咨询与建议

限定检索结果

文献类型

  • 1,151 篇 会议
  • 1,142 篇 期刊文献

馆藏范围

  • 2,293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,566 篇 工学
    • 1,106 篇 计算机科学与技术...
    • 760 篇 软件工程
    • 322 篇 信息与通信工程
    • 294 篇 电气工程
    • 192 篇 控制科学与工程
    • 175 篇 生物工程
    • 107 篇 光学工程
    • 101 篇 生物医学工程(可授...
    • 94 篇 机械工程
    • 90 篇 电子科学与技术(可...
    • 76 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 57 篇 交通运输工程
    • 51 篇 动力工程及工程热...
    • 51 篇 土木工程
    • 46 篇 建筑学
    • 45 篇 网络空间安全
  • 729 篇 理学
    • 390 篇 数学
    • 196 篇 生物学
    • 179 篇 物理学
    • 118 篇 统计学(可授理学、...
    • 97 篇 化学
    • 58 篇 系统科学
  • 382 篇 管理学
    • 234 篇 管理科学与工程(可...
    • 166 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 131 篇 医学
    • 109 篇 临床医学
    • 72 篇 基础医学(可授医学...
  • 58 篇 法学
    • 44 篇 社会学
  • 43 篇 农学
  • 42 篇 教育学
    • 39 篇 教育学
  • 31 篇 经济学
  • 17 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 111 篇 feature extracti...
  • 91 篇 training
  • 89 篇 semantics
  • 84 篇 deep learning
  • 57 篇 computational mo...
  • 53 篇 predictive model...
  • 47 篇 task analysis
  • 46 篇 data models
  • 45 篇 accuracy
  • 43 篇 convolution
  • 39 篇 visualization
  • 38 篇 object detection
  • 36 篇 neural networks
  • 34 篇 contrastive lear...
  • 30 篇 machine learning
  • 30 篇 convolutional ne...
  • 27 篇 data mining
  • 26 篇 graph neural net...
  • 25 篇 speech processin...
  • 24 篇 reinforcement le...

机构

  • 131 篇 south china univ...
  • 69 篇 key laboratory o...
  • 69 篇 minist educ key ...
  • 54 篇 south china univ...
  • 53 篇 south china univ...
  • 53 篇 school of comput...
  • 51 篇 pazhou lab peopl...
  • 45 篇 school of softwa...
  • 41 篇 jiangsu key labo...
  • 41 篇 south china univ...
  • 40 篇 south china univ...
  • 39 篇 school of electr...
  • 36 篇 hong kong polyte...
  • 35 篇 hunan provincial...
  • 35 篇 jiangsu key labo...
  • 34 篇 chongqing key la...
  • 33 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 32 篇 national enginee...
  • 31 篇 key laboratory o...

作者

  • 96 篇 cai yi
  • 82 篇 tan mingkui
  • 48 篇 wu qingyao
  • 43 篇 li qing
  • 40 篇 shen linlin
  • 39 篇 xu xiaolong
  • 36 篇 wang guoyin
  • 28 篇 xu xuemiao
  • 27 篇 xiaolong xu
  • 25 篇 huang qingbao
  • 24 篇 zhou zhiheng
  • 23 篇 huang qingming
  • 21 篇 xie jiayuan
  • 21 篇 xu qianqian
  • 20 篇 hongyan ma
  • 18 篇 ren haopeng
  • 18 篇 niu shuaicheng
  • 17 篇 wang tao
  • 17 篇 he shengfeng
  • 17 篇 liu yiwen

语言

  • 2,165 篇 英文
  • 104 篇 其他
  • 36 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot"
2293 条 记 录,以下是31-40 订阅
排序:
Enhancing graph representation learning via type-aware decoupling and node influence allocation
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-14页
作者: Zhu, Guochang Hu, Jun Liu, Li Zhang, Qinghua Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
The traditional graph representation methods can fit the information of graph with low-dimensional vectors, but they cannot interpret their composition, resulting in insufficient security. Graph decoupling, as a metho... 详细信息
来源: 评论
A study of MySQL protocol-based database proxy approval system for fortress machine
收藏 引用
International Journal of data Science 2025年 第1期10卷 96-117页
作者: Zhang, Xian Luo, Xinhui Yin, Dong Qu, Taiguo Li, Hao Huaihua University Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Hunan Huaihua418000 China Huaihua Tourism School Hunan Huaihua418099 China
With the increase of enterprise informatisation, database security and compliance operation management have become increasingly important. Therefore, it is essential to design an efficient database proxy approval syst...
来源: 评论
Trajectory optimization for UAV-enabled relaying with reinforcement learning
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 200-209页
作者: Chiya Zhang Xinjie Li Chunlong He Xingquan Li Dongping Lin School of Electronic and Information Engineering Harbin Institute of TechnologyShenzhenChina Guangdong Key Laboratory of Intelligent Information Processing Shenzhen UniversityShenzhenChina Peng Cheng Laboratory(PCL) ShenzhenChina National Mobile Communications Research Laboratory Southeast UniversityNanjingChina Shenzhen Institute of Information Technology ShenzhenChina Guangdong-Hong Kong Joint Laboratory for Big Data Imaging and Communication Shenzhen UniversityShenzhenChina
In this paper,we investigate the application of the Unmanned Aerial Vehicle(UAV)-enabled relaying system in emergency communications,where one UAV is applied as a relay to help transmit information from ground users t... 详细信息
来源: 评论
A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy fusion memetic algorithm
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2025年 第3期26卷 415-426页
作者: Mengyu ZHANG Zhenxue HE Yijin WANG Xiaojun ZHAO Xiaodan ZHANG Limin XIAO Xiang WANG Intelligent griculturalquipment RearchInstitute Hebei Agricultural UniverityBaoding 071001China Key Laboratory of Agricultural Big Data of Hebei Province Hebei Agricultural UniversityBaoding 071001China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Electronic Information Engineering Beihang UniversityBeijing 100191China
The power optimization of mixed polarity Reed–Muller(MPRM)logic circuits is a classic combinatorial optimization *** optimization approaches often suffer from slow convergence and a propensity to converge to local op... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
CKE-Former: A clinical knowledge-enhanced transformer for disease classification in telemedicine
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2025年 316卷
作者: Peng, Qi Cai, Yi Liu, Jiankun Chen, Xing Wang, Zefeng Xie, Jiayuan Li, Qing South China Univ Technol Sch Software Engn Guangzhou Peoples R China South China Univ Technol Key Lab Big Data & Intelligent Robot Minist Educ Guangzhou Peoples R China Meizhou Peoples Hosp Data Ctr Meizhou Peoples R China Univ Sydney Fac Engn Sydney Australia Hong Kong Polytech Univ Dept Comp Hong Kong Peoples R China
Recently, disease classification in telemedicine scenario has become an important research topic, as it enables consultations without the need for face-to-face interactions between doctors and patients, which is espec... 详细信息
来源: 评论
Fake Face Detection Based on Fusion of Spatial Texture and High-Frequency Noise
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 212-221页
作者: Dengyong Zhang Feifan Qi Jiahao Chen Jiaxin Chen Rongrong Gong Yuehong Tian Lebing Zhang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Changsha University of Science and Technology School of Computer and Communication Engineering Changsha University of Science and Technology Changsha Social Work College Changkuangao Beijing Technology Co. Ltd. School of Computer and Artificial Intelligence Huaihua University
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论