咨询与建议

限定检索结果

文献类型

  • 640 篇 期刊文献
  • 600 篇 会议

馆藏范围

  • 1,240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 849 篇 工学
    • 639 篇 计算机科学与技术...
    • 517 篇 软件工程
    • 196 篇 信息与通信工程
    • 130 篇 电气工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 68 篇 生物医学工程(可授...
    • 54 篇 光学工程
    • 52 篇 电子科学与技术(可...
    • 44 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 40 篇 机械工程
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 209 篇 数学
    • 126 篇 生物学
    • 77 篇 物理学
    • 75 篇 统计学(可授理学、...
    • 46 篇 化学
    • 31 篇 系统科学
  • 231 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 81 篇 医学
    • 68 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 54 篇 法学
    • 35 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 24 篇 农学
  • 8 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 45 篇 deep learning
  • 45 篇 feature extracti...
  • 38 篇 semantics
  • 34 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 22 篇 cloud computing
  • 21 篇 machine learning
  • 20 篇 convolution
  • 19 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 privacy
  • 17 篇 semantic segment...
  • 17 篇 security
  • 16 篇 big data
  • 16 篇 image segmentati...
  • 16 篇 neural networks
  • 16 篇 predictive model...
  • 16 篇 accuracy

机构

  • 129 篇 state key labora...
  • 74 篇 state key labora...
  • 35 篇 key laboratory o...
  • 34 篇 college of compu...
  • 34 篇 college of compu...
  • 33 篇 fujian provincia...
  • 27 篇 national enginee...
  • 26 篇 college of compu...
  • 25 篇 college of compu...
  • 23 篇 college of compu...
  • 22 篇 guizhou universi...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 19 篇 state key labora...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 school of big da...
  • 14 篇 guizhou universi...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 29 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 li shaobo
  • 17 篇 peng changgen
  • 15 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 changgen peng
  • 13 篇 xiong jinbo
  • 12 篇 qin yongbin
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 tao li
  • 11 篇 zhenyong zhang
  • 11 篇 tan chaoyue

