咨询与建议

限定检索结果

文献类型

  • 2,545 篇 期刊文献
  • 2,356 篇 会议
  • 4 册 图书

馆藏范围

  • 4,905 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,249 篇 工学
    • 2,481 篇 计算机科学与技术...
    • 2,108 篇 软件工程
    • 790 篇 信息与通信工程
    • 557 篇 生物工程
    • 376 篇 电气工程
    • 353 篇 控制科学与工程
    • 309 篇 生物医学工程(可授...
    • 266 篇 光学工程
    • 244 篇 电子科学与技术(可...
    • 193 篇 机械工程
    • 187 篇 化学工程与技术
    • 103 篇 动力工程及工程热...
    • 97 篇 仪器科学与技术
    • 91 篇 安全科学与工程
    • 89 篇 建筑学
    • 87 篇 网络空间安全
    • 81 篇 土木工程
  • 1,805 篇 理学
    • 1,000 篇 数学
    • 604 篇 生物学
    • 378 篇 物理学
    • 344 篇 统计学(可授理学、...
    • 211 篇 化学
    • 151 篇 系统科学
  • 897 篇 管理学
    • 493 篇 管理科学与工程(可...
    • 451 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 231 篇 医学
    • 193 篇 临床医学
    • 171 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 145 篇 法学
    • 114 篇 社会学
  • 76 篇 经济学
  • 53 篇 农学
  • 50 篇 教育学
  • 15 篇 文学
  • 13 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 190 篇 semantics
  • 175 篇 feature extracti...
  • 155 篇 training
  • 144 篇 deep learning
  • 120 篇 computational mo...
  • 88 篇 data models
  • 87 篇 accuracy
  • 81 篇 machine learning
  • 78 篇 data mining
  • 76 篇 predictive model...
  • 74 篇 graph neural net...
  • 71 篇 task analysis
  • 67 篇 convolution
  • 58 篇 visualization
  • 54 篇 optimization
  • 53 篇 neural networks
  • 52 篇 conferences
  • 52 篇 image segmentati...
  • 52 篇 forecasting
  • 51 篇 contrastive lear...

机构

  • 109 篇 school of comput...
  • 107 篇 shenzhen researc...
  • 105 篇 national enginee...
  • 96 篇 school of comput...
  • 85 篇 school of big da...
  • 85 篇 school of comput...
  • 84 篇 guangdong key la...
  • 84 篇 department of el...
  • 75 篇 beijing advanced...
  • 72 篇 school of scienc...
  • 70 篇 school of big da...
  • 69 篇 school of comput...
  • 66 篇 peng cheng labor...
  • 66 篇 school of comput...
  • 59 篇 school of data a...
  • 57 篇 school of comput...
  • 53 篇 school of comput...
  • 51 篇 the department o...
  • 49 篇 state key labora...
  • 47 篇 gaoling school o...

作者

  • 112 篇 hai jin
  • 99 篇 jin hai
  • 97 篇 zhang rui
  • 47 篇 chen enhong
  • 47 篇 li haizhou
  • 47 篇 xia yong
  • 43 篇 liu qi
  • 39 篇 zhang yanning
  • 38 篇 zhu lipeng
  • 35 篇 liu jun
  • 35 篇 zhou pan
  • 34 篇 yin jian
  • 33 篇 xu xiaolong
  • 32 篇 wang meng
  • 30 篇 xiaofei liao
  • 29 篇 peng hao
  • 29 篇 liu yang
  • 27 篇 qi liu
  • 25 篇 li jianxin
  • 25 篇 shen linlin

