咨询与建议

限定检索结果

文献类型

  • 6,113 篇 期刊文献
  • 4,902 篇 会议
  • 5 册 图书

馆藏范围

  • 11,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,434 篇 工学
    • 4,554 篇 计算机科学与技术...
    • 3,807 篇 软件工程
    • 1,583 篇 信息与通信工程
    • 866 篇 控制科学与工程
    • 854 篇 电气工程
    • 772 篇 生物工程
    • 757 篇 化学工程与技术
    • 718 篇 电子科学与技术(可...
    • 546 篇 光学工程
    • 526 篇 生物医学工程(可授...
    • 516 篇 机械工程
    • 353 篇 仪器科学与技术
    • 352 篇 材料科学与工程(可...
    • 307 篇 动力工程及工程热...
    • 287 篇 交通运输工程
    • 230 篇 建筑学
    • 225 篇 土木工程
  • 4,308 篇 理学
    • 2,073 篇 数学
    • 1,265 篇 物理学
    • 932 篇 生物学
    • 675 篇 统计学(可授理学、...
    • 601 篇 化学
    • 312 篇 系统科学
  • 1,912 篇 管理学
    • 1,104 篇 管理科学与工程(可...
    • 877 篇 图书情报与档案管...
    • 361 篇 工商管理
  • 521 篇 医学
    • 433 篇 临床医学
    • 311 篇 基础医学(可授医学...
    • 216 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 232 篇 农学
  • 156 篇 经济学
  • 87 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 260 篇 semantics
  • 219 篇 feature extracti...
  • 209 篇 deep learning
  • 159 篇 data mining
  • 132 篇 computational mo...
  • 131 篇 training
  • 124 篇 machine learning
  • 113 篇 knowledge engine...
  • 113 篇 convolution
  • 102 篇 neural networks
  • 100 篇 image segmentati...
  • 97 篇 predictive model...
  • 94 篇 computer science
  • 92 篇 reinforcement le...
  • 91 篇 object detection
  • 91 篇 data models
  • 85 篇 optimization
  • 82 篇 laboratories
  • 82 篇 accuracy
  • 79 篇 contrastive lear...

机构

  • 410 篇 college of compu...
  • 304 篇 university of ch...
  • 256 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 167 篇 school of inform...
  • 161 篇 infn sezione di ...
  • 157 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 149 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 112 篇 warsaw
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 101 篇 bowcock t.j.v.
  • 101 篇 casse g.
  • 100 篇 bobulska d.
  • 100 篇 blake t.
  • 100 篇 borsato m.
  • 100 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 90 篇 cali s.
  • 86 篇 amato s.
  • 86 篇 baryshnikov f.
  • 84 篇 bjørn m.
  • 77 篇 niyato dusit

