咨询与建议

限定检索结果

文献类型

  • 2,601 篇 期刊文献
  • 2,367 篇 会议
  • 4 册 图书

馆藏范围

  • 4,972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,338 篇 工学
    • 2,552 篇 计算机科学与技术...
    • 2,143 篇 软件工程
    • 831 篇 信息与通信工程
    • 557 篇 生物工程
    • 415 篇 电气工程
    • 387 篇 控制科学与工程
    • 309 篇 生物医学工程(可授...
    • 272 篇 电子科学与技术(可...
    • 263 篇 光学工程
    • 197 篇 机械工程
    • 188 篇 化学工程与技术
    • 106 篇 动力工程及工程热...
    • 99 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 98 篇 安全科学与工程
    • 86 篇 建筑学
    • 86 篇 交通运输工程
  • 1,837 篇 理学
    • 1,023 篇 数学
    • 614 篇 生物学
    • 384 篇 物理学
    • 357 篇 统计学(可授理学、...
    • 212 篇 化学
    • 150 篇 系统科学
  • 916 篇 管理学
    • 509 篇 管理科学与工程(可...
    • 463 篇 图书情报与档案管...
    • 191 篇 工商管理
  • 233 篇 医学
    • 194 篇 临床医学
    • 170 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 146 篇 法学
    • 113 篇 社会学
  • 76 篇 经济学
  • 54 篇 农学
  • 50 篇 教育学
  • 15 篇 文学
  • 13 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 191 篇 semantics
  • 176 篇 feature extracti...
  • 154 篇 training
  • 152 篇 deep learning
  • 120 篇 computational mo...
  • 88 篇 accuracy
  • 88 篇 data models
  • 84 篇 machine learning
  • 79 篇 data mining
  • 76 篇 predictive model...
  • 75 篇 graph neural net...
  • 72 篇 task analysis
  • 68 篇 convolution
  • 59 篇 visualization
  • 55 篇 contrastive lear...
  • 54 篇 neural networks
  • 54 篇 optimization
  • 53 篇 reinforcement le...
  • 52 篇 conferences
  • 52 篇 image segmentati...

机构

  • 108 篇 school of comput...
  • 106 篇 shenzhen researc...
  • 102 篇 national enginee...
  • 95 篇 school of comput...
  • 87 篇 school of big da...
  • 86 篇 school of comput...
  • 84 篇 guangdong key la...
  • 83 篇 department of el...
  • 74 篇 beijing advanced...
  • 71 篇 school of scienc...
  • 70 篇 school of big da...
  • 69 篇 school of comput...
  • 67 篇 peng cheng labor...
  • 66 篇 school of comput...
  • 58 篇 school of data a...
  • 57 篇 school of comput...
  • 55 篇 school of comput...
  • 51 篇 state key labora...
  • 51 篇 the department o...
  • 47 篇 gaoling school o...

作者

  • 111 篇 hai jin
  • 99 篇 zhang rui
  • 99 篇 jin hai
  • 48 篇 chen enhong
  • 47 篇 xia yong
  • 46 篇 li haizhou
  • 43 篇 liu qi
  • 39 篇 zhu lipeng
  • 37 篇 zhang yanning
  • 36 篇 liu jun
  • 35 篇 zhou pan
  • 34 篇 yin jian
  • 32 篇 wang meng
  • 32 篇 xu xiaolong
  • 30 篇 xiaofei liao
  • 29 篇 peng hao
  • 29 篇 liu yang
  • 27 篇 qi liu
  • 27 篇 wang peng
  • 25 篇 li jianxin

