咨询与建议

限定检索结果

文献类型

  • 367 篇 期刊文献
  • 283 篇 会议

馆藏范围

  • 650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 399 篇 工学
    • 279 篇 计算机科学与技术...
    • 235 篇 软件工程
    • 105 篇 信息与通信工程
    • 64 篇 电气工程
    • 59 篇 生物工程
    • 52 篇 控制科学与工程
    • 45 篇 电子科学与技术(可...
    • 28 篇 生物医学工程(可授...
    • 27 篇 光学工程
    • 24 篇 机械工程
    • 21 篇 化学工程与技术
    • 20 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 223 篇 理学
    • 110 篇 数学
    • 67 篇 生物学
    • 49 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 22 篇 化学
    • 17 篇 系统科学
  • 115 篇 管理学
    • 63 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 32 篇 医学
    • 22 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
    • 10 篇 药学(可授医学、理...
  • 16 篇 法学
    • 13 篇 社会学
  • 6 篇 经济学
  • 5 篇 教育学
  • 4 篇 农学

主题

  • 18 篇 feature extracti...
  • 18 篇 training
  • 17 篇 deep learning
  • 16 篇 computational mo...
  • 16 篇 semantics
  • 14 篇 reinforcement le...
  • 13 篇 accuracy
  • 12 篇 machine learning
  • 11 篇 robustness
  • 10 篇 deep neural netw...
  • 10 篇 task analysis
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 predictive model...
  • 10 篇 adaptation model...
  • 9 篇 codes
  • 9 篇 data models
  • 8 篇 scalability
  • 8 篇 signal processin...
  • 8 篇 optimization

机构

  • 133 篇 national enginee...
  • 78 篇 college of compu...
  • 50 篇 school of comput...
  • 46 篇 school of cyber ...
  • 31 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei engineerin...
  • 26 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 23 篇 peng cheng labor...
  • 18 篇 shenzhen huazhon...
  • 18 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 16 篇 college of big d...
  • 15 篇 department of el...
  • 15 篇 school of inform...
  • 15 篇 shenzhen researc...
  • 13 篇 huazhong univers...

作者

  • 44 篇 jin hai
  • 42 篇 hai jin
  • 40 篇 shen linlin
  • 24 篇 li jianqiang
  • 20 篇 hu shengshan
  • 19 篇 zhang rui
  • 18 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 deqing zou
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 11 篇 wang jinbao
  • 11 篇 zou deqing
  • 11 篇 mei weidong
  • 11 篇 huang qingming
  • 11 篇 cao xiaochun
  • 11 篇 xu qianqian
  • 10 篇 gao can
  • 10 篇 jie chen

语言

  • 583 篇 英文
  • 60 篇 其他
  • 8 篇 中文
检索条件"机构=National Engineering Laboratory for Big Data System Computing Technology Shenzhen University"
650 条 记 录,以下是331-340 订阅
排序:
Dockformer: A transformer-based molecular docking paradigm for large-scale virtual screening
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhangfan Ji, Junkai He, Shan Li, Jianqiang He, Tiantian Bai, Ruibin Zhu, Zexuan Ong, Yew Soon School of Computer Science University of Nottingham Ningbo Ningbo315199 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Singapore138632 Singapore School of Computer Science University of Birmingham BirminghamB15 2TT United Kingdom School of Computer Science and Engineering Nanyang Technological University Nanyang Avenue 639798 Singapore
Molecular docking is a crucial step in drug development, which enables the virtual screening of compound libraries to identify potential ligands that target proteins of interest. However, the computational complexity ... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Write-Optimized B^(+) Tree Index technology for Persistent Memory
收藏 引用
Journal of Computer Science & technology 2021年 第5期36卷 1037-1050页
作者: Rui-Xiang Ma Fei Wu Bu-Rong Dong Meng Zhang Wei-Jun Li Chang-Sheng Xie Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430070China Key Laboratory of Information Storage System Ministry of Education of ChinaWuhan 430070China Engineering Research Center of Data Storage Systems and Technology Huazhong University of Science and Technology Wuhan 430070China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430070China Shenzhen DAPU Microelectronics Co. LtdShenzhen 518116China
Due to its low latency,byte-addressable,non-volatile,and high density,persistent memory(PM)is expected to be used to design a high-performance storage ***,PM also has disadvantages such as limited endurance,thereby pr... 详细信息
来源: 评论
TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Yinbo Xu, Yuanqi Huang, Kepu Liu, Jiajia National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Cybersecurity Northwestern Polytechnical University China Research & Development Institute Northwestern Polytechnical University Shenzhen China
Trigger-Action Programming (TAP) is a popular end-user programming framework in the home automation (HA) system, which eases users to customize home automation and control devices as expected. However, its simplified ... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
DNN Task Assignment in UAV Networks: A Generative AI Enhanced Multi-Agent Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Xin Chen, Qian Weng, Wenjie Liao, Binhan Wang, Jiacheng Cao, Xianbin Li, Xiaohuan Guangxi University Key Laboratory of Intelligent Networking and Scenario System School of Information and Communication Guilin University of Electronic Technology Guilin541004 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guilin541004 China National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology Guangxi Nanning530001 China College of Computing and Data Science Nanyang Technological University 639798 Singapore School of Electronic and Information Engineering The Key Laboratory of Advanced Technology of Near Space Information System Ministry of Industry and Information Technology of China Beihang University Beijing100191 China
Unmanned Aerial Vehicles (UAVs) possess high mobility and flexible deployment capabilities, prompting the development of UAVs for various application scenarios within the Internet of Things (IoT). The unique capabilit... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xiaogeng Li, Minghui Wang, Haoyu Hu, Shengshan Ye, Dengpan Jin, Hai Wu, Libing Xiao, Chaowei School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China School of Cyber Science and Engineering Wuhan University China Arizona State University United States
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger... 详细信息
来源: 评论
Query-Centered Temporal Community Search via Time-Constrained Personalized PageRank
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Longlong Yuan, Pingpeng Li, Rong-Hua Zhu, Chunxue Qin, Hongchao Jin, Hai Jia, Tao College of Computer and Information Science Southwest University Chongqing400715 China National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technololgy Beijing Institute of Technology Beijing100081 China
Existing temporal community search suffers from two defects: (i) they ignore the temporal proximity between the query vertex q and other vertices but simply require the result to include q. Thus, they find many tempor... 详细信息
来源: 评论
Graft: Efficient Inference Serving for Hybrid Deep Learning with SLO Guarantees via DNN Re-alignment
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jing Wang, Lin Jin, Qirui Liu, Fangming The National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in The School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan430074 China Paderborn University TU Darmstadt Germany Peng Cheng Laboratory Huazhong University of Science and Technology China
Deep neural networks (DNNs) have been widely adopted for various mobile inference tasks, yet their ever-increasing computational demands are hindering their deployment on resource-constrained mobile devices. Hybrid de... 详细信息
来源: 评论
Communication-Efficient Federated Learning by Quantized Variance Reduction for Heterogeneous Wireless Edge Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Wang, Shuai Xu, Yanqing You, Chaoqun Shao, Mingjie Quek, Tony Q.S. University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China The Chinese University of HongKong Shenzhen Research Institute of Big Data School of Science and Engineering Shenzhen518172 China Fudan University School of Computer Science and Technology 200433 China Beijing100149 China Singapore University of Technology and Design Information Systems Technology and Design 487372 Singapore
Federated learning (FL) has been recognized as a viable solution for local-privacy-aware collaborative model training in wireless edge networks, but its practical deployment is hindered by the high communication overh... 详细信息
来源: 评论