咨询与建议

限定检索结果

文献类型

  • 1,215 篇 会议
  • 1,083 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,306 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,558 篇 工学
    • 1,156 篇 计算机科学与技术...
    • 949 篇 软件工程
    • 344 篇 信息与通信工程
    • 181 篇 生物工程
    • 171 篇 控制科学与工程
    • 133 篇 电气工程
    • 111 篇 化学工程与技术
    • 109 篇 电子科学与技术(可...
    • 106 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 79 篇 机械工程
    • 51 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
    • 49 篇 建筑学
    • 44 篇 材料科学与工程(可...
    • 44 篇 交通运输工程
    • 38 篇 土木工程
  • 736 篇 理学
    • 374 篇 数学
    • 199 篇 生物学
    • 172 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 91 篇 化学
    • 50 篇 系统科学
  • 500 篇 管理学
    • 285 篇 图书情报与档案管...
    • 251 篇 管理科学与工程(可...
    • 79 篇 工商管理
  • 91 篇 医学
    • 81 篇 临床医学
    • 60 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 71 篇 法学
    • 61 篇 社会学
  • 34 篇 经济学
  • 26 篇 农学
  • 20 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 96 篇 semantics
  • 59 篇 data mining
  • 56 篇 feature extracti...
  • 55 篇 training
  • 40 篇 knowledge engine...
  • 36 篇 deep learning
  • 36 篇 machine learning
  • 33 篇 task analysis
  • 32 篇 conferences
  • 31 篇 computational mo...
  • 30 篇 data models
  • 26 篇 forecasting
  • 25 篇 object detection
  • 25 篇 big data
  • 25 篇 visualization
  • 24 篇 data engineering
  • 24 篇 information retr...
  • 22 篇 xml
  • 21 篇 optimization
  • 21 篇 clustering algor...

机构

  • 196 篇 school of inform...
  • 104 篇 school of comput...
  • 50 篇 key laboratory o...
  • 50 篇 key laboratory o...
  • 41 篇 school of cyber ...
  • 40 篇 university of ch...
  • 38 篇 college of compu...
  • 35 篇 school of comput...
  • 31 篇 key laboratory o...
  • 31 篇 jiangxi key labo...
  • 31 篇 school of inform...
  • 30 篇 national enginee...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 28 篇 hubei key labora...
  • 28 篇 hubei engineerin...
  • 27 篇 services computi...
  • 27 篇 department of ma...
  • 26 篇 cluster and grid...
  • 24 篇 school of econom...

作者

  • 69 篇 du xiaoyong
  • 56 篇 chen hong
  • 40 篇 li cuiping
  • 35 篇 wu xindong
  • 33 篇 he jun
  • 32 篇 wang meng
  • 32 篇 xiaoyong du
  • 31 篇 liu hongyan
  • 30 篇 liu jun
  • 30 篇 hong chen
  • 30 篇 jin hai
  • 28 篇 wang shan
  • 28 篇 li xirong
  • 27 篇 xindong wu
  • 25 篇 niyato dusit
  • 25 篇 zhang jing
  • 24 篇 sun geng
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 19 篇 zhou linjie

