咨询与建议

限定检索结果

文献类型

  • 2,667 篇 期刊文献
  • 1,526 篇 会议
  • 3 册 图书

馆藏范围

  • 4,196 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,547 篇 工学
    • 1,693 篇 计算机科学与技术...
    • 1,379 篇 软件工程
    • 595 篇 信息与通信工程
    • 377 篇 生物工程
    • 363 篇 电气工程
    • 295 篇 生物医学工程(可授...
    • 286 篇 控制科学与工程
    • 278 篇 电子科学与技术(可...
    • 242 篇 光学工程
    • 185 篇 化学工程与技术
    • 139 篇 机械工程
    • 100 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 74 篇 建筑学
    • 67 篇 安全科学与工程
    • 65 篇 土木工程
  • 1,805 篇 理学
    • 722 篇 数学
    • 693 篇 物理学
    • 476 篇 生物学
    • 274 篇 统计学(可授理学、...
    • 226 篇 化学
    • 118 篇 系统科学
  • 600 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 313 篇 医学
    • 256 篇 临床医学
    • 182 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
    • 93 篇 公共卫生与预防医...
  • 107 篇 法学
    • 86 篇 社会学
  • 82 篇 农学
  • 59 篇 经济学
  • 34 篇 教育学
  • 11 篇 艺术学
  • 10 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 109 篇 deep learning
  • 106 篇 semantics
  • 99 篇 feature extracti...
  • 95 篇 training
  • 75 篇 computational mo...
  • 74 篇 hadrons
  • 73 篇 machine learning
  • 71 篇 data models
  • 65 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 data mining
  • 46 篇 hadronic decays
  • 42 篇 optimization
  • 42 篇 graph neural net...
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 425 篇 department of ph...
  • 411 篇 horia hulubei na...
  • 405 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 392 篇 school of physic...
  • 389 篇 cavendish labora...
  • 379 篇 university of ch...
  • 378 篇 yandex school of...
  • 362 篇 department of ph...
  • 352 篇 imperial college...
  • 341 篇 stfc rutherford ...
  • 339 篇 center for high ...
  • 334 篇 institute of par...
  • 312 篇 henryk niewodnic...
  • 299 篇 nikhef national ...
  • 290 篇 physik-institut ...
  • 289 篇 school of physic...
  • 289 篇 oliver lodge lab...
  • 285 篇 school of physic...

作者

  • 250 篇 barter w.
  • 247 篇 bellee v.
  • 240 篇 beiter a.
  • 223 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 215 篇 amato s.
  • 212 篇 boettcher t.
  • 211 篇 baryshnikov f.
  • 208 篇 brundu d.
  • 208 篇 braun s.
  • 204 篇 borisyak m.
  • 200 篇 bizzeti a.
  • 191 篇 bencivenni g.
  • 184 篇 back j.j.
  • 179 篇 bay a.
  • 173 篇 bjørn m.

语言

  • 3,297 篇 英文
  • 848 篇 其他
  • 68 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4196 条 记 录,以下是731-740 订阅
排序:
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Jiaqi Zhai Xuanhua Shi Kaiyi Huang Chencheng Ye Weifang Hu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
Artificial Intelligence and Intelligent Manufacturing (AIIM), International Symposium on
作者: Jincheng Zhou Yue Li Yujie Shen Dan Tang Hongliang Cai Jing Gong Ningchao Bai School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
Robust Federated Learning in Unreliable Wireless Networks: A Client Selection Approach
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yanmeng Ji, Wenkai Zhou, Jian Xiao, Fu Chang, Tsung-Hui School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Science and Engineering The Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China
Federated learning (FL) has emerged as a promising distributed learning paradigm for training deep neural networks (DNNs) at the wireless edge, but its performance can be severely hindered by unreliable wireless trans... 详细信息
来源: 评论
Lightweight Transformer Network and Self-supervised Task for Kinship Verification  8
Lightweight Transformer Network and Self-supervised Task for...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Zhu, Xiaoke Li, Yunwei Li, Danyang Dong, Lingyun Chen, Xiaopan School of Computer and Information Engineering Henan University Kaifeng China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University China
Kinship verification is one of the interesting and critical problems in computer vision research, with significant progress in the past decades. Meanwhile, Vision Transformer (VIT) has recently achieved impressive suc... 详细信息
来源: 评论
Large Language Model Supply Chain: A research Agenda
收藏 引用
ACM Transactions on Software engineering and Methodology 2025年 第5期34卷
作者: Wang, Shenao Zhao, Yanjie Hou, Xinyi Wang, Haoyu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
The rapid advancement of large language models (LLMs) has revolutionized artificial intelligence, introducing unprecedented capabilities in natural language processing and multimodal content generation. However, the i... 详细信息
来源: 评论
Hard-Label Black-Box Attacks on 3D Point Clouds
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Tao, Yunbo Zhou, Pan Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the maturity of depth sensors in various 3D safety-critical applications, 3D point cloud models have been shown to be vulnerable to adversarial attacks. Almost all existing 3D attackers simply follow the white-bo... 详细信息
来源: 评论
Semi-supervised Segmentation and Quantization Algorithm for Infarct Size Measurement of Rat Heart Sections  8
Semi-supervised Segmentation and Quantization Algorithm for ...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Zhu, Xiaoke Cai, Yulong Chen, Xiaopan Hu, Qi Dong, Lingyun Yuan, Caihong School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University China
Segmentation of rat heart section images and infarct area quantization are essential components of infarct size measurement in processing data from animal experiments on ischemic heart disease. Previously, the task of... 详细信息
来源: 评论
How graph neural networks learn: lessons from training dynamics  24
How graph neural networks learn: lessons from training dynam...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Chenxiao Yang Qitian Wu David Wipf Ruoyu Sun Junchi Yan School of Artificial Intelligence & Department of Computer Science and Engineering & MoE Lab of AI Shanghai Jiao Tong University Amazon Web Services School of Data Science The Chinese University of Hong Kong Shenzhen and Shenzhen International Center for Industrial and Applied Mathematics Shenzhen Research Institute of Big Data
A long-standing goal in deep learning has been to characterize the learning behavior of black-box models in a more interpretable manner. For graph neural networks (GNNs), considerable advances have been made in formal...
来源: 评论
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device Identification
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device...
收藏 引用
International Workshop on Quality of Service
作者: Kangli Niu Shenghao Liu Lingzhi Yi Xianjun Deng Suning Chen Laurence T. Yang Minmin Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Safety Engineering Zhongnan University of Economics and Law
In order to resist network attacks on IoT devices, identifying IoT devices is the first step for ensuring device security. The traditional passive method identifies IoT devices by mining the potential relationship bet... 详细信息
来源: 评论
Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
收藏 引用
Frontiers of Information Technology & Electronic engineering 2024年 第10期25卷 1353-1369页
作者: Yongning GUO Guodong SU Zhiqiang YAO Wang ZHOU School of Big Data and Artificial Intlligence Fujian Polytechnic Normal UniversityFuzhou 350300China College of Mathematics and Informatics Fujian Normal UniversityFuzhou 350117China Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion(Fujian Polytechnic Normal University) FujianProvinceUniversityFuzhou350300China School of Computer and Sofiware Engineering Xihua UniversityChengdu 610039China
Joint Photographic Experts Group(JPEG)format is extensively used for images in many practical applications due to its excellent compression ratio and satisfactory image *** compelling concerns about the invasion of pr... 详细信息
来源: 评论