咨询与建议

限定检索结果

文献类型

  • 324 篇 期刊文献
  • 253 篇 会议

馆藏范围

  • 577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 356 篇 工学
    • 251 篇 计算机科学与技术...
    • 210 篇 软件工程
    • 91 篇 信息与通信工程
    • 62 篇 电气工程
    • 51 篇 生物工程
    • 48 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 26 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 20 篇 化学工程与技术
    • 20 篇 交通运输工程
    • 16 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 200 篇 理学
    • 100 篇 数学
    • 59 篇 生物学
    • 45 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 21 篇 化学
    • 16 篇 系统科学
  • 103 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 30 篇 医学
    • 21 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
    • 8 篇 药学(可授医学、理...
  • 15 篇 法学
    • 12 篇 社会学
  • 5 篇 经济学
  • 4 篇 教育学
  • 4 篇 农学

主题

  • 18 篇 training
  • 17 篇 feature extracti...
  • 15 篇 computational mo...
  • 13 篇 deep learning
  • 13 篇 semantics
  • 12 篇 reinforcement le...
  • 12 篇 machine learning
  • 11 篇 accuracy
  • 10 篇 task analysis
  • 10 篇 contrastive lear...
  • 9 篇 speech processin...
  • 9 篇 codes
  • 9 篇 data models
  • 9 篇 robustness
  • 8 篇 deep neural netw...
  • 8 篇 optimization
  • 8 篇 predictive model...
  • 8 篇 evolutionary com...
  • 7 篇 scalability
  • 7 篇 big data

机构

  • 131 篇 national enginee...
  • 77 篇 college of compu...
  • 50 篇 school of comput...
  • 44 篇 school of cyber ...
  • 31 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei engineerin...
  • 26 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 18 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 17 篇 peng cheng labor...
  • 16 篇 shenzhen huazhon...
  • 16 篇 school of softwa...
  • 15 篇 department of el...
  • 14 篇 school of inform...
  • 13 篇 huazhong univers...
  • 13 篇 guangdong provin...
  • 13 篇 shenzhen researc...

作者

  • 44 篇 jin hai
  • 40 篇 shen linlin
  • 40 篇 hai jin
  • 24 篇 li jianqiang
  • 20 篇 hu shengshan
  • 19 篇 zhang rui
  • 17 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 deqing zou
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 11 篇 wang jinbao
  • 11 篇 zou deqing
  • 11 篇 mei weidong
  • 10 篇 gao can
  • 10 篇 jie chen
  • 9 篇 zhu lipeng
  • 8 篇 zhou jie
  • 8 篇 ji junkai

语言

  • 518 篇 英文
  • 52 篇 其他
  • 8 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University"
577 条 记 录,以下是91-100 订阅
排序:
An Improved YOLOv5s-Based Smoke Detection system for Outdoor Parking Lots
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
AFaVS: Accurate Yet Fast Version Switching for Graph Processing systems  39
AFaVS: Accurate Yet Fast Version Switching for Graph Process...
收藏 引用
39th IEEE International Conference on data engineering, ICDE 2023
作者: Zheng, Long Ye, Xiangyu Liu, Haifeng Wang, Qinggang Huang, Yu Gui, Chuangyi Yao, Pengcheng Liao, Xiaofei Jin, Hai Xue, Jingling Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Laboratory Wuhan430074 China Zhejiang Lab Hangzhou311121 China Unsw School of Computer Science and Engineering Sydney Australia
Multi-version graph processing has been widely used to solve many real-world problems. The process of the multi-version graph processing typically includes: (1) a history graph version switching at a specific time and... 详细信息
来源: 评论
Impulsive Control of Nonlinear Multi-Agent systems: A Hybrid Fuzzy Adaptive and Event-Triggered Strategy
收藏 引用
IEEE Transactions on Fuzzy systems 2025年
作者: Han, Fang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China
This paper presents a hybrid control approach that integrates an adaptive fuzzy mechanism with an event-triggered impulse strategy to address consensus control challenges in nonlinear Multi-Agent systems (MASs) with u... 详细信息
来源: 评论
Personalized Federated Learning with Enhanced Implicit Generalization
Personalized Federated Learning with Enhanced Implicit Gener...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Heping Liu Songbai Liu Junkai Ji Qiuzhen Lin Jianyong Chen Kay Chen Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computing The Hong Kong Polytechnic University
Integrating personalization into federated learning is crucial for addressing data heterogeneity and surpassing the limitations of a single aggregated model. Personalized federated learning excels at capturing inter-c... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Visual Explanations: Activation-Based Acute Lymphoblastic Leukemia Cell Classification
Visual Explanations: Activation-Based Acute Lymphoblastic Le...
收藏 引用
IEEE International Conference on Development and Learning, ICDL
作者: Muhammad Umair Raza Adil Nawaz Xintong Liu Zhuangzhuang Chen Victor C.M. Leung Jie Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University
The saliency methods are widely used for generating heatmaps that emphasize the important portions of an input image for deep networks on a specific classification task. Interpretability is crucial for deploying deep ...
来源: 评论
Hash Function Based on Quantum Walks with Two-Step Memory
Hash Function Based on Quantum Walks with Two-Step Memory
收藏 引用
2024 International Conference on computing, Machine Learning and data Science, CMLDS 2024
作者: Zhou, Qing Lu, Songfeng Yang, Hao Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China Shenzhen Huazhong University of Science and Technology Research Institute Guangdong Shenzhen China
We propose a new quantum-walk-based hash function QHF2M by combining two types of quantum walks with two-step memory and numerically test its statistical performance. The test result shows that QHF2M is on a par with ... 详细信息
来源: 评论
λGrapher: A Resource-Efficient Serverless system for GNN Serving through Graph Sharing  24
λGrapher: A Resource-Efficient Serverless System for GNN Se...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Hu, Haichuan Liu, Fangming Pei, Qiangyu Yuan, Yongjie Xu, Zichen Wang, Lin National Engineering Research Center for Big Data Technology and System The Services Computing Technology and System Lab Cluster and Grid Computing Lab in the School of Computer Science and Technology Huazhong University of Science and Technology 1037 Luoyu Road Wuhan China Peng Cheng Laboratory Huazhong University of Science and Technology China School of Mathematics and Computer Science Nanchang University China Paderborn University Paderborn Germany
Graph Neural Networks (GNNs) have been increasingly adopted for graph analysis in web applications such as social networks. Yet, efficient GNN serving remains a critical challenge due to high workload fluctuations and... 详细信息
来源: 评论
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity  22
Dynamic Searchable Scheme with Forward Privacy for Encrypted...
收藏 引用
22nd IEEE International Conference on Trust, Security and Privacy in computing and Communications, TrustCom 2023
作者: Al Sibahee, Mustafa A. Luo, Chengwen Zhang, Jin Huang, Yijing Abduljabbar, Zaid Ameen Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Iraq University College Computer Technology Engineering Department Basrah61004 Iraq University of Basrah College of Education for Pure Sciences Department of Computer Science Basrah61004 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518000 China
Document retrieval plays an essential role in many real-world applications especially when the data storage is outsourced. Due to the great advantages offered by cloud computing, clients tend to outsource their person... 详细信息
来源: 评论