咨询与建议

限定检索结果

文献类型

  • 361 篇 会议
  • 356 篇 期刊文献

馆藏范围

  • 717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 426 篇 工学
    • 311 篇 计算机科学与技术...
    • 236 篇 软件工程
    • 72 篇 信息与通信工程
    • 56 篇 生物工程
    • 47 篇 电气工程
    • 46 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 29 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 21 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 网络空间安全
    • 15 篇 建筑学
    • 15 篇 交通运输工程
  • 242 篇 理学
    • 115 篇 数学
    • 71 篇 物理学
    • 63 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 地球物理学
    • 18 篇 系统科学
  • 110 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 21 篇 法学
    • 13 篇 社会学
  • 10 篇 经济学
  • 10 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 25 篇 feature extracti...
  • 23 篇 computational mo...
  • 23 篇 semantics
  • 19 篇 deep learning
  • 17 篇 machine learning
  • 16 篇 training
  • 14 篇 accuracy
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 12 篇 graph neural net...
  • 11 篇 cloud computing
  • 10 篇 scalability
  • 10 篇 computer archite...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 optimization
  • 9 篇 costs
  • 9 篇 blockchain

机构

  • 102 篇 national enginee...
  • 64 篇 school of comput...
  • 53 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 28 篇 beijing advanced...
  • 27 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 21 篇 guangxi cooperat...
  • 18 篇 school of inform...
  • 16 篇 center for data ...
  • 14 篇 dipartimento di ...
  • 14 篇 zhejiang lab
  • 13 篇 shandong provinc...
  • 13 篇 national enginee...
  • 13 篇 national center ...
  • 13 篇 key laboratory o...

作者

  • 125 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 17 篇 zhang leo yu
  • 16 篇 zou deqing
  • 16 篇 yu zhang
  • 16 篇 lionetti stefano
  • 15 篇 deqing zou
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan wei
  • 11 篇 dinkar sitaram
  • 11 篇 wan yao

语言

  • 647 篇 英文
  • 62 篇 其他
  • 14 篇 中文
检索条件"机构=National Center in Big Data and Cloud Computing"
717 条 记 录,以下是321-330 订阅
排序:
Multi-Granularity Open Intent Classification via Adaptive Granular-Ball Decision Boundary  39
Multi-Granularity Open Intent Classification via Adaptive Gr...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Yanhua Ouyang, Xiaocao Pan, Chaofan Zhang, Jie Zhao, Sen Xia, Shuyin Yang, Xin Wang, Guoyin Li, Tianrui School of Computing and Artificial Intelligence Southwestern University of Finance and Economics Chengdu611130 China Engineering Research Center of Intelligent Finance Ministry of Education Chengdu611130 China Key Laboratory of Big Data Intelligent Computing Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing401331 China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China
Open intent classification is critical for the development of dialogue systems, aiming to accurately classify known intents into their corresponding classes while identifying unknown intents. Prior boundary-based meth...
来源: 评论
CFT Correlators and CP-Violating Trace Anomalies
arXiv
收藏 引用
arXiv 2023年
作者: Corianò, Claudio Lionetti, Stefano Maglio, Matteo Maria Dipartimento di Matematica e Fisica Università del Salento INFN Sezione di Lecce Via Arnesano 73100 Lecce Italy National Center for HPC Big Data and Quantum Computing University of Heidelberg Philosophenweg 16 Heidelberg69120 Germany
We analyze the parity-odd correlators 〈JJO〉odd, 〈JJT 〉odd, 〈T T O〉odd and 〈T T T 〉odd in momentum space, constrained by conformal Ward identities, extending our former investigation of the parity-odd chiral anomaly ve...
来源: 评论
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Zhejiang Lab Zhejiang-HUST Joint Research Center for Graph Processing China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hangtao Yao, Zeming Zhang, Leo Yu Hu, Shengshan Chen, Chao Liew, Alan Li, Zhetao School of Cyber Science and Engineering Huazhong University of Science and Technology China Swinburne University of Technology Australia Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China RMIT University Australia Xiangtan University China
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Hyperbit: A Financial Temporal Knowledge Graph data Storage System
SSRN
收藏 引用
SSRN 2022年
作者: Yuan, Pingpeng Han, Sheng Zang, Shaoqi Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
In the field of finance, data has the characteristics of temporal multi-frequency and heterogeneous high dimension, and the traditional knowledge graph is not suitable to express the temporal relation of financial dat... 详细信息
来源: 评论
The Gravitational Chiral Anomaly at Finite Temperature and Density
arXiv
收藏 引用
arXiv 2024年
作者: Corianò, Claudio Cretì, Mario Lionetti, Stefano Tommasi, Riccardo Dipartimento di Matematica e Fisica Università del Salento INFN Sezione di Lecce Via Arnesano 73100 Lecce Italy National Center for HPC Big Data and Quantum Computing Italy Lecce73100 Italy Center for Biomolecular Nanotechnologies Istituto Italiano di Tecnologia Via Barsanti 14 Arnesano Lecce73010 Italy
We investigate the gravitational anomaly vertex 〈TTJ5〉 (graviton - graviton - axial current) under conditions of finite density and temperature. Through a direct analysis of perturbative contributions, we demonstrate ...
来源: 评论
FedAA: A Reinforcement Learning Perspective on Adaptive Aggregation for Fair and Robust Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: He, Jialuo Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Microelectronics and Communication Engineering Chongqing University Chongqing400044 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Federated Learning (FL) has emerged as a promising approach for privacy-preserving model training across decentralized devices. However, it faces challenges such as statistical heterogeneity and susceptibility to adve... 详细信息
来源: 评论