咨询与建议

限定检索结果

文献类型

  • 6,113 篇 期刊文献
  • 4,902 篇 会议
  • 5 册 图书

馆藏范围

  • 11,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,434 篇 工学
    • 4,554 篇 计算机科学与技术...
    • 3,807 篇 软件工程
    • 1,583 篇 信息与通信工程
    • 866 篇 控制科学与工程
    • 854 篇 电气工程
    • 772 篇 生物工程
    • 757 篇 化学工程与技术
    • 718 篇 电子科学与技术(可...
    • 546 篇 光学工程
    • 526 篇 生物医学工程(可授...
    • 516 篇 机械工程
    • 353 篇 仪器科学与技术
    • 352 篇 材料科学与工程(可...
    • 307 篇 动力工程及工程热...
    • 287 篇 交通运输工程
    • 230 篇 建筑学
    • 225 篇 土木工程
  • 4,308 篇 理学
    • 2,073 篇 数学
    • 1,265 篇 物理学
    • 932 篇 生物学
    • 675 篇 统计学(可授理学、...
    • 601 篇 化学
    • 312 篇 系统科学
  • 1,912 篇 管理学
    • 1,104 篇 管理科学与工程(可...
    • 877 篇 图书情报与档案管...
    • 361 篇 工商管理
  • 521 篇 医学
    • 433 篇 临床医学
    • 311 篇 基础医学(可授医学...
    • 216 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 232 篇 农学
  • 156 篇 经济学
  • 87 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 260 篇 semantics
  • 219 篇 feature extracti...
  • 209 篇 deep learning
  • 159 篇 data mining
  • 132 篇 computational mo...
  • 131 篇 training
  • 124 篇 machine learning
  • 113 篇 knowledge engine...
  • 113 篇 convolution
  • 102 篇 neural networks
  • 100 篇 image segmentati...
  • 97 篇 predictive model...
  • 94 篇 computer science
  • 92 篇 reinforcement le...
  • 91 篇 object detection
  • 91 篇 data models
  • 85 篇 optimization
  • 82 篇 laboratories
  • 82 篇 accuracy
  • 79 篇 contrastive lear...

机构

  • 410 篇 college of compu...
  • 304 篇 university of ch...
  • 256 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 167 篇 school of inform...
  • 161 篇 infn sezione di ...
  • 157 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 149 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 112 篇 warsaw
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 101 篇 bowcock t.j.v.
  • 101 篇 casse g.
  • 100 篇 bobulska d.
  • 100 篇 blake t.
  • 100 篇 borsato m.
  • 100 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 90 篇 cali s.
  • 86 篇 amato s.
  • 86 篇 baryshnikov f.
  • 84 篇 bjørn m.
  • 77 篇 niyato dusit

