianyan Tang, Yanmei Xi'an University of Posts and Telecommunications Shaanxi Provincial Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an710121 China Xi'an University of Posts and Telecommunications Xi'an710121 China
Deep neural networks are extremely vulnerable due to the existence of adversarial samples. It is a challenging problem to optimize the robustness of the model to protect deep neural networks from the threat of adversa... 详细信息
来源: 评论
Few-Shot Node Classification on Attributed Networks Based on Prototypical Network
Few-Shot Node Classification on Attributed Networks Based on...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yaliang Zhao Guangming Zhang Jinke Wang Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Henan University Kaifeng China
In today’s society, the interactions between various entities form complicated attributed networks. The node classification task as the core task of analyzing attribute networks has gained a considerable amount of at...
来源: 评论
GraphSparseNet: a Novel Method for Large Scale Trafffic Flow Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Kong, Weiyang Wu, Kaiqi Zhang, Sen Liu, Yubao Sun Yat-Sen University Guangzhou China Sun Yat-Sen University Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China
Traffic flow forecasting is a critical spatio-temporal data mining task with wide-ranging applications in intelligent route planning and dynamic traffic management. Recent advancements in deep learning, particularly t... 详细信息
来源: 评论
Research progress on an intelligent production and distribution of the remote sensing products
Research progress on an intelligent production and distribut...
收藏 引用
International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2020
作者: Kong, Dezhen Zhao, Jinhuan Tian, Meng Liu, Yang Henan Province Space Information Processing Engineering Laboratory KaifengHenan475004 China Henan Key Laboratory of Big Data Analysis and Processing KaifengHenan475004 China School of Computer and Information Engineering Henan University KaifengHenan475004 China
Since the amount of remote sensing data that can be obtained every day has reached ten terabytes, the storage and sharing of massive remote sensing data and the construction of product production application architect... 详细信息
来源: 评论
Contamination-Resilient Anomaly Detection via Adversarial Learning on Partially-Observed Normal and Anomalous data  41
Contamination-Resilient Anomaly Detection via Adversarial Le...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Lv, Wenxi Su, Qinliang Wan, Hai Xu, Hongteng Xu, Wenchao School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Gaoling School of Artifical Intelligence Renmin University of China Beijing China Department of Computing The Hong Kong Polytechnic University Hong Kong
Many existing anomaly detection methods assume the availability of a large-scale normal dataset. But for many applications, limited by resources, removing all anomalous samples from a large unlabeled dataset is unreal... 详细信息
来源: 评论
DreamFuse: Adaptive Image Fusion with Diffusion Transformer
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Junjia Yan, Pengxiang Liu, Jiyang Wu, Jie Wang, Zhao Wang, Yitong Lin, Liang Li, Guanbin Sun Yat-sen University China ByteDance Intelligent Creation China Peng Cheng Laboratory China Guangdong Key Laboratory of Big Data Analysis and Processing China
Image fusion seeks to seamlessly integrate foreground objects with background scenes, producing realistic and harmonious fused images. Unlike existing methods that directly insert objects into the background, adaptive... 详细信息
来源: 评论
Competitive and exclusion and oscillation phenomena of an eco-epidemiological model: An invasive approach
收藏 引用
International Journal of Biomathematics 2023年 第5期16卷 23-47页
作者: Ke-Lu Li Jun-Yuan Yang Xue-Zhi Li School of Mathematics and Information Science Henan Normal University 453007XinriangHenanP.R.China Comple Systems Research Center Shanri University 030006TaiyuanShanciP.R.China Shanci Key Laboratory of Mathematical Techniques and Big Data Analysis on Disease Control and Prevention Shanri University 030006TaiyuanShanriP.R.China School of Statistics and Mathematics Henan Finance University 450046ZhengzhouHenanP.R.China
Eco-epidemiological model plays a crucial role in maintaining ecological balance and biological *** this paper,we propose a predator-prey model where the predator population is infected by the *** non-negativity and b... 详细信息
来源: 评论
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论