咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,572 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,316 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,126 篇 工学
    • 1,527 篇 计算机科学与技术...
    • 1,277 篇 软件工程
    • 515 篇 信息与通信工程
    • 297 篇 生物工程
    • 284 篇 控制科学与工程
    • 278 篇 电气工程
    • 168 篇 电子科学与技术(可...
    • 165 篇 光学工程
    • 157 篇 生物医学工程(可授...
    • 137 篇 机械工程
    • 109 篇 化学工程与技术
    • 100 篇 交通运输工程
    • 90 篇 仪器科学与技术
    • 76 篇 动力工程及工程热...
    • 74 篇 土木工程
    • 71 篇 建筑学
    • 68 篇 网络空间安全
  • 1,182 篇 理学
    • 652 篇 数学
    • 335 篇 生物学
    • 239 篇 物理学
    • 206 篇 统计学(可授理学、...
    • 129 篇 化学
    • 96 篇 系统科学
  • 588 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 147 篇 医学
    • 127 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 103 篇 法学
    • 84 篇 社会学
  • 61 篇 农学
  • 44 篇 经济学
  • 39 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 138 篇 feature extracti...
  • 132 篇 semantics
  • 117 篇 training
  • 95 篇 deep learning
  • 74 篇 accuracy
  • 73 篇 computational mo...
  • 60 篇 predictive model...
  • 56 篇 contrastive lear...
  • 56 篇 data models
  • 54 篇 convolution
  • 54 篇 machine learning
  • 50 篇 graph neural net...
  • 47 篇 neural networks
  • 44 篇 federated learni...
  • 43 篇 reinforcement le...
  • 42 篇 object detection
  • 42 篇 data mining
  • 39 篇 optimization
  • 38 篇 visualization
  • 37 篇 task analysis

机构

  • 78 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 61 篇 university of ch...
  • 61 篇 key laboratory o...
  • 59 篇 school of comput...
  • 59 篇 college of compu...
  • 58 篇 shandong provinc...
  • 54 篇 south china univ...
  • 54 篇 national enginee...
  • 52 篇 shandong enginee...
  • 51 篇 peng cheng labor...
  • 45 篇 school of softwa...
  • 43 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 41 篇 school of cyber ...
  • 40 篇 school of electr...
  • 36 篇 key laboratory o...
  • 36 篇 guangdong key la...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...

作者

  • 39 篇 wang guoyin
  • 37 篇 xu xiaolong
  • 35 篇 tan mingkui
  • 30 篇 jin hai
  • 26 篇 huang qingming
  • 26 篇 xiaolong xu
  • 25 篇 shen linlin
  • 23 篇 guo wenzhong
  • 22 篇 hai jin
  • 22 篇 xu qianqian
  • 20 篇 hu shengshan
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 niyato dusit
  • 18 篇 guo kun
  • 17 篇 wu di
  • 16 篇 xia shuyin
  • 16 篇 li jianxin
  • 15 篇 peng hao
  • 15 篇 chen gang

