咨询与建议

限定检索结果

文献类型

  • 437 篇 会议
  • 423 篇 期刊文献

馆藏范围

  • 860 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 534 篇 工学
    • 411 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 100 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 78 篇 生物工程
    • 76 篇 电气工程
    • 40 篇 电子科学与技术(可...
    • 33 篇 交通运输工程
    • 30 篇 生物医学工程(可授...
    • 29 篇 机械工程
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 13 篇 材料科学与工程(可...
  • 265 篇 理学
    • 133 篇 数学
    • 88 篇 生物学
    • 44 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 29 篇 化学
    • 17 篇 系统科学
  • 145 篇 管理学
    • 82 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 27 篇 feature extracti...
  • 27 篇 training
  • 26 篇 computational mo...
  • 24 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 contrastive lear...
  • 15 篇 predictive model...
  • 15 篇 machine learning
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 13 篇 deep neural netw...
  • 13 篇 graph neural net...
  • 13 篇 costs
  • 13 篇 codes
  • 12 篇 reinforcement le...
  • 12 篇 convolution
  • 12 篇 adaptation model...
  • 11 篇 scalability

机构

  • 145 篇 national enginee...
  • 103 篇 national enginee...
  • 82 篇 college of compu...
  • 63 篇 school of comput...
  • 55 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 huazhong univers...
  • 29 篇 cluster and grid...
  • 29 篇 shenzhen univers...
  • 28 篇 hubei key labora...
  • 24 篇 national enginee...
  • 22 篇 school of softwa...
  • 21 篇 guangdong provin...
  • 20 篇 school of comput...
  • 18 篇 shenzhen institu...
  • 18 篇 zhejiang lab
  • 17 篇 school of inform...
  • 13 篇 huazhong univers...

作者

  • 129 篇 jin hai
  • 125 篇 hai jin
  • 43 篇 xiaofei liao
  • 43 篇 shen linlin
  • 29 篇 li jianqiang
  • 27 篇 liao xiaofei
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 21 篇 haikun liu
  • 18 篇 linlin shen
  • 17 篇 li tianrui
  • 17 篇 zhang leo yu
  • 17 篇 yu zhang
  • 16 篇 zou deqing
  • 15 篇 wang jinbao
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui

语言

  • 735 篇 英文
  • 115 篇 其他
  • 14 篇 中文
检索条件"机构=The National Engineering Laboratory of Big Data System Computing Technology"
860 条 记 录,以下是171-180 订阅
排序:
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
Targeted Pareto Optimization for Subset Selection With Monotone Objective Function and Cardinality Constraint
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Shang, Ke Wu, Guotong Pang, Lie Meng Ishibuchi, Hisao National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
Subset selection, a fundamental problem in various domains, is to choose a subset of elements from a large candidate set under a given objective or multiple objectives. Pareto optimization for subset selection (POSS) ... 详细信息
来源: 评论
A multi-source signals separation algorithm for identifying the threatening signals applied in Fiber-Optic Distributed Acoustic Sensor
A multi-source signals separation algorithm for identifying ...
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: He, Tao Zhang, Shixiong Li, Hao Yan, Zhijun Liu, Deming Sun, Qizhen School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Wuhan430074 China Optics Valley Laboratory Huazhong University of Science and Technology School of Optical and Electronic Information National Laboratory for Optoelectronics National Engineering Laboratory for Next Generation Internet Access System Wuhan430074 China
A multi-source signals separation algorithm is proposed to identify the potential threatening signals submerged in the strong background noises. Finally, the recognition rate of the mixed signals is improved from 62.8... 详细信息
来源: 评论
Dynamic Bi-Elman Attention Networks (DBEAN): Dual-Directional Context-Aware Representation Learning for Enhanced Text Classification
arXiv
收藏 引用
arXiv 2025年
作者: Liao, Mengyao Lai, Zhenglin Xu, Dong College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Text classification, a fundamental task in natural language processing (NLP), aims to categorize textual data into predefined labels. Traditional methods struggled with complex linguistic structures and semantic depen... 详细信息
来源: 评论
Visual Explanations: Activation-Based Acute Lymphoblastic Leukemia Cell Classification
Visual Explanations: Activation-Based Acute Lymphoblastic Le...
收藏 引用
IEEE International Conference on Development and Learning, ICDL
作者: Muhammad Umair Raza Adil Nawaz Xintong Liu Zhuangzhuang Chen Victor C.M. Leung Jie Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University
The saliency methods are widely used for generating heatmaps that emphasize the important portions of an input image for deep networks on a specific classification task. Interpretability is crucial for deploying deep ...
来源: 评论
Investigation of Traffic Radar Coverage Efficiency under Different Placement Strategies
Investigation of Traffic Radar Coverage Efficiency under Dif...
收藏 引用
International Conference on Internet of Things 2024, ICIoT 2024
作者: Yao, Shun Zhou, Jin Chieng, David Kwong, Chiew Foong Lee, Boon Giin Li, Jianqiang Chen, Yusen Next-Generation Internet of Everything Laboratory Department of Electrical and Electronic Engineering University of Nottingham Ningbo China Ningbo China School of Computer Science University of Nottingham Ningbo China Ningbo China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Zhejiang Communication Investment Group Co. Ltd. Zhejiang China
This paper presents a comprehensive investigation of traffic radar coverage efficiency under different placement strategies in collaboration with Zhejiang Communications Investment Group Company Limited (CICO). The ov... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
AccelES: Accelerating Top-K SpMV for Embedding Similarity via Low-bit Pruning
AccelES: Accelerating Top-K SpMV for Embedding Similarity vi...
收藏 引用
IEEE Symposium on High-Performance Computer Architecture
作者: Jiaqi Zhai Xuanhua Shi Kaiyi Huang Chencheng Ye Weifang Hu Bingsheng He Hai Jin National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore
In the realm of recommendation systems, achieving real-time performance in embedding similarity tasks is often hindered by the limitations of traditional Top-K sparse matrix-vector multiplication (SpMV) methods, which... 详细信息
来源: 评论
Towards trustworthy blockchain systems in the era of “Internet of value”: development, challenges, and future trends
收藏 引用
Science China(Information Sciences) 2022年 第5期65卷 250-260页
作者: Hai JIN Jiang XIAO National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology
Since the advent of cryptocurrencies such as Bitcoin, blockchain, as their underlying technologies,has drawn a massive amount of attention from both academia and the industry. This ever-evolving technology inherits t... 详细信息
来源: 评论