咨询与建议

限定检索结果

文献类型

  • 363 篇 期刊文献
  • 276 篇 会议

馆藏范围

  • 639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 396 篇 工学
    • 277 篇 计算机科学与技术...
    • 234 篇 软件工程
    • 105 篇 信息与通信工程
    • 63 篇 电气工程
    • 59 篇 生物工程
    • 52 篇 控制科学与工程
    • 45 篇 电子科学与技术(可...
    • 28 篇 生物医学工程(可授...
    • 27 篇 光学工程
    • 24 篇 机械工程
    • 21 篇 化学工程与技术
    • 20 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 11 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 223 篇 理学
    • 110 篇 数学
    • 67 篇 生物学
    • 49 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 22 篇 化学
    • 17 篇 系统科学
  • 114 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 32 篇 医学
    • 22 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
    • 10 篇 药学(可授医学、理...
  • 16 篇 法学
    • 13 篇 社会学
  • 5 篇 经济学
  • 5 篇 教育学
  • 4 篇 农学

主题

  • 18 篇 feature extracti...
  • 18 篇 training
  • 17 篇 deep learning
  • 16 篇 semantics
  • 15 篇 computational mo...
  • 13 篇 reinforcement le...
  • 13 篇 accuracy
  • 12 篇 machine learning
  • 11 篇 robustness
  • 10 篇 deep neural netw...
  • 10 篇 task analysis
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 9 篇 codes
  • 9 篇 data models
  • 9 篇 adaptation model...
  • 8 篇 scalability
  • 8 篇 signal processin...
  • 8 篇 optimization

机构

  • 131 篇 national enginee...
  • 78 篇 college of compu...
  • 50 篇 school of comput...
  • 45 篇 school of cyber ...
  • 31 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei engineerin...
  • 26 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 23 篇 peng cheng labor...
  • 18 篇 shenzhen huazhon...
  • 18 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 16 篇 college of big d...
  • 16 篇 school of softwa...
  • 15 篇 department of el...
  • 15 篇 shenzhen researc...
  • 14 篇 school of inform...
  • 13 篇 huazhong univers...

作者

  • 44 篇 jin hai
  • 40 篇 shen linlin
  • 40 篇 hai jin
  • 24 篇 li jianqiang
  • 20 篇 hu shengshan
  • 19 篇 zhang rui
  • 17 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 deqing zou
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 11 篇 wang jinbao
  • 11 篇 zou deqing
  • 11 篇 mei weidong
  • 11 篇 huang qingming
  • 11 篇 cao xiaochun
  • 11 篇 xu qianqian
  • 10 篇 gao can
  • 10 篇 jie chen

语言

  • 572 篇 英文
  • 60 篇 其他
  • 8 篇 中文
检索条件"机构=National Engineering Laboratory for Big Data System Computing Technology Shenzhen University"
639 条 记 录,以下是181-190 订阅
排序:
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Learning Pareto Set for Multi-Objective Continuous Robot Control
arXiv
收藏 引用
arXiv 2024年
作者: Shu, Tianye Shang, Ke Gong, Cheng Nan, Yang Ishibuchi, Hisao Department of Computer Science and Engineering Southern University of Science and Technology China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science City University of Hong Kong Hong Kong
For a control problem with multiple conflicting objectives, there exists a set of Pareto-optimal policies called the Pareto set instead of a single optimal policy. When a multi-objective control problem is continuous ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
OUTLIER SYNTHESIS VIA HAMILTONIAN MONTE CARLO FOR OUT-OF-DISTRIBUTION DETECTION
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hengzhuang Zhang, Teng National Engineering Research Center for Big Data Technology and System Service Computing Technology and Systems Laboratory Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Out-of-distribution (OOD) detection is crucial for developing trustworthy and reliable machine learning systems. Recent advances in training with auxiliary OOD data demonstrate efficacy in enhancing detection capabili... 详细信息
来源: 评论
VARIATIONAL AUTO-ENCODER BASED SOLUTIONS TO INTERACTIVE DYNAMIC INFLUENCE DIAGRAMS
arXiv
收藏 引用
arXiv 2024年
作者: Pan, Yinghui Ma, Biyang Zhang, Hanyi Zeng, Yifeng National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Computer Science Minnan Normal University Zhangzhou China Department of Computer and Information Sciences Northumbria University Newcastle United Kingdom
Addressing multiagent decision problems in AI, especially those involving collaborative or competitive agents acting concurrently in a partially observable and stochastic environment, remains a formidable challenge. W... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
EPL: Empirical Prototype Learning for Deep Face Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Weijia Wen, Jiajun Jia, Xi Shen, Linlin Zhou, Jiancan Li, Qiufu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Computer Vision Institute Shenzhen University Shenzhen518060 China School of Computer Science University of Birmingham Birmingham United Kingdom Aqara Lumi United Technology Coopration Shenzhen China
Prototype learning is widely used in face recognition, which takes the row vectors of coefficient matrix in the last linear layer of the feature extraction model as the prototypes for each class. When the prototypes a... 详细信息
来源: 评论
Optimal Linear Crossover for Mitigating Negative Transfer in Evolutionary Multitasking
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Liu, Zhaobo Yuan, Jianhua Zhang, Haili Zeng, Tao Zhu, Zexuan Shenzhen University Institute for Advanced Study Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Shenzhen Polytechnic University School of Undergraduate Education Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University Shenzhen City Key Laboratory of Embedded System Design Shenzhen518060 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of China Chongqing400044 China
Evolutionary multitasking algorithms use information exchange among individuals in a population to solve multiple optimization problems simultaneously. Negative transfer is a critical factor that affects the performan... 详细信息
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees  40
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Zhang, Jianshun Wang, Fang Qiu, Sheng Wang, Yi Ou, Jiaxin Huang, Junxun Li, Baoquan Fang, Peng Feng, Dan School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China China Shenzhen Huazhong University of Science and Technology Research Institute China Bytefrance Inc.
Key-Value Stores (KVS) implemented with log-structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification d... 详细信息
来源: 评论
Epl: Empirical Prototype Learning for Deep Face Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Fan, Weijia Wen, Jiajun Jia, Xi Shen, Linlin Zhou, Jiancan Li, Qiufu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Computer Vision Institute Shenzhen University Shenzhen518060 China School of Computer Science University of Birmingham Birmingham United Kingdom Aqara Lumi United Technology Coopration Shenzhen China
Prototype learning is widely used in face recognition, which takes the row vectors of coefficient matrix in the last linear layer of the feature extraction model as the prototypes for each class. When the prototypes a... 详细信息
来源: 评论