咨询与建议

限定检索结果

文献类型

  • 2,667 篇 期刊文献
  • 1,526 篇 会议
  • 3 册 图书

馆藏范围

  • 4,196 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,547 篇 工学
    • 1,693 篇 计算机科学与技术...
    • 1,379 篇 软件工程
    • 595 篇 信息与通信工程
    • 377 篇 生物工程
    • 363 篇 电气工程
    • 295 篇 生物医学工程(可授...
    • 286 篇 控制科学与工程
    • 278 篇 电子科学与技术(可...
    • 242 篇 光学工程
    • 185 篇 化学工程与技术
    • 139 篇 机械工程
    • 100 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 74 篇 建筑学
    • 67 篇 安全科学与工程
    • 65 篇 土木工程
  • 1,805 篇 理学
    • 722 篇 数学
    • 693 篇 物理学
    • 476 篇 生物学
    • 274 篇 统计学(可授理学、...
    • 226 篇 化学
    • 118 篇 系统科学
  • 600 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 313 篇 医学
    • 256 篇 临床医学
    • 182 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 107 篇 法学
    • 86 篇 社会学
  • 82 篇 农学
  • 59 篇 经济学
  • 34 篇 教育学
  • 11 篇 艺术学
  • 10 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 109 篇 deep learning
  • 106 篇 semantics
  • 99 篇 feature extracti...
  • 95 篇 training
  • 75 篇 computational mo...
  • 74 篇 hadrons
  • 73 篇 machine learning
  • 71 篇 data models
  • 65 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 data mining
  • 46 篇 hadronic decays
  • 42 篇 optimization
  • 42 篇 graph neural net...
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 425 篇 department of ph...
  • 411 篇 horia hulubei na...
  • 405 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 392 篇 school of physic...
  • 389 篇 cavendish labora...
  • 379 篇 university of ch...
  • 378 篇 yandex school of...
  • 362 篇 department of ph...
  • 352 篇 imperial college...
  • 341 篇 stfc rutherford ...
  • 339 篇 center for high ...
  • 334 篇 institute of par...
  • 312 篇 henryk niewodnic...
  • 299 篇 nikhef national ...
  • 290 篇 physik-institut ...
  • 289 篇 school of physic...
  • 289 篇 oliver lodge lab...
  • 285 篇 school of physic...

作者

  • 250 篇 barter w.
  • 247 篇 bellee v.
  • 240 篇 beiter a.
  • 223 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 215 篇 amato s.
  • 212 篇 boettcher t.
  • 211 篇 baryshnikov f.
  • 208 篇 brundu d.
  • 208 篇 braun s.
  • 204 篇 borisyak m.
  • 200 篇 bizzeti a.
  • 191 篇 bencivenni g.
  • 184 篇 back j.j.
  • 179 篇 bay a.
  • 173 篇 bjørn m.

