咨询与建议

限定检索结果

文献类型

  • 620 篇 期刊文献
  • 595 篇 会议

馆藏范围

  • 1,215 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 830 篇 工学
    • 623 篇 计算机科学与技术...
    • 509 篇 软件工程
    • 184 篇 信息与通信工程
    • 120 篇 电气工程
    • 99 篇 生物工程
    • 98 篇 控制科学与工程
    • 67 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 48 篇 电子科学与技术(可...
    • 43 篇 化学工程与技术
    • 38 篇 机械工程
    • 37 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 23 篇 建筑学
  • 394 篇 理学
    • 208 篇 数学
    • 123 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 74 篇 物理学
    • 44 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 77 篇 医学
    • 66 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 54 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 45 篇 deep learning
  • 45 篇 feature extracti...
  • 37 篇 semantics
  • 34 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 22 篇 cloud computing
  • 20 篇 convolution
  • 20 篇 machine learning
  • 19 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 privacy
  • 17 篇 security
  • 16 篇 semantic segment...
  • 16 篇 big data
  • 16 篇 neural networks
  • 16 篇 predictive model...
  • 16 篇 accuracy
  • 16 篇 data models

机构

  • 127 篇 state key labora...
  • 71 篇 state key labora...
  • 34 篇 college of compu...
  • 33 篇 key laboratory o...
  • 31 篇 college of compu...
  • 31 篇 fujian provincia...
  • 28 篇 national enginee...
  • 26 篇 college of compu...
  • 24 篇 college of compu...
  • 23 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 state key labora...
  • 19 篇 college of compu...
  • 18 篇 key laboratory o...
  • 18 篇 guizhou provinci...
  • 16 篇 guangdong provin...
  • 14 篇 school of big da...
  • 14 篇 guizhou provinci...

作者

  • 36 篇 tian youliang
  • 33 篇 chen yuling
  • 29 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 shen linlin
  • 16 篇 li shaobo
  • 13 篇 shaobo li
  • 13 篇 changgen peng
  • 13 篇 wang lihui
  • 12 篇 qin yongbin
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 chu shu-chuan
  • 12 篇 xiong jinbo
  • 11 篇 tan weijie
  • 11 篇 tao li
  • 11 篇 zhenyong zhang
  • 11 篇 tan chaoyue

