咨询与建议

限定检索结果

文献类型

  • 1,727 篇 会议
  • 1,590 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,318 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,144 篇 工学
    • 1,538 篇 计算机科学与技术...
    • 1,289 篇 软件工程
    • 517 篇 信息与通信工程
    • 299 篇 生物工程
    • 289 篇 控制科学与工程
    • 284 篇 电气工程
    • 167 篇 光学工程
    • 167 篇 电子科学与技术(可...
    • 160 篇 生物医学工程(可授...
    • 139 篇 机械工程
    • 110 篇 化学工程与技术
    • 101 篇 交通运输工程
    • 90 篇 仪器科学与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 土木工程
    • 72 篇 建筑学
    • 69 篇 网络空间安全
  • 1,190 篇 理学
    • 648 篇 数学
    • 338 篇 生物学
    • 242 篇 物理学
    • 203 篇 统计学(可授理学、...
    • 129 篇 化学
    • 96 篇 系统科学
  • 595 篇 管理学
    • 349 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 149 篇 医学
    • 128 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 103 篇 法学
    • 84 篇 社会学
  • 62 篇 农学
  • 44 篇 经济学
  • 40 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 135 篇 feature extracti...
  • 131 篇 semantics
  • 114 篇 training
  • 96 篇 deep learning
  • 68 篇 computational mo...
  • 65 篇 accuracy
  • 60 篇 predictive model...
  • 56 篇 machine learning
  • 56 篇 data models
  • 53 篇 graph neural net...
  • 52 篇 convolution
  • 50 篇 contrastive lear...
  • 48 篇 neural networks
  • 43 篇 object detection
  • 43 篇 reinforcement le...
  • 42 篇 data mining
  • 38 篇 task analysis
  • 36 篇 optimization
  • 36 篇 visualization
  • 36 篇 federated learni...

机构

  • 78 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 61 篇 university of ch...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 south china univ...
  • 54 篇 national enginee...
  • 52 篇 key laboratory o...
  • 51 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 44 篇 school of softwa...
  • 43 篇 school of comput...
  • 41 篇 school of cyber ...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 37 篇 guangdong key la...
  • 36 篇 key laboratory o...
  • 36 篇 jiangsu key labo...
  • 35 篇 fujian provincia...

作者

  • 42 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 35 篇 tan mingkui
  • 31 篇 jin hai
  • 26 篇 huang qingming
  • 26 篇 xiaolong xu
  • 24 篇 shen linlin
  • 22 篇 hai jin
  • 22 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 hu shengshan
  • 20 篇 chen yanping
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 niyato dusit
  • 18 篇 xia shuyin
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 li jianxin
  • 15 篇 peng hao

