咨询与建议

限定检索结果

文献类型

  • 785 篇 会议
  • 528 篇 期刊文献

馆藏范围

  • 1,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 827 篇 工学
    • 591 篇 计算机科学与技术...
    • 507 篇 软件工程
    • 232 篇 信息与通信工程
    • 140 篇 生物工程
    • 95 篇 控制科学与工程
    • 82 篇 电气工程
    • 63 篇 机械工程
    • 63 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 55 篇 电子科学与技术(可...
    • 47 篇 化学工程与技术
    • 33 篇 网络空间安全
    • 31 篇 土木工程
    • 31 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 26 篇 仪器科学与技术
  • 487 篇 理学
    • 267 篇 数学
    • 147 篇 生物学
    • 86 篇 物理学
    • 84 篇 统计学(可授理学、...
    • 50 篇 化学
    • 38 篇 系统科学
  • 234 篇 管理学
    • 127 篇 管理科学与工程(可...
    • 117 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 58 篇 医学
    • 47 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 41 篇 法学
    • 31 篇 社会学
  • 19 篇 教育学
  • 13 篇 经济学
  • 13 篇 农学
  • 6 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 67 篇 feature extracti...
  • 51 篇 training
  • 43 篇 semantics
  • 37 篇 deep learning
  • 27 篇 object detection
  • 26 篇 accuracy
  • 25 篇 predictive model...
  • 24 篇 convolution
  • 23 篇 data models
  • 21 篇 computational mo...
  • 20 篇 data mining
  • 19 篇 task analysis
  • 19 篇 neural networks
  • 17 篇 machine learning
  • 16 篇 forecasting
  • 15 篇 reinforcement le...
  • 15 篇 big data
  • 15 篇 optimization
  • 14 篇 three-dimensiona...
  • 14 篇 anomaly detectio...

机构

  • 74 篇 college of compu...
  • 54 篇 school of comput...
  • 52 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 shaanxi key labo...
  • 32 篇 fujian provincia...
  • 31 篇 key laboratory o...
  • 31 篇 key laboratory o...
  • 30 篇 school of comput...
  • 30 篇 jiangsu key labo...
  • 29 篇 fujian key labor...
  • 28 篇 shaanxi key labo...
  • 26 篇 beijing key labo...
  • 26 篇 national enginee...
  • 24 篇 school of mathem...
  • 23 篇 school of comput...
  • 22 篇 henan key labora...

作者

  • 36 篇 xu xiaolong
  • 26 篇 wang zhongmin
  • 24 篇 huang qingming
  • 24 篇 xiaolong xu
  • 22 篇 xu qianqian
  • 21 篇 guo wenzhong
  • 21 篇 hongyan ma
  • 20 篇 shen linlin
  • 20 篇 li zuoyong
  • 19 篇 chen yanping
  • 18 篇 guo kun
  • 16 篇 liu yiwen
  • 15 篇 yang zhiyong
  • 13 篇 xia hong
  • 13 篇 xue xingsi
  • 13 篇 gao cong
  • 13 篇 zhongmin wang
  • 12 篇 wang shiping
  • 12 篇 wang tao
  • 11 篇 ma sugang

语言

  • 1,251 篇 英文
  • 47 篇 其他
  • 22 篇 中文
检索条件"机构=Intelligent Data Processing Laboratory"
1313 条 记 录,以下是121-130 订阅
排序:
Rethinking Distribution Alignment for Inter-class Fairness  1
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Ye, Jinhuang Wu, Jiawei Li, Zuoyong Zheng, Xianghan College of Computer and Big Data Fuzhou University Fuzhou350108 China School of Intelligent Systems Engineering Sun Yat-sen University Shenzhen518107 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China
Semi-supervised learning (SSL) is a successful paradigm that can use unlabelled data to alleviate the labelling cost problem in supervised learning. However, the excellent performance brought by SSL does not transfer ... 详细信息
来源: 评论
ALEDAR: An Attentions-based Encoder-Decoder and Autoregressive model for workload Forecasting of Cloud data Center  25
ALEDAR: An Attentions-based Encoder-Decoder and Autoregressi...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Sun, Wei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing School of Computer Science Nanjing China
Effective workload forecasting can provide a reference for resource scheduling in cloud data centers. Compared with the normal single data center, the multi-data center has a more complicated architecture design and p... 详细信息
来源: 评论
An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Tong, Jiacheng Zhao, Yilin Jin, Chongju Chen, Wei Zhang, Yiting Wu, Lifa Nanjing University of Posts and Telecommunications School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210003 China
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi... 详细信息
来源: 评论
Carbon emission reduction enabled by informatization construction: an analysis of spatial effects based on China’s experience
收藏 引用
Environmental Science and Pollution Research 2024年 第24期31卷 35595-35608页
作者: He, Zhuo Ma, Shaojuan Deng, Zixin Meng, Ying College of Business Administration Nanchang Institute of Technology Jiangxi Nanchang330032 China School of Mathematics and Information Science Northern Minzu University Ningxia Yinchuan750021 China Ningxia Key Laboratory of Intelligent Information and Big Data Processing Ningxia Yinchuan750021 China School of Statistics Capital University of Economics and Business Beijing100071 China
The "dual-carbon" objective presents a huge challenge for China and the world, with profound implications for the advancement of China’s eco-friendly economy. Additionally, informatization development has a... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论
A New Semi-supervised Approach for Network Encrypted Traffic Clustering and Classification  25
A New Semi-supervised Approach for Network Encrypted Traffic...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Lin, Kunda Xu, Xiaolong Jiang, Yu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Encrypted network traffic classification is an essential task in modern communications, which is used in a wide range of applications, such as network resource allocation, QoS (Quality of Service), malicious detection... 详细信息
来源: 评论
Model-Based Offline Policy Optimization with Adversarial Network  26
Model-Based Offline Policy Optimization with Adversarial Net...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
Obstacle-Avoidance Path Planning of Robot Arm Based on Improved RRT Algorithm  8
Obstacle-Avoidance Path Planning of Robot Arm Based on Impro...
收藏 引用
8th Asia-Pacific Conference on intelligent Robot Systems, ACIRS 2023
作者: Hu, Chong Mu, Chunyang Xing, Ma Zhang, Chuntao Zhou, Wenya Yang, Ke School of Electrical and Information Engineering North Minzu University Yinchuan China College of Mechanical and Electrical Engineering North Minzu University The Key Laboratory of Intelligent Information and Big Data Processing of Ningxia Province Yinchuan China School of Electrical and Information Engineering North Minzu University The Key Laboratory of Intelligent Information and Big Data Processing of Ningxia Province Yinchuan China College of Mechanical and Electrical Engineering North Minzu University Yinchuan China
In the application of RRT (Rapidly-exploring Random Trees) algorithm in obstacle avoidance path planning of redundant robot arms in high-dimensional space, the sampling area of random sampling points is large, the sea... 详细信息
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems  26
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xu, Shicheng Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance  26
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Feiyu Zhou, Jian-Tao Guo, Xu Inner Mongolia University College of Computer Science Inner Mongolia Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe... 详细信息
来源: 评论