语言

  • 2,782 篇 英文
  • 497 篇 其他
  • 66 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3316 条 记 录,以下是1191-1200 订阅
排序:
StyleGene: Crossover and Mutation of Region-level Facial Genes for Kinship Face Synthesis
StyleGene: Crossover and Mutation of Region-level Facial Gen...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Hao Li Xianxu Hou Zepeng Huang Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of AI and Advanced Computing Xi'an Jiaotong-Liverpool University Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
High-fidelity kinship face synthesis has many potential applications, such as kinship verification, missing child identification, and social media analysis. However, it is challenging to synthesize high-quality descen...
来源: 评论
Hyper-Parameter Optimization and Proxy Re-encryption for Federated Learning  6th
Hyper-Parameter Optimization and Proxy Re-encryption for F...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Du, Wanrong Wen, Bin Ma, Mengshuai Liu, Wenlong Wei, Xiaoxun Key Laboratory of Data Science and Smart Education Ministry of Education Hainan Normal University Haikou571158 China School of Information Science and Technology Hainan Normal University Haikou571158 China Cloud Computing and Big Data Research Center Hainan Normal University Haikou571158 China
Federated learning is a distributed machine learning paradigm that allows multiple participants to collaborate on training a shared model without revealing their own data. However, federated learning faces challenges ... 详细信息
来源: 评论
Spatial-Temporal Cross-View Contrastive Pre-training for Check-in Sequence Representation Learning
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Letian Wan, Huaiyu Guo, Shengnan Li, Xiucheng Lin, Yan Zheng, Erwen Wang, Tianyi Zhou, Zeyu Lin, Youfang The Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education Beijing Jiaotong University Beijing100044 China The Key Laboratory of Intelligent Passenger Service of Civil Aviation CAAC Beijing101318 China The School of Computer Science and Technology Harbin Institute of Technology Shenzhen518055 China
The rapid growth of location-based services (LBS) has yielded massive amounts of data on human mobility. Effectively extracting meaningful representations for user-generated check-in sequences is pivotal for facilitat... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for Processing Large-scale datasets on Distributed Platforms
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Hu Song Xinyun Cheng Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
Some Support Vector Regression Machines with Given Empirical Risks Partly
收藏 引用
Journal of Computers (Taiwan) 2022年 第5期33卷 61-72页
作者: Luo, Lin-Kai Xu, Chao-Jie Ye, Ling-Jun Peng, Hong Department of Automation Xiamen University Xiamen China Xiamen Key Laboratory of Intelligent Analysis and Decision of Big Data Xiamen China
There are often some prior requirements about empirical risk in regression problems. To meet these requirements, this paper firstly proposes two novel support vector regression machine models in which part of empirica... 详细信息
来源: 评论
Exploring Patent Transformation Event: Forecasting Patent Transfer Time
Exploring Patent Transformation Event: Forecasting Patent Tr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jinchen Huo Weidong Liu Yang Li Yan Cao College of Computer Science Inner Mongolia University China Institute of Scientific and Technical Information of China China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China Inner Mongolia Key Laboratory of Social Computing and Data Processing China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
As the largest source of technical information around the world, patents are regarded as an essential crystallization and carrier of knowledge and technological innovation. Patent transformation is conducive not only ...
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
A Constraints Fusion-induced Symmetric Nonnegative Matrix Factorization Approach for Community Detection
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Zhigang Luo, Xin College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China College of Computer and Information Science Southwest University Chongqing400715 China
Community is a fundamental and critical characteristic of an undirected social network, making community detection be a vital yet thorny issue in network representation learning. A symmetric and non-negative matrix fa... 详细信息
来源: 评论
NSPG-Miner: Mining Repetitive Negative Sequential Patterns
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yan Wang, Zhulin Liu, Jing Guo, Lei Fournier-Viger, Philippe Wu, Youxi Wu, Xindong School of Economics and Management Hebei University of Technology Tianjin300401 China School of Artificial Intelligence Hebei University of Technology Tianjin300401 China State Key Laboratory of Reliability and Intelligence of Electrical Equipment Hebei University of Technology Tianjin300401 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518061 China Hebei Key Laboratory of Big Data Computing 300401 China Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China Hefei University of Technology Hefei230009 China
Sequential pattern mining (SPM) with gap constraints (or repetitive SPM or tandem repeat discovery in bioinformatics) can find frequent repetitive subsequences satisfying gap constraints, which are called positive seq... 详细信息
来源: 评论
V2I Based Environment Perception for Autonomous Vehicles at Intersections
收藏 引用
China Communications 2021年 第7期18卷 1-12页
作者: Xuting Duan Hang Jiang Daxin Tian Tianyuan Zou Jianshan Zhou Yue Cao Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems&Safety ControlSchool of Transportation Science and EngineeringBeihang UniversityBeijing 100191China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
In recent years,autonomous driving technology has made good progress,but the noncooperative intelligence of vehicle for autonomous driving still has many technical bottlenecks when facing urban road autonomous driving... 详细信息
来源: 评论