咨询与建议

限定检索结果

文献类型

  • 1,644 篇 会议
  • 1,561 篇 期刊文献

馆藏范围

  • 3,205 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,064 篇 工学
    • 1,480 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 503 篇 信息与通信工程
    • 293 篇 生物工程
    • 276 篇 电气工程
    • 269 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 155 篇 生物医学工程(可授...
    • 139 篇 机械工程
    • 109 篇 化学工程与技术
    • 101 篇 交通运输工程
    • 88 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,151 篇 理学
    • 628 篇 数学
    • 329 篇 生物学
    • 235 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 128 篇 化学
    • 96 篇 系统科学
  • 581 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 278 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 148 篇 医学
    • 127 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 102 篇 法学
    • 83 篇 社会学
  • 62 篇 农学
  • 46 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 131 篇 feature extracti...
  • 127 篇 semantics
  • 113 篇 training
  • 95 篇 deep learning
  • 67 篇 computational mo...
  • 63 篇 accuracy
  • 60 篇 predictive model...
  • 56 篇 machine learning
  • 55 篇 data models
  • 52 篇 convolution
  • 48 篇 neural networks
  • 48 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 41 篇 reinforcement le...
  • 41 篇 data mining
  • 38 篇 task analysis
  • 36 篇 visualization
  • 35 篇 optimization
  • 35 篇 federated learni...

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 62 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 43 篇 school of softwa...
  • 43 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 38 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 33 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 30 篇 jin hai
  • 25 篇 huang qingming
  • 24 篇 xiaolong xu
  • 21 篇 chen yanping
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 20 篇 hongyan ma
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,001 篇 英文
  • 169 篇 其他
  • 52 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing"
3205 条 记 录,以下是121-130 订阅
排序:
DSAFF-Net:A Backbone Network Based on Mask R-CNN for Small Object Detection
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3405-3419页
作者: Jian Peng Yifang Zhao Dengyong Zhang Feng Li Arun Kumar Sangaiah Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computing Science and Engineering Vellore Institute of Technology(VIT)Vellore632014India
Recently,object detection based on convolutional neural networks(CNNs)has developed *** backbone networks for basic feature extraction are an important component of the whole detection ***,we present a new feature ext... 详细信息
来源: 评论
A study of MySQL protocol-based database proxy approval system for fortress machine
收藏 引用
International Journal of data Science 2025年 第1期10卷 96-117页
作者: Zhang, Xian Luo, Xinhui Yin, Dong Qu, Taiguo Li, Hao Huaihua University Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Hunan Huaihua418000 China Huaihua Tourism School Hunan Huaihua418099 China
With the increase of enterprise informatisation, database security and compliance operation management have become increasingly important. Therefore, it is essential to design an efficient database proxy approval syst...
来源: 评论
Rethinking-based Code Summarization with Chain of Comments  31
Rethinking-based Code Summarization with Chain of Comments
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Cao, Liuwen He, Hongkui Huang, Hailin Wang, Jiexin Cai, Yi School of Software Engineering South China University of Technology China Key Laboratory of Big Data and Intelligent Robot South China University of Technology Ministry of Education China
Automatic code summarization aims to generate concise natural language descriptions (summary) for source code, which can free software developers from the heavy burden of manual commenting and software maintenance. Ex... 详细信息
来源: 评论
Unified pre-training with pseudo infrared images for visible-infrared person re-identification
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86039-86058页
作者: Liu, ZhiGang Hu, Yan College of Computer and Information Technology Northeast Petroleum University Heilongjiang Daqing163318 China Heilongjiang Petroleum Big data and Intelligent Analysis Key Laboratory Northeast Petroleum University Heilongjiang Daqing163318 China
In the pre-training task of visible-infrared person re-identification(VI-ReID), two main challenges arise: i) Domain disparities. A significant domain gap exists between the ImageNet utilized in public pre-trained mod... 详细信息
来源: 评论
Some Thoughts on the Classification Standard of intelligent Autonomous Level of Measurement and Control System  9
Some Thoughts on the Classification Standard of Intelligent ...
收藏 引用
9th International Conference on big data and Information Analytics, bigDIA 2023
作者: Yuan, Guangfu Yang, Liu Han, Haoran Li, Yong Shao, Cong Zhan, Siyu Gansu Photoelectric Measurement Technology Research Laboratory Gansu735018 China University of Electronic Science and Technology of China Laboratory of Intelligent Collaborative Computing Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu611731 China
Intelligence is an important trend in the development of measurement and control systems. However, there is still a lack of unified understanding of the intelligent autonomous classification of the measurement and con... 详细信息
来源: 评论
TOWARDS ROBUST AND EFFICIENT CLOUD-EDGE ELASTIC MODEL ADAPTATION VIA SELECTIVE ENTROPY DISTILLATION  12
TOWARDS ROBUST AND EFFICIENT CLOUD-EDGE ELASTIC MODEL ADAPTA...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Chen, Yaofo Niu, Shuaicheng Wang, Yaowei Xu, Shoukai Song, Hengjie Tan, Mingkui South China University of Technology China Pengcheng Laboratory China Nanyang Technological University Singapore Key Laboratory of Big Data and Intelligent Robot Ministry of Education China Pazhou Laboratory China
The conventional deep learning paradigm often involves training a deep model on a server and then deploying the model or its distilled ones to resource-limited edge devices. Usually, the models shall remain fixed once... 详细信息
来源: 评论
DDoS Detection and Defense Based on FLAD and SDN  20
DDoS Detection and Defense Based on FLAD and SDN
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Dong, Jie Fang, Wenyu Zheng, Wanling Liu, Jinkun Liu, Yanhua College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS... 详细信息
来源: 评论
Knowledge Distillation Facilitates the Lightweight and Efficient Plant Diseases Detection Model
收藏 引用
Plant Phenomics 2023年 第3期5卷 501-519页
作者: Qianding Huang Xingcai Wu Qi Wang Xinyu Dong Yongbin Qin Xue Wu Yangyang Gao Gefei Hao State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang 550025China National Key Laboratory of Green Pesticide Guizhou UniversityGuiyang 550025China
Plant disease diagnosis in time can inhibit the spread of the disease and prevent a large-scale drop in production,which benefits food *** detection-based plant disease diagnosis methods have attracted widespread atte... 详细信息
来源: 评论
Resolution-Adaptive Representation Learning via Eliminating Abnormal Features for Cross-Resolution Person Re-Identification  14
Resolution-Adaptive Representation Learning via Eliminating ...
收藏 引用
14th International Conference on Information Technology in Medicine and Education, ITME 2024
作者: Lu, Xing Lai, Fengshan Cao, Zhixiang Xia, Daoxun Guizhou Normal University School of Big Data and Computer Science Guiyang China Guizhou Normal University Key Laboratory of Information and Computing Science Guizhou Province Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
Cross-resolution person re-identification(CR-ReID) seeks to overcome the challenge of retrieving and matching specific person images across cameras with varying resolutions. Numerous existing studies utilize establish... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论