咨询与建议

限定检索结果

文献类型

  • 6,181 篇 期刊文献
  • 4,911 篇 会议
  • 5 册 图书

馆藏范围

  • 11,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,505 篇 工学
    • 4,604 篇 计算机科学与技术...
    • 3,779 篇 软件工程
    • 1,596 篇 信息与通信工程
    • 930 篇 控制科学与工程
    • 871 篇 电气工程
    • 775 篇 生物工程
    • 761 篇 化学工程与技术
    • 737 篇 电子科学与技术(可...
    • 542 篇 光学工程
    • 527 篇 生物医学工程(可授...
    • 520 篇 机械工程
    • 358 篇 材料科学与工程(可...
    • 357 篇 仪器科学与技术
    • 314 篇 动力工程及工程热...
    • 290 篇 交通运输工程
    • 228 篇 建筑学
    • 224 篇 土木工程
  • 4,327 篇 理学
    • 2,070 篇 数学
    • 1,279 篇 物理学
    • 938 篇 生物学
    • 671 篇 统计学(可授理学、...
    • 614 篇 化学
    • 311 篇 系统科学
  • 1,909 篇 管理学
    • 1,104 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 361 篇 工商管理
  • 535 篇 医学
    • 444 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 274 篇 法学
    • 227 篇 社会学
  • 232 篇 农学
  • 156 篇 经济学
  • 83 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 18 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 260 篇 semantics
  • 222 篇 feature extracti...
  • 213 篇 deep learning
  • 160 篇 data mining
  • 133 篇 computational mo...
  • 132 篇 training
  • 124 篇 machine learning
  • 113 篇 knowledge engine...
  • 113 篇 convolution
  • 102 篇 neural networks
  • 97 篇 image segmentati...
  • 97 篇 predictive model...
  • 94 篇 computer science
  • 92 篇 object detection
  • 92 篇 reinforcement le...
  • 88 篇 data models
  • 86 篇 optimization
  • 82 篇 laboratories
  • 81 篇 contrastive lear...
  • 81 篇 accuracy

机构

  • 409 篇 college of compu...
  • 302 篇 university of ch...
  • 258 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 167 篇 school of inform...
  • 161 篇 infn sezione di ...
  • 155 篇 horia hulubei na...
  • 151 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 149 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 112 篇 warsaw
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 101 篇 bowcock t.j.v.
  • 101 篇 casse g.
  • 100 篇 bobulska d.
  • 100 篇 blake t.
  • 100 篇 borsato m.
  • 100 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 88 篇 cali s.
  • 87 篇 amato s.
  • 86 篇 baryshnikov f.
  • 85 篇 bjørn m.
  • 76 篇 niyato dusit