语言

  • 4,630 篇 英文
  • 244 篇 其他
  • 40 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=School of Computer and Big Data Science"
4905 条 记 录,以下是91-100 订阅
排序:
A Universal Low-Dimensional Subspace Structure in Beamforming Design: Theory and Applications
收藏 引用
IEEE Transactions on Signal Processing 2025年
作者: Zhao, Xiaotong Shi, Qingjiang Tongji University School of Computer Science and Technology Shanghai201804 China Shenzhen Research Institute of Big Data Shenzhen518172 China
Beamforming design plays a crucial role in multi-antenna systems, with numerous methods proposed to optimize key performance metrics such as spectral efficiency and power consumption. However, these methods often face... 详细信息
来源: 评论
Improving hierarchical graph pooling with information bottleneck
收藏 引用
Journal of King Saud University - computer and Information sciences 2025年 第3期37卷 1-15页
作者: Long, Jun Wang, Zidong Chen, Tingxuan Yang, Liu Big Data Institute Central South University Changsha 410083 China School of Computer Science and Engineering Central South University Changsha 410083 China
Hierarchical graph pooling has received significant attention in recent years due to its capability to capture hierarchical structures and deliver superior performance on graph-level tasks. However, most existing meth... 详细信息
来源: 评论
FLEKE: Federated Locate-then-Edit Knowledge Editing
arXiv
收藏 引用
arXiv 2025年
作者: Zhao, Zongkai Xu, Guozeng Li, Xiuhua Wei, Kaiwen Zhong, Jiang School of Big Data & Software Engineering Chongqing University China College of Computer Science Chongqing University China
Locate-then-Edit Knowledge Editing (LEKE) is a key technique for updating large language models (LLMs) without full retraining. However, existing methods assume a single-user setting and become inefficient in real-wor... 详细信息
来源: 评论
Hierarchical Optimization for Cross-Regional Planning and Scheduling of Hydrogen Energy Storage Systems Considering Uncertainty
Hierarchical Optimization for Cross-Regional Planning and Sc...
收藏 引用
International Conference of Electrical, Electronic and Networked Energy Systems, EENES 2024
作者: Tang, Zihang Wang, Yingxiao Liu, Yuqian Wu, Jianghua School of Computer Science and Technology Xi’an Jiaotong University Xi’an 710049 China Department of Mathematics Nanjing University Nanjing210023 China Shenzhen Research Institute of Big Data the Chinese University of Hong Kong-Shenzhen Guangdong Shenzhen518172 China
Cross-regional Hydrogen Energy Storage System (HESS) effectively addresses the uneven spatial and temporal distribution of renewable energy sources by facilitating energy storage, transfer, and scheduling across regio... 详细信息
来源: 评论
Image manipulation localization via semantic-guided feature enhancement and deep multi-scale edge supervision
收藏 引用
Neurocomputing 2025年 639卷
作者: Wang, Haichou Cheng, Hang Chen, Yun Xu, Yongliang Wang, Meiqing School of Mathematics and Statistics Fuzhou University Fuzhou350108 China College of Computer Science and Big Data Fuzhou University Fuzhou350108 China
With the widespread application of image editing software, image manipulation localization has become a focal point and promising research. Existing neural networks for image manipulation primarily rely on RGB and noi... 详细信息
来源: 评论
An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Tong, Jiacheng Zhao, Yilin Jin, Chongju Chen, Wei Zhang, Yiting Wu, Lifa Nanjing University of Posts and Telecommunications School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi... 详细信息
来源: 评论
DMC-Watermark: A backdoor richer watermark for dual identity verification by dynamic mask covering
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-15页
作者: Zhu, Yujia Wang, Ruoxi Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Advanced Computing Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the increasing use of neural networks, the importance of copyright protection for these models has gained significant attention. Backdoor watermarking is one of the key methods for protecting copyright. However, ... 详细信息
来源: 评论
CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy  24th
CPAKE: Dynamic Batch Authenticated Key Exchange with Condit...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xiang, Axin Tian, Youliang Xiong, Jinbo Ying, Zuobin Peng, Changgen State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guiyang550025 China Industrial School of Joint Innovation Quanzhou Vocational and Technical University Quanzhou362268 China Faculty of Data Science City University of Macau 999078 China
Authenticated key exchange (AKE) needs to be designed for realizing point-to-multipoint secure communications in blockchain networks (BNet). However, since BNet is open, untrusted and decentralized, traditional certif... 详细信息
来源: 评论
Glare-SNet: Unsupervised Glare Suppression Balance Network  27th
Glare-SNet: Unsupervised Glare Suppression Balance Network
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Pei Zuo, Chengyu Wei, Wangjuan Pan, Xiaoying Wang, Zhanhao School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an China Shaanxi Key Laboratory of Intelligent Media Computing and interaction Xi’an China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an China
In light of the problems associated with glare and halo effects in low-light images, as well as the inadequacy of existing processing algorithms in handling details, a glare suppression balance network based on unsupe... 详细信息
来源: 评论
Interference-Based Reliability and Capacity Analysis for IEEE 802.11 Broadcast Ad-Hoc Networks on the Highway  11
Interference-Based Reliability and Capacity Analysis for IEE...
收藏 引用
11th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2025
作者: Li, Zhijuan Wu, Xintong Li, Xiaokun Ma, Xiaomin Department of Computer and Big Data Heilongjiang University Harbin150080 China Postdoctoral Program of Heilongjiang Hengxun Technology Co. Ltd. Harbin150090 China School of Computer Science and Technology Harbin Institute of Technology Harbin150001 China College of Science and Engineering Oral Roberts University TulsaOK74171 United States
Interference is a critical factor that degrades wireless network performance. In IEEE 802.11 wireless broadcast networks, hidden terminals and concurrent transmissions are the primary sources of interference due to th... 详细信息
来源: 评论