语言

  • 3,030 篇 英文
  • 250 篇 其他
  • 54 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3318 条 记 录,以下是941-950 订阅
排序:
Graph Regularized Nonnegative Latent Factor Analysis Model for Temporal Link Prediction in Cryptocurrency Transaction Networks  19
Graph Regularized Nonnegative Latent Factor Analysis Model f...
收藏 引用
19th IEEE International Conference on Networking, Sensing and Control, ICNSC 2022
作者: Zhou, Yue Liu, ZhiGang Yuan, Ye Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The Chongqing School University of Chinese Academy of Sciences Chongqing400714 China Southwest University College of Computer and Information Science Chongqing400715 China
With the development of blockchain technology, a cryptocurrency based on blockchain technology is becoming more and more popular. The huge cryptocurrency transaction network has therefore received widespread attention... 详细信息
来源: 评论
Hyperbolic Neural Network Based Preselection for Expensive Multi-Objective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Li, Bingdong Yang, Yanting Hong, Wenjing Yang, Peng Zhou, Aimin Shanghai Institute of AI for Education the School of Computer Science and Technology and the Shanghai Frontiers Science Center of Molecule Intelligent Syntheses East China Normal University Shanghai China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science and Engineering Guangdong Key Laboratory of Brain-Inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
A series of surrogate-assisted evolutionary algorithms (SAEAs) have been proposed for expensive multi-objective optimization problems (EMOPs), building cheap surrogate models to replace the expensive real function eva... 详细信息
来源: 评论
Collision-Aware MPCC Integrated with Neural Augmentation for Quadrotor Trajectory Tracking
Collision-Aware MPCC Integrated with Neural Augmentation for...
收藏 引用
2025 IEEE International Conference on Mechatronics, ICM 2025
作者: Hu, Chuanqi Wang, Jin Chen, Yikai Chen, Yonghang Zheng, Zhi Meng, Jun Lu, Guodong Zhejiang University State Key Laboratory of Fluid Power and Mechatronic Systems Hangzhou310058 China Zhejiang University Zhejiang Key Laboratory of Industrial Big Data and Robot Intelligent Systems Hangzhou310058 China Robotics Research Center of Yuyao City Ningbo315400 China National Elite Institute of Engineering Chongqing University Chongqing401135 China School of Mechanical Engineering Zhejiang University Hangzhou310058 China College of Electrical Engineering Zhejiang University Hangzhou310027 China Center for Data Mining and Systems Biology College of Electrical Engineering Zhejiang University Hangzhou310027 China
This paper presents a trajectory tracking algorithm designed for autonomous quadrotors to navigate complex dy-namic environments that is resilient to collision disturbances. Since it combines Model Predictive Contouri... 详细信息
来源: 评论
Multilevel Perception Boundary-guided Network for Breast Lesion Segmentation in Ultrasound Images
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Xing Zhang, Jian Chen, Qijian Wang, Li Wang, Lihui Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Automatic segmentation of breast tumors from the ultrasound images is essential for the subsequent clinical diagnosis and treatment plan. Although the existing deep learning-based methods have achieved significant pro... 详细信息
来源: 评论
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by Distributed Ledger Technology and Internet of Things  23
ZombieCoin3.0: On the Looming of a Novel Botnet Fortified by...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Haoyu Li, Leixiao Lin, Hao Chang, Xiangyang Wan, Jianxiong Li, Jie Zhu, Fangyuan College of Data Science and Application Inner Mongolia University of Technology China Inner Mongolia Autonomous Reg. Eng. and Technol. Research Center of Big Data Based Software Service China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
P2P Botnet is famous for the resilience against termination. However, its dependence on Neighbor List (NL) makes it susceptible to infiltration and poison, also leading to a dearth of adequate protection of Botmaster&... 详细信息
来源: 评论
Learning Self-Supervised Vision Transformers from Scratch for Aerial Person Re- Identification
Learning Self-Supervised Vision Transformers from Scratch fo...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Houfu Peng Lili Xu Xing Lu Daoxun Xia School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Information and Computing Science Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
In recent years, person re-identification (Re-ID) as a widely studied computer vision task, has reached a saturation state under closed-world setting, which encourages researchers to further explore more realistic sce...
来源: 评论
CA-Edit: Causality-Aware Condition Adapter for High-Fidelity Local Facial Attribute Editing
arXiv
收藏 引用
arXiv 2024年
作者: Xian, Xiaole He, Xilin Niu, Zenghao Zhang, Junliang Xie, Weicheng Song, Siyang Yu, Zitong Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Key Laboratory of Intelligent Information Processing China University of Exeter United Kingdom Great Bay University China
For efficient and high-fidelity local facial attribute editing, most existing editing methods either require additional finetuning for different editing effects or tend to affect beyond the editing regions. Alternativ...
来源: 评论
Reducing Traffic Wastage in Video Streaming via Bandwidth-Efficient Bitrate Adaptation
arXiv
收藏 引用
arXiv 2024年
作者: Su, Hairong Wang, Shibo Yang, Shusen Huang, Tianchi Ren, Xuebin National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University China R&D department Sony
Bitrate adaptation (also known as ABR) is a crucial technique to improve the quality of experience (QoE) for video streaming applications. However, existing ABR algorithms suffer from severe traffic wastage, which ref... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Adaptive Latent Factor Analysis via Generalized Momentum-Incorporated Particle Swarm Optimization  19
Adaptive Latent Factor Analysis via Generalized Momentum-Inc...
收藏 引用
19th IEEE International Conference on Networking, Sensing and Control, ICNSC 2022
作者: Chen, Jiufang Yuan, Ye School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing400714 China Chongqing School University of Chinese Academy of Sciences Chongqing400714 China College of Computer and Information Science Southwest University Chongqing400715 China
Stochastic gradient descent (SGD) algorithm is an effective learning strategy to build a latent factor analysis (LFA) model on a high-dimensional and incomplete (HDI) matrix. A particle swarm optimization (PSO) algori... 详细信息
来源: 评论