语言

  • 3,297 篇 英文
  • 848 篇 其他
  • 68 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4196 条 记 录,以下是721-730 订阅
排序:
Global Feature Enhancing and Fusion Framework for Strain Gauge Status Recognition  25
Global Feature Enhancing and Fusion Framework for Strain Gau...
收藏 引用
Companion Proceedings of the ACM on Web Conference 2025
作者: Xu Zhang Peng Wang Chen Wang Zhe Xu Xiaohua Nie Wei Wang Shanghai Key Laboratory of Data Science School of Computer Science and Technology Fudan University Shang Hai China Shanghai Key Laboratory of Data Science School of Computer Science and Technology Fudan University Shanghai China National Engineering Research Center for Big Data Software Tsinghua University Beijing China School of Software Tsinghua University Beijing China National Key Laboratory of Strength and Structural Integrity Aircraft Strength Research Institute of China Xi'an Shaanxi China
Strain Gauge Status (SGS) recognition is crucial in the field of intelligent manufacturing based on the Internet of Things, as accurate identification helps timely detection of failed mechanical components, avoiding a... 详细信息
来源: 评论
Provenance Based Intrusion Detection via Measuring Provenance Sequence Similarity
Provenance Based Intrusion Detection via Measuring Provenanc...
收藏 引用
2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022
作者: Wu, Lin Xie, Y.L. Wu, Yafeng Liang, Jinyuan Li, Xuan School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Wuhan China Nsfocus Inc. A9-3/F Optical Valley Software Park Wuhan China
Malicious intrusion presents normalization and diversification in the current environment. Attackers often evade detection by changing the execution order of programs or adding many confusing operations. Aiming at the... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
Exploration and Practice of Civic Teaching in Cybersecurity Technology Specialized Courses under the Background of big data
收藏 引用
Applied Mathematics and Nonlinear sciences 2024年 第1期9卷
作者: Yu, Kun School of Computer Engineering Jingchu University of Technology Hubei Jingmen448000 China Jingmen Cryptometry Application Technology Research Center Hubei Jingmen448000 China Big Data Research Center Jingchu University of Technology Hubei Jingmen448000 China
In recent years, curriculum Civics has begun to be widely used in higher education programs, providing new ideas and inspiration for the development and reform of higher education. The study integrates Civic Politics ... 详细信息
来源: 评论
DivLog: Log Parsing with Prompt Enhanced In-Context Learning
DivLog: Log Parsing with Prompt Enhanced In-Context Learning
收藏 引用
International Conference on Software engineering (ICSE)
作者: Junjielong Xu Ruichun Yang Yintong Huo Chengyu Zhang Pinjia He School of Data Science The Chinese University of Hong Kong Shenzhen China Dept. of Computer Science & Engineering The Chinese University of Hong Kong China ETH Zurich Switzerland Shenzhen Research Institute of Big Data China
Log parsing, which involves log template extraction from semi-structured logs to produce structured logs, is the first and the most critical step in automated log analysis. However, current log parsers suffer from lim... 详细信息
来源: 评论
Mining User–Item Interactions via Knowledge Graph for Recommendation
收藏 引用
ACM Transactions on Recommender Systems 2025年 第3期3卷 1-19页
作者: Shenghao Liu Lingyun Lu Bang Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology (HUST) Wuhan China
Introducing a Knowledge Graph (KG) to facilitate a recommender system has become a tendency in recent years. Many existing methods leverage KGs to obtain side information of items to promote item representation learni... 详细信息
来源: 评论
Personalized Local Differential Privacy for Multi-dimensional Range Queries over Mobile User data
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: He, Yuanyuan Wang, Meiqi Deng, Xianjun Yang, Peng Xue, Qiao Yang, Laurence T. Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan430074 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210000 China
Multi-dimensional range queries performed on the mobile user data records become increasingly important and popular in the fields of e-commerce, social media, transportation logistics, etc. Meanwhile, mobile users usu... 详细信息
来源: 评论
research of mask wearing detection method using Improved YOLO network
Research of mask wearing detection method using Improved YOL...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Fei Xiao Zixi Liu Shengbin Zhao Shuai Yuan School of Computer Science and Engineering Shenyang Jianzhu University Shenyang China Daqing Oilfield Limited Company DaQing China School of Computer Science and Engineering Shenyang Jianzhu University Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang China
Mask wearing detection technology is a practical and research-oriented area within object detection. Due to the complexity of mask wearing detection scenarios, issues such as small target detection and low image clari... 详细信息
来源: 评论
Passenger Waiting Time Prediction Based on Density Spatiotemporal Clustering and Time Series Feature Processing  6
Passenger Waiting Time Prediction Based on Density Spatiotem...
收藏 引用
6th International Conference on Electronic engineering and Informatics, EEI 2024
作者: Huang, Ruixi Xia, Dawen Geng, Jian Zhang, Wenyong Hu, Yang Li, Yantao Li, Huaqing College of Data Science and Information Engineering Guizhou Minzu University Guiyang550025 China Engineering Research Center of Micro-nano and Intelligent Manufacturing Ministry of Education Kaili University Kaili556011 China College of Big Data Engineering College of Microelectronics and Artificial Intelligence Kaili University Kaili556011 China Party School of the Anshun Municipal Committee of C.P.C Anshun561000 China Guizhou Traffic Technician and Transportation College Department of Automotive Engineering Guiyang550008 China College of Computer Science Chongqing University Chongqing400044 China College of Electronic and Information Engineering Southwest University Chongqing400715 China
Accurate passenger waiting time prediction addresses the taxi supply-demand imbalance in Intelligent Transport Systems (ITS). To capture the dependencies of passenger waiting time on urban taxi distribution, we propos... 详细信息
来源: 评论