咨询与建议

限定检索结果

文献类型

  • 2,441 篇 期刊文献
  • 1,900 篇 会议
  • 1 册 图书

馆藏范围

  • 4,342 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,753 篇 工学
    • 1,853 篇 计算机科学与技术...
    • 1,520 篇 软件工程
    • 583 篇 信息与通信工程
    • 329 篇 电气工程
    • 325 篇 生物工程
    • 317 篇 控制科学与工程
    • 234 篇 化学工程与技术
    • 206 篇 电子科学与技术(可...
    • 181 篇 生物医学工程(可授...
    • 167 篇 光学工程
    • 156 篇 机械工程
    • 118 篇 动力工程及工程热...
    • 115 篇 材料科学与工程(可...
    • 92 篇 土木工程
    • 91 篇 交通运输工程
    • 89 篇 仪器科学与技术
    • 83 篇 建筑学
  • 1,650 篇 理学
    • 773 篇 数学
    • 495 篇 物理学
    • 407 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 255 篇 化学
    • 104 篇 系统科学
  • 716 篇 管理学
    • 406 篇 管理科学与工程(可...
    • 327 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 245 篇 医学
    • 192 篇 临床医学
    • 121 篇 基础医学(可授医学...
  • 128 篇 法学
    • 99 篇 社会学
  • 88 篇 农学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 38 篇 教育学
  • 14 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 123 篇 feature extracti...
  • 116 篇 deep learning
  • 108 篇 training
  • 83 篇 computational mo...
  • 67 篇 machine learning
  • 65 篇 accuracy
  • 61 篇 data mining
  • 61 篇 federated learni...
  • 60 篇 convolution
  • 55 篇 predictive model...
  • 55 篇 data models
  • 52 篇 graph neural net...
  • 48 篇 hadrons
  • 47 篇 contrastive lear...
  • 45 篇 neural networks
  • 45 篇 adaptation model...
  • 42 篇 object detection
  • 42 篇 visualization
  • 40 篇 task analysis

机构

  • 224 篇 university of ch...
  • 172 篇 iccub universita...
  • 171 篇 department of ph...
  • 171 篇 infn sezione di ...
  • 169 篇 infn sezione di ...
  • 169 篇 yandex school of...
  • 166 篇 cavendish labora...
  • 166 篇 school of physic...
  • 164 篇 infn sezione di ...
  • 164 篇 infn sezione di ...
  • 162 篇 van swinderen in...
  • 160 篇 horia hulubei na...
  • 160 篇 department of ph...
  • 158 篇 h.h. wills physi...
  • 153 篇 imperial college...
  • 139 篇 stfc rutherford ...
  • 137 篇 universiteit maa...
  • 137 篇 institute of par...
  • 128 篇 center for high ...
  • 125 篇 massachusetts in...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 117 篇 barter w.
  • 117 篇 brundu d.
  • 116 篇 bellee v.
  • 103 篇 bowcock t.j.v.
  • 103 篇 casse g.
  • 103 篇 blake t.
  • 103 篇 borsato m.
  • 103 篇 betancourt c.
  • 103 篇 belin s.
  • 103 篇 amato s.
  • 103 篇 boettcher t.
  • 102 篇 bobulska d.
  • 102 篇 afsharnia h.
  • 101 篇 belavin v.
  • 101 篇 bediaga i.
  • 101 篇 cali s.
  • 101 篇 baryshnikov f.
  • 101 篇 bjørn m.

