咨询与建议

限定检索结果

文献类型

  • 2,662 篇 期刊文献
  • 1,501 篇 会议
  • 3 册 图书

馆藏范围

  • 4,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,564 篇 工学
    • 1,712 篇 计算机科学与技术...
    • 1,388 篇 软件工程
    • 594 篇 信息与通信工程
    • 381 篇 生物工程
    • 355 篇 电气工程
    • 295 篇 生物医学工程(可授...
    • 294 篇 控制科学与工程
    • 284 篇 电子科学与技术(可...
    • 237 篇 光学工程
    • 189 篇 化学工程与技术
    • 140 篇 机械工程
    • 97 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 70 篇 建筑学
    • 66 篇 安全科学与工程
    • 61 篇 材料科学与工程(可...
  • 1,809 篇 理学
    • 728 篇 数学
    • 695 篇 物理学
    • 477 篇 生物学
    • 276 篇 统计学(可授理学、...
    • 228 篇 化学
    • 120 篇 系统科学
  • 600 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 313 篇 医学
    • 255 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 94 篇 公共卫生与预防医...
  • 105 篇 法学
    • 84 篇 社会学
  • 79 篇 农学
  • 59 篇 经济学
  • 32 篇 教育学
  • 11 篇 文学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 108 篇 deep learning
  • 101 篇 semantics
  • 92 篇 feature extracti...
  • 90 篇 training
  • 74 篇 hadrons
  • 71 篇 machine learning
  • 69 篇 computational mo...
  • 68 篇 data models
  • 56 篇 accuracy
  • 50 篇 hadron colliders
  • 49 篇 predictive model...
  • 46 篇 graph neural net...
  • 46 篇 hadronic decays
  • 44 篇 federated learni...
  • 40 篇 image segmentati...
  • 40 篇 optimization
  • 40 篇 data mining
  • 38 篇 bottom mesons
  • 36 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 391 篇 cavendish labora...
  • 390 篇 school of physic...
  • 379 篇 university of ch...
  • 376 篇 yandex school of...
  • 360 篇 department of ph...
  • 353 篇 imperial college...
  • 343 篇 stfc rutherford ...
  • 339 篇 center for high ...
  • 335 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 293 篇 physik-institut ...
  • 293 篇 oliver lodge lab...
  • 292 篇 school of physic...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 220 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 214 篇 amato s.
  • 212 篇 boettcher t.
  • 210 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 205 篇 braun s.
  • 202 篇 borisyak m.
  • 199 篇 bizzeti a.
  • 192 篇 bencivenni g.
  • 183 篇 back j.j.
  • 179 篇 bay a.
  • 172 篇 bjørn m.

语言

  • 3,763 篇 英文
  • 345 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4166 条 记 录,以下是41-50 订阅
排序:
Media Power Measuring via Emotional Contagion
收藏 引用
Journal of Social Computing 2024年 第1期5卷 15-35页
作者: Xue Lin Hong Huang Zongya Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China School of Journalism Huazhong University of Science and TechnologyWuhan 430074China
Media power,the impact that media have on public opinion and perspectives,plays a significant role in maintaining internal stability,exerting external influence,and shaping international dynamics for nations/***,prior... 详细信息
来源: 评论
Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2412-2426页
作者: Xia, Na Chen, Lei Li, Meng Yin, Yutao Zhang, Ke Ministry of Education School of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China State Grid Electric Power Research Institute Co. Ltd Hefei230088 China
In wireless networks, utilizing sniffers for fault analysis, traffic traceback, and resource optimization is a crucial task. However, existing centralized algorithms cannot be applied to high-density wireless networks... 详细信息
来源: 评论
PKEST: Public-Key Encryption With Similarity Test for Medical Consortia Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 680-693页
作者: Chen, Junsong Zeng, Shengke Han, Song Yin, Jin Chen, Peng Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China Sichuan University West China Biomedical Big Data Center West China Hospital Chengdu610041 China
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo... 详细信息
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection System With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论
Visual abstraction of dynamic network via improved multi-class blue noise sampling
收藏 引用
Frontiers of computer science 2023年 第1期17卷 171-185页
作者: Yanni PENG Xiaoping FAN Rong CHEN Ziyao YU Shi LIU Yunpeng CHEN Ying ZHAO Fangfang ZHOU School of Computer Science and Engineering Central South UniversityChangsha 410083China Institute of Big Data Hunan University of Finance and EconomicsChangsha 410205China Rail Data Research and Application Key Laboratory of Hunan Province Changsha 410083China
Massive sequence view (MSV) is a classic timeline-based dynamic network visualization approach. However, it is vulnerable to visual clutter caused by overlapping edges, thereby leading to unexpected misunderstanding o... 详细信息
来源: 评论
Abnormal Clustering and Cross Slicing Transformer for Insect Fine-Grained Image Classification  2
Abnormal Clustering and Cross Slicing Transformer for Insect...
收藏 引用
2nd International Conference on Algorithm, Image Processing and Machine Vision, AIPMV 2024
作者: Mei, Aokun Huo, Hua Big Data and Computing Intelligence Engineering Technology Research Center School of Information Engineering Henan University of Science and Technology Big Data Analysis Laboratory of Henan Medical Luoyang471023 China
Insect fine-grained image classification is an application scenario in fine-grained image classification. It not only has the characteristics of small inter-class differences and large intra-class differences, but als... 详细信息
来源: 评论
Efect of Pre‑stretch Strain at High Temperatures on the Formability of AZ31 Magnesium Alloy Sheets
收藏 引用
Acta Metallurgica Sinica(English Letters) 2023年 第1期36卷 48-60页
作者: Yongqiao Li Lifei Wang Xiaohuan Pan Qiang Zhang Guangsheng Huang Bin Xing Weili Cheng Hongxia Wang Kwang Seon Shin College of Materials Science and Engineering Taiyuan University of TechnologyTaiyuan 030024China Chongqing Innovation Center of Industrial Big-Data Co.Ltd. National Engineering Laboratory for Industrial Big-Data Application TechnologyChongqing 400707China School of Materials Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China National Engineering Research Center for Magnesium Alloys Chongqing UniversityChongqing 400044China Magnesium Technology Innovation Center School of Materials Science and EngineeringSeoul National UniversitySeoul 881416Republic of Korea
High-temperature pre-stretching experiments were carried out on the AZ31 Mg alloy at 723 K with strain levels of 2.54%,6.48%,10.92%,and 19.2%to alter the microstructure and texture for improving room-temperature *** r... 详细信息
来源: 评论
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
UCat: heterogeneous memory management for unikernels
收藏 引用
Frontiers of computer science 2023年 第1期17卷 51-61页
作者: Chong TIAN Haikun LIU Xiaofei LIAO Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing LabSchool of Computing Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Unikernels provide an efficient and lightweight way to deploy cloud computing services in application-specialized and single-address-space virtual machines (VMs). They can efficiently deploy hundreds of unikernel-base... 详细信息
来源: 评论
Internet of Brain, Thought, Thinking, and Creation
收藏 引用
Chinese Journal of Electronics 2022年 第6期31卷 1025-1042页
作者: ZHANG Zhimin YIN Rui NING Huansheng School of Computer and Communication Engineering University of Science and Technology Beijing Beijing Engineering Research Center for Cyberspace Data Analysis and Applications
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and... 详细信息
来源: 评论