咨询与建议

限定检索结果

文献类型

  • 450 篇 会议
  • 205 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 415 篇 工学
    • 320 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 83 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 43 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 32 篇 机械工程
    • 26 篇 电气工程
    • 18 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 14 篇 化学工程与技术
    • 11 篇 网络空间安全
    • 10 篇 交通运输工程
    • 9 篇 光学工程
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 环境科学与工程(可...
    • 8 篇 生物医学工程(可授...
    • 7 篇 农业工程
  • 170 篇 理学
    • 94 篇 数学
    • 43 篇 生物学
    • 29 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 18 篇 化学
  • 114 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 8 篇 农学
  • 7 篇 医学
  • 6 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 26 篇 training
  • 25 篇 computational mo...
  • 24 篇 feature extracti...
  • 19 篇 deep learning
  • 18 篇 cloud computing
  • 15 篇 machine learning
  • 14 篇 benchmark testin...
  • 14 篇 hardware
  • 14 篇 accuracy
  • 12 篇 task analysis
  • 12 篇 computer archite...
  • 12 篇 neural networks
  • 12 篇 educational inst...
  • 12 篇 convolution
  • 12 篇 algorithm design...
  • 12 篇 kernel
  • 12 篇 distributed data...
  • 11 篇 servers
  • 11 篇 data models
  • 10 篇 quality of servi...

机构

  • 111 篇 college of compu...
  • 77 篇 science and tech...
  • 41 篇 national laborat...
  • 26 篇 college of compu...
  • 22 篇 science and tech...
  • 21 篇 key laboratory o...
  • 18 篇 national laborat...
  • 16 篇 science and tech...
  • 14 篇 science and tech...
  • 14 篇 national laborat...
  • 13 篇 school of comput...
  • 12 篇 national key lab...
  • 11 篇 national key lab...
  • 11 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 national key lab...
  • 10 篇 college of compu...
  • 10 篇 national laborat...
  • 9 篇 college of compu...
  • 8 篇 school of comput...

作者

  • 28 篇 dongsheng li
  • 24 篇 yijie wang
  • 23 篇 li dongsheng
  • 23 篇 wang huaimin
  • 20 篇 zhigang luo
  • 20 篇 wang yijie
  • 20 篇 huaimin wang
  • 18 篇 naiyang guan
  • 18 篇 lu jun
  • 17 篇 jun lu
  • 16 篇 peng yuxing
  • 15 篇 liu jie
  • 13 篇 yuxing peng
  • 13 篇 dou yong
  • 13 篇 jie liu
  • 12 篇 xiang zhang
  • 12 篇 lai zhiquan
  • 12 篇 qiao peng
  • 12 篇 yin gang
  • 11 篇 ding bo

