咨询与建议

限定检索结果

文献类型

  • 367 篇 期刊文献
  • 274 篇 会议

馆藏范围

  • 641 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 392 篇 工学
    • 272 篇 计算机科学与技术...
    • 229 篇 软件工程
    • 101 篇 信息与通信工程
    • 65 篇 电气工程
    • 59 篇 生物工程
    • 52 篇 控制科学与工程
    • 41 篇 电子科学与技术(可...
    • 29 篇 生物医学工程(可授...
    • 27 篇 机械工程
    • 27 篇 光学工程
    • 21 篇 化学工程与技术
    • 19 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 225 篇 理学
    • 111 篇 数学
    • 67 篇 生物学
    • 49 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 22 篇 化学
    • 17 篇 系统科学
  • 116 篇 管理学
    • 63 篇 管理科学与工程(可...
    • 53 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 34 篇 医学
    • 24 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 14 篇 法学
    • 12 篇 社会学
  • 5 篇 经济学
  • 5 篇 教育学
  • 5 篇 农学

主题

  • 21 篇 feature extracti...
  • 19 篇 training
  • 17 篇 deep learning
  • 17 篇 computational mo...
  • 17 篇 semantics
  • 14 篇 accuracy
  • 12 篇 reinforcement le...
  • 11 篇 speech processin...
  • 11 篇 machine learning
  • 11 篇 robustness
  • 10 篇 deep neural netw...
  • 10 篇 task analysis
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 9 篇 codes
  • 9 篇 adaptation model...
  • 8 篇 scalability
  • 8 篇 signal processin...
  • 8 篇 face recognition
  • 8 篇 convolution

机构

  • 132 篇 national enginee...
  • 79 篇 college of compu...
  • 50 篇 school of comput...
  • 45 篇 school of cyber ...
  • 31 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei engineerin...
  • 26 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 peng cheng labor...
  • 20 篇 national enginee...
  • 18 篇 shenzhen huazhon...
  • 18 篇 shenzhen institu...
  • 17 篇 shenzhen researc...
  • 16 篇 department of el...
  • 16 篇 college of big d...
  • 16 篇 school of softwa...
  • 14 篇 guangdong provin...
  • 14 篇 school of inform...

作者

  • 47 篇 hai jin
  • 44 篇 jin hai
  • 39 篇 shen linlin
  • 25 篇 li jianqiang
  • 20 篇 hu shengshan
  • 19 篇 zhang rui
  • 16 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 deqing zou
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 12 篇 wang jinbao
  • 11 篇 mei weidong
  • 11 篇 huang qingming
  • 11 篇 cao xiaochun
  • 11 篇 xu qianqian
  • 10 篇 zou deqing
  • 10 篇 gao can
  • 10 篇 jie chen

语言

  • 582 篇 英文
  • 52 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=National Engineering Laboratory for Big Data System Computing Technology Shenzhen University"
641 条 记 录,以下是21-30 订阅
排序:
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Preserving Location Privacy of IoT Devices in Heterogeneous Edge computing Architecture Through Deniability-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Ali, Ikram Li, Jianqiang Chen, Jie Chen, Yong Ullah, Shamsher Wakeel, Abdul Shenzhen University National Engineering Laboratory of Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Automation Engineering Chengdu611731 China National University of Sciences and Technology Military College of Signals Department of Electrical Engineering Islamabad Pakistan
Edge computing moves cloud services closer to consumer Internet of Things (IoT) devices, reducing latency and bandwidth usage. This setup enables faster responses but also introduces new security challenges, particula... 详细信息
来源: 评论
Dual Encoders for Diffusion-based Image Inpainting
Dual Encoders for Diffusion-based Image Inpainting
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dezhi Zheng Kaijun Deng Jinbao Wang Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
Current diffusion-based inpainting models struggle to preserve unmasked regions or generate highly coherent content. Additionally, it is hard for them to generate meaningful content for 3D inpainting. To tackle these ... 详细信息
来源: 评论
Dynamic Charging and Path Planning for UAV-Powered Rechargeable WSNs Using Multi-Agent Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年
作者: Betalo, Mesfin Leranso Leng, Supeng Seid, Abegaz Mohammed Abishu, Hayla Nahom Erbad, Aiman Bai, Xiaoshan Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Hamad Bin Khalifa University Division of Information and Computing Technology College of Science and Engineering Doha Qatar Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Unmanned Aerial Vehicle (UAV)-powered 5G/6G networks integrated with rechargeable wireless sensor networks (RWSNs) offer promising solutions for extending system lifetime, collecting data, and providing computing serv... 详细信息
来源: 评论
Spatial-Temporal Resource Utilization for Partially Connected Multi-AUV Broadcast Scheduling
收藏 引用
IEEE Wireless Communications Letters 2025年 第5期14卷 1321-1325页
作者: He, Hongyi Du, Jun Jiang, Chunxiao Wang, Jintao Song, Jian Niyato, Dusit Tsinghua University Beijing National Research Center for Information Science and Technology and State Key laboratory of Space Network and Communications Department of Electronic Engineering Beijing100084 China Tsinghua University Department of Electronic Engineering and State Key laboratory of Space Network and Communications Beijing100084 China Tsinghua University Beijing National Research Center for Information Science and Technology Beijing100084 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Tsinghua University Shenzhen International Graduate School Shenzhen518055 China Nanyang Technological University College of Computing and Data Science Singapore
The long propagation delays in underwater acoustic channels can be leveraged to improve communication efficiency using spatial-temporal reuse techniques. This work focuses on a system of partially connected AUVs that ... 详细信息
来源: 评论
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
CTGDiff: A Conditional Diffusion Model for Cardiotocography Signal Synthesis
CTGDiff: A Conditional Diffusion Model for Cardiotocography ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaoqing Li Pufan Cai Yu Lu Shijie Shi Liangkun Ma Xianghua Fu College of Big Data and Internet Shenzhen Technology University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Surgery Yong Loo Lin School of Medicine National University of Singapore Singapore School of Applied Technology Shenzhen University Shenzhen China Department of Obstetrics and Gynecology Peking Union Medical College Hospital Beijing China
The analysis of Cardiotocography (CTG) signals is often hindered by challenges such as limited data availability and label imbalance, which can undermine the performance of deep learning models. To address these issue... 详细信息
来源: 评论
Mamba in Speech: Towards an Alternative to Self-Attention
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 1933-1948页
作者: Xiangyu Zhang Qiquan Zhang Hexin Liu Tianyi Xiao Xinyuan Qian Beena Ahmed Eliathamby Ambikairajah Haizhou Li Julien Epps School of Electrical Engineering and Telecommunications The University of New South Wales (UNSW) Sydney NSW Australia College of Computing and Data Science Nanyang Technological University Singapore School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong (Shenzhen) Shenzhen China Shenzhen Research Institute of Big Data Shenzhen China
Transformer and its derivatives have achieved success in diverse tasks across computer vision, natural language processing, and speech processing. To reduce the complexity of computations within the multi-head self-at... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论