语言

  • 3,698 篇 英文
  • 576 篇 其他
  • 82 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Hubei Key Laboratory of Big Data in Science and Technology"
4342 条 记 录,以下是241-250 订阅
排序:
Image Denoising Method Based on Channel Compression and Split-Attention Mechanism  5
Image Denoising Method Based on Channel Compression and Spli...
收藏 引用
5th International Conference on Computer Engineering and Intelligent Control, ICCEIC 2024
作者: Sun, Hao Qiao, Xiaoyan School of Computer Science and Technology Shandong Technology and Business University Technology and Evaluation Shandong Engineering Research Center Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Immersion Shandong Yantai China
In the image restoration task, how to make full use of spatial and channel feature information to improve the reconstruction quality of the model without significantly increasing the computational complexity is an imp... 详细信息
来源: 评论
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive data
收藏 引用
China Communications 2024年 第1期21卷 310-322页
作者: Zhiwei Wang Nianhua Yang Qingqing Chen Wei Shen Zhiying Zhang School of Computer Sciences Nanjing University of Posts and TelecommunicationsNanjing 210023China Dept.of Intelligent Science and Information Law East China University of Political Science and LawShanghai 201620China Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal UniversityHaikou 571158China State Key Laboratory of Public Big Data Guizhou UniversityGuizhou 550025China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Research Institute of Beijing University of Aeronautics and AstronauticsKunming 650233
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... 详细信息
来源: 评论
Learning Self-Supervised Vision Transformers from Scratch for Aerial Person Re- Identification  13
Learning Self-Supervised Vision Transformers from Scratch fo...
收藏 引用
13th International Conference on Information technology in Medicine and Education, ITME 2023
作者: Peng, Houfu Xu, Lili Lu, Xing Xia, Daoxun Guizhou Normal University Guizhou Key Laboratory of Information and Computing Science Guiyang China School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
In recent years, person re-identification (Re-ID) as a widely studied computer vision task, has reached a saturation state under closed-world setting, which encourages researchers to further explore more realistic sce... 详细信息
来源: 评论
Boosting MLPs on Graphs via Distillation in Resource-Constrained Environment
Boosting MLPs on Graphs via Distillation in Resource-Constra...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Yang, Zhihui Qu, Zhihao Jia, Ninghui Hu, Shihong Ye, Baoliu Zeng, Deze Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources Nanjing China Nanjing University National Key Laboratory for Novel Software Technology Nanjing China School of Computer Science China University of Geosciences Nanjing China
Graph Neural Networks (GNNs) have emerged as a powerful technique across various applications, due to their effective message-passing mechanism. However, their deployment is constrained by limited computational resour... 详细信息
来源: 评论
Secrecy Performance Analysis of Artificial Noise Assisted Secure Transmission for MISO systems with Multiple Eavesdroppers
Secrecy Performance Analysis of Artificial Noise Assisted Se...
收藏 引用
2023 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2023
作者: Xu, Panpan Tan, Weijie Niu, Kun Li, Zhen Peng, Changgen School of Mathematics and Statistics Guizhou University Guiyang China Key Laboratory of Advanced Manufacturing Technology of Ministry of Education Guizhou China Guizhou Big Data Academy Guizhou University Guiyang China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Big Data and Information Engineering Guizhou University Guiyang China
In the paper, we investigate the secure communication of multiple-input single-output (MISO) systems with multiple eavesdroppers. We jointly design the beamforming (BF) and the artificial noise (AN) in MISO systems wi... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论
A new network intrusion detection system based on auto-encoding and variance analysis  5
A new network intrusion detection system based on auto-encod...
收藏 引用
5th IEEE International Conference on Civil Aviation Safety and Information technology, ICCASIT 2023
作者: Chen, Dequ Zhang, Ming Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fujian Fuzhou China
In today's big data era, ensuring the network security of information technology (IT) communication facilities is one of the most challenging issues. In fact, with progress in technology, hackers have developed in... 详细信息
来源: 评论
A mobile energy trading scheme based on Lightning Network
A mobile energy trading scheme based on Lightning Network
收藏 引用
作者: Tan, Chaoyue Chen, Yuling Ren, Xiaojun Peng, Changgen State Key Laboratory of Public Big Data College of Computer Science and Technology GuiZhou University Guiyang China Block Chain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Shouguang China
Current blockchain-based energy trading models raise serious concerns regarding the high and capped transaction latency and expensive service charges. To solve these problems, In this article, we combine Lightning Net... 详细信息
来源: 评论
Real-time Student Classroom Feedback with the RFMNet Framework in a Smart Classroom  13
Real-time Student Classroom Feedback with the RFMNet Framewo...
收藏 引用
13th International Conference on Information technology in Medicine and Education, ITME 2023
作者: Tang, Xianpiao Hu, Pengyun Yu, Dewei Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Normal University Guizhou Key Laboratory of Information and Computing Science Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
Facial expression recognition is the ability to interpret human feelings from facial features. Teachers can use it to visualize the state of emotion and estimate students' learning effects to take corresponding in... 详细信息
来源: 评论
Few-Shot Object Detection Based on the Transformer and High-Resolution Network
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3439-3454页
作者: Dengyong Zhang Huaijian Pu Feng Li Xiangling Ding Victor S.Sheng Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411004China Department of Computer Science Texas Tech UniversityLubbock79409TXUSA
Now object detection based on deep learning tries different *** uses fewer data training networks to achieve the effect of large dataset ***,the existing methods usually do not achieve the balance between network para... 详细信息
来源: 评论