咨询与建议

限定检索结果

文献类型

  • 636 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 638 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 191 篇 信息与通信工程
    • 123 篇 电气工程
    • 117 篇 控制科学与工程
    • 100 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 51 篇 电子科学与技术(可...
    • 45 篇 化学工程与技术
    • 40 篇 机械工程
    • 40 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 211 篇 数学
    • 124 篇 生物学
    • 76 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 47 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 50 篇 工商管理
  • 79 篇 医学
    • 68 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 53 篇 法学
    • 34 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 6 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 48 篇 feature extracti...
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 32 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 17 篇 contrastive lear...
  • 17 篇 accuracy
  • 16 篇 image segmentati...
  • 16 篇 optimization
  • 16 篇 predictive model...

机构

  • 125 篇 state key labora...
  • 77 篇 state key labora...
  • 37 篇 college of compu...
  • 34 篇 key laboratory o...
  • 33 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 28 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,084 篇 英文
  • 134 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1232 条 记 录,以下是21-30 订阅
排序:
A Transformer-Based Video Colorization Method Fusing Local Self-attention and Bidirectional Optical Flow  10th
A Transformer-Based Video Colorization Method Fusing Local S...
收藏 引用
10th International Conference of Pioneering computer Scientists, Engineers and Educators, ICPCSEE 2024
作者: Yuan, Lin Duan, Xun Xiang, Lingjie Kong, Guangqian Wu, Yun State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Video colorization encounters two principal challenges: colorization quality and temporal flicker. Balancing colorization quality and temporal consistency is a significant challenge. To address the aforementioned issu... 详细信息
来源: 评论
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
收藏 引用
computer Modeling in Engineering & sciences 2024年 第1期138卷 917-938页
作者: Jinqiu Hou Changgen Peng Weijie Tan Hongfa Ding State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China College of Information Guizhou University of Finance and EconomicsGuiyang550025China
Cloud-based services have powerful storage functions and can provide accurate ***,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research *** t... 详细信息
来源: 评论
Efficient Enhanced Feature Learning for Remote Sensor Image Object Detection
Efficient Enhanced Feature Learning for Remote Sensor Image ...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2023
作者: Chen, Dazhi Gou, Gang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China
The realm of computer vision has witnessed a profound interest from the scholarly community in the task of remote sensing object detection. Within this article, we present a pioneering and refined approach to feature ... 详细信息
来源: 评论
A robust tensor watermarking algorithm for diffusion-tensor images
收藏 引用
Frontiers of Information technology & Electronic Engineering 2024年 第3期25卷 384-397页
作者: Chengmeng LIU Zhi LI Guomei WANG Long ZHENG State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China
Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning ***,after embedding watermark signals by convolution,the feature fusion eficiency of convolution ... 详细信息
来源: 评论
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution
收藏 引用
computer Modeling in Engineering & sciences 2024年 第1期138卷 827-843页
作者: Tao Yin Changgen Peng Weijie Tan Dequan Xu Hanlin Tang State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China Guizhou Big Data Academy Guizhou UniversityGuiyang550025China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China College of Computer Science and Technology Guizhou UniversityGuiyang550025China ChinaDataPay Company Guiyang550025China
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie *** traditional approach to obtaining the Tweedie r... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
A federated learning scheme meets dynamic differential privacy
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 1087-1100页
作者: Shengnan Guo Xibin Wang Shigong Long Hai Liu Liu Hai Toong Hai Sam State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyangChina School of Big Data Key Laboratory of Electric Power Big Data of Guizhou ProvinceGuizhou Institute of TechnologyGuiyangChina School of Information Guizhou University of Finance and EconomicsGuiyangChina Faculty of Business and Communication INTI International UniversityNilaiMalaysia
Federated learning is a widely used distributed learning approach in recent years,however,despite model training from collecting data become to gathering parameters,privacy violations may occur when publishing and sha... 详细信息
来源: 评论
Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised data-Driven Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 550-553页
作者: Zhenyong Zhang Yan Qin Jingpei Wang Hui Li Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China the School of Chemical and Biomedical Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China IEEE
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... 详细信息
来源: 评论
A Write-Optimized PM-oriented B+-tree with Aligned Flush and Selective Migration  21
A Write-Optimized PM-oriented B+-tree with Aligned Flush and...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: He, Xianyu Zhang, Runyu Tian, Pengpeng Zhou, Lening Lian, Min Yang, Chaoshu Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China
Emerging Persistent Memories (PMs) usually have the severe drawback of expensive writes. Therefore, existing PM-oriented B+-trees mainly concentrate on alleviating the write overhead (i.e., reducing the writes to PM a... 详细信息
来源: 评论
Iterative Android automated testing
收藏 引用
Frontiers of computer science 2023年 第5期17卷 15-26页
作者: Yi ZHONG Mengyu SHI Youran XU Chunrong FANG Zhenyu CHEN State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210093China School of Big Data and Computer Science Chongqing College of Mobile CommunicationChongqing 400065China
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage... 详细信息
来源: 评论