咨询与建议

限定检索结果

文献类型

  • 2,566 篇 期刊文献
  • 2,448 篇 会议
  • 4 册 图书

馆藏范围

  • 5,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,348 篇 工学
    • 2,566 篇 计算机科学与技术...
    • 2,157 篇 软件工程
    • 825 篇 信息与通信工程
    • 558 篇 生物工程
    • 396 篇 控制科学与工程
    • 376 篇 电气工程
    • 312 篇 生物医学工程(可授...
    • 264 篇 光学工程
    • 254 篇 电子科学与技术(可...
    • 193 篇 机械工程
    • 189 篇 化学工程与技术
    • 103 篇 动力工程及工程热...
    • 98 篇 仪器科学与技术
    • 94 篇 建筑学
    • 92 篇 安全科学与工程
    • 91 篇 网络空间安全
    • 86 篇 土木工程
  • 1,811 篇 理学
    • 1,006 篇 数学
    • 606 篇 生物学
    • 372 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 211 篇 化学
    • 151 篇 系统科学
  • 899 篇 管理学
    • 493 篇 管理科学与工程(可...
    • 451 篇 图书情报与档案管...
    • 190 篇 工商管理
  • 230 篇 医学
    • 196 篇 临床医学
    • 171 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 149 篇 法学
    • 116 篇 社会学
  • 76 篇 经济学
  • 54 篇 农学
  • 52 篇 教育学
  • 14 篇 文学
  • 13 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 189 篇 semantics
  • 175 篇 feature extracti...
  • 154 篇 training
  • 150 篇 deep learning
  • 119 篇 computational mo...
  • 89 篇 data models
  • 85 篇 accuracy
  • 81 篇 machine learning
  • 76 篇 data mining
  • 75 篇 graph neural net...
  • 74 篇 predictive model...
  • 72 篇 task analysis
  • 68 篇 convolution
  • 59 篇 contrastive lear...
  • 59 篇 visualization
  • 57 篇 optimization
  • 56 篇 image segmentati...
  • 55 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 adaptation model...

机构

  • 108 篇 school of comput...
  • 106 篇 shenzhen researc...
  • 102 篇 national enginee...
  • 95 篇 school of comput...
  • 89 篇 school of comput...
  • 88 篇 school of big da...
  • 87 篇 guangdong key la...
  • 87 篇 department of el...
  • 76 篇 school of scienc...
  • 74 篇 beijing advanced...
  • 72 篇 school of big da...
  • 71 篇 school of comput...
  • 67 篇 peng cheng labor...
  • 67 篇 school of comput...
  • 62 篇 school of comput...
  • 59 篇 school of data a...
  • 57 篇 school of comput...
  • 53 篇 state key labora...
  • 51 篇 the department o...
  • 48 篇 national enginee...

作者

  • 112 篇 hai jin
  • 101 篇 zhang rui
  • 88 篇 jin hai
  • 48 篇 chen enhong
  • 47 篇 xia yong
  • 45 篇 li haizhou
  • 43 篇 liu qi
  • 42 篇 zhu lipeng
  • 39 篇 liu jun
  • 39 篇 zhang yanning
  • 35 篇 zhou pan
  • 33 篇 yin jian
  • 32 篇 wang meng
  • 32 篇 xu xiaolong
  • 30 篇 liu yang
  • 30 篇 xiaofei liao
  • 29 篇 peng hao
  • 27 篇 qi liu
  • 27 篇 shen linlin
  • 26 篇 li jianxin