语言

  • 628 篇 英文
  • 26 篇 中文
  • 6 篇 其他
检索条件"机构=Science and Technology on Parallel and Distributed Laboratory College of Computer"
660 条 记 录,以下是71-80 订阅
排序:
DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server
DaBA: Data-free Backdoor Attack against Federated Learning v...
收藏 引用
Image Processing, computer Vision and Machine Learning (ICICML), International Conference on
作者: Kuiqi Chen Liming Fang Mengxin Wang Changchun Yin College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China
Current research shows that the privacy of FL is threatened by an honest-but-curious server. However, existing research focus on privacy attacks against the malicious server while overlooking that it could also compro...
来源: 评论
A Connectivity-Enhanced Multi-Task Learning based on Anatomical Priors for 3D Class-Balanced Pulmonary Airway Segmentation
A Connectivity-Enhanced Multi-Task Learning based on Anatomi...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yan Jia Yong Dou Peng Qiao Yuqing Cheng Kele Xu Zhouyu He National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Systems Engineering National University of Defense Technology Changsha China
Accurate and efficient airway segmentation is essential for evaluating pulmonary diseases, aiding diagnosis, reducing the preoperative burden of airway identification, and minimizing patient discomfort during prolonge... 详细信息
来源: 评论
OLM2: Automatic Optimal Strategy Generating for Large-Scale Model Training with Limited-Memory
OLM2: Automatic Optimal Strategy Generating for Large-Scale ...
收藏 引用
IEEE International Conference on Joint Cloud Computing (JCC)
作者: Zhilin Yang Yu Tang Linbo Qiao Xi Yang Zhen Huang National Key Laboratory of Parallel and Distributed Computing College of Computer Science National University of Defense Technology Changsha 410073 China
The scale of model parameters and the amount of training data is exponentially increasing. It requires more GPU memory with the exponential increasement of model parameters. Recomputation and swapping are two main mem...
来源: 评论
Sparse Matrix Reordering Method Selection with parallel Computing and Deep Learning
Sparse Matrix Reordering Method Selection with Parallel Comp...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Rui Xia Jihu Guo Huajian Zhang Shun Yang Qinglin Wang Jie Liu College of Computer Science and Techonology National University of Defense Technology Changsha China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology
Sparse matrix reordering is an important step in Cholesky decomposition. By reordering the rows and columns of the matrix, the time of computation and storage cost can be greatly reduced. With the proposal of various ... 详细信息
来源: 评论
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack
MPS: A Multiple Poisoned Samples Selection Strategy in Backd...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weihong Zou Shigeng Zhang Weiping Wang Jian Zhang Xuan Liu Schoosl of Computer Science and Engineering Central South University Science and Technology on Parallel and Distributed Processing Laboratory (PDL) College of Computer Science and Electronic Engineering Hunan University
Recently there has been many studies on backdoor attacks, which involve injecting poisoned samples into the training set in order to embed backdoors into the model. Existing multiple poisoned samples attacks usually r... 详细信息
来源: 评论
False Positive Detection for Text-Based Person Retrieval  21st
False Positive Detection for Text-Based Person Retrieval
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Cao, Yan Lu, Jun College of Computer Science and Technology Heilongjiang University Harbin150080 China Jiaxiang Industrial Technology Research Institute of Heilongjiang University Shandong Jining272400 China Key Laboratory of Database and Parallel Computing of Heilongjiang Province Heilongjiang University Harbin150080 China
Text-based person retrieval (TBPR) is a challenging topic in cross-modal retrieval tasks, aiming to query corresponding person images based on textual descriptions. This task is complicated by noisy correspondences be... 详细信息
来源: 评论
YOLO-RSOD: Improved YOLO Remote Sensing Object Detection  27th
YOLO-RSOD: Improved YOLO Remote Sensing Object Detection
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xu, Yang Lu, Jun College of Computer Science and Technology Heilongjiang University Harbin150080 China Jiaxiang Industrial Technology Research Institute of Heilongjiang University Shandong Jining272400 China Key Laboratory of Database and Parallel Computing of Heilongjiang Province Heilongjiang University Harbin150080 China
Remote sensing object detection has important application value in fields such as environmental monitoring and resource detection and analysis. However, the current universal object detectors are not very effective in... 详细信息
来源: 评论
Simultaneously Learning Syntactic Dependency and Semantics Reasonability for Relation Extraction
Simultaneously Learning Syntactic Dependency and Semantics R...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Wang, Xin Yin, Nan Zhang, Xiang Bai, Xinyi Luo, Zhigang College of Computer National University of Defense Technology Changsha China Institute for Quantum and State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China Science and Technology on Parallel and Distributed Laboratory National University of Defense Technology Changsha China
Relation extraction as an important Natural Language Processing (NLP) task is to identify relations between named entities in text. Recently, graph convolutional networks over dependency trees have been widely used to... 详细信息
来源: 评论
DCI-Net: Remote Sensing Image-Based Object Detector  27th
DCI-Net: Remote Sensing Image-Based Object Detector
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Cui, Quanyue Lu, Jun College of Computer Science and Technology Heilongjiang University Harbin150080 China Jiaxiang Industrial Technology Research Institute of Heilongjiang University Shandong Jining272400 China Key Laboratory of Database and Parallel Computing of Heilongjiang Province Heilongjiang University Harbin150080 China
Recently the analysis of remotely sensed images has played a vital role in various aspects of research. The current researches ignore the unique prior knowledge in remote sensing images and do not consider exploring t... 详细信息
来源: 评论
HAF: a hybrid annotation framework based on expert knowledge and learning technique
收藏 引用
science China(Information sciences) 2022年 第1期65卷 276-278页
作者: Zhixing LI Yue YU Tao WANG Gang YIN Xinjun MAO Huaimin WANG Key Laboratory of Parallel and Distributed Computing National University of Defense Technology College of Computer National University of Defense Technology
Dear editor,The increasing awareness of the potential value hidden in data has resulted in many data mining studies being conducted. In the domain of software engineering, for example, developers' behavioral data ...
来源: 评论