咨询与建议

限定检索结果

文献类型

  • 2,880 篇 期刊文献
  • 2,270 篇 会议
  • 1 册 图书

馆藏范围

  • 5,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,250 篇 工学
    • 2,036 篇 计算机科学与技术...
    • 1,710 篇 软件工程
    • 598 篇 信息与通信工程
    • 396 篇 电气工程
    • 380 篇 控制科学与工程
    • 314 篇 生物工程
    • 305 篇 化学工程与技术
    • 266 篇 生物医学工程(可授...
    • 265 篇 电子科学与技术(可...
    • 244 篇 光学工程
    • 203 篇 机械工程
    • 159 篇 仪器科学与技术
    • 137 篇 材料科学与工程(可...
    • 134 篇 建筑学
    • 129 篇 交通运输工程
    • 123 篇 动力工程及工程热...
    • 122 篇 土木工程
    • 114 篇 环境科学与工程(可...
  • 1,946 篇 理学
    • 938 篇 数学
    • 441 篇 物理学
    • 420 篇 生物学
    • 329 篇 统计学(可授理学、...
    • 247 篇 化学
    • 135 篇 地球物理学
    • 126 篇 系统科学
  • 842 篇 管理学
    • 481 篇 管理科学与工程(可...
    • 402 篇 图书情报与档案管...
    • 161 篇 工商管理
  • 370 篇 医学
    • 317 篇 临床医学
    • 175 篇 基础医学(可授医学...
  • 154 篇 农学
  • 120 篇 法学
  • 68 篇 经济学
  • 39 篇 教育学
  • 20 篇 文学
  • 7 篇 艺术学
  • 2 篇 军事学
  • 1 篇 历史学

主题

  • 151 篇 semantics
  • 136 篇 feature extracti...
  • 111 篇 data mining
  • 105 篇 deep learning
  • 95 篇 training
  • 83 篇 computer science
  • 81 篇 knowledge engine...
  • 79 篇 laboratories
  • 79 篇 computational mo...
  • 71 篇 educational tech...
  • 65 篇 educational inst...
  • 65 篇 accuracy
  • 63 篇 image segmentati...
  • 57 篇 data models
  • 56 篇 predictive model...
  • 55 篇 neural networks
  • 55 篇 machine learning
  • 52 篇 visualization
  • 49 篇 reinforcement le...
  • 49 篇 convolution

机构

  • 415 篇 college of compu...
  • 244 篇 key laboratory o...
  • 93 篇 school of inform...
  • 82 篇 national frontie...
  • 81 篇 school of automa...
  • 77 篇 key laboratory o...
  • 74 篇 school of data a...
  • 74 篇 school of comput...
  • 71 篇 shandong provinc...
  • 69 篇 key laboratory o...
  • 68 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 key laboratory o...
  • 50 篇 south china univ...
  • 47 篇 ministry of educ...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 university of ch...
  • 42 篇 school of softwa...
  • 42 篇 department of ph...

作者

  • 49 篇 p.f. he
  • 46 篇 yang bo
  • 46 篇 x. li
  • 44 篇 s.x. zhang
  • 43 篇 dan feng
  • 43 篇 zhang xin
  • 37 篇 wu xindong
  • 37 篇 q. yu
  • 35 篇 sun geng
  • 33 篇 tan mingkui
  • 32 篇 zhang jing-fei
  • 31 篇 niyato dusit
  • 30 篇 du xiaoyong
  • 30 篇 liang yanchun
  • 27 篇 ouyang dantong
  • 26 篇 zheng wei-shi
  • 25 篇 ouyang jihong
  • 25 篇 xindong wu
  • 24 篇 dantong ouyang
  • 23 篇 li cuiping

