咨询与建议

限定检索结果

文献类型

  • 318 篇 会议
  • 282 篇 期刊文献

馆藏范围

  • 600 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 369 篇 工学
    • 304 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 66 篇 信息与通信工程
    • 52 篇 生物工程
    • 49 篇 电气工程
    • 42 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 19 篇 化学工程与技术
    • 18 篇 生物医学工程(可授...
    • 17 篇 动力工程及工程热...
    • 17 篇 交通运输工程
    • 16 篇 光学工程
    • 15 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
  • 177 篇 理学
    • 91 篇 数学
    • 59 篇 生物学
    • 26 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 22 篇 化学
    • 15 篇 系统科学
  • 107 篇 管理学
    • 60 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 17 篇 医学
    • 12 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 8 篇 公共卫生与预防医...
  • 11 篇 法学
    • 6 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 22 篇 training
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 19 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 task analysis
  • 13 篇 memory managemen...
  • 13 篇 machine learning
  • 12 篇 accuracy
  • 12 篇 data models
  • 10 篇 computer archite...
  • 10 篇 optimization
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 10 篇 codes
  • 9 篇 scalability
  • 9 篇 deep neural netw...
  • 9 篇 robustness
  • 8 篇 parallel process...
  • 8 篇 reinforcement le...

机构

  • 134 篇 national enginee...
  • 100 篇 national enginee...
  • 74 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 26 篇 hubei key labora...
  • 20 篇 school of softwa...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 16 篇 school of inform...
  • 15 篇 guangdong provin...
  • 12 篇 national enginee...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 131 篇 jin hai
  • 126 篇 hai jin
  • 43 篇 xiaofei liao
  • 40 篇 shen linlin
  • 28 篇 liao xiaofei
  • 24 篇 li jianqiang
  • 23 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu zhang
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 liu haikun
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 wan yao

语言

  • 549 篇 英文
  • 47 篇 其他
  • 5 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
600 条 记 录,以下是271-280 订阅
排序:
Shared Incentive system for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
PointFaceFormer: Local and Global Attention Based Transformer for 3D Point Cloud Face Recognition
PointFaceFormer: Local and Global Attention Based Transforme...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Ziqi Gao Qiufu Li Gui Wang Linlin Shen Computer Vision Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science University of Nottingham Ningbo China
Existing 3D point cloud-based facial recognition struggles to fully leverage both global and local information inherent in the 3D point cloud data. In this paper, we introduce the PointFaceFormer, the first Transforme... 详细信息
来源: 评论
IBATree: A Novel Method for Interpretable Cancer Cell Diagnosis Using Information Bottleneck Attribution
IBATree: A Novel Method for Interpretable Cancer Cell Diagno...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Muhammad Umair Raza Jie Chen Adil Nawaz Faisal Saeed Victor C.M. Leung Jianqiang Li Zhaoxia Wang College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Gastroenterology Shenzhen Children’s Hospital China
Deep Neural Networks (DNNs) have demonstrated remarkable performance in classification and regression tasks on RGB-based pathological inputs. The network’s prediction mechanism must be interpretable to establish trus... 详细信息
来源: 评论
Towards Efficient data-Centric Robust Machine Learning with Noise-based Augmentation
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Xiaogeng Wang, Haoyu Zhang, Yechao Wu, Fangzhou Hu, Shengshan School Of Cyber Science And Engineering National Engineering Research Center For Big Data Technology And System Services Computing Technology And System Lab Hubei Engineering Research Center On Big Data Security Huazhong University Of Science And Technology Wuhan430074 China
The data-centric machine learning aims to find effective ways to build appropriate datasets which can improve the performance of AI models. In this paper, we mainly focus on designing an efficient data-centric scheme ... 详细信息
来源: 评论
Expediting Distributed GNN Training with Feature-only Partition and Optimized Communication Planning
Expediting Distributed GNN Training with Feature-only Partit...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Bingqian Du Jun Liu Ziyue Luo Chuan Wu Qiankun Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering The Ohio State University USA Department of Computer Science The University of Hong Kong Hong Kong School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Feature-only partition of large graph data in distributed Graph Neural Network (GNN) training offers advantages over commonly adopted graph structure partition, such as minimal graph preprocessing cost and elimination... 详细信息
来源: 评论
Learning Pareto Set for Multi-Objective Continuous Robot Control
arXiv
收藏 引用
arXiv 2024年
作者: Shu, Tianye Shang, Ke Gong, Cheng Nan, Yang Ishibuchi, Hisao Department of Computer Science and Engineering Southern University of Science and Technology China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science City University of Hong Kong Hong Kong
For a control problem with multiple conflicting objectives, there exists a set of Pareto-optimal policies called the Pareto set instead of a single optimal policy. When a multi-objective control problem is continuous ... 详细信息
来源: 评论
Preserving Location Privacy of IoT Devices in Heterogeneous Edge computing Architecture Through Deniability-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Ali, Ikram Li, Jianqiang Chen, Jie Chen, Yong Ullah, Shamsher Wakeel, Abdul Shenzhen University National Engineering Laboratory of Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Automation Engineering Chengdu611731 China National University of Sciences and Technology Military College of Signals Department of Electrical Engineering Islamabad Pakistan
Edge computing moves cloud services closer to consumer Internet of Things (IoT) devices, reducing latency and bandwidth usage. This setup enables faster responses but also introduces new security challenges, particula... 详细信息
来源: 评论
Many Objectives Autonomous Robot Path Planning with Improved MOEA/D
Many Objectives Autonomous Robot Path Planning with Improved...
收藏 引用
Congress on Evolutionary Computation
作者: Jin Zhou David Chieng Boon Giin Lee Junkai Ji Jianqiang Li Department of Electrical and Electronic Engineering Next-Generation Internet of Everything Laboratory University of Nottingham Ningbo China Ningbo China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Path planning is the core of autonomous robot navigation, which helps the robot to find a collision-free path to the destination based on the environment information. Most current path planning methods only consider t... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论