咨询与建议

限定检索结果

文献类型

  • 2,342 篇 会议
  • 1,935 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,807 篇 工学
    • 1,915 篇 计算机科学与技术...
    • 1,504 篇 软件工程
    • 583 篇 信息与通信工程
    • 350 篇 电气工程
    • 338 篇 控制科学与工程
    • 310 篇 电子科学与技术(可...
    • 257 篇 生物工程
    • 216 篇 机械工程
    • 203 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 150 篇 仪器科学与技术
    • 141 篇 动力工程及工程热...
    • 139 篇 化学工程与技术
    • 102 篇 交通运输工程
    • 88 篇 网络空间安全
    • 86 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 78 篇 土木工程
  • 1,430 篇 理学
    • 712 篇 数学
    • 376 篇 物理学
    • 309 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 151 篇 化学
    • 148 篇 系统科学
  • 757 篇 管理学
    • 504 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 115 篇 法学
    • 76 篇 社会学
  • 72 篇 经济学
  • 55 篇 农学
  • 21 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 96 篇 feature extracti...
  • 89 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 68 篇 deep learning
  • 66 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 53 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 49 篇 protocols
  • 48 篇 bandwidth
  • 48 篇 accuracy
  • 47 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 121 篇 school of comput...
  • 99 篇 national enginee...
  • 91 篇 hubei province k...
  • 86 篇 school of comput...
  • 76 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 services computi...
  • 43 篇 state key labora...
  • 40 篇 national enginee...
  • 39 篇 huazhong univers...
  • 39 篇 hubei province k...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 37 篇 school of inform...
  • 35 篇 school of comput...
  • 34 篇 key laboratory o...
  • 33 篇 school of comput...
  • 33 篇 university of ch...

作者

  • 235 篇 hai jin
  • 189 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 niyato dusit
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 song wu
  • 26 篇 shen linlin
  • 24 篇 wang wei
  • 22 篇 li peng
  • 22 篇 hu shengshan
  • 19 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,974 篇 英文
  • 187 篇 其他
  • 138 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4293 条 记 录,以下是51-60 订阅
排序:
LibAMM: Empirical Insights into Approximate computing for Accelerating Matrix Multiplication  38
LibAMM: Empirical Insights into Approximate Computing for Ac...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zeng, Xianzhi Jiang, Wenchao Zhang, Shuhao National Engineering Research Center for Big DataTechnology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Nanyang Technological University Singapore Singapore University of Technology and Design Singapore
Matrix multiplication (MM) is pivotal in fields from deep learning to scientific computing, driving the quest for improved computational efficiency. Accelerating MM encompasses strategies like complexity reduction, pa...
来源: 评论
A comprehensive survey of visible infrared person re-identification from an application perspective
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90243-90270页
作者: Chang, Hua Xu, Xin Liu, Wei Lu, Lingyi Li, Weigang School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan430065 China School of Information Science and Engineering Wuhan University of Science and Technology Wuhan China
Person re-identification (ReID) is a significant issue in computer vision, aiming to match the same pedestrian across various cameras. Recent research on this issue has successfully reached a satisfactory performance ... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Adaptive Bistable Stochastic Resonance Based Weak Signal Reception in Additive Laplacian Noise
收藏 引用
China Communications 2024年 第1期21卷 228-241页
作者: Jin Liu Zan Li Qiguang Miao Li Yang School of Computer Science and Technology Xidian UniversityXi’an 710071China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China
Weak signal reception is a very important and challenging problem for communication systems especially in the presence of non-Gaussian noise,and in which case the performance of optimal linear correlated receiver degr... 详细信息
来源: 评论
Multi-level Multi-task representation learning with adaptive fusion for multimodal sentiment analysis
收藏 引用
Neural computing and Applications 2025年 第3期37卷 1491-1508页
作者: Zhu, Chuanbo Chen, Min Li, Haomin Zhang, Sheng Liang, Han Sun, Chao Liu, Yifan Chen, Jincai Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Hubei Wuhan430074 China School of Computer Science and Engineering South China University of Technology Guangdong Guangzhou510641 China Pazhou Laboratory Guangdong Guangzhou510640 China School of Computer Science and Technology Huazhong University of Science and Technology Hubei Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China Hubei Wuhan430074 China
Multimodal sentiment analysis is an active task in multimodal intelligence, which aims to compute the user’s sentiment tendency from multimedia data. Generally, each modality is a specific and necessary perspective t... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Ciphertext-Policy Attribute-Based Encryption with Short Keys
收藏 引用
Chinese Journal of Electronics 2025年 第4期23卷 655-660页
作者: Peng Xu Yong Tang Wenbin Jiang Hai Jin Deqing Zou Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Ciphertext-policy attribute-based encryption (CP-ABE) allows a user with some attributes to decrypt the ciphertexts associated with these attributes. Though several CP-ABE schemes with the constant size ciphertext wer... 详细信息
来源: 评论
Towards High-throughput and Low-latency Billion-scale Vector Search via CPU/GPU Collaborative Filtering and Re-ranking  23
Towards High-throughput and Low-latency Billion-scale Vector...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Tian, Bing Liu, Haikun Tang, Yuhang Xiao, Shihai Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Xuecang Zhu, Junhua Zhang, Yu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd. China
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Numerical Simulation Study of Oil-Water Emulsion Separation in an Ultrasonic Field:Effect of Coupling between Acoustic and Flow Field Parameters
收藏 引用
China Petroleum Processing & Petrochemical technology 2024年 第1期26卷 116-125页
作者: Wang Heping Lin Yinchao Li Yanggui Zhang Xiaohang Wu Yi Key Laboratory of Engineering Mathematics and Advanced Computing of Nanchang Institute of Technology School of SciencesNanchang Institute of TechnologyNanchang 330099People’s Republic of China Dongguan Key Laboratory of Kunpeng Computing School of Computer ScienceGuangdong University of Science&TechnologyDongguan 523083China State Key Laboratory of Plateau Ecology and Agriculture Qinghai UniversityXining 810016China
In this study,the separation and coalescence of oil-in-water emulsions are explored in an ultrasonic field using the lattice Boltzmann *** simulating the propagation of ultrasonic waves,this study focuses on examining... 详细信息
来源: 评论