咨询与建议

限定检索结果

文献类型

  • 361 篇 会议
  • 356 篇 期刊文献

馆藏范围

  • 717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 426 篇 工学
    • 311 篇 计算机科学与技术...
    • 236 篇 软件工程
    • 72 篇 信息与通信工程
    • 56 篇 生物工程
    • 47 篇 电气工程
    • 46 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 29 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 21 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 网络空间安全
    • 15 篇 建筑学
    • 15 篇 交通运输工程
  • 242 篇 理学
    • 115 篇 数学
    • 71 篇 物理学
    • 63 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 地球物理学
    • 18 篇 系统科学
  • 110 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 21 篇 法学
    • 13 篇 社会学
  • 10 篇 经济学
  • 10 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 25 篇 feature extracti...
  • 23 篇 computational mo...
  • 23 篇 semantics
  • 19 篇 deep learning
  • 17 篇 machine learning
  • 16 篇 training
  • 14 篇 accuracy
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 12 篇 graph neural net...
  • 11 篇 cloud computing
  • 10 篇 scalability
  • 10 篇 computer archite...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 optimization
  • 9 篇 costs
  • 9 篇 blockchain

机构

  • 102 篇 national enginee...
  • 64 篇 school of comput...
  • 53 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 28 篇 beijing advanced...
  • 27 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 21 篇 guangxi cooperat...
  • 18 篇 school of inform...
  • 16 篇 center for data ...
  • 14 篇 dipartimento di ...
  • 14 篇 zhejiang lab
  • 13 篇 shandong provinc...
  • 13 篇 national enginee...
  • 13 篇 national center ...
  • 13 篇 key laboratory o...

作者

  • 125 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 17 篇 zhang leo yu
  • 16 篇 zou deqing
  • 16 篇 yu zhang
  • 16 篇 lionetti stefano
  • 15 篇 deqing zou
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan wei
  • 11 篇 dinkar sitaram
  • 11 篇 wan yao

语言

  • 647 篇 英文
  • 62 篇 其他
  • 14 篇 中文
检索条件"机构=National Center in Big Data and Cloud Computing"
717 条 记 录,以下是301-310 订阅
排序:
Comprehensive Architecture Search for Deep Graph Neural Networks
收藏 引用
IEEE Transactions on big data 2025年
作者: Dong, Yukang Pan, Fanxing Gui, Yi Jiang, Wenbin Wan, Yao Zheng, Ran Jin, Hai National Engineering Research Center for Big Data Technology Huazhong University of Science and Technology Wuhan430074 China Huazhong University of Science and Technology Service Computing Technology and System Laboratory Wuhan430074 China Huazhong University of Science and Technology Cluster and Grid Computing Laboratory Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Zhejiang Lab Hangzhou311121 China
In recent years, Neural Architecture Search (NAS) has emerged as a promising approach for automatically discovering superior model architectures for deep Graph Neural Networks (GNNs). Different methods have paid atten... 详细信息
来源: 评论
Fil-Cad: A Fault Detection Method for Iiot Based on Federated Incremental Learning with Class Accuracy Distillation
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Yanhua Fang, Wenyu Huang, Wei Wang, Xiaofeng Zhao, Baokang Liu, Ximeng College of Computer and Data Science Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China College of Computer National University of Defense Technology Changsha410073 China
Fault detection is a research topic attracting much attention in IIoT. However, the continuous accumulation and growth of IIoT data leads to the catastrophic forgetting problem in the fault detection model and data he... 详细信息
来源: 评论
CFT Constraints on Parity-odd Interactions with Axions and Dilatons
arXiv
收藏 引用
arXiv 2024年
作者: Corianò, Claudio Lionetti, Stefano Dipartimento di Matematica e Fisica Università del Salento INFN Sezione di Lecce Via Arnesano Lecce73100 Italy National Center for HPC Big Data and Quantum Computing Via Magnanelli 2 Casalecchio di Reno40033 Italy Lecce73100 Italy
We illustrate how the conformal Ward identities (CWIs) in momentum space completely determine the structure of a parity-odd 3-point correlator involving currents, energy-momentum tensors and at least one scalar operat... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Robust and Lightweight Authentication for Securing Communication in the Internet-of-Drones (IoD) Environment
Robust and Lightweight Authentication for Securing Communica...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Saeed Ullah Jan Muhammad Bilal Anwar Ghani Salabat Khan Rashid Ahmad Do–Hveun Kim Higher Education Department Govt. College Wari (Dir Upper) Khyber Pakhtunkhwa Pakistan School of Computing and Communications Lancaster University United Kingdom Big Data Research Center Jeju National University Jeju-si South Korea Faculty of Computing and Information Technology Sohar University Sohar Oman Dept. Computer Engineering Jeju National University Jeju-si South Korea
Being an essential component of 5G and beyond, the Internet of Drones (IoD) enables a legitimate operator to employ several drones to carry out distinct missions in restricted airspace under the control of the GCS. Co... 详细信息
来源: 评论
FedAA: A Reinforcement Learning Perspective on Adaptive Aggregation for Fair and Robust Federated Learning  39
FedAA: A Reinforcement Learning Perspective on Adaptive Aggr...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: He, Jialuo Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Microelectronics and Communication Engineering Chongqing University Chongqing400044 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Federated Learning (FL) has emerged as a promising approach for privacy-preserving model training across decentralized devices. However, it faces challenges such as statistical heterogeneity and susceptibility to adve... 详细信息
来源: 评论
Axion-like Interactions and CFT in Topological Matter, Anomaly Sum Rules and the Faraday Effect
arXiv
收藏 引用
arXiv 2024年
作者: Corianò, Claudio Cretì, Mario Lionetti, Stefano Melle, Dario Tommasi, Riccardo Dipartimento di Matematica e Fisica Università del Salento INFN Sezione di Lecce Via Arnesano Lecce73100 Italy National Center for HPC Big Data and Quantum Computing Lecce73100 Italy Center for Biomolecular Nanotechnologies Istituto Italiano di Tecnologia Via Barsanti 14 Arnesano Lecce73010 Italy
We discuss fundamental aspects of chiral anomaly-driven interactions in conformal field theory (CFT) in four spacetime dimensions. They find application in very general contexts, from early universe plasma to topologi... 详细信息
来源: 评论
Towards high-throughput and low-latency billion-scale vector search via CPU/GPU collaborative filtering and re-ranking  25
Towards high-throughput and low-latency billion-scale vector...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Bing Tian Haikun Liu Yuhang Tang Shihai Xiao Zhuohui Duan Xiaofei Liao Hai Jin Xuecang Zhang Junhua Zhu Yu Zhang National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd Towards high-throughput and low-latency billion-scale vector search via CPU/GPU collaborative filtering and re-ranking
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ...
来源: 评论
Automated data Visualization from Natural Language via Large Language Models: An Exploratory Study
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yang Wan, Yao Zhang, Hongyu Sui, Yulei Wei, Wucai Zhao, Wei Xu, Guandong Jin, Hai Huazhong University of Science and Technology China Chongqing University China University of New South Wales Australia University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
The Natural Language to Visualization (NL2Vis) task aims to transform natural-language descriptions into visual representations for a grounded table, enabling users to gain insights from vast amounts of data. Recently... 详细信息
来源: 评论
DarkFed: A data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论