咨询与建议

限定检索结果

文献类型

  • 416 篇 期刊文献
  • 405 篇 会议

馆藏范围

  • 821 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 499 篇 工学
    • 378 篇 计算机科学与技术...
    • 300 篇 软件工程
    • 94 篇 信息与通信工程
    • 77 篇 生物工程
    • 76 篇 电气工程
    • 57 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 31 篇 交通运输工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 16 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 13 篇 材料科学与工程(可...
  • 261 篇 理学
    • 132 篇 数学
    • 88 篇 生物学
    • 43 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 28 篇 化学
    • 17 篇 系统科学
  • 143 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 19 篇 法学
    • 14 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 26 篇 feature extracti...
  • 26 篇 training
  • 24 篇 computational mo...
  • 21 篇 deep learning
  • 19 篇 accuracy
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 13 篇 contrastive lear...
  • 13 篇 predictive model...
  • 13 篇 data models
  • 12 篇 graph neural net...
  • 12 篇 codes
  • 12 篇 machine learning
  • 11 篇 scalability
  • 11 篇 deep neural netw...
  • 11 篇 convolution
  • 11 篇 optimization
  • 11 篇 robustness
  • 10 篇 object detection

机构

  • 131 篇 national enginee...
  • 105 篇 national enginee...
  • 74 篇 college of compu...
  • 60 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 huazhong univers...
  • 27 篇 cluster and grid...
  • 27 篇 shenzhen univers...
  • 26 篇 hubei key labora...
  • 19 篇 zhejiang lab
  • 18 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 16 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of inform...
  • 12 篇 hubei key labora...

作者

  • 130 篇 jin hai
  • 129 篇 hai jin
  • 43 篇 xiaofei liao
  • 39 篇 shen linlin
  • 28 篇 liao xiaofei
  • 24 篇 long zheng
  • 24 篇 li jianqiang
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 17 篇 yu zhang
  • 16 篇 zhang leo yu
  • 16 篇 yu huang
  • 16 篇 linlin shen
  • 15 篇 zou deqing
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 14 篇 li tianrui
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 wang jinbao

语言

  • 750 篇 英文
  • 61 篇 其他
  • 13 篇 中文
检索条件"机构=National Engineering Laboratory for Big Data System Computing Technology"
821 条 记 录,以下是191-200 订阅
排序:
A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2020年 第3期7卷 790-799页
作者: Hao Zhang Yongdan Li Zhihan Lv Arun Kumar Sangaiah Tao Huang IEEE National Engineering Laboratory for Educational Big Data Central China Normal UniversityWuhan 430072China Lanzhou Central Sub-branch of The People’s Bank of China Lanzhou 730000China School of Data Science and Software Engineering Qingdao UniversityQingdao 266071China School of Computing Science and Engineering Vellore Institute of Technology UniversityTamil Nadu 632014India
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network... 详细信息
来源: 评论
Spatial-Temporal Graph-Based AU Relationship Learning for Facial Action Unit Detection
Spatial-Temporal Graph-Based AU Relationship Learning for Fa...
收藏 引用
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Wang, Zihan Song, Siyang Luo, Cheng Zhou, Yuzhi Wu, Shiling Xie, Weicheng Shen, Linlin Shenzhen University Computer Vision Institute School of Computer Science & Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China University of Leicester School of Computing and Mathematical Sciences United Kingdom
This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial rep... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
RETIA: Relation-Entity Twin-Interact Aggregation for Temporal Knowledge Graph Extrapolation  39
RETIA: Relation-Entity Twin-Interact Aggregation for Tempora...
收藏 引用
39th IEEE International Conference on data engineering, ICDE 2023
作者: Liu, Kangzheng Zhao, Feng Xu, Guandong Wang, Xianzhi Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China University of Technology Sydney Data Science and Machine Intelligence Lab Sydney Australia
Temporal knowledge graph (TKG) extrapolation aims to predict future unknown events (facts) based on historical information, and has attracted considerable attention due to its great practical significance. Accurate re... 详细信息
来源: 评论
A Survey of LLM datasets:From Autoregressive Model to AI Chatbot
收藏 引用
Journal of Computer Science & technology 2024年 第3期39卷 542-566页
作者: 杜非 马新建 杨婧如 柳熠 罗超然 王学斌 姜海鸥 景翔 National Key Laboratory of Data Space Technology and System Beijing 100195China Advanced Institute of Big Data Beijing 100195China Fu Foundation School of Engineering and Applied Science Columbia UniversityNY 10027U.S.A. School of Software and Microelectronics Peking UniversityBeijing 100091China CCF IEEE
Since OpenAI opened access to ChatGPT,large language models(LLMs)become an increasingly popular topic attracting researchers’attention from abundant ***,public researchers meet some problems when developing LLMs give... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Improved Demonstration-Knowledge Utilization in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2139-2150页
作者: Liu, Yanyu Zeng, Yifeng Ma, Biyang Pan, Yinghui Gao, Huifan Zhang, Yuting Xiamen University Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision Department of Automation Xiamen361102 China Northumbria University Department of Computer and Information Sciences NewcastleNE1 8ST United Kingdom Minnan Normal University Department of Computer Science Zhangzhou363000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Reinforcement learning (RL) has made great success in recent years. Generally, the learning process requires a huge amount of interaction with the environment before an agent can achieve acceptable performance. This m... 详细信息
来源: 评论
HMvisor: dynamic hybrid memory management for virtual machines
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 74-89页
作者: Dang YANG Haikun LIU Hai JIN Yu ZHANG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing LabSchool of Computer Science and Technology Huazhong University of Science and Technology
Emerging non-volatile memory(NVM) technologies promise high density, low cost and dynamic random access memory(DRAM)-like performance, at the expense of limited write endurance and high write energy consumption. It is... 详细信息
来源: 评论
Towards trustworthy blockchain systems in the era of “Internet of value”: development, challenges, and future trends
收藏 引用
Science China(Information Sciences) 2022年 第5期65卷 250-260页
作者: Hai JIN Jiang XIAO National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology
Since the advent of cryptocurrencies such as Bitcoin, blockchain, as their underlying technologies,has drawn a massive amount of attention from both academia and the industry. This ever-evolving technology inherits t... 详细信息
来源: 评论