咨询与建议

限定检索结果

文献类型

  • 2,425 篇 期刊文献
  • 1,900 篇 会议
  • 1 册 图书

馆藏范围

  • 4,326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,758 篇 工学
    • 1,855 篇 计算机科学与技术...
    • 1,520 篇 软件工程
    • 584 篇 信息与通信工程
    • 333 篇 电气工程
    • 325 篇 生物工程
    • 318 篇 控制科学与工程
    • 235 篇 化学工程与技术
    • 209 篇 电子科学与技术(可...
    • 180 篇 生物医学工程(可授...
    • 167 篇 光学工程
    • 158 篇 机械工程
    • 118 篇 材料科学与工程(可...
    • 118 篇 动力工程及工程热...
    • 92 篇 土木工程
    • 91 篇 交通运输工程
    • 89 篇 仪器科学与技术
    • 84 篇 建筑学
  • 1,649 篇 理学
    • 773 篇 数学
    • 496 篇 物理学
    • 406 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 256 篇 化学
    • 104 篇 系统科学
  • 716 篇 管理学
    • 405 篇 管理科学与工程(可...
    • 328 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 243 篇 医学
    • 191 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 129 篇 法学
    • 100 篇 社会学
  • 88 篇 农学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 38 篇 教育学
  • 14 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 123 篇 feature extracti...
  • 116 篇 deep learning
  • 108 篇 training
  • 83 篇 computational mo...
  • 66 篇 machine learning
  • 65 篇 accuracy
  • 61 篇 data mining
  • 61 篇 federated learni...
  • 60 篇 convolution
  • 55 篇 predictive model...
  • 55 篇 data models
  • 52 篇 graph neural net...
  • 48 篇 hadrons
  • 47 篇 contrastive lear...
  • 45 篇 neural networks
  • 45 篇 adaptation model...
  • 42 篇 object detection
  • 42 篇 visualization
  • 40 篇 task analysis

机构

  • 227 篇 university of ch...
  • 172 篇 iccub universita...
  • 171 篇 department of ph...
  • 171 篇 infn sezione di ...
  • 169 篇 infn sezione di ...
  • 169 篇 yandex school of...
  • 166 篇 cavendish labora...
  • 166 篇 school of physic...
  • 166 篇 infn sezione di ...
  • 164 篇 infn sezione di ...
  • 161 篇 van swinderen in...
  • 160 篇 horia hulubei na...
  • 160 篇 department of ph...
  • 158 篇 h.h. wills physi...
  • 152 篇 imperial college...
  • 140 篇 stfc rutherford ...
  • 137 篇 universiteit maa...
  • 137 篇 institute of par...
  • 132 篇 center for high ...
  • 125 篇 massachusetts in...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 117 篇 barter w.
  • 117 篇 brundu d.
  • 117 篇 bellee v.
  • 103 篇 bowcock t.j.v.
  • 103 篇 casse g.
  • 103 篇 blake t.
  • 103 篇 borsato m.
  • 103 篇 betancourt c.
  • 103 篇 belin s.
  • 103 篇 amato s.
  • 103 篇 boettcher t.
  • 102 篇 bobulska d.
  • 102 篇 afsharnia h.
  • 101 篇 belavin v.
  • 101 篇 bediaga i.
  • 101 篇 cali s.
  • 101 篇 baryshnikov f.
  • 101 篇 bjørn m.

