咨询与建议

限定检索结果

文献类型

  • 1,659 篇 会议
  • 1,574 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,064 篇 工学
    • 1,481 篇 计算机科学与技术...
    • 1,252 篇 软件工程
    • 502 篇 信息与通信工程
    • 293 篇 生物工程
    • 270 篇 电气工程
    • 267 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 156 篇 生物医学工程(可授...
    • 138 篇 机械工程
    • 110 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 87 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,150 篇 理学
    • 624 篇 数学
    • 330 篇 生物学
    • 234 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 128 篇 化学
    • 96 篇 系统科学
  • 577 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 277 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 150 篇 医学
    • 128 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 101 篇 法学
    • 83 篇 社会学
  • 61 篇 农学
  • 44 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 134 篇 feature extracti...
  • 129 篇 semantics
  • 116 篇 training
  • 96 篇 deep learning
  • 69 篇 computational mo...
  • 64 篇 accuracy
  • 60 篇 predictive model...
  • 57 篇 machine learning
  • 57 篇 data models
  • 52 篇 convolution
  • 49 篇 neural networks
  • 49 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 43 篇 data mining
  • 41 篇 reinforcement le...
  • 38 篇 task analysis
  • 36 篇 optimization
  • 36 篇 visualization
  • 35 篇 federated learni...

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 44 篇 school of softwa...
  • 44 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 29 篇 jin hai
  • 25 篇 huang qingming
  • 25 篇 xiaolong xu
  • 22 篇 hai jin
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hongyan ma
  • 19 篇 chen yanping
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,033 篇 英文
  • 165 篇 其他
  • 53 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3234 条 记 录,以下是381-390 订阅
排序:
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
HVAC Optimal Control Based on the Sensitivity Analysis:An Improved SA Combination Method Based on a Neural Network
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第9期136卷 2741-2758页
作者: Lifan Zhao Zetian Huang Qiming Fu Nengwei Fang Bin Xing Jianping Chen School of Electronic and Information Engineering Suzhou University of Science and TechnologySuzhou215009China Jiangsu Key Laboratory of Intelligent Building Energy Efficiency Suzhou University of Science and TechnologySuzhou215009China Suzhou Key Laboratory of Mobile Network Technology and Application Suzhou University of Science and TechnologySuzhou215009China Chongqing Industrial Big Data Innovation Center Co. Ltd.Chongqing400707China
Aiming at optimizing the energy consumption of HVAC,an energy conservation optimization method was proposed for HVAC systems based on the sensitivity analysis(SA),named the sensitivity analysis combination method(SAC)... 详细信息
来源: 评论
Ethereum Smart Contract Representation Learning for Robust Bytecode-Level Similarity Detection  34
Ethereum Smart Contract Representation Learning for Robust B...
收藏 引用
34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022
作者: Tian, Zhenzhou Huang, Yaqian Tian, Jie Wang, Zhongmin Chen, Yanping Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an710121 China Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an710121 China Department of Computer Science and Engineering Wright State University DaytonOH United States
Smart contracts are programs that run on a blockchain, where Ethereum is one of the most popular ones supporting them. Due to the fact that they are immutable, it is essential to design smart contracts bug-free before... 详细信息
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems  26
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Shicheng Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere... 详细信息
来源: 评论
Research on Highly Secure Metaverse Based on Extended Reality Under Edge computing  16th
Research on Highly Secure Metaverse Based on Extended Realit...
收藏 引用
16th EAI International Conference on Wireless Internet, WiCON 2023
作者: Fu, Jinrong Liu, Yiwen Yan, Haobo Yang, Yahui Peng, Ling Shi, Yuanquan Feng, Tao School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China School of Foreign Languages Huaihua University Huaihua418000 China
With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid development of extended reality technology and Internet of Things technology... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
DASCDC: Dual Attention-based Sparse Common Deep Clustering Method  9
DASCDC: Dual Attention-based Sparse Common Deep Clustering M...
收藏 引用
9th IEEE International Conference on Behavioural and Social computing, BESC 2022
作者: Dong, Yao Shi, Jin Deng, Yahan Dong, Yongfeng Wang, Ziqiu School of Artificial Intelligence Hebei University of Technology Tianjin300401 China Hebei Province Key Laboratory of Big Data Computing Tianjin300401 China Data Driven Industrial Intelligent Hebei Engineering Research Center Tianjin300401 China
Graph convolutional network (GCN) has been successfully applied in deep clustering on the high dimensional dataset, which is usually processed by extracting the feature and structure information. However, it lacks an ... 详细信息
来源: 评论
GraphConvNet: A Dual Network Utilizing Local Features Coupled with Structural Information for Predicting Knee Osteoarthritis
GraphConvNet: A Dual Network Utilizing Local Features Couple...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Pengju Tang Dawei Dai Kai Zou Xionghui Yang Guoyin Wang Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing China College of Computer and Information Science Chongqing Normal University Chongqing China
Knee Osteoarthritis (KOA) is a common joint disease that severely affects the normal lives of patients. In clinical practice, the severity of KOA is commonly evaluated by observing radiographs of the knee joint Howeve... 详细信息
来源: 评论
A Model robustness optimization method based on adversarial sample detection  22
A Model robustness optimization method based on adversarial ...
收藏 引用
Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
作者: Jiaze Sun Siyuan Long Xianyan Ma Yanmei Tang Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts & Telecommunications China Xi'an University of Posts & Telecommunications China
Deep neural networks are extremely vulnerable due to the existence of adversarial samples. It is a challenging problem to optimize the robustness of the model to protect deep neural networks from the threat of adversa... 详细信息
来源: 评论
Indoor Navigation Mechanism based on 5G network for Large Parking Garage  26
Indoor Navigation Mechanism based on 5G network for Large Pa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Xiaolong Ding, Qun Lin, Licheng Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory Big Data Security and Intelligent Processing Nanjing210023 China
With the increase of car ownership in China, the problem of difficult parking in cities has become more and more serious. In large parking garage, finding an ideal parking space has become a daily problem for people;e... 详细信息
来源: 评论