咨询与建议

限定检索结果

文献类型

  • 330 篇 期刊文献
  • 278 篇 会议

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 415 篇 工学
    • 308 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 94 篇 信息与通信工程
    • 70 篇 生物工程
    • 52 篇 电气工程
    • 48 篇 控制科学与工程
    • 38 篇 机械工程
    • 35 篇 光学工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 14 篇 建筑学
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
  • 206 篇 理学
    • 112 篇 数学
    • 73 篇 生物学
    • 38 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 17 篇 化学
  • 116 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 24 篇 法学
    • 19 篇 社会学
  • 18 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 经济学
  • 6 篇 农学
  • 3 篇 军事学

主题

  • 34 篇 semantics
  • 22 篇 training
  • 20 篇 deep learning
  • 16 篇 feature extracti...
  • 13 篇 convolution
  • 11 篇 neural networks
  • 11 篇 visualization
  • 10 篇 conferences
  • 10 篇 graph neural net...
  • 9 篇 data models
  • 8 篇 task analysis
  • 8 篇 signal processin...
  • 8 篇 optimization
  • 8 篇 predictive model...
  • 8 篇 decoding
  • 8 篇 codes
  • 7 篇 deep neural netw...
  • 7 篇 three-dimensiona...
  • 7 篇 recommender syst...
  • 7 篇 speech processin...

机构

  • 49 篇 school of softwa...
  • 38 篇 school of big da...
  • 38 篇 key laboratory o...
  • 21 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 national enginee...
  • 17 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 key laboratory o...
  • 16 篇 college of compu...
  • 16 篇 services computi...
  • 15 篇 key laboratory o...
  • 15 篇 beijing advanced...
  • 15 篇 cluster and grid...
  • 15 篇 state key labora...
  • 14 篇 school of inform...
  • 12 篇 peng cheng labor...

作者

  • 15 篇 huang sheng
  • 15 篇 wu qingyao
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 tan mingkui
  • 13 篇 cai yi
  • 12 篇 shen linlin
  • 11 篇 jin hai
  • 10 篇 zhang leo yu
  • 10 篇 qingyao wu
  • 9 篇 cui bin
  • 9 篇 meng yan
  • 8 篇 hai jin
  • 8 篇 zhou ziqi
  • 7 篇 lü jinhu
  • 7 篇 ling xu
  • 7 篇 minghui li
  • 7 篇 shengshan hu
  • 7 篇 fei dai
  • 7 篇 zhang wentao

语言

  • 562 篇 英文
  • 42 篇 其他
  • 5 篇 中文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot School of Software Engineering"
608 条 记 录,以下是261-270 订阅
排序:
QoS Optimization via Computation Offloading in Metaverse Environment
QoS Optimization via Computation Offloading in Metaverse Env...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Zhiyuan Ge Pengcheng Zhang Huiying Jin Hai Dong Shunhui Ji Jiajia Li Qi Wang Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computing Technologies RMIT University Melbourne Australia
The emergence of the metaverse signifies a paradigm shift in Internet technology, offering a comprehensive virtual social platform spanning various domains such as social interaction, gaming, healthcare, and tourism. ... 详细信息
来源: 评论
A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism
收藏 引用
Computer Modeling in engineering & Sciences 2021年 第7期128卷 223-245页
作者: Daojun Han Jinyu Chen Lei Zhang Yatian Shen Yihua Gao Xueheng Wang Henan Key Laboratory of Big Data Analysis and Processing Henan UniversityKaifeng47500China Institute of Data and Knowledge Engineering Henan UniversityKaifeng47500China School of Computer and Information Engineering Henan UniversityKaifeng47500China Department of Network and Finance Agricultural Bank of China Limited Xuchang BranchXuchang461000China School of Software Pingdingshan UniversityPingdingshan467000China Department of Network and Finance Agricultural Bank of China Limited Nanyang BranchNanyang473000China
As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various ***,data on a blockchain cannot be *** a result,it is impo... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Vulnerability Detection with Graph Simplification and Enhanc...
收藏 引用
International Conference on software engineering (ICSE)
作者: Xin-Cheng Wen Yupan Chen Cuiyun Gao Hongyu Zhang Jie M. Zhang Qing Liao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory and Guangdong Provincial Key Laboratory Novel Security Intelligence Technologies School of Big Data and Software Engineering Chongqing University China Department of Informatics King's College London UK Peng Cheng Laboratory
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
来源: 评论
Hyperbolic Geometric Latent Diffusion Model for Graph Generation
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
Model Degradation Hinders Deep Graph Neural Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Wentao Sheng, Zeang Yin, Ziqi Jiang, Yuezihan Xia, Yikuan Gao, Jun Yang, Zhi Cui, Bin School of CS & Key Laboratory of High Confidence Software Technologies Peking University China Center for Data Science Peking University National Engineering Laboratory for Big Data Analysis and Applications China Beijing Institute of Technology China
Graph Neural Networks (GNNs) have achieved great success in various graph mining tasks. However, drastic performance degradation is always observed when a GNN is stacked with many layers. As a result, most GNNs only h... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论
GKT: A Novel Guidance-Based Knowledge Transfer Framework For Efficient Cloud-edge Collaboration LLM Deployment
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Yao Li, Zuchao Zhao, Hai Department of Computer Science and Engineering Shanghai Jiao Tong University China Shanghai Key Laboratory of Trusted Data Circulation and Governance in Web3 China Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China
The burgeoning size of Large Language Models (LLMs) has led to enhanced capabilities in generating responses, albeit at the expense of increased inference times and elevated resource demands. Existing methods of accel... 详细信息
来源: 评论
Hyperbolic geometric latent diffusion model for graph generation  24
Hyperbolic geometric latent diffusion model for graph genera...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xingcheng Fu Yisen Gao Yuecen Wei Qingyun Sun Hao Peng Jianxin Li Xianxian Li Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China and Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m...
来源: 评论
CLDG: Contrastive Learning on Dynamic Graphs
CLDG: Contrastive Learning on Dynamic Graphs
收藏 引用
International Conference on data engineering
作者: Yiming Xu Bin Shi Teng Ma Bo Dong Haoyi Zhou Qinghua Zheng Department of Computer Science and Technology Xi’an Jiaotong University China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China Department of Distance Education Xi’an Jiaotong University China School of Software Beihang University China Advanced Innovation Center for Big Data and Brain Computing Beihang University China
The graph with complex annotations is the most potent data type, whose constantly evolving motivates further exploration of the unsupervised dynamic graph representation. One of the representative paradigms is graph c...
来源: 评论