语言

  • 10,041 篇 英文
  • 717 篇 其他
  • 272 篇 中文
  • 4 篇 德文
  • 4 篇 法文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11020 条 记 录,以下是161-170 订阅
排序:
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
Fake Face Detection Based on Fusion of Spatial Texture and High-Frequency Noise
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 212-221页
作者: Dengyong Zhang Feifan Qi Jiahao Chen Jiaxin Chen Rongrong Gong Yuehong Tian Lebing Zhang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Changsha University of Science and Technology School of Computer and Communication Engineering Changsha University of Science and Technology Changsha Social Work College Changkuangao Beijing Technology Co. Ltd. School of Computer and Artificial Intelligence Huaihua University
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the... 详细信息
来源: 评论
HUSS:A Heuristic Method for Understanding the Semantic Structure of Spreadsheets
收藏 引用
data Intelligence 2023年 第3期5卷 537-559页
作者: Xindong Wu Hao Chen Chenyang Bu Shengwei Ji Zan Zhang Victor S.Sheng Key Laboratory of Knowledge Engineering with Big Data(the Ministry of Education of China) Hefei University of TechnologyChinaSchool of Computer Science and Information EngineeringHefei University of TechnologyHefeiChina Research Institute of Artificial Intelligence Zhejiang LabHangzhouChina Department of Computer Science Texas Tech UniversityLubbockTX 79409USA
Spreadsheets contain a lot of valuable data and have many practical *** key technology of these practical applications is how to make machines understand the semantic structure of spreadsheets,e.g.,identifying cell fu... 详细信息
来源: 评论
A new mobility field and gradient-based traffic signal control approach applicable to large-scale road networks
收藏 引用
Transportation Safety and Environment 2025年 第1期7卷 62-73页
作者: Hu Yang Bao Guo Changxin Yan Zhiqiang Chen Pu Wang School of Traffic and Transportation Engineering Rail Data Research and Application Key Laboratory of Hunan ProvinceCentral South UniversityChangsha 410000China Changsha Planning&Design Survey Research Institute Changsha 410000China Hunan Engineering Research Center of Urban Transport Data-driven Modeling&Simulation Changsha 410000China
Previous traffic control models were usually developed on small or medium sized road *** traffic control models applicable to large-scale road networks have received growing *** this study,we develop a new mobility fi... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
Robust and Trustworthy data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2159-2179页
作者: Jinyang Yu Xiao Zhang Jinjiang Wang Yuchen Zhang Yulong Shi Linxuan Su Leijie Zeng School of Computer Science Northwestern Polytechnical UniversityXi’an710072China MIIT Key Laboratory of Big Data Storage and Management Northwestern Polytechnical UniversityXi’an710072China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical UniversityXi’an710072China
The proliferation of Internet of Things(IoT)systems has resulted in the generation of substantial data,presenting new challenges in reliable storage and trustworthy *** distributed storage systems are hindered by cent... 详细信息
来源: 评论
EFFC-Net:lightweight fully convolutional neural networks in remote sensing disaster images
收藏 引用
地球空间信息科学学报(英文版) 2025年 第1期28卷 中插12,212-223页
作者: Jianye Yuan Xin Ma Zhentong Zhang Qiang Xu Ge Han Song Li Wei Gong Fangyuan Liu Xin Cai School of Electronic Information Wuhan UniversityWuhanChina State Key Laboratory of Information Engineering in Surveying Mappingand Remote Sensing Wuhan UniversityWuhanChina School of Cyber Science and Engineering Southeast UniversityNanjingChina Department of Electrical Engineering and Center for Intelligent Multidimensional Data AnalysisCity University of Hong KongHong KongChina School of Remote Sensing and Information Engineering Wuhan UniversityWuhanChina The Second Clinical Medical College Jinan UniversityShenzhenChina School of Electrical Engineering Xinjiang UniversityUrumqiChina
Continuous development of remote sensing technology can rapidly and accurately extract secondary disaster information,such as the area of various ***,in the extraction process,some disasters should be initially classi... 详细信息
来源: 评论
Benchmark experiment on slab^(238)U with D-T neutrons for validation of evaluated nuclear data
收藏 引用
Nuclear Science and Techniques 2024年 第2期35卷 145-159页
作者: Yan-Yan Ding Yang-Bo Nie Yue Zhang Zhi-Jie Hu Qi Zhao Huan-Yu Zhang Kuo-Zhi Xu Shi-Yu Zhang Xin-Yi Pan Chang-Lin Lan Jie Ren Xi-Chao Ruan Key Laboratory of Nuclear Data China Institute of Atomic EnergyBeijing 102413China School of Nuclear Science and Technology Lanzhou UniversityLanzhou 730000China Institute of Fluid Physics China Academy of Engineering PhysicsMianyang 62100China
A benchmark experiment on^(238)U slab samples was conducted using a deuterium-tritium neutron source at the China Institute of Atomic *** leakage neutron spectra within energy levels of 0.8-16 MeV at 60°and 120&#... 详细信息
来源: 评论
Soliton molecules for combined mKdV-type bilinear equation
收藏 引用
Communications in Theoretical Physics 2023年 第10期75卷 1-9页
作者: Zhang-Xuan Zhao Lu-Wei Zhang Wei Yang Xue-Ping Cheng School of Information Engineering Zhejiang Ocean UniversityZhoushan 316022China Key Laboratory of Oceanographic Big Data Mining&Application of Zhejiang Province Zhoushan 316022China
Starting from the multi-soliton solutions obtained by the Hirota bilinear method,the soli ton molecule structures for the combined mKdV-type bilinear equation(Dt+∑n=1NαnDx2n+1)f*·f=0 are investigated using the ... 详细信息
来源: 评论
Scalable and adaptive log manager in distributed systems
收藏 引用
Frontiers of Computer Science 2023年 第2期17卷 45-62页
作者: Huan ZHOU Weining QIAN Xuan ZHOU Qiwen DONG Aoying ZHOU Wenrong TAN The Key Laboratory for Computer Systems of State Ethnic Affairs Commission Southwest Minzu UniversityChengdu 610041China School of Data Science and Engineering East China Normal UniversityShanghai 200062China
On-line transaction processing(OLTP)systems rely on transaction logging and quorum-based consensus protocol to guarantee durability,high availability and strong *** makes the log manager a key component of distributed... 详细信息
来源: 评论