咨询与建议

限定检索结果

文献类型

  • 6,218 篇 期刊文献
  • 4,778 篇 会议
  • 5 册 图书

馆藏范围

  • 11,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,484 篇 工学
    • 4,545 篇 计算机科学与技术...
    • 3,801 篇 软件工程
    • 1,604 篇 信息与通信工程
    • 928 篇 电气工程
    • 855 篇 控制科学与工程
    • 773 篇 生物工程
    • 772 篇 化学工程与技术
    • 744 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 531 篇 生物医学工程(可授...
    • 519 篇 机械工程
    • 368 篇 材料科学与工程(可...
    • 357 篇 仪器科学与技术
    • 315 篇 动力工程及工程热...
    • 294 篇 交通运输工程
    • 232 篇 建筑学
    • 227 篇 土木工程
  • 4,379 篇 理学
    • 2,086 篇 数学
    • 1,294 篇 物理学
    • 964 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 627 篇 化学
    • 313 篇 系统科学
  • 1,926 篇 管理学
    • 1,116 篇 管理科学与工程(可...
    • 884 篇 图书情报与档案管...
    • 364 篇 工商管理
  • 538 篇 医学
    • 438 篇 临床医学
    • 324 篇 基础医学(可授医学...
    • 220 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 248 篇 农学
  • 159 篇 经济学
  • 88 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 261 篇 semantics
  • 223 篇 feature extracti...
  • 208 篇 deep learning
  • 162 篇 data mining
  • 135 篇 computational mo...
  • 127 篇 training
  • 125 篇 machine learning
  • 114 篇 convolution
  • 113 篇 knowledge engine...
  • 101 篇 neural networks
  • 99 篇 predictive model...
  • 98 篇 image segmentati...
  • 94 篇 computer science
  • 91 篇 data models
  • 90 篇 object detection
  • 88 篇 reinforcement le...
  • 88 篇 accuracy
  • 83 篇 optimization
  • 82 篇 laboratories
  • 77 篇 educational inst...

机构

  • 394 篇 college of compu...
  • 306 篇 university of ch...
  • 256 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 166 篇 school of inform...
  • 160 篇 infn sezione di ...
  • 158 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 147 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 101 篇 bobulska d.
  • 100 篇 blake t.
  • 99 篇 borsato m.
  • 99 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 90 篇 cali s.
  • 86 篇 amato s.
  • 85 篇 baryshnikov f.
  • 83 篇 bjørn m.
  • 77 篇 niyato dusit