语言

  • 954 篇 英文
  • 275 篇 其他
  • 17 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1240 条 记 录,以下是701-710 订阅
排序:
Blockchain-Based Multi-Cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Feiyu Wang Jian-tao Zhou College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
Structure Aware Loss for Deep Unsupervised Industrial Image Registration
Structure Aware Loss for Deep Unsupervised Industrial Image ...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Yong Shi Mengjin Lyu Zhiquan Qi Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China College of Information Science and Technology University of Nebraska at Omaha Omaha USA School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China School of Economics and Management University of Chinese Academy of Sciences Beijing China
Image registration is extensively utilized in industrial applications. However, specific challenges inherent to these environments—such as low texture, significant displacement, and poor lighting conditions—complica... 详细信息
来源: 评论
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes
Understanding and Detecting Privacy Leakage Vulnerabilities ...
收藏 引用
International Symposium on Software Reliability Engineering (ISSRE)
作者: Ziming Chen Yue Li Jianbo Gao Jiashuo Zhang Ke Wang Jianbin Hu Zhi Guan Zhong Chen School of Computer Science Peking University Beijing China College of Computer Science and Technology Taiyuan University of Technology Taiyuan China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
The application on a blockchain cannot maintain secrecy because its data is replicated across all peers in the network. To remedy this problem, Hyperledger Fabric introduces private data collection (PDC) into its smar... 详细信息
来源: 评论
Spatiotemporal-Augmented Graph Neural Networks for Human Mobility Simulation
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yu Zheng, Tongya Liu, Shunyu Feng, Zunlei Chen, Kaixuan Hao, Yunzhi Song, Mingli The College of Computer Science Zhejiang university Hangzhou China Big Graph Center School of Computer and Computing Science Hangzhou City University Hangzhou China The College of Software Technology Zhejiang University Hangzhou China The State Key Laboratory of Blockchain and Security Zhejiang University Hangzhou China
Human mobility patterns have shown significant applications in policy-decision scenarios and economic behavior researches. The human mobility simulation task aims to generate human mobility trajectories given a small ... 详细信息
来源: 评论
Selection for Cheaper Amino Acids Drives Nucleotide Usage at the Start of Translation in Eukaryotic Genes
收藏 引用
Genomics, Proteomics & Bioinformatics 2021年 第6期19卷 949-957页
作者: Na L.Gao Zilong He Qianhui Zhu Puzi Jiang Songnian Hu Wei-Hua Chen Key Laboratory of Molecular Biophysics of the Ministry of Education Hubei Key Laboratory of Bioinformatics and Molecular-imagingDepartment of Bioinformatics and Systems BiologyCollege of Life Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Institute for Computer Science and Cluster of Excellence on Plant Sciences Heinrich Heine UniversityD-40225 DuesseldorfGermany CAS Key Laboratory of Genome Sciences and Information Beijing Institute of GenomicsChinese Academy of SciencesBeijing 100101China State Key Laboratory of Microbial Resources Institute of MicrobiologyChinese Academy of SciencesBeijing 100101China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine Interdisciplinary Innovation Institute of Medicine and EngineeringBeihang UniversityBeijing 100191China University of Chinese Academy of Sciences Beijing 100049China
Coding regions have complex interactions among multiple selective forces,which are manifested as biases in nucleotide *** studies have revealed a decreasing GC gradient from the 5′-end to 3′-end of coding regions in... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Feiyu Wang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
来源: 评论
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
收藏 引用
science China(Information sciences) 2021年 第6期64卷 242-243页
作者: Zengpeng LI Vishal SHARMA Chunguang MA Chunpeng GE Willy SUSILO College of Computer Science and Technology Qingdao University Guizhou Provincial Key Laboratory of Public Big Data Guizhou University ISTD Pillar Singapore University of Technology and Design (SUTD) College of Computer Science and Engineering Shandong University of Science and Technology College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics School of Computing and Information Technology University of Wollongong
Dear editor,To maintain the confidentiality of the sensitive data, users tend to encrypt their data under an associated access policy(or attributes) before outsourcing them to the *** the traditional access control mo... 详细信息
来源: 评论
High-Frequency Stereo Matching Network
High-Frequency Stereo Matching Network
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Haoliang Zhao Huizhou Zhou Yongjun Zhang Jie Chen Yitong Yang Yong Zhao Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry State Key Laboratory of Public Big Data College of Computer Science and Technology Institute of Artificial Intelligence Guizhou University Guiyang Guizhou China Ghost-Valley AI Technology Shenzhen Guangdong China School of Physics and Optoelectronic Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Integrated Microsystems Shenzhen Graduate School Peking University China
In the field of binocular stereo matching, remarkable progress has been made by iterative methods like RAFT-Stereo and CREStereo. However, most of these methods lose information during the iterative process, making it...
来源: 评论
OFFLINE MODEL-BASED OPTIMIZATION BY LEARNING TO RANK
arXiv
收藏 引用
arXiv 2024年
作者: Tan, Rong-Xi Xue, Ke Lyu, Shen-Huan Shang, Haopu Wang, Yao Wang, Yaoyuan Fu, Sheng Qian, Chao National Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University China College of Computer Science and Software Engineering Hohai University China Advanced Computing and Storage Lab Huawei Technologies Co. Ltd. China
Offline model-based optimization (MBO) aims to identify a design that maximizes a black-box function using only a fixed, pre-collected dataset of designs and their corresponding scores. This problem has garnered signi... 详细信息
来源: 评论
Homogeneous and Heterogeneous Graph Learning for Hybrid Beamforming in mmWave Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Li, Yuhang Lu, Yang Zhang, Guangyang Ai, Bo Niyato, Dusit Cui, Shuguang State Key Laboratory of Advanced Rail Autonomous Operation China Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Shenzhen518066 China
Hybrid analog and digital beamforming (HBF) is a cost-efficient technique to achieve high data rates in millimeterwave (mmWave) communication systems. This paper applies the emerging graph neural networks (GNNs) to HB... 详细信息
来源: 评论