咨询与建议

限定检索结果

文献类型

  • 426 篇 期刊文献
  • 410 篇 会议

馆藏范围

  • 836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 391 篇 计算机科学与技术...
    • 305 篇 软件工程
    • 103 篇 信息与通信工程
    • 82 篇 电气工程
    • 77 篇 生物工程
    • 66 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 36 篇 交通运输工程
    • 31 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 材料科学与工程(可...
  • 269 篇 理学
    • 137 篇 数学
    • 88 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 28 篇 化学
    • 17 篇 系统科学
  • 148 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 20 篇 法学
    • 14 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 26 篇 training
  • 25 篇 computational mo...
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 14 篇 contrastive lear...
  • 14 篇 predictive model...
  • 14 篇 machine learning
  • 13 篇 costs
  • 13 篇 codes
  • 12 篇 graph neural net...
  • 11 篇 scalability
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 convolution
  • 11 篇 optimization

机构

  • 132 篇 national enginee...
  • 102 篇 national enginee...
  • 75 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 huazhong univers...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 20 篇 national enginee...
  • 19 篇 zhejiang lab
  • 18 篇 school of comput...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 15 篇 guangdong provin...
  • 15 篇 school of inform...
  • 13 篇 huazhong univers...

作者

  • 130 篇 jin hai
  • 129 篇 hai jin
  • 43 篇 xiaofei liao
  • 39 篇 shen linlin
  • 28 篇 liao xiaofei
  • 25 篇 li jianqiang
  • 24 篇 long zheng
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu huang
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhou ziqi

语言

  • 757 篇 英文
  • 69 篇 其他
  • 13 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology"
836 条 记 录,以下是381-390 订阅
排序:
HYPERBOLIC HYPERGRAPH NEURAL NETWORKS FOR MULTI-RELATIONAL KNOWLEDGE HYPERGRAPH REPRESENTATION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Mengfan Shi, Xuanhua Qiao, Chenqi Zhang, Teng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Knowledge hypergraphs generalize knowledge graphs using hyperedges to connect multiple entities and depict complicated relations. Existing methods either transform hyperedges into an easier-to-handle set of binary rel... 详细信息
来源: 评论
Clustering With Adaptive Graph Learning and Spectral Rotation  7
Clustering With Adaptive Graph Learning and Spectral Rotatio...
收藏 引用
7th International Conference on Vision, Image and Signal Processing, ICVISP 2023
作者: Yuan, Ge Zhou, Jie Huang, Chucheng Gao, Can Wang, Yangbo Shen, Xinrui National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China College of Mathematics and Statistics Shenzhen University Guangdong Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China
Prototype-based clustering algorithms have garnered considerable attention in the field of machine learning due to their efficiency and interpretability. Nonetheless, these algorithms often face performance degradatio... 详细信息
来源: 评论
Generative Positive-Unlabeled Classification for Hunting Small Open Reading Frames
Generative Positive-Unlabeled Classification for Hunting Sma...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jie Chen Wenbin Liao Du Wen Jianqiang Li Fangzhong Wang College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Laboratory of Synthetic Microbiology School of Chemical Engineering & Technology Tianjin University China
The annotation of Open Reading Frames (ORFs) is a crucial step in gene annotation, as it precisely delineates the specific regions of expressed genes. However, small Open Reading Frames (smORFs), in comparison to ORFs...
来源: 评论
Personalized Federated Learning with Enhanced Implicit Generalization
Personalized Federated Learning with Enhanced Implicit Gener...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Heping Liu Songbai Liu Junkai Ji Qiuzhen Lin Jianyong Chen Kay Chen Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University
Integrating personalization into federated learning is crucial for addressing data heterogeneity and surpassing the limitations of a single aggregated model. Personalized federated learning excels at capturing inter-c... 详细信息
来源: 评论
Node Importance Estimation Leveraging LLMs for Semantic Augmentation in Knowledge Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Xinyu Zhang, Tianyu Hou, Chengbin Wang, Jinbao Xue, Jianye Lv, Hairong School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China Department of Automation Tsinghua University Beijing China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Node Importance Estimation (NIE) is a task that quantifies the importance of node in a graph. Recent research has investigated to exploit various information from Knowledge Graphs (KGs) to estimate node importance sco... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Service Decomposition method for multimodal data exchange scenarios  3
Service Decomposition method for multimodal data exchange sc...
收藏 引用
3rd International Conference on Computer Science and Management technology, ICCSMT 2022
作者: Jiang, Deyou Huang, Lei Tian, Hanyu Xie, Yujie Li, Xiaoming Beijing Jiaotong University School of Economics and Management Beijing China Beijing Jingwei Information Technologies Limited Company National Engineering Laboratory of Comprehensive Transportation Big Data Application Technology Beijing China Institute of Computing Technologies China Academy of Railway Sciences Beijing China
Influenced by the complexity of multimodal data exchange scenarios and their differences in data flow graph construction, the objective basis of existing service decomposition methods is not sufficient, and the granul... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
µVulDeePecker: A deep learning-based system for multiclass vulnerability detection
arXiv
收藏 引用
arXiv 2020年
作者: Zou, Deqing Wang, Sujuan Xu, Shouhuai Li, Zhen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Texas at San Antonio San AntonioTX78249 United States
Fine-grained software vulnerability detection is an important and challenging problem. Ideally, a detection system (or detector) not only should be able to detect whether or not a program contains vulnerabilities, but... 详细信息
来源: 评论
China in the eyes of news media:a case study under COVID-19 epidemic
收藏 引用
Frontiers of Information technology & Electronic engineering 2021年 第11期22卷 1443-1457页
作者: Hong HUANG Zhexue CHEN Xuanhua SHI Chenxu WANG Zepeng HE Hai JIN Mingxin ZHANG Zongya LI National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Journalism and Information Communication Huazhong University of Science and TechnologyWuhan430074China
As one of the early COVID-19 epidemic outbreak areas,China attracted the global news media’s attention at the beginning of *** the epidemic period,Chinese people united and actively fought against the ***,in the eyes... 详细信息
来源: 评论