咨询与建议

限定检索结果

文献类型

  • 361 篇 会议
  • 356 篇 期刊文献

馆藏范围

  • 717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 426 篇 工学
    • 311 篇 计算机科学与技术...
    • 236 篇 软件工程
    • 72 篇 信息与通信工程
    • 56 篇 生物工程
    • 47 篇 电气工程
    • 46 篇 控制科学与工程
    • 40 篇 电子科学与技术(可...
    • 29 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 21 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 网络空间安全
    • 15 篇 建筑学
    • 15 篇 交通运输工程
  • 242 篇 理学
    • 115 篇 数学
    • 71 篇 物理学
    • 63 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 24 篇 化学
    • 23 篇 地球物理学
    • 18 篇 系统科学
  • 110 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 21 篇 法学
    • 13 篇 社会学
  • 10 篇 经济学
  • 10 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 25 篇 feature extracti...
  • 23 篇 computational mo...
  • 23 篇 semantics
  • 19 篇 deep learning
  • 17 篇 machine learning
  • 16 篇 training
  • 14 篇 accuracy
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 12 篇 graph neural net...
  • 11 篇 cloud computing
  • 10 篇 scalability
  • 10 篇 computer archite...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 10 篇 data models
  • 9 篇 parallel process...
  • 9 篇 optimization
  • 9 篇 costs
  • 9 篇 blockchain

机构

  • 102 篇 national enginee...
  • 64 篇 school of comput...
  • 53 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 28 篇 beijing advanced...
  • 27 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 21 篇 guangxi cooperat...
  • 18 篇 school of inform...
  • 16 篇 center for data ...
  • 14 篇 dipartimento di ...
  • 14 篇 zhejiang lab
  • 13 篇 shandong provinc...
  • 13 篇 national enginee...
  • 13 篇 national center ...
  • 13 篇 key laboratory o...

作者

  • 125 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 corianò claudio
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 17 篇 zhang leo yu
  • 16 篇 zou deqing
  • 16 篇 yu zhang
  • 16 篇 lionetti stefano
  • 15 篇 deqing zou
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 jiang xiao
  • 12 篇 wan wei
  • 11 篇 dinkar sitaram
  • 11 篇 wan yao

语言

  • 647 篇 英文
  • 62 篇 其他
  • 14 篇 中文
检索条件"机构=National Center in Big Data and Cloud Computing"
717 条 记 录,以下是331-340 订阅
排序:
Fast and Scalable Gate-Level Simulation in Massively Parallel Systems
Fast and Scalable Gate-Level Simulation in Massively Paralle...
收藏 引用
IEEE International Conference on Computer-Aided Design
作者: Haichuan Hu Zichen Xu Yuhao Wang Fangming Liu Services Computing Technology and System Lab Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Mathematics and Computer Science Nanchang University Nanchang China Pengcheng Laboratory Shenzhen China
The natural bijection between a proposed circuit design and its graph representation shall allow any graph optimization algorithm deploying into many-core systems efficiently. However, this process suffers from the ex...
来源: 评论
NaFV-Net: An Adversarial Four-view Network for Mammogram Classification  39
NaFV-Net: An Adversarial Four-view Network for Mammogram Cla...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Lu, Feng Hou, Yuxiang Li, Wei Yang, Xiangying Zheng, Haibo Luo, Wenxi Chen, Leqing Cao, Yuyang Liao, Xiaofei Zhang, Yu Yang, Fan Zomaya, Albert Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Australia-China Joint Research Centre for Energy Informatics and Demand Response Technologies Centre for Distributed and High Performance Computing School of Computer Science University of Sydney Australia Tongji Hospital Tongji Medical College Huazhong University of Science and Technology China
Breast cancer remains a leading cause of mortality among women, with millions of new cases diagnosed annually. Early detection through screening is crucial. Using neural networks to improve the accuracy of breast canc... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论
Simplify Implant Depth Prediction as Video Grounding: A Texture Perceive Implant Depth Prediction Network
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Xinquan Li, Xuguang Luo, Xiaoling Zeng, Leilei Zhang, Yudi Shen, Linlin Deng, Yongqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China AI Research Center for Medical Image Analysis and Diagnosis Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Stomatology Shenzhen University General Hospital Shenzhen China
Surgical guide plate is an important tool for the dental implant surgery. However, the design process heavily relies on the dentist to manually simulate the implant angle and depth. When deep neural networks have been... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Reconciling Selective Logging and Hardware Persistent Memory Transaction
Reconciling Selective Logging and Hardware Persistent Memory...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Chencheng Ye Yuanchao Xu Xipeng Shen Yan Sha Xiaofei Liao Hai Jin Yan Solihin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China North Carolina State University Raleigh North Carolina USA University of Central Florida Florida USA
Log creation, maintenance, and its persist ordering are known to be performance bottlenecks for durable transactions on persistent memory. Existing hardware persistent memory transactions overlook an important opportu... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Multi-Granularity Open Intent Classification via Adaptive Granular-Ball Decision Boundary
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yanhua Ouyang, Xiaocao Pan, Chaofan Zhang, Jie Zhao, Sen Xia, Shuyin Yang, Xin Wang, Guoyin Li, Tianrui School of Computing and Artificial Intelligence Southwestern University of Finance and Economics Chengdu611130 China Engineering Research Center of Intelligent Finance Ministry of Education Chengdu611130 China Key Laboratory of Big Data Intelligent Computing Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing401331 China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China
Open intent classification is critical for the development of dialogue systems, aiming to accurately classify known intents into their corresponding classes while identifying unknown intents. Prior boundary-based meth... 详细信息
来源: 评论
EC²Detect: Real-Time Online Video Object Detection in Edge-cloud Collaborative IoT
收藏 引用
IEEE Internet of Things Journal 2022年 第20期9卷 20382-20392页
作者: Siyan Guo Cong Zhao Guiqin Wang Jiaqing Yang Shusen Yang National Engineering Laboratory for Big Data Analytics and the School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China Department of Computing Imperial College London London U.K. National Engineering Laboratory for Big Data Analytics and the School of Computer Science and Technology Xi’an Jiaotong University Xi’an China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Industrial Artificial Intelligence Center Pazhou Laboratory Guangzhou China
Video object detection is a fundamental technology of intelligent video analytics for Internet of Things (IoT) applications. However, even with extraordinary detection accuracy, predominating solutions based on deep c... 详细信息
来源: 评论