咨询与建议

限定检索结果

文献类型

  • 426 篇 期刊文献
  • 410 篇 会议

馆藏范围

  • 836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 391 篇 计算机科学与技术...
    • 305 篇 软件工程
    • 103 篇 信息与通信工程
    • 82 篇 电气工程
    • 77 篇 生物工程
    • 66 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 36 篇 交通运输工程
    • 31 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 材料科学与工程(可...
  • 269 篇 理学
    • 137 篇 数学
    • 88 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 28 篇 化学
    • 17 篇 系统科学
  • 148 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 20 篇 法学
    • 14 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 26 篇 training
  • 25 篇 computational mo...
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 14 篇 contrastive lear...
  • 14 篇 predictive model...
  • 14 篇 machine learning
  • 13 篇 costs
  • 13 篇 codes
  • 12 篇 graph neural net...
  • 11 篇 scalability
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 convolution
  • 11 篇 optimization

机构

  • 132 篇 national enginee...
  • 102 篇 national enginee...
  • 75 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 huazhong univers...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 20 篇 national enginee...
  • 19 篇 zhejiang lab
  • 18 篇 school of comput...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 15 篇 guangdong provin...
  • 15 篇 school of inform...
  • 13 篇 huazhong univers...

作者

  • 130 篇 jin hai
  • 129 篇 hai jin
  • 43 篇 xiaofei liao
  • 39 篇 shen linlin
  • 28 篇 liao xiaofei
  • 25 篇 li jianqiang
  • 24 篇 long zheng
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu huang
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhou ziqi

语言

  • 757 篇 英文
  • 69 篇 其他
  • 13 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology"
836 条 记 录,以下是271-280 订阅
排序:
A Novel Multi-layered Minutiae Extractor Based on OCT Fingerprints  16th
A Novel Multi-layered Minutiae Extractor Based on OCT Finge...
收藏 引用
16th Chinese Conference on Biometric Recognition, CCBR 2022
作者: Zeng, Wenfeng Zhang, Wentian Liu, Feng Tan, Xu Li, Qin College of Computer Science and Software Engineering Shenzhen University Shenzhen China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Senzhen China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Software Engineering Shenzhen Institute of Information Technology Shenzhen China
Fingerprints of Optical Coherence Tomography (OCT) imaging provide 3D volume data which have the nature property of multi-layered tissue structure. This paper, for the first time, attempts to extract minutiae for OCT-... 详细信息
来源: 评论
Local and Global Feature-Aware Dual-Branch Networks for Plant Disease Recognition
收藏 引用
植物表型组学(英文) 2024年 第4期6卷 828-840页
作者: Jianwu Lin Xin Zhang Yongbin Qin Shengxian Yang Xingtian Wen Tomislav Cernava Quirico Migheli Xiaoyulong Chen Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China Guizhou-Europe Environmental Biotechnology and Agricultural Informatics Oversea Innovation Center in Guizhou University Guizhou Provincial Science and Technology DepartmentGuiyang 550025China Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China Guizhou-Europe Environmental Biotechnology and Agricultural Informatics Oversea Innovation Center in Guizhou University Guizhou Provincial Science and Technology DepartmentGuiyang 550025China College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China School of Biological Sciences Faculty of Environmental and Life SciencesUniversity of SouthamptonSouthampton S017 1BJUK Dipartimento di Agraria and NRD-Nucleo di Ricerca sulla Desertificazione Università degli Studi di SassariSassariItaly Guizhou-Europe Environmental Biotechnology and Agricultural Informatics Oversea Innovation Center in Guizhou University Guizhou Provincial Science and Technology DepartmentGuiyang 550025China College of Life Sciences Guizhou UniversityGuiyang 550025China
Accurate identification of plant diseases is important for ensuring the safety of agricultural *** neural networks(CNNs)and visual transformers(VTs)can extract effective representations of images and have been widely ... 详细信息
来源: 评论
Meta-Chain: User-Aware Cross-Layer Space Allocation Strategy for Blockchain Storage systems: Work-in-Progress
Meta-Chain: User-Aware Cross-Layer Space Allocation Strategy...
收藏 引用
International Conference on Hardware/Software Codesign and system Synthesis (CODES)
作者: Jing Liao Zhengda Li Yi Wang College of Computer Science and Software Engineering The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Current LSM-Tree-based blockchain storage system will assign the data from multiple system users to the same disk drive. This will lead to the inefficient usage of physical spaces in disk and cause extra compaction op... 详细信息
来源: 评论
A multi-source signals separation algorithm for identifying the threatening signals applied in Fiber-Optic Distributed Acoustic Sensor
A multi-source signals separation algorithm for identifying ...
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: He, Tao Zhang, Shixiong Li, Hao Yan, Zhijun Liu, Deming Sun, Qizhen School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan430074 China Optics Valley Laboratory Huazhong University of Science and Technology School of Optical and Electronic Information National Laboratory for Optoelectronics National Engineering Laboratory for Next Generation Internet Access System Wuhan430074 China
A multi-source signals separation algorithm is proposed to identify the potential threatening signals submerged in the strong background noises. Finally, the recognition rate of the mixed signals is improved from 62.8... 详细信息
来源: 评论
Dispatcher: Resource-aware Nakamoto Blockchain via Hierarchical Topology and Adaptive Incentives
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第2期3卷 1-20页
作者: Hai Jin Shuohua Dong Xiaohai Dai Yuandi Cai Jiang Xiao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Mainstream blockchain systems such as Bitcoin and Ethereum are revolutionizing the financial industry by adopting the Nakamoto consensus protocol, i.e., Proof-of-Work (PoW). Only nodes with sufficient computing resour... 详细信息
来源: 评论
Visual Explanations: Activation-Based Acute Lymphoblastic Leukemia Cell Classification
Visual Explanations: Activation-Based Acute Lymphoblastic Le...
收藏 引用
IEEE International Conference on Development and Learning, ICDL
作者: Muhammad Umair Raza Adil Nawaz Xintong Liu Zhuangzhuang Chen Victor C.M. Leung Jie Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University
The saliency methods are widely used for generating heatmaps that emphasize the important portions of an input image for deep networks on a specific classification task. Interpretability is crucial for deploying deep ...
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection system With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论
MSE-CapsPPISP: Spatial Hierarchical Protein-Protein Interaction Sites Prediction Using Squeeze-and-Excitation Capsule Networks
MSE-CapsPPISP: Spatial Hierarchical Protein-Protein Interact...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Weipeng Lv Changkun Jiang Jianqiang Li College of Computer Science and Software Engineering and the National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
The discovery of protein-protein interaction sites (PPIs) is vital for exploring the principle of PPI and understanding the nature of life activities. Developing computational approaches to predict PPIs can effectivel... 详细信息
来源: 评论
X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream Analytics
X-Stream: A Flexible, Adaptive Video Transformer for Privacy...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Dou Feng Lin Wang Shutong Chen Lingching Tung Fangming Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Paderborn University Germany National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Guangxi University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Peng Cheng Laboratory China
Video stream analytics (VSA) systems fuel many exciting applications that facilitate people’s lives, but also raise critical concerns about exposing too much individuals’ privacy. To alleviate these concerns, variou... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论