咨询与建议

限定检索结果

文献类型

  • 1,659 篇 会议
  • 1,591 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,080 篇 工学
    • 1,491 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 503 篇 信息与通信工程
    • 293 篇 生物工程
    • 277 篇 电气工程
    • 269 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 156 篇 生物医学工程(可授...
    • 139 篇 机械工程
    • 111 篇 化学工程与技术
    • 101 篇 交通运输工程
    • 88 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,156 篇 理学
    • 628 篇 数学
    • 331 篇 生物学
    • 235 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 129 篇 化学
    • 96 篇 系统科学
  • 581 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 278 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 151 篇 医学
    • 129 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 102 篇 法学
    • 83 篇 社会学
  • 63 篇 农学
  • 46 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 133 篇 feature extracti...
  • 129 篇 semantics
  • 116 篇 training
  • 96 篇 deep learning
  • 69 篇 computational mo...
  • 63 篇 accuracy
  • 60 篇 predictive model...
  • 56 篇 machine learning
  • 56 篇 data models
  • 52 篇 convolution
  • 49 篇 neural networks
  • 49 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 43 篇 data mining
  • 41 篇 reinforcement le...
  • 38 篇 task analysis
  • 36 篇 optimization
  • 36 篇 visualization
  • 36 篇 federated learni...

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 44 篇 school of softwa...
  • 44 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 29 篇 jin hai
  • 25 篇 huang qingming
  • 25 篇 xiaolong xu
  • 22 篇 hai jin
  • 21 篇 chen yanping
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hongyan ma
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,047 篇 英文
  • 169 篇 其他
  • 52 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing"
3251 条 记 录,以下是3021-3030 订阅
排序:
Separable reversible data hiding and encryption for HEVC video
Separable reversible data hiding and encryption for HEVC vid...
收藏 引用
作者: Long, Min Peng, Fei Li, Han-yun College of Computer and Communication Engineering Changsha University of Science and Technology ChangshaHunan China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology ChangshaHunan410114 China College of Computer Science and Electronic Engineering Hunan University ChangshaHunan China
A separable reversible data hiding and encryption for high efficiency video coding (HEVC) video is proposed in this paper. In the encoding phase, one can encrypt the signs and amplitudes of motion vector differences a... 详细信息
来源: 评论
MIXGAN: Learning concepts from different domains for mixture generation
arXiv
收藏 引用
arXiv 2018年
作者: Hao, Guang-Yuan Yu, Hong-Xing Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Collaborative Innovation Center of High Performance Computing NUDT China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China
In this work, we present an interesting attempt on mixture generation: absorbing different image concepts (e.g., content and style) from different domains and thus generating a new domain with learned concepts. In par... 详细信息
来源: 评论
Flickr group recommendation with auxiliary information in heterogeneous information networks
Flickr group recommendation with auxiliary information in he...
收藏 引用
作者: Wang, Yueyang Xia, Yuanfang Tang, Siliang Wu, Fei Zhuang, Yueting Key Laboratory of Big Data Intelligent Computing of Zhejiang Province Innovation Joint Research Center for ICPS College of Computer Science and Technology Zhejiang University Hangzhou China
Over the past few years, the appropriate utilization of user communities or image groups in social networks (i.e., Flickr or Facebook) has drawn a great deal of attention. In this paper, we are particularly interested... 详细信息
来源: 评论
Network Traffic Outlier Detection Based on Full Convolutional Network
Network Traffic Outlier Detection Based on Full Convolutiona...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Jingrong Mo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the en... 详细信息
来源: 评论
MFPR: A Personalized Ranking Recommendation with Multiple Feedback
收藏 引用
ACM Transactions on Social computing 2018年 第2期1卷 1–22页
作者: Shi, Chuan Liu, Jian Zhang, Yiding Hu, Binbin Liu, Shenghua Yu, Philip S. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications No. 10 Xi Tu Cheng Road Beijing China Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences No.6 Kexueyuan South Road Zhongguancun Beijing China Department of Computer Science University of Illinois at Chicago 851 South Morgan Street Chicago United States
Recently, recommender systems have played an important role in improving web user experiences and increasing profits. Recommender systems exploit users' behavioral history (i.e., feedback on items) to build models... 详细信息
来源: 评论
User Behavior Analysis of Location-Based Social Network
User Behavior Analysis of Location-Based Social Network
收藏 引用
IIAI International Conference on Advanced Applied Informatics (IIAIAAI)
作者: Jun Zeng Xin He Yingbo Wu Sachio Hirokawa Key Laboratory of Dependable Service Computing in Cyber Physical Society School of Big Data and Software Engineering Chongqing China School of Big Data and Software Engineering Chongqing China Research Institute for Information Technology Kyushu University Fukuoka Japan
User behavior changes over time under the influence of their activities. We contend that these activities are non-random behavior and have a desire to explore the underlying information behind these changes. In this p... 详细信息
来源: 评论
Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding
收藏 引用
Computers, Materials & Continua 2018年 第6期55卷 541-559页
作者: Lingyun Xiang Yan Li Wei Hao Peng Yang Xiaobo Shen Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha 410114HunanChina School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha 410114HunanChina School of Traffic&Transportation Engineering Changsha University of Science&TechnologyChangsha 410114HunanChina Hunan Branch of CNCERT/CC Changsha 410004HunanChina School of Computer Science and Engineering Nanyang Technological University639798Singapore
For protecting the copyright of a text and recovering its original content harmlessly,this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitutio... 详细信息
来源: 评论
Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach  2
Privacy Preserving Scheme for Location Based Services Using ...
收藏 引用
2nd IEEE Symposium on Privacy-Aware computing, PAC 2018
作者: Pu, Yuwen Luo, Jin Wang, Ying Hu, Chunqiang Huo, Yan Zhang, Jiong School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing University Chongqing China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China Ningbo Branch of Agricultural Bank of China Ningbo China
Location based services pose strong security and privacy requirements but achieving privacy protection at the client side is a non-trial problem. In this paper, we propose an efficient and reliable location privacy pr... 详细信息
来源: 评论
Improved Upper Bound on the Network Function computing Capacity
Improved Upper Bound on the Network Function Computing Capac...
收藏 引用
作者: Guang, Xuan Yeung, Raymond W. Yang, Shenghao Li, Congduan School of Mathematical Sciences and LPMC Nankai University Tianjin300071 China Institute of Network Coding Chinese University of Hong Kong Hong Kong Hong Kong Department of Information Engineering Chinese University of Hong Kong Hong Kong Hong Kong School of Science and Engineering Chinese University of Hong Kong Shenzhen518172 China Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou510006 China
The problem of network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a target function, of which the inputs are g... 详细信息
来源: 评论
Mobile laser scanning systems for GPS/GNSS-denied environment mapping
Mobile laser scanning systems for GPS/GNSS-denied environmen...
收藏 引用
2018 ISPRS Technical Commission I Midterm Symposium on Innovative Sensing - From Sensors to Methods and Applications
作者: Wen, Chenglu Xia, Yan Lian, Yuhan Dai, Yudi Tan, Jinbin Wang, Cheng Li, Jonathan Fujian Key Laboratory of Sensing and Computing for Smart City School of Information Science and Engineering Xiamen University Xiamen361005 China Fujian Collaborative Innovation Center for Big Data Applications in Governments Fuzhou350003 China Faculty of Environment University of Waterloo WaterlooONN2L 3G1 Canada
Indoor 3D mapping provides a useful three-dimensional structure via an indoor map for many applications. To acquire highly efficient and relatively accurate mapping for large-scale GPS/GNSS-denied scene, we present an... 详细信息
来源: 评论