语言

  • 4,596 篇 英文
  • 387 篇 其他
  • 44 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer and Big Data Science"
5018 条 记 录,以下是121-130 订阅
排序:
A High-Quality Adaptive Video Reconstruction Optimization Method Based on Compressed Sensing
收藏 引用
computer Modeling in Engineering & sciences 2023年 第10期137卷 363-383页
作者: Yanjun Zhang Yongqiang He Jingbo Zhang Yaru Zhao Zhihua Cui Wensheng Zhang School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan030024China Department of Big Data and Intelligent Engineering Shanxi Institute of TechnologyYangquan045000China School of Computer Science Beijing University of TechnologyBeijing100124China The Institute of Automation Chinese Academy of Sciences(CAS)Beijing100049China
The video compression sensing method based onmulti hypothesis has attracted extensive attention in the research of video codec with limited ***,the formation of high-quality prediction blocks in the multi hypothesis p... 详细信息
来源: 评论
Media Power Measuring via Emotional Contagion
收藏 引用
Journal of Social Computing 2024年 第1期5卷 15-35页
作者: Xue Lin Hong Huang Zongya Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China School of Journalism Huazhong University of Science and TechnologyWuhan 430074China
Media power,the impact that media have on public opinion and perspectives,plays a significant role in maintaining internal stability,exerting external influence,and shaping international dynamics for nations/***,prior... 详细信息
来源: 评论
Sketch2Human: Deep Human Generation with Disentangled Geometry and Appearance Constraints
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2024年 PP卷 1-14页
作者: Qu, Linzi Shang, Jiaxiang Ye, Hui Han, Xiaoguang Fu, Hongbo School of Creative Media City University of Hong Kong Hong Kong Department of Computer Science & Engineering HKUST Hong Kong Shenzhen Research Institute of Big Data Chinese University of Hong Kong Shenzhen China
Geometry- and appearance-controlled full-body human image generation is an interesting but challenging task. Existing solutions are either unconditional or dependent on coarse conditions (e.g., pose, text), thus lacki... 详细信息
来源: 评论
The most tenuous group query
收藏 引用
Frontiers of computer science 2023年 第2期17卷 197-208页
作者: Na LI Huaijie ZHU Wenhao LU Ningning CUI Wei LIU Jian YIN Jianliang XU Wang-Chien LEE School of Computer Science and Engineering Sun Yat-Sen UniversityGuangzhou 510006China Laboratory of Big Data Analysis and Processing Guangzhou 510006China School of Artificial Intelligence Sun Yat-Sen UniversityGuangzhou 510006China Department of Computer Science Anhui UniversityHefei 230601China Department of Computer Science Hong Kong Baptist UniversityHong Kong 999077China Department of Computer Science The Pennsylvania State UniversityState College 19019USA
Rtecently a lot of works have been investigating to find the tenuous groups,i.e.,groups with few social interactions and weak relationships among members,for reviewer selection and psycho-educational group ***,the met... 详细信息
来源: 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 评论
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph data in Cloud Computing  17th
Privacy Preserving Adjacency Query Supporting Homoionym Sear...
收藏 引用
17th International Conference on Cloud Computing, CLOUD 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Li, Hourong Tian, Yun Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China
Cloud computing is widely used in all walks of life today. Massive amounts of medical graph data are being outsourced to cloud servers to reduce overhead. The untrustworthiness of cloud servers puts the sensitive info... 详细信息
来源: 评论
Lay CO:Achieving Least Lossy Accuracy for Most Efficient RRAM-Based Deep Neural Network Accelerator via Layer-Centric Co-Optimization
收藏 引用
计算机科学技术学报(英文版) 2023年 第2期38卷 328-347页
作者: Shao-Feng Zhao Fang Wang Bo Liu Dan Feng Yang Liu Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cloud Computing and Big Data Institute Henan University of Economics and LawZhengzhou 450001China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Research Institute of Huazhong University of Science and Technology in Shenzhen Shenzhen 518057China School of Computer and Artificial Intelligence Zhengzhou UniversityZhengzhou 450001China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cloud Computing and Big Data Institute Henan University of Economics and LawZhengzhou 450001China
Resistive random access memory(RRAM)enables the functionality of operating massively parallel dot prod-ucts and ***-based accelerator is such an effective approach to bridging the gap between Internet of Things device... 详细信息
来源: 评论
Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2412-2426页
作者: Xia, Na Chen, Lei Li, Meng Yin, Yutao Zhang, Ke Ministry of Education School of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China State Grid Electric Power Research Institute Co. Ltd Hefei230088 China
In wireless networks, utilizing sniffers for fault analysis, traffic traceback, and resource optimization is a crucial task. However, existing centralized algorithms cannot be applied to high-density wireless networks... 详细信息
来源: 评论
Phishing Detection Model Integrating URL Characters and HTML Word Semantic Deep Features  4
Phishing Detection Model Integrating URL Characters and HTML...
收藏 引用
4th International Conference on Communication Technology and Information Technology, ICCTIT 2024
作者: Meng, Lihui Ma, Zhujuan Zhu, Erzhou Anhui University School of Computer Science and Technology Hefei230601 China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei230088 China
Deep learning methods, known for their powerful feature learning and classification capabilities, are widely used in phishing detection. To improve accuracy, this study proposes DPMLF (Deep Learning Phishing Detection... 详细信息
来源: 评论
A Deep Phishing Email Detection Model Combing Multi-Features Based on Word Frequency and Contextual Semantics  4
A Deep Phishing Email Detection Model Combing Multi-Features...
收藏 引用
4th International Conference on Communication Technology and Information Technology, ICCTIT 2024
作者: Liu, Yuntian Zhu, Erzhou Ma, Zhujuan Anhui University School of Computer Science and Technology Hefei230601 China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei230088 China
Due to the ability to automatically extract phishing features without relying on expert knowledge, deep learning methods have been widely applied in the research of phishing email classification and detection. However... 详细信息
来源: 评论