咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 42 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 25 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 电气工程
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 15 篇 理学
    • 7 篇 数学
    • 4 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 天文学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 军事学

主题

  • 11 篇 network coding
  • 5 篇 educational inst...
  • 4 篇 bandwidth
  • 3 篇 throughput
  • 3 篇 computational li...
  • 3 篇 media
  • 3 篇 multicast
  • 3 篇 real-time system...
  • 3 篇 entropy
  • 3 篇 protocols
  • 3 篇 virtualization
  • 3 篇 encoding
  • 2 篇 routing
  • 2 篇 java
  • 2 篇 twitter
  • 2 篇 vectors
  • 2 篇 data mining
  • 2 篇 servers
  • 2 篇 graph neural net...
  • 2 篇 social network s...

机构

  • 5 篇 shenzhen key lab...
  • 4 篇 school of mathem...
  • 4 篇 shenzhen key lab...
  • 3 篇 institute of big...
  • 3 篇 institute of big...
  • 3 篇 shenzhen enginee...
  • 2 篇 national digital...
  • 2 篇 the shenzhen key...
  • 2 篇 huawei cloud com...
  • 2 篇 dept. of electro...
  • 2 篇 peking universit...
  • 2 篇 shenzhen key lab...
  • 2 篇 高可信软件技术教...
  • 2 篇 huawei noah's ar...
  • 2 篇 guangdong poya i...
  • 2 篇 shenzhen institu...
  • 2 篇 peking universit...
  • 2 篇 shenzhen key lab...
  • 2 篇 shenzhen key lab...
  • 2 篇 moe key lab of a...

作者

  • 19 篇 kai lei
  • 16 篇 li hui
  • 9 篇 hui li
  • 8 篇 huang lian'en
  • 7 篇 chen fuxing
  • 6 篇 lei kai
  • 4 篇 wang wei
  • 4 篇 kuai xu
  • 4 篇 liu weiyang
  • 3 篇 pei yulong
  • 3 篇 ying shen
  • 3 篇 jie yuan
  • 3 篇 hanxu hou
  • 3 篇 jincheng wu
  • 3 篇 kai zhang
  • 3 篇 pan kai
  • 3 篇 qian yu
  • 3 篇 yin wenpeng
  • 3 篇 zhu guangxi
  • 3 篇 zhu zhipu