语言

  • 10,217 篇 英文
  • 516 篇 其他
  • 268 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Data Engineering & Knowledge Engineering"
11001 条 记 录,以下是301-310 订阅
排序:
Adaptive Detr: A Framework with Dynamic Sampling Points and Feature-Guided Adaptive Attention Updates
SSRN
收藏 引用
SSRN 2025年
作者: Li, Botao Yang, Huguang Xia, Chenglong Zheng, Han Wulamu, Aziguli Zhang, Taohong Beijing100083 China Department of Guangxi Zhuang Autonomous Region Key Laboratory of AI and Information Processing [Hechi University Guangxi546300 China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083 China
In recent years, models based on DETR (Detection Transformer) have made significant progress in the field of object detection. However, the encoder and decoder in DETR and its variants still face several critical chal... 详细信息
来源: 评论
Intelligent elevator system based on the Internet of Things: improving elevator safety and management efficiency
Intelligent elevator system based on the Internet of Things:...
收藏 引用
2024 International Conference on Smart Transportation and City engineering, STCE 2024
作者: Huang, Lingbo Chen, Yihong Zhao, Kun The Internet of Things Perception and Big Data Analysis Key Laboratory of Nanchong City China West Normal University Nanchong 637002 China School of Electronic Information Engineering China West Normal University Nanchong 637002 China
The number of elevators in China's urbanization process has increased significantly, yet they face safety problems such as aging and insufficient maintenance. This paper introduces an intelligent IoT elevator syst... 详细信息
来源: 评论
Differential-Trust-Mechanism Based Trade-off Method Between Privacy and Accuracy in Recommender Systems
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5054-5068页
作者: Xu, Guangquan Feng, Shicheng Xi, Hao Yan, Qingyang Li, Wenshan Wang, Cong Wang, Wei Liu, Shaoying Tian, Zhihong Zheng, Xi Qingdao Huanghai University School of Big Data Qingdao China Tianjin University College of Intelligence and Computing Tianjin300350 China KLISS and School of Software Beijing100084 China Sichuan University School of Cyber Science and Engineering Chengdu610207 China Xi’an Jiaotong University School of Cyber Science and Engineering Xi’an710049 China East China Normal University Shanghai200062 China Hiroshima University School of Informatics and Data Science Higashihiroshima739-8511 Japan Guangzhou University Cyberspace Institute of Advanced Technology Guangdong Key Laboratory of Industrial Control System Security Huangpu Research School of Guangzhou University China Macquarie University School of Computing SydneyNSW2109 Australia
In the era where Web3.0 values data security and privacy, adopting groundbreaking methods to enhance privacy in recommender systems is crucial. Recommender systems need to balance privacy and accuracy, while also havi... 详细信息
来源: 评论
Experimental and Modeling Study on Void Fraction Using Thermal Distribution Sensor in Horizontal Annular Flow
收藏 引用
IEEE Sensors Journal 2025年 第10期25卷 17640-17649页
作者: Zhao, Ning Chen, Xiangyi Sun, Mingcong Song, Yajing Fang, Lide Li, Zhibin Hebei University College of Quality and Technical Supervision Hebei Baoding071000 China National and Local Joint Engineering Research Center of Metrology Instrument and System Hebei Baoding071002 China CCIC North China Metrology Company Ltd. Beijing100070 China Chengdu University of Information Technology School of Software Engineering Chengdu610225 China Sichuan University of Arts and Science Dazhou Key Laboratory of Government Data Security Sichuan Dazhou635000 China Xinjiang Technical Institute of Physics and Chemistry Chinese Academy of Sciences Urumqi830011 China
The void fraction is an important parameter to characterize the characteristics of annular flow, which is an important precondition for calculating the flow velocity, average density, pressure gradient, and analyzing ... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Yujun Chen, Yanqu Wang, Jiakai Hu, Jin Tao, Renshuai Liu, Xianglong State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Dual-Network Cross-Learning for Metabolite-Disease Association Prediction
IEEE Transactions on Computational Biology and Bioinformatic...
收藏 引用
IEEE Transactions on Computational Biology and Bioinformatics 2025年 第2期22卷 545-556页
作者: Yanxin Chen Qiao Ning Yitong Zhang Hui Li Shikai Guo Department of Information Science and Technology Dalian Maritime University Dalian China School of Artificial Intelligence and Computer Science Jiangnan University Wuxi China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Dalian Key Laboratory of Artificial Intelligence Dalian China
In recent years, increasing evidence has demonstrated a close association between metabolites and various complex human diseases, providing valuable insights for disease diagnosis, treatment, and prevention. Although ... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Forecasting of exchange rate time series based on event-aware transformer mode
收藏 引用
Soft Computing 2025年 第6期29卷 3035-3045页
作者: Zhang, Siyi Che, Tong Zhu, Zhiliang Luo, Guoli Feng, Ping Virtual Reality and Interactive Techniques Institute East China Jiaotong University Nanchang330013 China Department of Engineering Mathematics University of Bristol Northern Ireland BristolBS8 1TH United Kingdom Guizhou Key Laboratory of Big Data Statistical Analysis Guizhou University of Finance and Economics Guiyang550025 China
Accurately forecasting exchange rate time series is crucial for effective risk management. The longer the forecast time window and the higher the frequency, the more valuable it is for managers to make timely decision... 详细信息
来源: 评论
Explainable Application Intent for Zero-Touch Networking: An Incorporation of Hypergraph and Transformer
收藏 引用
IEEE Transactions on Communications 2025年
作者: Wu, Bing Zou, Sai Liwang, Minghui Ni, Wei Wang, Xianbin Guizhou University College of Big Data and Information Engineering China National Key Laboratory of Autonomous Intelligent Unmanned Systems Department of Control Science and Engineering China Tongji University Frontiers Science Center for Intelligent Autonomous Systems Ministry of Education Shanghai China Data61 CSIRO Australia Department of Electrical and Computer Engineering Western University Canada
The autonomous interpretation of application intent (APPI) represents the primary step towards achieving closed-loop autonomy in zero-touch networking (ZTN) and also a prerequisite for intent-based networking (IBN). H... 详细信息
来源: 评论
An enhanced sparse subset selection model based on adaptive projection distance
收藏 引用
Evolutionary Intelligence 2025年 第3期18卷 1-15页
作者: Feng, Feng Gao, Erwei Zhi, Xiaobin Zhao, Yichuan School of Science and Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and Telecommunications Xi’an 710121 China School of Communication and Information Engineering Xi’an University of Posts and Telecommunications Xi’an 710121 China School of Science and Research Center for Intelligent Systems and Data Science Xi’an University of Posts and Telecommunications Xi’an 710121 China Department of Mathematics and Statistics Georgia State University Atlanta 30303 GA United States
Subset selection focuses on identifying representative samples from a large dataset to produce a data subset that can represent the main features of the original data and also reduce the data size in an effective way.... 详细信息
来源: 评论