咨询与建议

限定检索结果

文献类型

  • 463 篇 会议
  • 372 篇 期刊文献

馆藏范围

  • 835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 482 篇 工学
    • 379 篇 计算机科学与技术...
    • 310 篇 软件工程
    • 109 篇 信息与通信工程
    • 72 篇 生物工程
    • 67 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 47 篇 控制科学与工程
    • 42 篇 生物医学工程(可授...
    • 40 篇 光学工程
    • 19 篇 仪器科学与技术
    • 19 篇 动力工程及工程热...
    • 19 篇 网络空间安全
    • 18 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 交通运输工程
    • 12 篇 建筑学
  • 251 篇 理学
    • 127 篇 数学
    • 89 篇 生物学
    • 49 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 22 篇 化学
    • 17 篇 系统科学
  • 126 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 46 篇 医学
    • 37 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 17 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 18 篇 社会学
  • 11 篇 农学
  • 9 篇 经济学
  • 5 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 44 篇 semantics
  • 37 篇 computational mo...
  • 36 篇 feature extracti...
  • 26 篇 deep learning
  • 23 篇 predictive model...
  • 23 篇 accuracy
  • 23 篇 training
  • 18 篇 memory managemen...
  • 18 篇 data models
  • 15 篇 machine learning
  • 14 篇 neural networks
  • 14 篇 convolution
  • 14 篇 data mining
  • 14 篇 federated learni...
  • 13 篇 task analysis
  • 13 篇 image segmentati...
  • 12 篇 deep neural netw...
  • 12 篇 adaptation model...
  • 11 篇 scalability
  • 11 篇 graph neural net...

机构

  • 99 篇 national enginee...
  • 64 篇 school of comput...
  • 58 篇 shandong provinc...
  • 49 篇 school of cyber ...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 services computi...
  • 27 篇 huazhong univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 18 篇 school of softwa...
  • 17 篇 zhejiang lab
  • 16 篇 beijing advanced...
  • 14 篇 school of inform...
  • 12 篇 national enginee...
  • 12 篇 university of ch...
  • 12 篇 national enginee...
  • 12 篇 huazhong univers...

作者

  • 124 篇 jin hai
  • 122 篇 hai jin
  • 42 篇 xiaofei liao
  • 26 篇 liao xiaofei
  • 23 篇 hu shengshan
  • 21 篇 long zheng
  • 21 篇 haikun liu
  • 19 篇 yu zhang
  • 17 篇 zou deqing
  • 16 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 yu huang
  • 13 篇 jiang xiao
  • 13 篇 wang lihui
  • 12 篇 li zhen
  • 12 篇 wan yao
  • 12 篇 shi xuanhua
  • 12 篇 li minghui
  • 11 篇 qin yongbin
  • 11 篇 zhang hongyu

语言

  • 779 篇 英文
  • 46 篇 其他
  • 23 篇 中文
检索条件"机构=Technology Research Center of Big Data and Social Computing"
835 条 记 录,以下是41-50 订阅
排序:
AlphaFold2 and its applications in the fields of biology and medicine
收藏 引用
Signal Transduction and Targeted Therapy 2023年 第4期8卷 1630-1643页
作者: Zhenyu Yang Xiaoxi Zeng Yi Zhao Runsheng Chen West China Biomedical Big Data Center West China HospitalSichuan UniversityChengdu 610041China Key Laboratory of Intelligent Information Processing Advanced Computer Research CenterInstitute of Computing TechnologyChinese Academy of SciencesBeijing 100190China Key Laboratory of RNA Biology Center for Big Data Research in HealthInstitute of BiophysicsChinese Academy of SciencesBeijing 100101China Pingshan Translational Medicine Center Shenzhen Bay LaboratoryShenzhen 518118China
AlphaFold2(AF2)is an artificial intelligence(AI)system developed by DeepMind that can predict three-dimensional(3D)structures of proteins from amino acid sequences with atomic-level *** structure prediction is one of ... 详细信息
来源: 评论
Task Separation and Knowledge Sharing for Class Incremental Learning  5
Task Separation and Knowledge Sharing for Class Incremental ...
收藏 引用
5th International Conference on Intelligent computing and Human-Computer Interaction, ICHCI 2024
作者: Zhang, Jiali Qiao, Xiaoyan School of Computer Science and Technology Shandong Technology and Business University Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Immersion Technology and Evaluation Shandong Engineering Research Center Shandong Yantai China School of Mathematics and Information Science Shandong Technology and Business University Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Immersion Technology and Evaluation Shandong Engineering Research Center Shandong Yantai China
Methods based on dynamically expanding architectures can effectively mitigate catastrophic forgetting in class incremental learning (CIL), but they often overlook information sharing and integration between subnetwork... 详细信息
来源: 评论
A Graph with Adaptive AdjacencyMatrix for Relation Extraction
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4129-4147页
作者: Run Yang YanpingChen Jiaxin Yan Yongbin Qin Engineering Research Center of Text Computing&Cognitive Intelligence Ministry of EducationGuizhou UniversityGuiyang550025China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China College of Computer Science and Technology Guizhou UniversityGuiyang550025China
The relation is a semantic expression relevant to two named entities in a *** a sentence usually contains several named entities,it is essential to learn a structured sentence representation that encodes dependency in... 详细信息
来源: 评论
Towards High-throughput and Low-latency Billion-scale Vector Search via CPU/GPU Collaborative Filtering and Re-ranking  23
Towards High-throughput and Low-latency Billion-scale Vector...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Tian, Bing Liu, Haikun Tang, Yuhang Xiao, Shihai Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Xuecang Zhu, Junhua Zhang, Yu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd. China
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
FedRKG: A Privacy-Preserving Federated Recommendation Framework via Knowledge Graph Enhancement  18th
FedRKG: A Privacy-Preserving Federated Recommendation Framew...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud computing, GPC 2023
作者: Yao, Dezhong Liu, Tongtong Cao, Qi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computing Science University of Glasgow Glasgow United Kingdom
Federated Learning (FL) has emerged as a promising approach for preserving data privacy in recommendation systems by training models locally. Recently, Graph Neural Networks (GNN) have gained popularity in recommendat... 详细信息
来源: 评论
Image Denoising Method Based on Channel Compression and Split-Attention Mechanism  5
Image Denoising Method Based on Channel Compression and Spli...
收藏 引用
5th International Conference on Computer Engineering and Intelligent Control, ICCEIC 2024
作者: Sun, Hao Qiao, Xiaoyan School of Computer Science and Technology Shandong Technology and Business University Technology and Evaluation Shandong Engineering Research Center Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Immersion Shandong Yantai China
In the image restoration task, how to make full use of spatial and channel feature information to improve the reconstruction quality of the model without significantly increasing the computational complexity is an imp... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
CDA-GNN: A Chain-driven Accelerator for Efficient Asynchronous Graph Neural Network  24
CDA-GNN: A Chain-driven Accelerator for Efficient Asynchrono...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Yu, Hui Zhang, Yu He, Ligang He, Donghao Li, Qikun Zhao, Jin Liao, Xiaofei Jin, Hai Gu, Lin Liu, Haikun National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science University of Warwick United Kingdom
Asynchronous Graph Neural Network (AGNN) has attracted much research attention because it enables faster convergence speed than the synchronous GNN. However, existing software/hardware solutions suffer from redundant ... 详细信息
来源: 评论