语言

  • 71 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=The Shenzhen Key Lab for Cloud Computing Technology and Application"
80 条 记 录,以下是1-10 订阅
排序:
G-MAP: General Memory-Augmented Pre-trained Language Model for Domain Tasks
G-MAP: General Memory-Augmented Pre-trained Language Model f...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Wan, Zhongwei Yin, Yichun Zhang, Wei Shi, Jiaxin Shang, Lifeng Chen, Guangyong Jiang, Xin Liu, Qun Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Science China University of Chinese Academy of Sciences China Huawei Noah's Ark Lab Huawei Cloud Computing Zhejiang Lab China
Recently, domain-specific PLMs have been proposed to boost the task performance of specific domains (e.g., biomedical and computer science) by continuing to pre-train general PLMs with domain-specific corpora. However... 详细信息
来源: 评论
Contextual Embedding Learning to Enhance 2D Networks for Volumetric Image Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Zhuoyuan Sun, Dong Zeng, Xiangyun Wu, Ruodai Wang, Yi National-Regional Key Technology Engineering Laboratory for Medical Ultrasound Guangdong Key Laboratory for Biomedical Measurements and Ultrasound Imaging School of Biomedical Engineering Shenzhen University Medical School Shenzhen University Shenzhen China Lab Shenzhen China Lab Shenzhen China Huawei Cloud Computing Technologies Company Limited China Department of Radiology Shenzhen University General Hospital Shenzhen University Shenzhen China
The segmentation of organs in volumetric medical images plays an important role in computer-aided diagnosis and treatment/surgery planning. Conventional 2D convolutional neural networks (CNNs) can hardly exploit the s... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Characteristic-Specific Partial Fine-Tuning for Efficient Emotion and Speaker Adaptation in Codec Language Text-to-Speech Models
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Tianrui Ge, Meng Gong, Cheng Qiang, Chunyu Wang, Haoyu Huang, Zikang Jiang, Yu Wang, Xiaobao Chen, Xie Wang, Longbiao Dang, Jianwu Tianjin Key Laboratory of Cognitive Computing and Application College of Intelligence and Computing Tianjin University Tianjin China Guangdong Laboratory of Artificial Intelligence and Digital Economy Guangdong China China Telecom Beijing China MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University Shanghai China Co. Ltd Tianjin China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong China
Recently, emotional speech generation and speaker cloning have garnered significant interest in text-to-speech (TTS). With the open-sourcing of codec language TTS models trained on massive datasets with large-scale pa... 详细信息
来源: 评论
Stable Attribute Group Editing for Reliable Few-shot Image Generation
arXiv
收藏 引用
arXiv 2023年
作者: Ding, Guanqi Han, Xinzhe Wang, Shuhui Wu, Shuzhe Jin, Xin Tu, Dandan Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518066 China Huawei Cloud EI Innovation Lab China
Few-shot image generation aims to generate data of an unseen category based on only a few samples. Apart from basic content generation, a bunch of downstream applications hopefully benefit from this task, such as low-... 详细信息
来源: 评论
Progressive Residual Extraction based Pre-training for Speech Representation Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianrui Li, Jin Ma, Ziyang Cao, Rui Chen, Xie Wang, Longbiao Ge, Meng Wang, Xiaobao Wang, Yuguang Dang, Jianwu Tashi, Nyima The Tianjin Key Laboratory of Cognitive Computing and Application College of Intelligence and Computing Tianjin University Tianjin300350 China Company Ltd. Tianjin300350 China Saw Swee Hock School of Public Health National University of Singapore Singapore MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University Shanghai China Co. Ltd. Tianjin China The Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong China The School of Information Science and Technology Tibet University Lhasa China
Self-supervised learning (SSL) has garnered significant attention in speech processing, excelling in linguistic tasks such as speech recognition. However, jointly improving the performance of pre-trained models on var... 详细信息
来源: 评论
G-MAP: General Memory-Augmented Pre-trained Language Model for Domain Tasks
arXiv
收藏 引用
arXiv 2022年
作者: Wan, Zhongwei Yin, Yichun Zhang, Wei Shi, Jiaxin Shang, Lifeng Chen, Guangyong Jiang, Xin Liu, Qun Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Science China University of Chinese Academy of Sciences China Huawei Noah's Ark Lab Hong Kong Huawei Cloud Computing Zhejiang Lab China
Recently, domain-specific PLMs have been proposed to boost the task performance of specific domains (e.g., biomedical and computer science) by continuing to pre-train general PLMs with domain-specific corpora. However... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
On-edge multi-task transfer learning: Model and practice with data-driven task allocation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Zimu Chen, Qiong Hu, Chuang Wang, Dan Liu, Fangming The National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The Edge Cloud Innovation Lab. Technical Innovation Department Cloud BU Huawei Technologies Co. Ltd. Shenzhen China The Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Hong Kong
On edge devices, data scarcity occurs as a common problem where transfer learning serves as a widely-suggested remedy. Nevertheless, transfer learning imposes heavy computation burden to the resource-constrained edge ... 详细信息
来源: 评论
Machine learning-based orchestration of containers: A taxonomy and future directions
arXiv
收藏 引用
arXiv 2021年
作者: Zhong, Zhiheng Xu, Minxian Rodriguez, Maria Alejandra Xu, Chengzhong Buyya, Rajkumar Cloud Computing and Distributed Systems Laboratory School of Computing and Information Systems University of Melbourne Grattan Street Parkville MelbourneVICVIC 3010 Australia Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen University Town 1068 Xueyuan Avenue Guangdong Shenzhen518055 China State Key Lab of IOTSC University of Macau Avenida da Universidade Taipa 999078 China
Containerization is a lightweight application virtualization technology, providing high environmental consistency, operating system distribution portability, and resource isolation. Existing mainstream cloud service p... 详细信息
来源: 评论