语言

  • 10,041 篇 英文
  • 717 篇 其他
  • 272 篇 中文
  • 4 篇 德文
  • 4 篇 法文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11020 条 记 录,以下是4881-4890 订阅
Corrigendum to "DSTF: A diversified spatio-temporal feature extraction model for traffic flow prediction" [Neurocomputing 621 (2025) 129280] (Neurocomputing (2025) 621, (S0925231224020514), (10.1016/***.2024.129280))
收藏 引用
Neurocomputing 2025年 638卷
作者: Wang, Xing Wang, Xiaojun Huang, Faliang Zou, Fumin Liao, Lyuchao Zeng, Ruihao Fujian Normal University College of Computer and Cyber Security China Fujian Normal University Digital Fujian Institute of Big Data Security Technology China Nanning Normal University Guangxi Key Lab of Human-machine Interaction and Intelligent Decision China Fujian University of Technology Fujian Key Laboratory of Automotive Electronic and Electrical Drive Technology China The University of Sydney School of Civil Engineering Sydney Australia
The authors regret to inform that: (1) During the resubmission stage of the revised manuscript, in compliance with reviewers' recommendations to show standard deviations in the experimental results (In Section 5. ...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Paradigm shift in psychiatric neuroscience:Multidimensional integrative theory
Medicine Plus
收藏 引用
Medicine Plus 2024年 第2期1卷 1-5页
作者: Zhu-Qing Gong Bharat B.Biswal Xi-Nian Zuo State Key Laboratory of Cognitive Neuroscience and Learning Beijing Normal UniversityBeijing 100875China Department of Biomedical Engineering New Jersey Institute of TechnologyNewarkNJ 07102USA Developmental Population Neuroscience Research Center IDG/McGovern Institute for Brain ScienceBeijing Normal UniversityBeijing 100875China National Basic Science Data Center Beijing 100190China
Abnormal structure and function of the human brain cause various mental and neurological *** search for neurobiological mechanisms and biomarkers associated with psychiatric disorders has always been a focal point and... 详细信息
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
Cooperative Sensing Via Matrix Factorization of the Partially Received Sample Covariance Matrix
Cooperative Sensing Via Matrix Factorization of the Partiall...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Rui Zhou Wenqiang Pu Licheng Zhao Ming-Yi You Qingjiang Shi Sergios Theodoridis Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China National Key Laboratory of Electromagnetic Space Security Jiaxing China School of Software Engineering Tongji University Shanghai China Department of Electronics Systems Aalborg University Denmark Department of Informatics and Telecommunications National and Kapodistrian University of Athens Greece
A fundamental problem in cognitive radio is spectrum sensing, which detects the presence of the primary users in a licensed spectrum. To boost the detection performance and robustness, the multiantenna detector has be...
来源: 评论
I-mRMR: Incremental max-relevance, and min-redundancy feature selection  3rd
I-mRMR: Incremental max-relevance, and min-redundancy featur...
收藏 引用
3rd APWeb and WAIM Joint Conference on Web and Big data, APWeb-WAIM 2019
作者: Xiu, Yeliang Zhao, Suyun Chen, Hong Li, Cuiping Information of School Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China
An incremental method of feature selection based on mutual information, called incremental Max-Relevance, and Min-Redundancy (I-mRMR), is presented. I-mRMR is an incremental version of Max-Relevance, and Min-Redundanc... 详细信息
来源: 评论
Consistent and Asymptotically Efficient Localization from Range-Difference Measurements
arXiv
收藏 引用
arXiv 2023年
作者: Zeng, Guangyang Mu, Biqiang Shi, Ling Chen, Jiming Wu, Junfeng The School of Data Science Chinese University of Hong Kong Shenzhen Shenzhen China The Department of Automation University of Science and Technology of China Hefei China Key Laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China The Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong The College of Control Science and Engineering The State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310027 China
We consider signal source localization from range-difference measurements. First, we give some readily-checked conditions on measurement noises and sensor deployment to guarantee the asymptotic identifiability of the ... 详细信息
来源: 评论
High Sensitivity Surrounding Refractive Index Sensor Based on Helical Long-Period Fiber Gratings Inscribed in Tapered Double-Cladding Fiber
High Sensitivity Surrounding Refractive Index Sensor Based o...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Yanping He Yuehui Ma Chen Jiang Peng Wei Yunqi Liu Key Laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China Advanced Photonic Technology Lab College of Electronics and Optical Engineering Nanjing University of Posts and Telecommunications Nanjing China
We demonstrate a surrounding refractive index (SRI) sensor based on helical long-period fiber grating inscribed in the tapered double-cladding fiber. The maximum SRI sensitivity is 5483.33 nm/RIU.
来源: 评论
A dual-polarized zhe-shaped conformal patch antenna for 5G millimeter-wave applications  4
A dual-polarized zhe-shaped conformal patch antenna for 5G m...
收藏 引用
4th IEEE International Conference on Electronic Information and Communication Technology, ICEICT 2021
作者: Yang, Baifa Huang, Haixuan Feng, Botao Deng, Li College of Electronics and Information Engineering Shenzhen University Shenzhen518060 China College of Big Data and Internet Shenzhen Technology University Shenzhen518118 China College of Electronics and Information Engineering Shenzhen University Shenzhen518060 China Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing100876 China
We propose a dual-polarized conformal Zhe-shaped patch antenna that is suitable for future millimeter wave (mmW) applications. The proposed antenna is composed of 3 different layers. A Zhe-shaped (喆) patch is printed... 详细信息
来源: 评论
Semi-supervised classification on data streams with recurring concept drift and concept evolution
收藏 引用
knowledge-Based Systems 2021年 215卷 106749-106749页
作者: Zheng, Xiulin Li, Peipei Hu, Xuegang Yu, Kui Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology) Ministry of Education China School of Computer Science and Information Engineering Hefei University of Technology Hefei 230601 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei 230601 Anhui China
Mining non-stationary stream is a challenging task due to its unique property of infinite length and dynamic characteristics let alone the issues of concept drift, concept evolution and limited labeled data. Although ... 详细信息
来源: 评论