咨询与建议

限定检索结果

文献类型

  • 626 篇 期刊文献
  • 595 篇 会议

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 830 篇 工学
    • 623 篇 计算机科学与技术...
    • 509 篇 软件工程
    • 184 篇 信息与通信工程
    • 120 篇 电气工程
    • 99 篇 生物工程
    • 98 篇 控制科学与工程
    • 67 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 48 篇 电子科学与技术(可...
    • 43 篇 化学工程与技术
    • 38 篇 机械工程
    • 37 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 23 篇 建筑学
  • 395 篇 理学
    • 208 篇 数学
    • 124 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 74 篇 物理学
    • 44 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 医学
    • 66 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 54 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 45 篇 deep learning
  • 45 篇 feature extracti...
  • 37 篇 semantics
  • 34 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 22 篇 cloud computing
  • 21 篇 machine learning
  • 20 篇 convolution
  • 19 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 privacy
  • 17 篇 security
  • 16 篇 semantic segment...
  • 16 篇 big data
  • 16 篇 neural networks
  • 16 篇 predictive model...
  • 16 篇 accuracy
  • 16 篇 data models

机构

  • 127 篇 state key labora...
  • 72 篇 state key labora...
  • 34 篇 college of compu...
  • 33 篇 key laboratory o...
  • 32 篇 college of compu...
  • 31 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 23 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 state key labora...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 school of big da...
  • 14 篇 guizhou provinci...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 li shaobo
  • 15 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 changgen peng
  • 13 篇 xiong jinbo
  • 12 篇 qin yongbin
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 tao li
  • 11 篇 zhenyong zhang
  • 11 篇 tan chaoyue

语言

  • 1,010 篇 英文
  • 200 篇 其他
  • 15 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1221 条 记 录,以下是791-800 订阅
排序:
CoPRA: Bridging Cross-domain Pretrained Sequence Models with Complex Structures for Protein-RNA Binding Affinity Prediction  39
CoPRA: Bridging Cross-domain Pretrained Sequence Models with...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Han, Rong Liu, Xiaohong Pan, Tong Xu, Jing Wang, Xiaoyu Lan, Wuyang Li, Zhenyu Wang, Zixuan Song, Jiangning Wang, Guangyu Chen, Ting BNRist Department of Computer Science and Technology Tsinghua University China UCL Cancer Institute University College London United Kingdom Monash Data Futures Institute Monash University Australia Monash Biomedicine Discovery Institute Department of Biochemistry and Molecular Biology Monash University Australia State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Accurately measuring protein-RNA binding affinity is crucial in many biological processes and drug design. Previous computational methods for protein-RNA binding affinity prediction rely on either sequence or structur... 详细信息
来源: 评论
Random verifiable multi-server searchable encryption scheme
Random verifiable multi-server searchable encryption scheme
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Yu He Youliang Tian Hua Xu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang P. R. China Institute of Cryptography and Data Security Guizhou University Guiyang P. R. China
In order to solve the problem of difficult verification of query results in searchable encryption, we used the idea of Shamir-secret sharing, combined with game theory, to construct a randomly verifiable multi-cloud s... 详细信息
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
Cyber Security and Information Engineering (ICCSIE), International Conference on
作者: Jianhua Huang Yunlong Tang Yongjun Wei Huan Wang Haifeng Zhang Bing Zhang Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center School of Computer Science and Technology (School of Software) Guangxi University of Science and Technology Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
Example-based web page recoloring method
收藏 引用
Frontiers of computer science 2020年 第5期14卷 229-231页
作者: Yonghao Long Zhihao Zang Xiangping Chen Fan Zhou Xiaonan Luo School of Data and Computer Science National Engineering Research Center of Digital LifeSun Yat-sen UniversityGuangzhou510006China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion The School of Communication and DesignSun Yat-sen UniversityGuangzhou510006China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
1 Introduction The user interface(UI)is very important for a software product,and a well-designed UI will attract users and make a good *** has been shown that color plays an important role in invoking emotional react... 详细信息
来源: 评论
Deformation Monitoring of Super High-Rise Buildings Based on the Tomosar Double-Tier Permanent Scatterer Network
Deformation Monitoring of Super High-Rise Buildings Based on...
收藏 引用
SAR in big data Era: Models, Methods and Applications (bigSARdata)
作者: Haoxuan Duan Hong Zhang Yuzhou Liu Zihuan Guo Chao Wang Key Laboratory of Digital Earth Science Aerospace Information Research Institute Chinese Academy of Sciences Beijing China International Research Center of Big Data for Sustainable Development Goals Beijing China College of Resources and Environment University of Chinese Academy of Sciences Beijing China Shenzhen Technology Institute of Urban Public Safety Shenzhen China
Urban building safety directly affects people's life and property and sustainable development, especially in the field of super high-rise buildings. This paper carries out the inversion of physical parameters such...
来源: 评论
A WiFi-aware method for mobile data offloading with deadline constraints
A WiFi-aware method for mobile data offloading with deadline...
收藏 引用
作者: Tang, Wenda Wu, Chaobing Qi, Lianyong Zhang, Xuyun Xu, Xiaolong Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Information Science and Engineering Chinese Academy of Education Big Data Qufu Normal University Rizhao China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With an increasing number of public WiFi hotspots have been constructed in metropolitan areas, citizens can leverage these WiFi hotspots to surf the Internet with their smart devices almost everywhere. Compared to cel... 详细信息
来源: 评论
TeleOR: Real-time Telemedicine System for Full-Scene Operating Room
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yixuan Hu, Kaiyuan Shao, Qian Chen, Jintai Chen, Danny Z. Wu, Jian School of Public Health Zhejiang University China State Key Laboratory of Transvascular Implantation Devices of The Second Affiliated Hospital Zhejiang University School of Medicine China Institute of Wenzhou Zhejiang University China School of Science and Engineering The Chinese University of Hong Kong Shenzhen China College of Computer Science and Technology Zhejiang University China Computer Science Department University of Illinois at Urbana-Champaign United States Department of Computer Science and Engineering University of Notre Dame United States
The advent of telemedicine represents a transformative development in leveraging technology to extend the reach of specialized medical expertise to remote surgeries, a field where the immediacy of expert guidance is p... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
A method for detecting floating objects on water based on edge computing
A method for detecting floating objects on water based on ed...
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: He Li Shuaipeng Yang Jinjiang Liu Honglin Fang Zhumu Fu Rui Zhang Huimei Jia Lianmeng Lv Henan Costar Group Co. Ltd Nanyang Henan China College of Information Engineering Henan University of Science and Technology Luoyang Henan China Henan Engineering Research Center of Intelligent Processing for Big Data of Digital Image School of Computer Science and Technology Nanyang Normal University Nanyang China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunication Beijing China Xi'an Hengpin Electronic Technology Co. Ltd Xi’an China
With the development and application of computer vision, many target detection networks are applied to the detection of floating objects in rivers. For the detection problems such as small targets easily missed and mi...
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论