咨询与建议

限定检索结果

文献类型

  • 951 篇 期刊文献
  • 712 篇 会议
  • 1 册 图书

馆藏范围

  • 1,664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,129 篇 工学
    • 808 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 305 篇 信息与通信工程
    • 201 篇 电气工程
    • 153 篇 生物工程
    • 134 篇 控制科学与工程
    • 106 篇 生物医学工程(可授...
    • 104 篇 光学工程
    • 100 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 52 篇 化学工程与技术
    • 47 篇 仪器科学与技术
    • 47 篇 交通运输工程
    • 38 篇 网络空间安全
    • 35 篇 建筑学
    • 34 篇 土木工程
    • 33 篇 安全科学与工程
  • 606 篇 理学
    • 330 篇 数学
    • 173 篇 生物学
    • 130 篇 物理学
    • 113 篇 统计学(可授理学、...
    • 59 篇 化学
    • 45 篇 系统科学
  • 318 篇 管理学
    • 185 篇 管理科学与工程(可...
    • 150 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 103 篇 医学
    • 95 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 44 篇 法学
    • 35 篇 社会学
  • 25 篇 经济学
  • 19 篇 农学
  • 18 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 85 篇 semantics
  • 69 篇 feature extracti...
  • 49 篇 training
  • 48 篇 deep learning
  • 38 篇 federated learni...
  • 36 篇 computational mo...
  • 36 篇 accuracy
  • 32 篇 data models
  • 30 篇 convolution
  • 28 篇 contrastive lear...
  • 25 篇 data mining
  • 25 篇 machine learning
  • 24 篇 predictive model...
  • 21 篇 deep neural netw...
  • 21 篇 image segmentati...
  • 21 篇 neural networks
  • 21 篇 visualization
  • 21 篇 robustness
  • 20 篇 measurement
  • 19 篇 optimization

机构

  • 59 篇 college of compu...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 51 篇 national enginee...
  • 39 篇 beijing advanced...
  • 39 篇 school of cyber ...
  • 37 篇 school of comput...
  • 37 篇 university of ch...
  • 34 篇 college of compu...
  • 31 篇 nanyang technolo...
  • 31 篇 school of big da...
  • 29 篇 national enginee...
  • 28 篇 college of compu...
  • 28 篇 hubei key labora...
  • 27 篇 peng cheng labor...
  • 27 篇 hubei engineerin...
  • 26 篇 services computi...
  • 26 篇 school of comput...
  • 25 篇 cluster and grid...

作者

  • 75 篇 niyato dusit
  • 31 篇 jin hai
  • 24 篇 shen linlin
  • 23 篇 sun geng
  • 22 篇 hai jin
  • 20 篇 hu shengshan
  • 20 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 liu bin
  • 15 篇 zhang leo yu
  • 15 篇 li jiahui
  • 15 篇 liu ya-feng
  • 14 篇 huang sheng
  • 14 篇 zhou ziqi
  • 13 篇 cao xiaochun
  • 13 篇 du hongyang
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 12 篇 wang lihui

语言

  • 1,241 篇 英文
  • 403 篇 其他
  • 34 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1664 条 记 录,以下是841-850 订阅
排序:
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
CodeEnhance: A Codebook-Driven Approach for Low-Light Image Enhancement
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xu Hou, XianXu Lai, Zhihui Zhou, Jie Zhang, Ya-Nan Pedrycz, Witold Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China The Department of Electrical & Computer Engineering University of Alberta University of Alberta Canada
Low-light image enhancement (LLIE) aims to improve low-illumination images. However, existing methods face two challenges: (1) uncertainty in restoration from diverse brightness degradations;(2) loss of texture and co... 详细信息
来源: 评论
Task Delay and Energy Consumption Minimization for Low-altitude MEC via Evolutionary Multi-objective Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Geng Ma, Weilong Li, Jiahui Sun, Zemin Wang, Jiacheng Niyato, Dusit Mao, Shiwen College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore College of Software Jilin University Changchun130012 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
The low-altitude economy (LAE), driven by unmanned aerial vehicles (UAVs) and other aircraft, has revolutionized fields such as transportation, agriculture, and environmental monitoring. In the upcoming six-generation... 详细信息
来源: 评论
Securing Sdn/Nfv-Enabled Campus Networks with Software-Defined Perimeter-Based Zero-Trust Architecture
SSRN
收藏 引用
SSRN 2023年
作者: Ruambo, Francis A. Zou, Deqing Lopes, Ivandro O. Yuan, Bin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on Big Data Security Wuhan China National Engineering Research Center for Big Data Technology and System Wuhan China Services Computing Technology and System Lab Wuhan China Cluster and Grid Computing Lab Wuhan China Mbeya university of Science and Technology Mbeya131 Tanzania United Republic of Nucleo Operacional para a Sociedade de Informacao Cape Verde Songshan Laboratory Zhengzhou China
Network softwarization is a breakthrough in designing modern networks and providing numerous new network operations and services. This change is exemplified by Software Defined Networks (SDN) and Network Function Virt... 详细信息
来源: 评论
NOMANet: A Graph Neural Network Enabled Power Allocation Scheme for NOMA
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Yipu Lu, Yang Chen, Wei Ai, Bo Niyato, Dusit Ding, Zhiguo State Key Laboratory of Advanced Rail Autonomous Operation China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University 639798 Singapore Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates
This paper proposes a graph neural network (GNN) enabled power allocation scheme for non-orthogonal multiple access (NOMA) networks. In particular, a downlink scenario with one base station serving multiple users over... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Disentangling Interest and Conformity Representation to Mitigate Popularity Bias for Sequential Recommendation
Disentangling Interest and Conformity Representation to Miti...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Wenyue Hu Zhenyu Yang Yan Huang Zhibo Zhang Baojie Xu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The objective of sequential recommendation is to predict user preferences for items based on historical interaction sequences. This process often leads to a phenomenon known as popularity bias, where popular items are... 详细信息
来源: 评论
Logical Relation Modeling and Mining in Hyperbolic Space for Recommendation
Logical Relation Modeling and Mining in Hyperbolic Space for...
收藏 引用
International Conference on data engineering
作者: Yanchao Tan Hang Lv Zihao Zhou Wenzhong Guo Bo Xiong Weiming Liu Chaochao Chen Shiping Wang Carl Yang College of Computer and Data Science Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Institute for Artificial Intelligence University of Stuttgart Stuttgart Germany College of Computer Science Zhejiang University Hangzhou China Department of Computer Science Emory University Atlanta United States
The sparse interactions between users and items have aggravated the difficulty of their representations in recommender systems. Existing methods leverage tags to alleviate the sparsity problem but ignore prevalent log... 详细信息
来源: 评论
CSLP: Collaborative Solution to Long-Tail Problem and Popularity Bias in Sequential Recommendation
CSLP: Collaborative Solution to Long-Tail Problem and Popula...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yan Huang Zhenyu Yang Wenyue Hu Baojie Xu Zhibo Zhang The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Sequential Recommender Systems (SRS), leveraging the temporal information from users' behaviors, have noticeably improved user experience against traditional systems. However, these behaviors often follow long-tai... 详细信息
来源: 评论