语言

  • 3,683 篇 英文
  • 576 篇 其他
  • 81 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Hubei Key Laboratory of Big Data in Science and Technology"
4326 条 记 录,以下是131-140 订阅
排序:
The Double Contrast for Unsupervised Person Re-Identification  24
The Double Contrast for Unsupervised Person Re-Identificatio...
收藏 引用
2024 International Conference on Computer Vision and Deep Learning, CVDL 2024
作者: Liu, Daocheng Fu, Yanyun Shi, Wenxi Zhu, Zhansheng Wang, Deyong School of Computer Science and Technology Urumqi China Beijing Academy of Science and Technology Beijing China Key Laboratory of Big Data of Xinjiang Social Security Risk Urumqi China
At present, the most popular unsupervised person re-identification(Re-ID) research mainly uses some clustering methods to gather samples with similar features and generate a pseudo-label for each cluster, and uses the... 详细信息
来源: 评论
A Blockchain of Blockchains Structure Based on Asset Trading Scheme
A Blockchain of Blockchains Structure Based on Asset Trading...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Huang, Siyuan Chen, Yuling Tan, Chaoyue Dou, Hui Luo, Yun Yang, Yuxiang College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
In the realm of blockchain applications, the issue of value isolation, commonly referred to as the value island problem, imposes inherent limitations on the applicability of corresponding assets. To overcome this chal... 详细信息
来源: 评论
Robust Object Detection Based on a Comparative Learning Perspective
Robust Object Detection Based on a Comparative Learning Pers...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Yang, Hao Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Zhang, Yangwen College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
With the advent of adversarial samples, the safety of Artificial Intelligence is of particular concern, as only a small amount of perturbation can be added to mislead a model's judgment. Therefore there is an urge... 详细信息
来源: 评论
A High Capacity Combined Carrier Steganography Without Embedding Image
A High Capacity Combined Carrier Steganography Without Embed...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Zhang, Yangwen Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Xiong, Maolin College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
The technique of image steganography is the embedding of secret information into the carrier image by means of algorithms that are widely used in the field of information transmission, but steganalysis tools built wit... 详细信息
来源: 评论
Realizing n-type CdSb with promising thermoelectric performance
收藏 引用
Journal of Materials science & technology 2023年 第13期144卷 54-61页
作者: Peng Zhao Honghao Yao Shizhen Zhi Xiaojing Ma Zuoxu Wu Yijie Liu Xinyu Wang Li Yin Zongwei Zhang Shuaihang Hou Xiaodong Wang Siliang Chen Chen Chen Xi Lin Haoliang Liu Xingjun Liu Feng Cao Qian Zhang Jun Mao School of Materials Science and Engineering and Institute of Materials Genome&Big DataHarbin Institute of Technology(Shenzhen)Shenzhen 518055China School of Science Harbin Institute of Technology(Shenzhen)Shenzhen 518055China State Key Laboratory of Advanced Welding and Joining Harbin Institute of TechnologyHarbin 150001China
Realizing high performance in both n-type and p-type materials is essential for designing efficient ther-moelectric ***,the doping bottleneck is often encountered,i.e.,only one type of conduction can be *** one exampl... 详细信息
来源: 评论
Adversarial Attack Method Based on Dual- frequency Domain Transformation
Adversarial Attack Method Based on Dual- frequency Domain Tr...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Xiong, Maolin Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Zhang, Yangwen College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Deep neural network is vulnerable to adversarial samples, which means altering the image subtly to introduce errors into the neural network model. Adversarial samples can categorize into black-box and white-box attack... 详细信息
来源: 评论
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism
A Multiple Indicator Credit Ranking Scheme Based on Notary M...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and big data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Lang Chen, Yuling Tan, Chaoyue Dou, Hui Luo, Yun Chen, Pengyu College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Blockchain has penetrated multiple fields such as finance, healthcare, supply chain, and intelligent transportation. However, the value exchange between different independent blockchain systems limits the expansion of... 详细信息
来源: 评论
An enhanced exponential distribution optimizer for solving task scheduling in cloud computing systems  4
An enhanced exponential distribution optimizer for solving t...
收藏 引用
4th International Conference on Advanced Algorithms and Neural Networks, AANN 2024
作者: Wu, Fengbin Li, Shaobo Wu, Libang Xiong, Xuan Xie, Rongxiang State Key Laboratory of Public Big Data Guizhou University China Guizhou Institute of Technology China College of Computer Science and Technology Guizhou University China
Cloud computing has become integral to information technology, offering a flexible and scalable way to access and utilize computing resources. In cloud computing, task scheduling policies can affect the resource usage... 详细信息
来源: 评论
Optimization of cloud computing task scheduling based on whale optimization algorithm with quasi-opposition-based and nonlinear factor  6
Optimization of cloud computing task scheduling based on wha...
收藏 引用
6th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2024
作者: Xuan, Xiong Li, Shaobo Yu, Liya Wu, Fengbin Zhang, Xingxing An, Xue College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China Guizhou University College of Mechanical Engineering Guiyang550025 China
Task scheduling has a significant impact on the resource availability and operation cost of the system in cloud computing. In order to improve the efficiency of task execution in the cloud for a given computational re...
来源: 评论
Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice  18th
Fine-Grained Access Control Proxy Re-encryption with HRA Se...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Hou, Jinqiu Peng, Changgen Tan, Weijie Zhong, Chongyi Niu, Kun Li, Hu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Key Laboratory of Advanced Manufacturing Technology Ministry of Education Guizhou University Guiyang550025 China School of Mathematics and Big data Guizhou Education University Guiyang550025 China
With the gradual formation of the cloud computing ecosystem, the value of cloud computing is becoming increasingly evident, and the accompanying information security issues have become core elements. The challenge lie... 详细信息
来源: 评论