咨询与建议

限定检索结果

文献类型

  • 338 篇 会议
  • 291 篇 期刊文献

馆藏范围

  • 629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 322 篇 计算机科学与技术...
    • 250 篇 软件工程
    • 69 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 53 篇 生物工程
    • 52 篇 电气工程
    • 28 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 光学工程
    • 18 篇 化学工程与技术
    • 18 篇 交通运输工程
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
    • 8 篇 安全科学与工程
  • 178 篇 理学
    • 94 篇 数学
    • 60 篇 生物学
    • 26 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 21 篇 化学
    • 13 篇 系统科学
  • 108 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 18 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 11 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 24 篇 training
  • 23 篇 feature extracti...
  • 21 篇 computational mo...
  • 19 篇 semantics
  • 18 篇 deep learning
  • 15 篇 machine learning
  • 14 篇 accuracy
  • 13 篇 task analysis
  • 13 篇 contrastive lear...
  • 12 篇 memory managemen...
  • 12 篇 optimization
  • 12 篇 data models
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 predictive model...
  • 11 篇 codes
  • 10 篇 scalability
  • 10 篇 federated learni...
  • 10 篇 robustness
  • 9 篇 reinforcement le...

机构

  • 149 篇 national enginee...
  • 102 篇 national enginee...
  • 81 篇 college of compu...
  • 64 篇 school of comput...
  • 53 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 30 篇 shenzhen univers...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 huazhong univers...
  • 12 篇 computer vision ...
  • 12 篇 national enginee...

作者

  • 128 篇 jin hai
  • 126 篇 hai jin
  • 45 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 23 篇 liao xiaofei
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 linlin shen
  • 16 篇 deqing zou
  • 16 篇 yu zhang
  • 15 篇 wang jinbao
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 wan yao

语言

  • 458 篇 英文
  • 167 篇 其他
  • 6 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
629 条 记 录,以下是251-260 订阅
Node Importance Estimation Leveraging LLMs for Semantic Augmentation in Knowledge Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Xinyu Zhang, Tianyu Hou, Chengbin Wang, Jinbao Xue, Jianye Lv, Hairong School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China Department of Automation Tsinghua University Beijing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Node Importance Estimation (NIE) is a task that quantifies the importance of node in a graph. Recent research has investigated to exploit various information from Knowledge Graphs (KGs) to estimate node importance sco... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
A General Offloading Approach for Near-DRAM Processing-In-Memory Architectures
A General Offloading Approach for Near-DRAM Processing-In-Me...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Dan Chen Hai Jin Long Zheng Yu Huang Pengcheng Yao Chuangyi Gui Qinggang Wang Haifeng Liu Haiheng He Xiaofei Liao Ran Zheng National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Clusters and Grid Computing Lab Huazhong University of Science and Technology China
Processing-in-memory (PIM) is promising to solve the well-known data movement challenge by performing in-situ computations near the data. Leveraging PIM features is pretty profitable to boost the energy efficiency of ... 详细信息
来源: 评论
StreamFP: Learnable Fingerprint-guided data Selection for Efficient Stream Learning
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Tongjun Zhang, Shuhao Chen, Binbin He, Bingsheng National Engineering Research Center for Big DataTechnology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Singapore University of Technology and Design Singapore National University of Singapore Singapore
Stream Learning (SL) requires models that can quickly adapt to continuously evolving data, posing significant challenges in both computational efficiency and learning accuracy. Effective data selection is critical in ... 详细信息
来源: 评论
MFCLIP: Multi-modal Fine-grained CLIP for Generalizable Diffusion Face Forgery Detection
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5888-5903页
作者: Zhang, Yaning Wang, Tianyi Yu, Zitong Gao, Zan Shen, Linlin Chen, Shengyong Qilu University of Technology Shandong Academy of Sciences Faculty of Computer Science and Technology Jinan 250014 China National University of Singapore School of Computing 21 Lower Kent Ridge Rd 119077 Singapore Great Bay University School of Computing and Information Technology Dongguan 523000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen 518060 China Qilu University of Technology (Shandong Academy of Sciences) Shandong Artificial Intelligence Institute Jinan 250014 China Tianjin University of Technology Key Laboratory of Computer Vision and System Ministry of Education Tianjin 300384 China Shenzhen University Computer Vision Institute College of Computer Science and Software Engineering Shenzhen 518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen 518129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen 518060 China
The rapid development of photo-realistic face generation methods has raised significant concerns in society and academia, highlighting the urgent need for robust and generalizable face forgery detection (FFD) techniqu... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Can Large Language Models Serve as Evaluators for Code Summarization?
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yang Wan, Yao Chu, Zhaoyang Zhao, Wenting Liu, Ye Zhang, Hongyu Shi, Xuanhua Yu, Philip S. Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Big Data and Social Computing Lab University of Illinois Chicago Chicago United States Salesforce Research Palo Alto United States School of Big Data and Software Engineering Chongqing University Chongqing China
Code summarization facilitates program comprehension and software maintenance by converting code snippets into natural-language descriptions. Over the years, numerous methods have been developed for this task, but a k... 详细信息
来源: 评论
From General to Specific: Tailoring Large Language Models for Personalized Healthcare
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Ruize Huang, Hong Zhou, Wei Yin, Kehan Zhao, Kai Zhao, Yun Huazhong University of Science and Technology Wuhan China Tongji Medical College China Hubei Maternity and Child Health Care Hospital China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The rapid development of large language models (LLMs) has transformed many industries, including healthcare. However, previous medical LLMs have largely focused on leveraging general medical knowledge to provide respo... 详细信息
来源: 评论
Fed-AugMix: Balancing Privacy and Utility via data Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Haoyang Chen, Wei Zhang, Xiaojin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Software Engineering Huazhong University of Science and Technology Wuhan430074 China
Gradient leakage attacks pose a significant threat to the privacy guarantees of federated learning. While distortion-based protection mechanisms are commonly employed to mitigate this issue, they often lead to notable... 详细信息
来源: 评论
SaGraph: A Similarity-aware Hardware Accelerator for Temporal Graph Processing
SaGraph: A Similarity-aware Hardware Accelerator for Tempora...
收藏 引用
Design Automation Conference
作者: Jin Zhao Yu Zhang Jian Cheng Yiyang Wu Chuyue Ye Hui Yu Zhiying Huang Hai Jin Xiaofei Liao Lin Gu Haikun Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab Hangzhou China
Temporal graph processing is used to handle the snapshots of the temporal graph, which concerns changes in graph over time. Although several software/hardware solutions have been designed for efficient temporal graph ...
来源: 评论