咨询与建议

限定检索结果

文献类型

  • 2,082 篇 期刊文献
  • 1,821 篇 会议
  • 2 册 图书

馆藏范围

  • 3,905 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,646 篇 工学
    • 1,911 篇 计算机科学与技术...
    • 1,599 篇 软件工程
    • 658 篇 信息与通信工程
    • 399 篇 电气工程
    • 338 篇 生物工程
    • 312 篇 控制科学与工程
    • 234 篇 电子科学与技术(可...
    • 213 篇 光学工程
    • 210 篇 生物医学工程(可授...
    • 178 篇 机械工程
    • 137 篇 化学工程与技术
    • 130 篇 交通运输工程
    • 96 篇 仪器科学与技术
    • 91 篇 网络空间安全
    • 85 篇 动力工程及工程热...
    • 82 篇 建筑学
    • 81 篇 安全科学与工程
  • 1,498 篇 理学
    • 829 篇 数学
    • 387 篇 生物学
    • 332 篇 物理学
    • 257 篇 统计学(可授理学、...
    • 151 篇 化学
    • 122 篇 系统科学
  • 733 篇 管理学
    • 430 篇 管理科学与工程(可...
    • 334 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 208 篇 医学
    • 174 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 124 篇 法学
    • 96 篇 社会学
  • 74 篇 经济学
  • 50 篇 教育学
  • 45 篇 农学
  • 13 篇 文学
  • 6 篇 军事学
  • 5 篇 艺术学

主题

  • 134 篇 feature extracti...
  • 117 篇 semantics
  • 111 篇 training
  • 107 篇 deep learning
  • 78 篇 computational mo...
  • 62 篇 convolution
  • 62 篇 data models
  • 61 篇 machine learning
  • 56 篇 accuracy
  • 53 篇 predictive model...
  • 50 篇 task analysis
  • 50 篇 federated learni...
  • 49 篇 graph neural net...
  • 48 篇 contrastive lear...
  • 45 篇 reinforcement le...
  • 42 篇 object detection
  • 41 篇 neural networks
  • 41 篇 forecasting
  • 40 篇 data mining
  • 35 篇 optimization

机构

  • 103 篇 school of data a...
  • 71 篇 college of compu...
  • 63 篇 peng cheng labor...
  • 63 篇 school of comput...
  • 61 篇 key laboratory o...
  • 54 篇 school of comput...
  • 54 篇 university of ch...
  • 53 篇 fujian provincia...
  • 52 篇 college of compu...
  • 50 篇 beijing advanced...
  • 46 篇 school of inform...
  • 45 篇 school of comput...
  • 41 篇 national enginee...
  • 37 篇 guangdong key la...
  • 36 篇 shenzhen researc...
  • 35 篇 nanyang technolo...
  • 35 篇 school of comput...
  • 34 篇 school of softwa...
  • 33 篇 school of comput...
  • 33 篇 school of cyber ...

作者

  • 67 篇 niyato dusit
  • 35 篇 cheng xueqi
  • 35 篇 chang kuo-chi
  • 34 篇 zheng wei-shi
  • 31 篇 xu xiaolong
  • 30 篇 guo jiafeng
  • 26 篇 hai jin
  • 26 篇 xiaolong xu
  • 26 篇 jin hai
  • 25 篇 wu di
  • 25 篇 chen yanping
  • 24 篇 zhang rui
  • 24 篇 chu kai-chun
  • 24 篇 wang zhongmin
  • 23 篇 jin xiaolong
  • 23 篇 wang guoyin
  • 21 篇 huang qingming
  • 20 篇 ai bo
  • 19 篇 shen linlin
  • 19 篇 guo wenzhong

语言

  • 3,609 篇 英文
  • 252 篇 其他
  • 60 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Big Data \& Key Laboratory of Data Science and Intelligent Computing"
3905 条 记 录,以下是11-20 订阅
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage System for Large Language Model Inference  23
IMPRESS: An Importance-Informed Multi-Tier Prefix KV Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Ruidong Yang, Siling Chen, Ping Zheng, Yi Huai, Baoxing Chen, Gang The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Huawei Cloud China
Modern advanced large language model (LLM) applications often prepend long contexts before user queries to improve model output quality. These contexts frequently repeat, either partially or fully, across multiple que...
来源: 评论
Weak Multi-Label data Stream Classification Under Distribution Changes in Labels
收藏 引用
IEEE Transactions on big data 2025年 第3期11卷 1369-1380页
作者: Zou, Yizhang Hu, Xuegang Li, Peipei Hu, Jun Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education School of Computer Science and Information Engineering Hefei230002 China National University of Singapore School of Computing 119077 Singapore
Multi-label stream classification aims to address the challenge of dynamically assigning multiple labels to sequentially arrived instances. In real situations, only partial labels of instances can be observed due to t... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
An Evolutionary Multitasking Algorithm for Efficient Multiobjective Recommendations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 518-532页
作者: Tian, Ye Ji, Luke Hu, Yiwei Ma, Haiping Wu, Le Zhang, Xingyi Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Hefei230601 China Anhui University Institutes of Physical Science and Information Technology Hefei230601 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Hefei230029 China
Represented by evolutionary algorithms and swarm intelligence algorithms, nature-inspired metaheuristics have been successfully applied to recommender systems and amply demonstrated effectiveness, in particular, for m... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
DMC-Watermark: A backdoor richer watermark for dual identity verification by dynamic mask covering
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-15页
作者: Zhu, Yujia Wang, Ruoxi Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Advanced Computing Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the increasing use of neural networks, the importance of copyright protection for these models has gained significant attention. Backdoor watermarking is one of the key methods for protecting copyright. However, ... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
LeapGNN: Accelerating Distributed GNN Training Leveraging Feature-Centric Model Migration  23
LeapGNN: Accelerating Distributed GNN Training Leveraging Fe...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Chen, Weijian He, Shuibing Qu, Haoyang Zhang, Xuechen The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States
Distributed training of graph neural networks (GNNs) has become a crucial technique for processing large graphs. Prevalent GNN frameworks are model-centric, necessitating the transfer of massive graph vertex features ... 详细信息
来源: 评论