语言

  • 10,024 篇 英文
  • 814 篇 其他
  • 274 篇 中文
  • 4 篇 德文
  • 4 篇 法文
检索条件"机构=Key Laboratory of Data Engineering & Knowledge Engineering"
11097 条 记 录,以下是4721-4730 订阅
排序:
State of the art in dense image matching cost computation for high-resolution satellite stereo  24
State of the art in dense image matching cost computation fo...
收藏 引用
2021 24th ISPRS Congress Commission II: Imaging Today, Foreseeing Tomorrow
作者: Wang, Yue Gong, Danchao Hu, Hualong Wang, Shugen Han, Yilong Wang, Yuan Ma, Xiaoliang Wuhan Geomatics Institute Wuhan China State Key Laboratory of Geo-information Engineering Xi'an China School of Remote Sensing and Information Engineering Wuhan University Wuhan China School of Geographic and Oceanographic Science Nanjing University Nanjing China Xi'An Geovis Spatial Data Technology Co. Ltd. Xi'an China
Large-scale Digital Surface Model (DSM) generated with high-resolution satellite images (HRSI) are comparable, cheaper, and more accessible when comparing to Light Detection and Ranging (LiDAR) data and aerial remotel... 详细信息
来源: 评论
Dual-neighbourhood information aggregation and feature fusion for prediction of miRNA–disease association
收藏 引用
Computers in Biology and Medicine 2024年 181卷 109068-109068页
作者: Liu, Wei Lan, Zixin Li, Zejun Sun, Xingen Lu, Xu School of Computer Science Xiangtan University Xiangtan411105 China School of Computer Science and Engineering Hunan Institute of Technology Hengyang421002 China School of Mathematics and Computational Science Xiangtan University Xiangtan411105 China School of Computer Science Guangdong Polytechnic Normal University Guangdong Provincial Key Laboratory of Intellectual Property Big Data Guangzhou510665 China
Studying the intricate relationship between miRNAs and diseases is crucial to prevent and treat miRNA-related disorders. Existing computational methods often overlook the importance of features of different nodes and ... 详细信息
来源: 评论
Backdoor Attack with Sparse and Invisible Trigger
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Yinghua Li, Yiming Gong, Xueluan Li, Zhifeng Xia, Shu-Tao Wang, Qian The Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou311200 China College of Computing and Data Science Nanyang Technological University 639798 Singapore The School of Computer Science Wuhan University China Tencent Data Platform Shenzhen518057 China The Research Center of Artificial Intelligence Peng Cheng Laboratory Shenzhen518000 China The School of Cyber Science and Engineering Wuhan University China
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where the adversary manipulates a small portion of training data such that the victim model predicts normally on the benign samples but classifies the tr... 详细信息
来源: 评论
Novel Personalized Multimedia Recommendation Systems Using Tensor Singular-Value-Decomposition
Novel Personalized Multimedia Recommendation Systems Using T...
收藏 引用
2023 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2023
作者: Chang, Shih Yu Wu, Hsiao-Chun Yan, Kun Chen, Xinjia Wu, Yiyan San Jose State University Department of Applied Data Science San JoseCA95192 United States Louisiana State University School of Electrical Engineering and Computer Science Baton RougeLA70803 United States Guilin University of Electronic Technology Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin541004 China Guilin University of Electronic Technology Department of Information and Telecommunication Guilin541004 China Northwestern State University of Louisiana Department of Engineering Technology NatchitochesLA71497 United States Communications Research Centre Canada OttawaONK2H 8S2 Canada
Nowadays, multimedia data are often produced by various sources, e.g., Internet of Things (IoT), social media, customer databases, etc. As tremendous multimedia data are produced every day, users or E-commerce custome... 详细信息
来源: 评论
Research Method of Blind Path Recognition Based on DCGAN  6th
Research Method of Blind Path Recognition Based on DCGAN
收藏 引用
6th International Conference on Advanced Intelligent Systems and Informatics, AISI 2020
作者: Luo, Ling Zhang, Ping-Jun Hu, Peng-Jun Yang, Liu Chang, Kuo-Chi School of Information Science and Engineering Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China College of Mechanical and Electrical Engineering National Taipei University of Technology Taipei Taiwan Department of Business Administration North Borneo University College Sabah Malaysia
In order to solve the problem that there are few blind path data sets and a lot of manual data collection work in the current blind guide system, computer vision algorithm is used to automatically generate blind path ... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Ultra-broadband Luminescent Bi/Er Co-Doped Optical Fibre Based Temperature Sensing System
Ultra-broadband Luminescent Bi/Er Co-Doped Optical Fibre Bas...
收藏 引用
OptoElectronics and Communications Conference, OECC
作者: Yanhua Luo Jianxiang Wen Yanhua Dong Mengshi Zhu Tingyun Wang Shuen Wei Weiwen Zou Jiaying Wang Gang-Ding Peng Optical Fiber Research Institute Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai University Shanghai China Key Laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China Institute for Photonics and Advanced Sensing School of Physics Chemistry and Earth Sciences The University of Adelaide Adelaide SA Australia Department of Electronic Engineering State Key Laboratory of Advanced Optical Communications System and Networks Shanghai Jiao Tong University Shanghai China Photonics and Optical Communications Group School of Electrical Engineering and Telecommunications University of New South Wales Sydney NSW Australia
Bi/Er co-doped optical fibres (BEDFs) with the ultra-broadband emission and an eccentric core have been proposed for Mach–Zehnder interferometric (MZI) temperature sensing, which provides the temperature sensitivitie... 详细信息
来源: 评论
Variational Wasserstein Barycenters with c-Cyclical Monotonicity Regularization
arXiv
收藏 引用
arXiv 2021年
作者: Chi, Jinjin Yang, Zhiyao Li, Ximing Ouyang, Jihong Guan, Renchu College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education China
Wasserstein barycenter, built on the theory of Optimal Transport (OT), provides a powerful framework to aggregate probability distributions, and it has increasingly attracted great attention within the machine learnin... 详细信息
来源: 评论
GAN-based Intrusion Detection data Enhancement
GAN-based Intrusion Detection Data Enhancement
收藏 引用
第33届中国控制与决策会议
作者: Wei Fu Liping Qian Xiaohui Zhu School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture
In view of the lack of intrusion detection data and the slow update of mainstream detection methods,an intrusion detection data generation method based on a generative adversarial network is ***,the overall data is di... 详细信息
来源: 评论