语言

  • 4,757 篇 英文
  • 251 篇 其他
  • 151 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Data Engineering and Data Knowledge of the Ministry of Education of China"
5151 条 记 录,以下是1-10 订阅
排序:
Weak Multi-Label data Stream Classification Under Distribution Changes in Labels
收藏 引用
IEEE Transactions on Big data 2025年 第3期11卷 1369-1380页
作者: Zou, Yizhang Hu, Xuegang Li, Peipei Hu, Jun Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education School of Computer Science and Information Engineering Hefei230002 China National University of Singapore School of Computing 119077 Singapore
Multi-label stream classification aims to address the challenge of dynamically assigning multiple labels to sequentially arrived instances. In real situations, only partial labels of instances can be observed due to t... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
MSMAE-Net: multi-semantic and multi-attention enhanced network for image forgery localization
收藏 引用
Signal, Image and Video Processing 2025年 第7期19卷 1-11页
作者: Liao, Jianjun Su, Lichao Lu, Menghan Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
The popularization of modern digital image technology has brought convenience to us, but it also poses many risks. The advancement of image editing software allows anyone to modify image content effortlessly. If these... 详细信息
来源: 评论
Bayesian Network Reconstruction and Iterative Divergence Problem Solving Method Based on Norm Minimization
收藏 引用
Computer Modeling in engineering & Sciences 2025年 第4期143卷 617-637页
作者: Kuo Li Aimin Wang Limin Wang Yuetan Zhao Xinyu Zhu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun130012China College of Software Jilin UniversityChangchun130012China
A Bayesian network reconstruction method based on norm minimization is proposed to address the sparsity and iterative divergence issues in network reconstruction caused by noise and missing *** method achieves precise... 详细信息
来源: 评论
Histological Image Diagnosis of Breast Cancer Based on Multi-Attention Convolution Neural Network
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2025年 第1期30卷 91-106页
作者: XU Wangwang XU Liangfeng LIU Ninghui LU Na Key Laboratory of Knowledge Engineering with Big Data(Hefei University of Technology) Ministry of EducationHefei230601China School of Computer and Information Hefei University of TechnologyHefei230601China First Affiliated Hospital of Anhui Medical University Hefei230022China
Breast cancer is a serious and high morbidity disease in women,and it is the main cause of cancer death in ***,getting tested and diagnosed early can reduce the risk of *** present,there are clinical examinations,imag... 详细信息
来源: 评论
Byzantine-robust distributed support vector machine
收藏 引用
Science china Mathematics 2025年 第3期68卷 707-728页
作者: Xiaozhou Wang Weidong Liu Xiaojun Mao School of Statistics East China Normal UniversityShanghai 200062China Key Laboratory of Advanced Theory and Application in Statistics and Data Science(Ministry of Education) East China Normal UniversityShanghai 200062China School of Mathematical Sciences Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Artificial Intelligence(Ministry of Education) Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Scientific and Engineering Computing(Ministry of Education) Shanghai Jiao Tong UniversityShanghai 200240China
The development of information technology brings diversification of data sources and large-scale data sets and calls for the exploration of distributed learning algorithms. In distributed systems, some local machines ... 详细信息
来源: 评论
An Evolutionary Multitasking Algorithm for Efficient Multiobjective Recommendations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 518-532页
作者: Tian, Ye Ji, Luke Hu, Yiwei Ma, Haiping Wu, Le Zhang, Xingyi Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Hefei230601 China Anhui University Institutes of Physical Science and Information Technology Hefei230601 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Hefei230029 China
Represented by evolutionary algorithms and swarm intelligence algorithms, nature-inspired metaheuristics have been successfully applied to recommender systems and amply demonstrated effectiveness, in particular, for m... 详细信息
来源: 评论
A Method for Fast Feature Selection Utilizing Cross-Similarity within the Context of Fuzzy Relations
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1195-1218页
作者: Wenchang Yu Xiaoqin Ma Zheqing Zhang Qinli Zhang School of Big Data and Artificial Intelligence Chizhou UniversityChizhou247000China Anhui Education Big Data Intelligent Perception and Application Engineering Research Center Anhui Provincial Joint Construction Key Laboratory of Intelligent Education Equipment and TechnologyChizhou247000China
Feature selection methods rooted in rough sets confront two notable limitations:their high computa-tional complexity and sensitivity to noise,rendering them impractical for managing large-scale and noisy *** primary i... 详细信息
来源: 评论
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation
收藏 引用
IEEE Transactions on Software engineering 2025年 第5期51卷 1591-1614页
作者: Li, Hongyan Sun, Weifeng Yan, Meng Xu, Ling Li, Qiang Zhang, Xiaohong Zhang, Hongyu Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education Chongqing400044 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
Unit Testing is crucial in software development and maintenance, aiming to verify that the implemented functionality is consistent with the expected functionality. A unit test is composed of two parts: a test prefix, ... 详细信息
来源: 评论
Face Reconstruction-Based Generalized Deepfake Detection Model with Residual Outlook Attention
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2025年 第4期21卷 1-19页
作者: Shi, Zenan Liu, Wenyu Chen, Haipeng College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
With the continuous development of deep counterfeiting technology, the information security in our daily life is under serious threat. While existing face forgery detection methods exhibit impressive accuracy when app... 详细信息
来源: 评论