咨询与建议

限定检索结果

文献类型

  • 338 篇 会议
  • 291 篇 期刊文献

馆藏范围

  • 629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 390 篇 工学
    • 322 篇 计算机科学与技术...
    • 250 篇 软件工程
    • 69 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 53 篇 生物工程
    • 52 篇 电气工程
    • 28 篇 电子科学与技术(可...
    • 23 篇 机械工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 光学工程
    • 18 篇 化学工程与技术
    • 18 篇 交通运输工程
    • 17 篇 网络空间安全
    • 15 篇 动力工程及工程热...
    • 10 篇 仪器科学与技术
    • 9 篇 材料科学与工程(可...
    • 8 篇 安全科学与工程
  • 178 篇 理学
    • 94 篇 数学
    • 60 篇 生物学
    • 26 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 21 篇 化学
    • 13 篇 系统科学
  • 108 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 18 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 11 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 24 篇 training
  • 23 篇 feature extracti...
  • 21 篇 computational mo...
  • 19 篇 semantics
  • 18 篇 deep learning
  • 15 篇 machine learning
  • 14 篇 accuracy
  • 13 篇 task analysis
  • 13 篇 contrastive lear...
  • 12 篇 memory managemen...
  • 12 篇 optimization
  • 12 篇 data models
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 predictive model...
  • 11 篇 codes
  • 10 篇 scalability
  • 10 篇 federated learni...
  • 10 篇 robustness
  • 9 篇 reinforcement le...

机构

  • 149 篇 national enginee...
  • 102 篇 national enginee...
  • 81 篇 college of compu...
  • 64 篇 school of comput...
  • 53 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 30 篇 shenzhen univers...
  • 29 篇 cluster and grid...
  • 28 篇 hubei key labora...
  • 26 篇 huazhong univers...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 school of inform...
  • 14 篇 zhejiang lab
  • 13 篇 huazhong univers...
  • 12 篇 computer vision ...
  • 12 篇 national enginee...

作者

  • 128 篇 jin hai
  • 126 篇 hai jin
  • 45 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 23 篇 liao xiaofei
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 17 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 linlin shen
  • 16 篇 deqing zou
  • 16 篇 yu zhang
  • 15 篇 wang jinbao
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 wan yao

语言

  • 458 篇 英文
  • 167 篇 其他
  • 6 篇 中文
检索条件"机构=National Engineering Lab for Big Data System Computing Technology"
629 条 记 录,以下是461-470 订阅
A Cooperative Co-Evolution Algorithm with Variable-Importance Grouping for Large-Scale Optimization
A Cooperative Co-Evolution Algorithm with Variable-Importanc...
收藏 引用
Congress on Evolutionary Computation
作者: Yongfeng Li Yuze Zhang Lijia Ma Junkai Ji Dugang Liu Victor C. M. Leung Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy Shenzhen China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Cooperative co-evolution (CC) is a promising direction in solving large-scale multiobjective optimization problems (LMOPs). However, most existing methods of grouping decision variables face some difficulties when sea... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
DepGraph: A Dependency-Driven Accelerator for Efficient Iterative Graph Processing
DepGraph: A Dependency-Driven Accelerator for Efficient Iter...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Yu Zhang Xiaofei Liao Hai Jin Ligang He Bingsheng He Haikun Liu Lin Gu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China University of Warwick United Kingdom National University of Singapore Singapore
Many graph processing systems have been recently developed for many-core processors. However, for iterative graph processing, due to the dependencies between vertices' states, the propagations of new states of ver... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
GradSA: Gradient Sparsification and Accumulation for Communication-Efficient Distributed Deep Learning  15th
GradSA: Gradient Sparsification and Accumulation for Communi...
收藏 引用
15th International Conference on Green, Pervasive, and Cloud computing, GPC 2020
作者: Liu, Bo Jiang, Wenbin Zhao, Shaofeng Jin, Hai He, Bingsheng National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Huazhong University of Science and Technology Wuhan China Library Henan University of Economics and Law Zhengzhou China Department of Computer Science School of Computing National University of Singapore Singapore Singapore
Large-scale distributed deep learning is of great importance in various applications. For distributed training, the inter-node gradient communication often becomes the performance bottleneck. Gradient sparsification h... 详细信息
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
Dockformer: A transformer-based molecular docking paradigm for large-scale virtual screening
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhangfan Ji, Junkai He, Shan Li, Jianqiang He, Tiantian Bai, Ruibin Zhu, Zexuan Ong, Yew Soon School of Computer Science University of Nottingham Ningbo Ningbo315199 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Singapore138632 Singapore School of Computer Science University of Birmingham BirminghamB15 2TT United Kingdom School of Computer Science and Engineering Nanyang Technological University Nanyang Avenue 639798 Singapore
Molecular docking is a crucial step in drug development, which enables the virtual screening of compound libraries to identify potential ligands that target proteins of interest. However, the computational complexity ... 详细信息
来源: 评论
Automatically derived stateful network functions including non-field attributes
Automatically derived stateful network functions including n...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Bin Yuan Shengyao Sun Xianjun Deng Deqing Zou Haoyu Chen Shenghui Li Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Research Institute Huazhong University of Science and Technology Shenzhen China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Cluster and Grid Computing Lab
The modern network consists of thousands of network devices from different suppliers that perform distinct code-pendent functions, such as routing, switching, modifying header fields, and access control across physica... 详细信息
来源: 评论