咨询与建议

限定检索结果

文献类型

  • 636 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 638 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 191 篇 信息与通信工程
    • 123 篇 电气工程
    • 117 篇 控制科学与工程
    • 100 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 45 篇 化学工程与技术
    • 40 篇 机械工程
    • 40 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 211 篇 数学
    • 124 篇 生物学
    • 76 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 47 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 53 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 6 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 48 篇 feature extracti...
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 32 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 17 篇 contrastive lear...
  • 17 篇 accuracy
  • 16 篇 image segmentati...
  • 16 篇 optimization
  • 16 篇 predictive model...

机构

  • 125 篇 state key labora...
  • 77 篇 state key labora...
  • 37 篇 college of compu...
  • 34 篇 key laboratory o...
  • 33 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 28 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,084 篇 英文
  • 134 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1232 条 记 录,以下是151-160 订阅
排序:
Multi-objective multi-population Genetic Programming for feature selection and classification to high-dimensional data
Multi-objective multi-population Genetic Programming for fea...
收藏 引用
2024 Genetic and Evolutionary Computation Conference Companion, GECCO 2024 Companion
作者: Li, Qiaoman Gao, Xiaoying Meng, Wenyang Ma, Jianbin Hebei Agricultural University College of Information Science and Technology Baoding China Victoria University of Wellington School of Engineering and Computer Science Wellington New Zealand College of Information Science and Technology Hebei Key Laboratory of Agricultural Big Data Hebei Agricultural University Baoding China
Classification for high-dimensional data is a challenging task due to a great number of redundant and irrelevant features. Genetic Programming (GP) has its built-in feature selection characteristics and is suitable fo... 详细信息
来源: 评论
A Service-Oriented Anonymous Authentication Scheme with Partial-Disclosure in C-ITS
A Service-Oriented Anonymous Authentication Scheme with Part...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Junbo Huang Youliang Tian Kedi Yang Linjie Wang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Data Science Tongren University Tongren China
Service-oriented communication in collaborative intelligent transportation systems (C-ITS) can provide users with a variety of services to enhance the driving experience. Implementing anonymous authentication in servi... 详细信息
来源: 评论
Feature Decoupled of Deep Mutual Information Maximization  2
Feature Decoupled of Deep Mutual Information Maximization
收藏 引用
2nd International Conference on Automation, Robotics and computer Engineering, ICARCE 2023
作者: He, Xing Peng, Changgen Wang, Lin Tan, Weijie Wang, Zifan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China Guizhou Big Data Academy Guizhou University Guiyang China Guizhou Minzu University Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guiyang China Institute of Guizhou Aerospace Measuring and Testing Technology Guiyang China
In deep learning, supervised learning techniques usually require a large amount of expensive labeled data to train the network, and the feature representations extracted by the model usually mix multiple attributes, r... 详细信息
来源: 评论
SAD: Website Fingerprinting Defense Based on Adversarial Examples  1
收藏 引用
4th EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2021
作者: Tang, Renzhi Shen, Guowei Guo, Chun Cui, Yunhe College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou Provincial Key Laboratory of Public Big Data Guiyang550025 China
Website Fingerprinting (WF) attacks can infer website names from encrypted network traffic when the victim is browsing the website. Inherent defenses of anonymous communication systems such as The Onion Router (Tor) c... 详细信息
来源: 评论
Communication-Efficient Federated Learning with Sparsity and Quantization
Communication-Efficient Federated Learning with Sparsity and...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Zhong Long Yuling Chen Hui Dou Yun Luo Chaoyue Tan Yancheng Sun State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
Google proposed federated learning in 2016, which aims to solve the problems of data silos and privacy leakage in machine learning. However, as the difficulty of the target task increases and the model performance req...
来源: 评论
A Write-Optimized PM-oriented B+-tree with Aligned Flush and Selective Migration
A Write-Optimized PM-oriented B+-tree with Aligned Flush and...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Xianyu He Runyu Zhang Pengpeng Tian Lening Zhou Min Lian Chaoshu Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
Emerging Persistent Memories (PMs) usually have the severe drawback of expensive writes. Therefore, existing PM-oriented $\mathrm{B}^{+} -$trees mainly concentrate on alleviating the write overhead (i.e., reducing the...
来源: 评论
A Blockchain of Blockchains Structure Based on Asset Trading Scheme
A Blockchain of Blockchains Structure Based on Asset Trading...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Siyuan Huang Yuling Chen Chaoyue Tan Hui Dou Yun Luo Yuxiang Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
In the realm of blockchain applications, the issue of value isolation, commonly referred to as the value island problem, imposes inherent limitations on the applicability of corresponding assets. To overcome this chal...
来源: 评论
Power Optimization for Low Transmission Delay in Software Defined data Center Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5716-5730页
作者: Zhao, Yong Cao, Jiannong Wang, Xingwei Li, Fuliang He, Qiang Liu, Xiaojie University of Electronic Science and Technology of China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Laboratory of Intelligent Collaborative Computing Chengdu611731 China Hong Kong Polytechnic University Department of Computing Hung Hom Hong Kong Northeastern University College of Computer Science and Engineering Shenyang110819 China Northeastern University College of Medicine and Biological Information Engineering Shenyang110819 China Pengcheng Laboratory Shenzhen518066 China
Software-Defined data Center Networks (SDDCNs) utilizes Software Defined Networking (SDN) as a network architecture to achieve highly flexible, programmable, and automated management of data Center Networks (DCNs). Th... 详细信息
来源: 评论
Learning a Mini-Batch Graph Transformer via Two-Stage Interaction Augmentation  27
Learning a Mini-Batch Graph Transformer via Two-Stage Intera...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Li, Wenda Chen, Kaixuan Liu, Shunyu Zheng, Tongya Huang, Wenjie Song, Mingli State Key Laboratory of Blockchain and Security Zhejiang University China School of Software Technology Zhejiang University China Institute of Blockchain and Data Security China Big Graph Center School of Computer and Computing Science Hangzhou City University China College of Computer Science and Technology Zhejiang University Hangzhou China
Mini-batch Graph Transformer (MGT), as an emerging graph learning model, has demonstrated significant advantages in semi-supervised node prediction tasks with improved computational efficiency and enhanced model robus... 详细信息
来源: 评论
A High Capacity Combined Carrier Steganography Without Embedding Image
A High Capacity Combined Carrier Steganography Without Embed...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Yangwen Zhang Yuling Chen Hui Dou Yun Luo Chaoyue Tan Maolin Xiong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
The technique of image steganography is the embedding of secret information into the carrier image by means of algorithms that are widely used in the field of information transmission, but steganalysis tools built wit...
来源: 评论