咨询与建议

限定检索结果

文献类型

  • 2,441 篇 期刊文献
  • 1,900 篇 会议
  • 1 册 图书

馆藏范围

  • 4,342 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,753 篇 工学
    • 1,853 篇 计算机科学与技术...
    • 1,520 篇 软件工程
    • 583 篇 信息与通信工程
    • 329 篇 电气工程
    • 325 篇 生物工程
    • 317 篇 控制科学与工程
    • 234 篇 化学工程与技术
    • 206 篇 电子科学与技术(可...
    • 181 篇 生物医学工程(可授...
    • 167 篇 光学工程
    • 156 篇 机械工程
    • 118 篇 动力工程及工程热...
    • 115 篇 材料科学与工程(可...
    • 92 篇 土木工程
    • 91 篇 交通运输工程
    • 89 篇 仪器科学与技术
    • 83 篇 建筑学
  • 1,650 篇 理学
    • 773 篇 数学
    • 495 篇 物理学
    • 407 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 255 篇 化学
    • 104 篇 系统科学
  • 716 篇 管理学
    • 406 篇 管理科学与工程(可...
    • 327 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 245 篇 医学
    • 192 篇 临床医学
    • 121 篇 基础医学(可授医学...
  • 128 篇 法学
    • 99 篇 社会学
  • 88 篇 农学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 38 篇 教育学
  • 14 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 123 篇 feature extracti...
  • 116 篇 deep learning
  • 108 篇 training
  • 83 篇 computational mo...
  • 67 篇 machine learning
  • 65 篇 accuracy
  • 61 篇 data mining
  • 61 篇 federated learni...
  • 60 篇 convolution
  • 55 篇 predictive model...
  • 55 篇 data models
  • 52 篇 graph neural net...
  • 48 篇 hadrons
  • 47 篇 contrastive lear...
  • 45 篇 neural networks
  • 45 篇 adaptation model...
  • 42 篇 object detection
  • 42 篇 visualization
  • 40 篇 task analysis

机构

  • 224 篇 university of ch...
  • 172 篇 iccub universita...
  • 171 篇 department of ph...
  • 171 篇 infn sezione di ...
  • 169 篇 infn sezione di ...
  • 169 篇 yandex school of...
  • 166 篇 cavendish labora...
  • 166 篇 school of physic...
  • 164 篇 infn sezione di ...
  • 164 篇 infn sezione di ...
  • 162 篇 van swinderen in...
  • 160 篇 horia hulubei na...
  • 160 篇 department of ph...
  • 158 篇 h.h. wills physi...
  • 153 篇 imperial college...
  • 139 篇 stfc rutherford ...
  • 137 篇 universiteit maa...
  • 137 篇 institute of par...
  • 128 篇 center for high ...
  • 125 篇 massachusetts in...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 117 篇 barter w.
  • 117 篇 brundu d.
  • 116 篇 bellee v.
  • 103 篇 bowcock t.j.v.
  • 103 篇 casse g.
  • 103 篇 blake t.
  • 103 篇 borsato m.
  • 103 篇 betancourt c.
  • 103 篇 belin s.
  • 103 篇 amato s.
  • 103 篇 boettcher t.
  • 102 篇 bobulska d.
  • 102 篇 afsharnia h.
  • 101 篇 belavin v.
  • 101 篇 bediaga i.
  • 101 篇 cali s.
  • 101 篇 baryshnikov f.
  • 101 篇 bjørn m.

语言

  • 3,698 篇 英文
  • 576 篇 其他
  • 82 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Hubei Key Laboratory of Big Data in Science and Technology"
4342 条 记 录,以下是221-230 订阅
排序:
Visual Object Tracking via Cascaded RPN Fusion and Coordinate Attention
收藏 引用
Computer Modeling in Engineering & sciences 2022年 第9期132卷 909-927页
作者: Jianming Zhang Kai Wang Yaoqi He Lidan Kuang School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China
Recently,Siamese-based trackers have achieved excellent performance in object ***,the high speed and deformation of objects in the movement process make tracking ***,we have incorporated cascaded region-proposal-netwo... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
Compact Multitasking Multichromosome Genetic Algorithm for Heuristic Selection in Ontology Matching
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6752-6766页
作者: Xue, Xingsi Lin, Jerry Chun-Wei Su, Tong Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian Fuzhou350118 China Silesian University of Technology Department of Distributed Systems and IT Devices Akademicka Gliwice44-100 Poland Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China
Ontology matching (OM) is critical for knowledge integration and system interoperability on the semantic web, tasked with identifying semantically related entities across different ontologies. Despite its importance, ... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
A Knowledge-Injected Curriculum Pretraining Framework for Question Answering  24
A Knowledge-Injected Curriculum Pretraining Framework for Qu...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Lin, Xin Su, Tianhuang Huang, Zhenya Xue, Shangzi Liu, Haifeng Chen, Enhong School of Computer Science and Technology University of Science and Technology of China State Key Laboratory of Cognitive Intelligence Hefei China Guangdong OPPO Mobile Telecommunications Corp. Ltd Shenzhen China University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Big Data Analysis and Application University of Science and Technology of China State Key Laboratory of Cognitive Intelligence Hefei China
Knowledge-based question answering (KBQA) is a key task in natural language processing research, and also an approach to access the web data and knowledge, which requires exploiting knowledge graphs (KGs) for reasonin... 详细信息
来源: 评论
Pedestrian wind flow prediction using spatial-frequency generative adversarial network
收藏 引用
Building Simulation 2024年 第2期17卷 319-334页
作者: Pengyue Wang Maozu Guo Yingeng Cao Shimeng Hao Xiaoping Zhou Lingling Zhao School of Architecture and Urban Planning Beijing University of Civil Engineering and ArchitectureBeijing100044China Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing100044China School of Electrical and Information Engineering Beijing University of Civil Engineering and ArchitectureBeijing100044China School of Computer Science and Technology Harbin Institute of TechnologyHarbin150001China
Pedestrian wind flow is a critical factor in designing livable residential environments under growing complex urban *** pedestrian wind flow during the early design stages is essential but currently suffers from ineff... 详细信息
来源: 评论
Multi-Metric Based Client Selection for Backdoor Defense in Federated Learning  1
Multi-Metric Based Client Selection for Backdoor Defense in ...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Yuan, Changjiang Li, Yidong Chen, Naiyue Zhang, Zikai Key Laboratory of Big Data & Artificial Intelligence in Transportation Beijing Jiaotong University Ministry of Education China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China
The distributed nature of federated learning makes it highly susceptible to backdoor attacks, which aim to induce the model to produce incorrect results when specific data is input. Existing defense methods based on d... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Wi-SFDAGR: WiFi-Based Cross-Domain Gesture Recognition via Source-Free Domain Adaptation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24159-24173页
作者: Yan, Huan Zhang, Xiang Huang, Jinyang Feng, Yuanhao Li, Meng Wang, Anzhi Ou, Weihua Wang, Hongbing Liu, Zhi Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China Hefei University of Technology School of Computer and Information Hefei230601 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan
WiFi Channel State Information (CSI)-based gesture recognition offers unique advantages, including cost-effectiveness and enhanced privacy protection, and has garnered significant attention in recent years. However, e... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to data Clustering
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论