咨询与建议

限定检索结果

文献类型

  • 627 篇 期刊文献
  • 594 篇 会议

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 834 篇 工学
    • 628 篇 计算机科学与技术...
    • 512 篇 软件工程
    • 184 篇 信息与通信工程
    • 119 篇 电气工程
    • 101 篇 控制科学与工程
    • 99 篇 生物工程
    • 68 篇 生物医学工程(可授...
    • 54 篇 光学工程
    • 49 篇 电子科学与技术(可...
    • 44 篇 化学工程与技术
    • 39 篇 机械工程
    • 38 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 24 篇 建筑学
  • 398 篇 理学
    • 208 篇 数学
    • 125 篇 生物学
    • 75 篇 物理学
    • 74 篇 统计学(可授理学、...
    • 45 篇 化学
    • 31 篇 系统科学
  • 223 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 77 篇 医学
    • 66 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
    • 28 篇 公共卫生与预防医...
  • 54 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 23 篇 农学
  • 7 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 46 篇 feature extracti...
  • 44 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 16 篇 image segmentati...
  • 16 篇 predictive model...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 data models

机构

  • 126 篇 state key labora...
  • 76 篇 state key labora...
  • 36 篇 college of compu...
  • 33 篇 key laboratory o...
  • 32 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 13 篇 xiong jinbo
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,093 篇 英文
  • 115 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1221 条 记 录,以下是971-980 订阅
排序:
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining
Plagiarism Detection of Multi-threaded Programs Using Freque...
收藏 引用
作者: Tian, Zhenzhou Wang, Qing Gao, Cong Chen, Lingwei Wu, DInghao School of Computer Science and Technology Xi'An University of Posts and Telecommunications China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Shaanxi710121 China College of Information Sciences and Technology The Pennsylvania State University University ParkPA16802 United States
Software dynamic birthmark techniques construct birthmarks using the captured execution traces from running the programs, which serve as one of the most promising methods for obfuscation-resilient software plagiarism ... 详细信息
来源: 评论
Plot2API: Recommending graphic API from plot via semantic parsing guided neural network
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Zeyu Huang, Sheng Liu, Zhongxin Yan, Meng Xia, Xin Wang, Bei Yang, Dan Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Technology Zhejiang University Hangzhou China Faculty of Information Technology Monash University Australia Pengcheng Laboratory Shenzhen China
Plot-based Graphic API recommendation (Plot2API) is an unstudied but meaningful issue, which has several important applications in the context of software engineering and data visualization, such as the plotting guida... 详细信息
来源: 评论
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of states
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 809-827页
作者: Gang Xu Ke Xiao Zongpeng Li Xin-Xin Niu Michael Ryan School of Information Science and Technology North China University of TechnologyBeijing100144China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Computer Science Wuhan UniversityHubei430072China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou UniversityGuiyangGuizhou550025China School of Computing Dublin City UniversityDublin 9Ireland.
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a... 详细信息
来源: 评论
MSL: Not All Tokens Are What You Need for Tuning LLM as a Recommender
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Bohao Liu, Feng Chen, Jiawei Lou, Xingyu Zhang, Changwang Wang, Jun Sun, Yuegang Feng, Yan Chen, Chun Wang, Can Zhejiang University Hangzhou China OPPO Research Institute Shenzhen China Intelligence Indeed Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University China College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China
Large language models (LLMs), known for their comprehension capabilities and extensive knowledge, have been increasingly applied to recommendation systems (RS). Given the fundamental gap between the mechanism of LLMs ... 详细信息
来源: 评论
A Class of Elliptic Quasi–Variational–Hemivariational Inequalities with Applications
arXiv
收藏 引用
arXiv 2023年
作者: Migórski, Stanislaw Yao, Jen-Chih Zeng, Shengda College of Applied Mathematics Chengdu University of Information Technology Sichuan Province Chengdu610225 China Jagiellonian University in Krakow Chair of Optimization and Control ul. Lojasiewicza 6 Krakow30348 Poland Center for General Education China Medical University Taichung Taiwan Guangxi Colleges Universities Key Laboratory of Complex System Optimization and Big Data Processing Yulin Normal University Guangxi Yulin537000 China Jagiellonian University in Krakow Faculty of Mathematics and Computer Science ul. Lojasiewicza 6 Krakow30348 Poland
equalities in reflexive Banach spaces. The inequalities contain a convex potential, a locally Lipschitz superpotential, and a solution-dependent set of constraints. Solution existence and compactness of the solution s... 详细信息
来源: 评论
Sharpening semantic gradient in a planarized sentence representation
收藏 引用
Neural Networks 2025年 190卷 107687页
作者: Caiwei Yang Yanping Chen Shuai Yu Bo Dong Jiwei Qin Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Guizhou University Guiyang 550025 Guizhou PR China State Key Laboratory of Public Big Data Guizhou university Guiyang 550025 Guizhou PR China Department of Computer Science and Technology Xi’an Jiaotong University Xi’an 710049 Shanxi PR China College of Information Science and Engineering Xinjiang University Urumqi 830046 Xinjiang PR China
Mapping a sentence into a two-dimensional representation has the advantage of unfolding nested semantic structures in a sentence and encoding the interaction between tokens. In the planarized sentence representation, ... 详细信息
来源: 评论
Group-wise inhibition based feature regularization for robust classification
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Haozhe Wu, Haoqian Xie, Weicheng Liu, Feng Shen, Linlin 1Computer Vision Institute College of Computer Science and Software Engineering 2SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society 3National Engineering Laboratory for Big Data System Computing Technology 4Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen 518060 China
The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most... 详细信息
来源: 评论
A Gait Recognition Method Based on the Combination of Human Body Posture and Human Body Contour
A Gait Recognition Method Based on the Combination of Human ...
收藏 引用
作者: Yue Ma Chenghao Wei Hao Long Key Laboratory of Impression Evidence Examination and Identification Technology(Criminal Investigation Police University of China) Ministry of Public Security Big Data Institute College of Computer Science and Software EngineeringShenzhen University
Aiming at the issues that affect the gait recognition, such as outfit changes and carryon-objects during gait recognition, this paper proposes a gait recognition method based on the improved GaitSet network, which rel... 详细信息
来源: 评论
A game theoretical analysis of risk adaptive access control for privacy preserving
A game theoretical analysis of risk adaptive access control ...
收藏 引用
2019 International Conference on Networking and Network Applications, NaNA 2019
作者: Ding, Hongfa Peng, Changgen Tian, Youliang Xiang, Shuwen College of Mathematics and Statistics State Key Laboratory of Public Big Data Guizhou University Guiyang550025 China College of Information Guizhou University of Finance and Economics Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China
More and more security and privacy issues are arising as new technologies, such as big data and cloud computing, are widely applied in nowadays. For decreasing the privacy breaches in access control system under openi... 详细信息
来源: 评论
Spectral Clustering of Web Services by Fusing Document-based and Tag-based Topics Similarity
Spectral Clustering of Web Services by Fusing Document-based...
收藏 引用
International Conference on Advanced Cloud and big data (CBD)
作者: Liping Deng Wen Zheng Institute of Public-Safety and Big Data College of Data Science Taiyuan University of Technology Taiyuan China Key Laboratory of Impact and Safety Engineering Ministry of Education Ningbo University Ningbo China Center for Healthy Big Data Changzhi Medical College Changzhi China
This paper proposes a Web services clustering method based on network and integration tags. Firstly, a Document-Tag LDA model(DTag-LDA), is proposed, which considers the tag information of Web services and the tag can... 详细信息
来源: 评论