语言

  • 4,669 篇 英文
  • 267 篇 其他
  • 41 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Big Data and Computer Science"
4972 条 记 录,以下是31-40 订阅
排序:
DMC-Watermark: A backdoor richer watermark for dual identity verification by dynamic mask covering
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-15页
作者: Zhu, Yujia Wang, Ruoxi Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Advanced Computing Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the increasing use of neural networks, the importance of copyright protection for these models has gained significant attention. Backdoor watermarking is one of the key methods for protecting copyright. However, ... 详细信息
来源: 评论
Successive Interference Cancellation-Enabled Timely Status Update in Linear Multi-Hop Wireless Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5298-5311页
作者: Han, Xinhui Pan, Haoyuan Wang, Zhaorui Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Future Network of Intelligence Institute School of Science and Engineering Shenzhen518172 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology College of Computer Science and Software Engineering Shenzhen518060 China
We investigate the timely status update in linear multi-hop wireless networks, where a source tries to deliver status update packets to a destination through a sequence of half-duplex relays. Timeliness is measured by... 详细信息
来源: 评论
Overlapping community-based fair influence maximization in social networks under open-source development model algorithm
收藏 引用
Artificial Intelligence Review 2025年 第8期58卷 1-31页
作者: Wei, Pengcheng Yan, Bei Huang, Sixing Zhou, ZhiHong School of Artificial Intelligence Chongqing University of Education Chongqing400065 China School of Mathematics and Big Data Chongqing University of Posts and Telecommunications Chongqing China College of Computer Science and Technology Jilin Normal University Jilin Siping136000 China
The aim of Influence Maximization (IM) in social networks is to identify an optimal subset of users to maximize the spread of influence across the network. Fair Influence Maximization (FIM) develops the IM problem wit... 详细信息
来源: 评论
Fine extraction of multi-crop planting area based on deep learning with Sentinel- 2 time-series data
收藏 引用
Environmental science and Pollution Research 2025年 第19期32卷 11931-11949页
作者: Jiang, Jingmin Zhang, Jiahua Wang, Xue Zhang, Shichao Kong, Delong Wang, Xiaopeng Ali, Shawkat Ullah, Hidayat Space Information and Big Earth Data Research Center School of Computer Science and Technology Qingdao University Qingdao266071 China Key Laboratory of Digital Earth Science Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China
Accurate and timely access to the spatial distribution of crops is crucial for sustainable agricultural development and food security. However, extracting multi-crop areas based on high-resolution time-series data and... 详细信息
来源: 评论
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2771-2787页
作者: Guo, Bobiao Ping, Ping Xu, Feng Hohai University College of Computer Science and Software Engineering Nanjing210098 China Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources Nanjing210098 China Jiangsu Ocean University School of Computer Engineering Lianyungang222005 China
To avoid the pixel modification traces left by steganography from being detected by passive steganalysis, and to prevent the hidden data from being destroyed by active steganalysis attacks, Coverless Image Steganograp... 详细信息
来源: 评论
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph data in Cloud Computing  17th
Privacy Preserving Adjacency Query Supporting Homoionym Sear...
收藏 引用
17th International Conference on Cloud Computing, CLOUD 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Li, Hourong Tian, Yun Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China
Cloud computing is widely used in all walks of life today. Massive amounts of medical graph data are being outsourced to cloud servers to reduce overhead. The untrustworthiness of cloud servers puts the sensitive info... 详细信息
来源: 评论
Cost-Effective Edge data Caching With Failure Tolerance and Popularity Awareness
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5357-5369页
作者: Luo, Ruikun Zhang, Zujia He, Qiang Xu, Mengxi Chen, Feifei Dai, Xiaohai Wu, Song Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of  Computer Science and Technology Wuhan430074 China Deakin University School of Information Technology GeelongVIC3125 Australia
In the mobile edge computing environment, caching data in edge storage systems can significantly reduce data retrieval latency for users while saving the costs incurred by cloud-edge data transmissions for app vendors... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
PFed-NS: An Adaptive Personalized Federated Learning Scheme Through Neural Network Segmentation
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1936-1948页
作者: Liu, Yuchen He, Ligang Zhang, Zhigao Ren, Shenyuan University of Warwick Department of Computer Science CoventryCV4 7AL United Kingdom Wuhan University School of Computer Science Wuhan430072 China China Hubei Luojia Laboratory Wuhan430072 China Beijing Jiaotong University Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education School of Computer and Information Technology Beijing100044 China
Federated Learning (FL) is typically deployed in a client-server architecture, which makes the Edge-Cloud architecture an ideal backbone for FL. A significant challenge in this setup arises from the diverse data ... 详细信息
来源: 评论
A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy fusion memetic algorithm
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2025年 第3期26卷 415-426页
作者: Mengyu ZHANG Zhenxue HE Yijin WANG Xiaojun ZHAO Xiaodan ZHANG Limin XIAO Xiang WANG Intelligent Agricultural Equipment Research Institute Hebei Agricultural UniversityBaoding 071001China Key Laboratory of Agricultural Big Data of Hebei Province Hebei Agricultural UniversityBaoding 071001China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Electronic Information Engineering Beihang UniversityBeijing 100191China
The power optimization of mixed polarity Reed–Muller(MPRM)logic circuits is a classic combinatorial optimization *** optimization approaches often suffer from slow convergence and a propensity to converge to local op... 详细信息
来源: 评论