咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是111-120 订阅
排序:
Syntax-enhanced pre-trained model  59
Syntax-enhanced pre-trained model
收藏 引用
Joint Conference of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL-IJCNLP 2021
作者: Xu, Zenan Guo, Daya Tang, Duyu Su, Qinliang Shou, Linjun Gong, Ming Zhong, Wanjun Quan, Xiaojun Jiang, Daxin Duan, Nan School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Microsoft Research Asia Beijing China Microsoft Search Technology Center Asia Beijing China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Key Lab. of Machine Intelligence and Advanced Computing Ministry of Education China
We study the problem of leveraging the syntactic structure of text to enhance pre-trained models such as BERT and RoBERTa. Existing methods utilize syntax of text either in the pre-training stage or in the fine-tuning... 详细信息
来源: 评论
DRL-M4MR: An Intelligent Multicast Routing Approach Based on DQN Deep Reinforcement Learning in SDN
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Chenwei Ye, Miao Xue, Xingsi Lv, Jianhui Jiang, Qiuxiang Wang, Yong School of Information and Communication Guilin University of Electronic Technology Guilin541004 China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin University of Electronic Technology Guilin541004 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China Peng Cheng Lab. Guangdong Shenzhen518038 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China
Traditional multicast routing methods have some problems in constructing a multicast tree, such as limited access to network state information, poor adaptability to dynamic and complex changes in the network, and infl... 详细信息
来源: 评论
Blockchain-Based Homomorphic Transaction Framework for Enhanced Consumer security and Business Scalab.lity
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Guo, Tao Shang, Fengjun Dai, Xiangguang Liu, Qilie Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing400065 China Chongqing Three Gorges University Key Lab. of Intelligent Info. Proc. and Contr. of Chongqing Munic. Institutions of Higher Education Chongqing Engineering Research Center of Internet of Things and Intelligent Control Technology School of Three Gorges Artificial Intelligence Chongqing400044 China Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China
Energy trading in distributed microgrids represents an effective means of enhancing the utilization of renewable energy. However, the aggregation of large-scale consumption data may encounter business scalab.lity issu... 详细信息
来源: 评论
Inconsistency Distillation For Consistency:Enhancing Multi-View Clustering via Mutual Contrastive Teacher-Student Leaning
Inconsistency Distillation For Consistency:Enhancing Multi-V...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Dunqiang Liu Shu-Juan Peng Xin Liu Lei Zhu Zhen Cui Taihao Li Dept. of Comput. Sci. & Fujian Key Lab. of Big Data Intelligence and Security Huaqiao University Xiamen China Zhejiang Lab Hangzhou China Xiamen Key Lab. of Computer Vision and Pattern Recognition Huaqiao University Xiamen China Key Lab. of Computer Vision and Machine Learning (Huaqiao University) Fujian Province University Xiamen China School of Information Sci. and Eng. Shandong Normal University Jinan China School of Computer Sci. and Eng. Nanjing University of Science and Technology Nanjing China
Multi-view clustering has attracted more attention recently since many real-world data are comprised of different representations or views. Recent multi-view clustering works mainly exploit the instance consistency to... 详细信息
来源: 评论
Hybrid malware detection approach with feedback-directed machine learning
收藏 引用
science China(information sciences) 2020年 第3期63卷 240-242页
作者: Zhetao LI Wenlin LI Fuyuan LIN Yi SUN Min YANG Yuan ZHANG Zhibo WANG Hunan Provincial Key Lab of Internet of Things and Information Security Xiangtan University The College of Information Engineering Xiangtan University Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences School of Computer Science Fudan University Shanghai Institute of Intelligent Electronics & Systems Shanghai Institute for Advanced Communication and Data Science School of Cyber Science and Engineering Wuhan University
Dear editor,In recent years, the number of mobile malware has increased at an alarming rate. According to a report from G data [1], there are approximately 9000 new Android malware instances each *** malicious applica... 详细信息
来源: 评论
Ppdrm: Privacy-Preserving Drm Training and Classification on the Cloud
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Lida Tian, Chengliang Zhang, Guoyan Li, Leibo Tian, Weizhong Zhang, Yan College of Computer Science and Technology Qingdao University Qingdao266071 China School of Cyber Science and Technology Shandong University Shandong Ji’nan250101 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong Ji’nan250101 China Shandong Institute of Blockchain Shandong Ji’nan250101 China College of Big Data and Internet Shenzhen Technology University Guangdong Shenzhen518118 China College of Electromechanical Engineering Qingdao University of Science and Technology Qingdao266061 China
The prevalence of cloud computing greatly promotes the development of artificial intelligence(AI). Accurately and efficiently classify data on the cloud is a classic AI task. The recent Discriminative Ridge Machine(DR... 详细信息
来源: 评论
An identity-based anonymous signcryption for vehicular ad hoc networks  2nd
An identity-based anonymous signcryption for vehicular ad ho...
收藏 引用
2nd International Cognitive Cities Conference, IC3 2019
作者: Lu, Yong Yang, Huijie School of Management Science and Engineering Nanjing University of Information Science and Technology Nanjing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guiyang China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China
The vehicular ad hoc networks (VANETs) can share information of vehicles’ location, speed and route within a certain range by interconnecting vehicles, roadside units (RSU) and the cloud. As people’s daily traffic t... 详细信息
来源: 评论
Efficient Adaptive lab.l Refinement for lab.l Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy lab.ls, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
HSIGene: A Foundation Model for Hyperspectral Image Generation
arXiv
收藏 引用
arXiv 2024年
作者: Pang, Li Cao, Xiangyong Tang, datao Xu, Shuang Bai, Xueru Zhou, Feng Meng, Deyu The School of Computer Science and Technology The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Mathematics and Statistics Northwestern Polytechnical University Shaanxi Xi’an710021 China The National Laboratory of Radar Signal Processing Xidian University Xi’an710071 China The Key Laboratory of Electronic Information Countermeasure and Simulation of the Education Ministry of China Xidian University Xi’an710071 China The School of Mathematics and Statistics The Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
Hyperspectral image (HSI) plays a vital role in various fields such as agriculture and environmental monitoring. However, due to the expensive acquisition cost, the number of hyperspectral images is limited, degenerat... 详细信息
来源: 评论
Age and Energy Tradeoff for Short Packet Based Two-Hop Decode-and-Forward Relaying Networks
Age and Energy Tradeoff for Short Packet Based Two-Hop Decod...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Mangang Xie Jie Gong Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Real-time and energy-efficient transmissions are two critical demands for status update systems, however it is difficult to meet these requirements simultaneously. This paper focuses on the tradeoff between the averag... 详细信息
来源: 评论