咨询与建议

限定检索结果

文献类型

  • 443 篇 会议
  • 418 篇 期刊文献

馆藏范围

  • 861 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 524 篇 工学
    • 402 篇 计算机科学与技术...
    • 311 篇 软件工程
    • 101 篇 信息与通信工程
    • 78 篇 生物工程
    • 74 篇 电气工程
    • 72 篇 控制科学与工程
    • 38 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 31 篇 交通运输工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 光学工程
    • 23 篇 化学工程与技术
    • 20 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 13 篇 材料科学与工程(可...
    • 11 篇 建筑学
  • 262 篇 理学
    • 134 篇 数学
    • 88 篇 生物学
    • 43 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 27 篇 化学
    • 15 篇 系统科学
  • 143 篇 管理学
    • 82 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 33 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 21 篇 法学
    • 16 篇 社会学
  • 10 篇 经济学
  • 6 篇 农学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 32 篇 feature extracti...
  • 30 篇 training
  • 29 篇 computational mo...
  • 24 篇 deep learning
  • 23 篇 accuracy
  • 19 篇 contrastive lear...
  • 16 篇 federated learni...
  • 15 篇 predictive model...
  • 15 篇 machine learning
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 optimization
  • 14 篇 codes
  • 14 篇 adaptation model...
  • 13 篇 deep neural netw...
  • 13 篇 memory managemen...
  • 13 篇 convolution
  • 13 篇 robustness
  • 12 篇 scalability

机构

  • 145 篇 national enginee...
  • 102 篇 national enginee...
  • 82 篇 college of compu...
  • 64 篇 school of comput...
  • 54 篇 school of cyber ...
  • 40 篇 national enginee...
  • 33 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 cluster and grid...
  • 29 篇 shenzhen univers...
  • 28 篇 huazhong univers...
  • 28 篇 hubei key labora...
  • 23 篇 national enginee...
  • 22 篇 school of softwa...
  • 21 篇 guangdong provin...
  • 21 篇 key laboratory o...
  • 19 篇 shenzhen institu...
  • 18 篇 school of comput...
  • 17 篇 shandong enginee...
  • 17 篇 school of inform...

作者

  • 125 篇 hai jin
  • 124 篇 jin hai
  • 44 篇 shen linlin
  • 43 篇 xiaofei liao
  • 29 篇 li jianqiang
  • 25 篇 hu shengshan
  • 22 篇 long zheng
  • 22 篇 liao xiaofei
  • 21 篇 haikun liu
  • 17 篇 zhang leo yu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 li tianrui
  • 16 篇 zou deqing
  • 16 篇 deqing zou
  • 15 篇 wang jinbao
  • 15 篇 jianqiang li
  • 15 篇 yu huang
  • 14 篇 zhou ziqi
  • 14 篇 li minghui

语言

  • 630 篇 英文
  • 221 篇 其他
  • 14 篇 中文
检索条件"机构=The National Engineering Laboratory of Big Data System Computing Technology"
861 条 记 录,以下是341-350 订阅
排序:
Graph-Augmented Contrastive Clustering for Time Series
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Qin Liang, Zhuoluo Ngueilbaye, Alladoumbaye Zhang, Peng Chen, Junyang Chen, Xiaojun Huang, Joshua Zhexue Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The recent emergence of time series contrastive clustering methods can be broadly categorized into two classes. The first class uses contrastive learning to learn universal representations for time series. Though they... 详细信息
来源: 评论
Multi-Scale Dynamic and Hierarchical Relationship Modeling for Facial Action Units Recognition
Multi-Scale Dynamic and Hierarchical Relationship Modeling f...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zihan Wang Siyang Song Cheng Luo Songhe Deng Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Universiry of Leicester Monash University
Human facial action units (AUs) are mutually related in a hierarchical manner, as not only they are associated with each other in both spatial and temporal domains but also AUs located in the same/close facial regions... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
A Novel Adaptive Perturbation-Based Method for Long-Tailed Open Sets Recognition
SSRN
收藏 引用
SSRN 2023年
作者: Ngueilbaye, Alladoumbaye Zhang, Qin Yang, Hongye Zhang, Xiaolin Zhang, Peng Chen, Xiaojun Huang, Joshua Zhexue Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Real-world data often have a long-tailed and open-ended distribution. A reliable practical machine learning system need to learn from the majority classes and also generalize to minority *** achieve this, acknowledge ... 详细信息
来源: 评论
Heterogeneous differential privacy for vertically partitioned databases
Heterogeneous differential privacy for vertically partitione...
收藏 引用
作者: Xia, Yang Zhu, Tianqing Ding, Xiaofeng Jin, Hai Zou, Deqing National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan China Deakin University Victoria Australia
Existing privacy-preserving approaches are generally designed to provide privacy guarantee for individual data in a database, which reduces the utility of the database for data analysis. In this paper, we propose a no... 详细信息
来源: 评论
CTGDiff: A Conditional Diffusion Model for Cardiotocography Signal Synthesis
CTGDiff: A Conditional Diffusion Model for Cardiotocography ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaoqing Li Pufan Cai Yu Lu Shijie Shi Liangkun Ma Xianghua Fu College of Big Data and Internet Shenzhen Technology University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Surgery Yong Loo Lin School of Medicine National University of Singapore Singapore School of Applied Technology Shenzhen University Shenzhen China Department of Obstetrics and Gynecology Peking Union Medical College Hospital Beijing China
The analysis of Cardiotocography (CTG) signals is often hindered by challenges such as limited data availability and label imbalance, which can undermine the performance of deep learning models. To address these issue... 详细信息
来源: 评论
RSP-gcForest: A Distributed Deep Forest via Random Sample Partition
RSP-gcForest: A Distributed Deep Forest via Random Sample Pa...
收藏 引用
IEEE International Conference on big data
作者: Mark Junjie Li Wenzhu Cai Yigang Lin Sunjie Huang Joshua Zhexue Huang Patrick Xiaogang Peng College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Academy of Inspection and Quarantine
Deep Forest, a powerful alternative to deep neural networks, has gained much attention due to its advantages, such as low complexity, minimal hyperparameter requirements, and strong application performance. In the cur...
来源: 评论
DeepGATGO: A Hierarchical Pretraining-Based Graph-Attention Model for Automatic Protein Function Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zihao Jiang, Changkun Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Lab for Big Data System Computing Technology Shenzhen University Shenzhen China
Automatic protein function prediction (AFP) is classified as a large-scale multi-label classification problem aimed at automating protein enrichment analysis to eliminate the current reliance on labor-intensive wet-la... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency
Detecting Backdoors During the Inference Stage Based on Corr...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xiaogeng Liu Minghui Li Haoyu Wang Shengshan Hu Dengpan Ye Hai Jin Libing Wu Chaowei Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Software Engineering Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab Arizona State University
Deep neural networks are proven to be vulnerable to backdoor attacks. Detecting the trigger samples during the inference stage, i.e., the test-time trigger sample detection, can prevent the backdoor from being trigger...
来源: 评论