语言

  • 1,004 篇 英文
  • 200 篇 其他
  • 15 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1215 条 记 录,以下是871-880 订阅
排序:
HAM:a deep collaborative ranking method incorporating textual information
收藏 引用
Frontiers of Information technology & Electronic Engineering 2020年 第8期21卷 1206-1216页
作者: Cheng-wei WANG Teng-fei ZHOU Chen CHEN Tian-lei HU Gang CHEN The Key Laboratory of Big Data Intelligent Computing of Zhejiang Province Hangzhou 310027China State Key Lab of CAD&CG Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Zhejiang UniversityHangzhou 310027China
The recommendation task with a textual corpus aims to model customer preferences from both user feedback and item textual *** is highly desirable to explore a very deep neural network to capture the complicated nonlin... 详细信息
来源: 评论
The Trade-off Between Privacy and Utility in Local Differential Privacy
The Trade-off Between Privacy and Utility in Local Different...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Mengqian Li Youliang Tian Junpeng Zhang Dandan Fan Dongmei Zhao College of Computer Science and Technology Guizhou University Guiyang P. R. China State Key Laboratory of Public Big Data Guizhou University Guiyang P. R. China College of Computer and Cyber Security Hebei Normal University Shijiazhuang P. R. China
In statistical queries work, such as frequency estimation, the untrusted data collector could as an honest-but-curious (HbC) or malicious adversary to learn true values. Local differential privacy(LDP) protocols have ... 详细信息
来源: 评论
An Improved Whale Optimization Algorithm and Its Application to Power Generation in Cascade Reservoir  16th
An Improved Whale Optimization Algorithm and Its Application...
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information technology, Applications and Tools, FITAT 2020
作者: Lü, Ji-Xiang Yan, Li-Jun Pan, Tien-Szu Chu, Shu-Chuan Pan, Jeng-Shyang He, Xian-Kang Chang, Kuo-Chi School of Information Science and Engineering Fujian University of Technology Fuzhou350108 China Shenzhen Institute of Information Technology Shenzhen518172 China Department of Electronic Engineering National Kaohsiung University of Science and Technology Kaohsiung82445 Taiwan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Science and Engineering Flinders University Sturt Rd Bedford ParkSA5042 Australia Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350108 China College of Mechanical & Electrical Engineering National Taipei University of Technology Taipei10608 Taiwan Department of Business Administration North Borneo University College Sabah Malaysia
Nowadays, there is a very popular artificial intelligence algorithm called whale optimization algorithm (WOA). WOA is obtained through the special bubble net foraging process of humpback whales. It has a special searc... 详细信息
来源: 评论
A De-swinging Scheme in Location Privacy Protection via Smart Contract
A De-swinging Scheme in Location Privacy Protection via Smar...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Manxiang Yang Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Information Technology Innovation Service Center of Guizhou Province Guiyang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China Guizhou CoVision Science & Technology Co. Ltd Guiyang China
There are some problems such as behavior deception and service swing while utilizing distributed k-anonymity technology to construct an anonymous domain. If the malicious nodes submit a false location coordinate to ta... 详细信息
来源: 评论
A location data protection protocol based on differential privacy
A location data protection protocol based on differential pr...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Ping Guo Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Information Technology Innovation Service Center of Guizhou Province Guiyang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China Guizhou CoVision Science &Technology Co. Ltd Guiyang China
Location-based services (LBS) is geo-location-based a mobile information service based on spatial location that adopts wireless positioning, GIS, Internet, wireless communication, database and other related technologi... 详细信息
来源: 评论
CodeEnhance: A Codebook-Driven Approach for Low-Light Image Enhancement
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xu Hou, XianXu Lai, Zhihui Zhou, Jie Zhang, Ya-Nan Pedrycz, Witold Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China The Department of Electrical & Computer Engineering University of Alberta University of Alberta Canada
Low-light image enhancement (LLIE) aims to improve low-illumination images. However, existing methods face two challenges: (1) uncertainty in restoration from diverse brightness degradations;(2) loss of texture and co... 详细信息
来源: 评论
An Optimizing Parameters and Feature Selection in SVM Based on Improved Cockroach Swarm Optimization  16th
An Optimizing Parameters and Feature Selection in SVM Based ...
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information technology, Applications and Tools, FITAT 2020
作者: Nguyen, Trong-The Yu, Jie Nguyen, Thi-Thanh-Tan Lai, Quoc-Anh Ngo, Truong-Giang Dao, Thi-Kien Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China College of Mechanical and Automotive Engineering Fujian University of Technology Fuzhou China Information Technology Faculty Electric Power University Hanoi Viet Nam Department of Pattern Recognition & Image Processing Institute of Information Technology Vietnam Academy of Science and Technology Hanoi Viet Nam Faculty of Computer Science and Engineering Thuyloi University 175 Tay Son Dong Da Hanoi Viet Nam
This study improves a classifier of the support vector machine (SVM) by optimizing its parameters by adjusting cockroach swarm optimization (CSO). Classification system design includes data inputs, pre-process, and cl... 详细信息
来源: 评论
Performance Evaluation of Lightweight Open-source Large Language Models in Pediatric Consultations: A Comparative Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Wei, Qiuhong Cui, Ying Ding, Mengwei Wang, Yanqin Xiang, Lingling Yao, Zhengxiong Chen, Ceran Long, Ying Jin, Zhezhen Xu, Ximing Big Data Center for Children’s Medical Care Children’s Hospital of Chongqing Medical University National Clinical Research Center for Child Health and Disorders Ministry of Education Key Laboratory of Child Development and Disorders Chongqing China Chongqing Key Laboratory of Child Neurodevelopment and Cognitive Disorders China International Science and Technology Cooperation base of Child Development and Critical Disorders China Department of Biomedical Data Science Stanford University School of Medicine StanfordCA United States Department of Nephrology Children’s Hospital of Chongqing Medical University Chongqing China Department of Neonatology Children’s Hospital of Chongqing Medical University Chongqing China Department of Neurology Children’s Hospital of Chongqing Medical University Chongqing China College of Computer Science and Engineering Chongqing University of Technology Chongqing China Department of Biostatistics Mailman School of Public Health Columbia University New YorkNY United States
Background Large language models (LLMs) have demonstrated potential applications in medicine, yet data privacy and computational burden limit their deployment in healthcare institutions. Open-source and lightweight ve... 详细信息
来源: 评论
Unsupervised vehicle re-identification with progressive adaptation  29
Unsupervised vehicle re-identification with progressive adap...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Peng, Jinjia Wang, Yang Wang, Huibing Zhang, Zhao Fu, Xianping Wang, Meng College of Information and Science Technology Dalian Maritime University Liaoning Dalian China Pengcheng Laboratory Shenzhen Guangdong China Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei University of Technology China School of Computer Science and Information Engineering Hefei University of Technology China
Vehicle re-identification (reID) aims at identifying vehicles across different non-overlapping cameras views. The existing methods heavily relied on well-labeled datasets for ideal performance, which inevitably causes... 详细信息
来源: 评论
A knowledge graph constructed for job-related crimes
收藏 引用
Procedia computer science 2022年 199卷 540-547页
作者: Yong Shi Wenlu An Jiayu Xue Yi Qu School of Economics and Management University of Chinese Academy of Sciences Beijing 100190 CHINA Research Center on Fictitious Economy & Data Science Chinese Academy of Sciences Beijing 100190 CHINA Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing 100190 CHINA College of Information Science and Technology University of Nebraska at Omaha NE 68182 USA People’s Procuratorate of Shanghai Pudong New District Shanghai 200135 CHINA School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 100190 China
Since the 18th National Congress, the Party Central Committee has greatly enhanced its efforts to "fight corruption and advocate honesty". While achieving excellent results, the rising number of crime cases ... 详细信息
来源: 评论