咨询与建议

限定检索结果

文献类型

  • 429 篇 会议
  • 411 篇 期刊文献

馆藏范围

  • 840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 514 篇 工学
    • 391 篇 计算机科学与技术...
    • 306 篇 软件工程
    • 98 篇 信息与通信工程
    • 78 篇 生物工程
    • 68 篇 电气工程
    • 66 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 30 篇 交通运输工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 13 篇 材料科学与工程(可...
    • 12 篇 建筑学
  • 262 篇 理学
    • 132 篇 数学
    • 88 篇 生物学
    • 43 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 28 篇 化学
    • 16 篇 系统科学
  • 140 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 20 篇 法学
    • 15 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 27 篇 feature extracti...
  • 27 篇 training
  • 26 篇 computational mo...
  • 23 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 contrastive lear...
  • 15 篇 predictive model...
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 machine learning
  • 13 篇 reinforcement le...
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 13 篇 codes
  • 12 篇 convolution
  • 12 篇 graph neural net...
  • 12 篇 costs
  • 12 篇 adaptation model...
  • 11 篇 scalability

机构

  • 144 篇 national enginee...
  • 102 篇 national enginee...
  • 81 篇 college of compu...
  • 63 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 29 篇 shenzhen univers...
  • 28 篇 huazhong univers...
  • 28 篇 hubei key labora...
  • 22 篇 school of softwa...
  • 21 篇 national enginee...
  • 21 篇 guangdong provin...
  • 18 篇 shenzhen institu...
  • 17 篇 school of comput...
  • 17 篇 school of inform...
  • 14 篇 zhejiang lab
  • 12 篇 computer vision ...

作者

  • 124 篇 hai jin
  • 121 篇 jin hai
  • 43 篇 xiaofei liao
  • 43 篇 shen linlin
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 21 篇 liao xiaofei
  • 17 篇 zhang leo yu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 15 篇 wang jinbao
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui

语言

  • 743 篇 英文
  • 87 篇 其他
  • 14 篇 中文
检索条件"机构=National Engineering Laboratory for Big Data System Computing Technology"
840 条 记 录,以下是551-560 订阅
排序:
A Two-Stage Missing Value Imputation Method Based on Autoencoder Neural Network
A Two-Stage Missing Value Imputation Method Based on Autoenc...
收藏 引用
IEEE International Conference on big data
作者: Jiayin Yu Yulin He Joshua Zhexue Huang College of Computer Science & Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Due to the ubiquitous presence of missing values in real-world datasets, an imputation algorithm can recover the missing values and provide users with a complete dataset that utilizes all the available observed inform... 详细信息
来源: 评论
Continual Learning for Smart City: A Survey
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Li Luo, Zhipeng Zhang, Shiming Teng, Fei Li, Tianrui School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Southwest Jiaotong University Sichuan Chengdu611756 China
With the digitization of modern cities, large data volumes and powerful computational resources facilitate the rapid update of intelligent models deployed in smart cities. Continual learning (CL) is a novel machine le... 详细信息
来源: 评论
Random Sample Partition-Based Clustering Ensemble Algorithm for big data
Random Sample Partition-Based Clustering Ensemble Algorithm ...
收藏 引用
IEEE International Conference on big data
作者: Xueqin Du Yulin He Joshua Zhexue Huang College of Computer Science & Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
A novel random sample partition-based clustering ensemble (RSP-CE) algorithm is proposed in this paper to handle the big data clustering problems. There are three key components in RSP-CE algorithm, i.e., generating t... 详细信息
来源: 评论
Whale: Efficient One-to-Many data Partitioning in RDMA-Assisted Distributed Stream Processing systems
Whale: Efficient One-to-Many Data Partitioning in RDMA-Assis...
收藏 引用
Supercomputing Conference
作者: Jie Tan Hanhua Chen Yonghui Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computing Science and Technology Huazhong University of Science and Technology Wuhan China
To process large-scale real-time data streams, existing distributed stream processing systems (DSPSs) leverage different stream partitioning strategies. The one-to-many data partitioning strategy plays an important ro... 详细信息
来源: 评论
Intra-Person Camera Adversarial for Intra-Camera Supervised Person Re-Identification
Intra-Person Camera Adversarial for Intra-Camera Supervised ...
收藏 引用
International Conference on Automatic Face and Gesture Recognition
作者: Ruochen Tang Xun Gong School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu China Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education Chengdu China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Southwest Jiaotong University Chengdu China
Re-identification (ReID) of individuals across different cameras is a challenging task due to the high-quality large-scale datasets required for the model. Intra-camera supervised (ICS) person re-identification has be... 详细信息
来源: 评论
Low-Light Enhancement Effect on Classification and Detection: An Empirical Study
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xu Lai, Zhihui Jie, Zhou Gao, Can Hou, Xianxu Zhang, Ya-Nan Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China
Low-light images are commonly encountered in real-world scenarios, and numerous low-light image enhancement (LLIE) methods have been proposed to improve the visibility of these images. The primary goal of LLIE is to g... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
VG-Net: Sensor Time Series Anomaly Detection with Joint Variational Autoencoder and Graph Neural Network
VG-Net: Sensor Time Series Anomaly Detection with Joint Vari...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shuai Wang Shenghao Liu Xiaoxuan Fan Haijun Wang Yinxin Zhou Hanjun Gao Hongwei Lu Xianjun Deng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hunan Technical College of Railway High-speed China Nanjing University of Posts and Telecommunications China China National Nuclear Power Co Ltd China
Intelligent Cyber-Physical systems typically utilize sensors to gather a significant amount of raw data which often possesses temporal and high-dimensional characteristics. Ensuring the data reliability is crucial for... 详细信息
来源: 评论
Towards Demystifying Android Adware: dataset and Payload Location
Towards Demystifying Android Adware: Dataset and Payload Loc...
收藏 引用
IEEE/ACM International Conference on Automated Software engineering - Workshops (ASE Workshops)
作者: Chao Wang Tianming Liu Yanjie Zhao Lin Zhang Xiaoning Du Li Li Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Monash University Clayton Australia Huazhong University of Science and Technology Wuhan China The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC) Beijing China Beihang University Beijing China
Adware represents a pervasive threat in the mobile ecosystem, yet its inherent characteristics have been largely overlooked by previous research. This work takes a crucial step towards demystifying Android adware. We ... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论