语言

  • 2,114 篇 英文
  • 160 篇 其他
  • 32 篇 中文
检索条件"机构=Key Lab of Data Engineering and Knowledge Engineering"
2306 条 记 录,以下是251-260 订阅
排序:
Mitigating label-Noise for Facial Expression Recognition in the Wild
Mitigating Label-Noise for Facial Expression Recognition in ...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Yan, Huan Gu, Yu Zhang, Xiang Wang, Yantong Ji, Yusheng Ren, Fuji School of Computer and Information Hefei University of Technology S2AC Lab China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China National Institute of Informatics Tokushima University Japan
label-noise constitutes a major challenge for facial expression recognition in the wild due to the ambiguity of facial expressions worsened by low-quality images. To deal with this problem, we propose a simple but eff... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Impact of Consumer Perceived Characteristics on Fruit Sales: Evidence from Community Group-buying  11
Impact of Consumer Perceived Characteristics on Fruit Sales:...
收藏 引用
11th International Conference on Information Technology and Quantitative Management, ITQM 2024
作者: Jiang, Hailiang Tian, Xin Tao, Ye Wang, Lulu Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing100190 China School of Economics and Management University of Chinese Academy of Sciences Beijing100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing100190 China Beijing HAOLINJU CVS Co. Ltd Beijing100088 China Shanghai HEADING Information Engineering Co. Ltd. Shanghai201112 China
There is a growing trend among retailers to sell fruits through their community group-buying (CGB) channels. Based on real operational data, we employ econometric models to empirically analyze how consumer perception ... 详细信息
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage  29
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Shi, Jiaoli Hu, Chao Yao, Shimao Mei, Zhuolin Wu, Bin Li, Hui Jiujiang Univ. School of Computer and Big Data Jiujiang China Jiangxi Univ. of Finance and Economics School of Software IoT Engineering Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China Jiujiang University School of Computer and Big Data Jiujiang China Peking University School of Elec. and Comp. Engineering Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user's private key to the pr... 详细信息
来源: 评论
PathReasoner: Modeling Reasoning Path with Equivalent Extension for Logical Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fangzhi Lin, Qika Zhao, Tianzhe Han, Jiawei Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China
Logical reasoning task has attracted great interest since it was proposed. Faced with such a task, current competitive models, even large language models (e.g., ChatGPT and PaLM 2), still perform badly. Previous promi... 详细信息
来源: 评论
Prototypical Replay with Old-class Focusing knowledge Distillation for Incremental Named Entity Recognition  39
Prototypical Replay with Old-class Focusing Knowledge Distil...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Zesheng Zhu, Qiannan Li, Cuiping Chen, Hong School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering MOE China Engineering Research Center of Database and Business Intelligence MOE China School of Artificial Intelligence Beijing Normal University Beijing China Engineering Research Center of Intelligent Technology and Educational Application MOE China
Catastrophic forgetting is a key challenge in incremental named entity recognition (INER). Existing methods often address this issue through distillation-based approaches, which involve transferring previously learned...
来源: 评论
Time Series Fusion Model for Predicting Electric power tools and equipment  6
Time Series Fusion Model for Predicting Electric power tools...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Xue, Liang Ling, Xinghong Yang, Lei Yang, Yang Computing Science and Artificial Intelligence College Suzhou City University Suzhou China College of Computer Science and Software Engineering Hohai University Nanjing China Suzhou Key Lab of Multi-modal Data Fusion and Intelligent Healthcare Suzhou City University Suzhou China
To effectively address the issue of inadequate accuracy and timeliness in industrial data classification, this paper proposes a fusion classification model based on time series (DT-RF-MLP) for loss prediction of elect... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
A survey on blockchain-based integrity auditing for cloud data
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 591-603页
作者: Haoxiang Han Shufan Fei Zheng Yan Xiaokang Zhou The State Key Lab of ISN School of Cyber EngineeringXidian University266 Xinglong Section of Xifeng RoadXi'anShaanxi710126China The Faculty of Data Science Shiga UniversityHikone522-8522Japan The RIKEN Center for Advanced Intelligence Project RIKENTokyo103-0027Japan
With the rapid advancement of cloud computing,cloud storage services have developed *** issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enough to rel... 详细信息
来源: 评论
An information model for highway operational risk management based on the IFC-Brick schema
收藏 引用
International Journal of Transportation Science and Technology 2023年 第3期12卷 878-890页
作者: Bencheng Zhu Fujin Hou Tao Feng Tao Li Cancan Song The Key Laboratory of Road and Traffic Engineering of the Ministry of Education Tongji UniversityShanghai 201804China Shandong Hi-Speed Construction Management Group Co. Ltd.Jinan 250014ShandongChina Urban and Data Science Lab Graduate School of Advanced Science and EngineeringHiroshima University7390046 Higashi-HiroshimaJapan Department of the Built Environment Eindhoven University of TechnologyEindhoven 5600 MBthe Netherlands School of Civil Engineering Shanghai Normal UniversityNo.100Haisi RoadShanghai 201418China
With the development of highways,new technologies should be continuously introduced to improve highway traffic *** twin(DT)has been an emerging field of research in recent *** develop a digital twin management system,... 详细信息
来源: 评论