咨询与建议

限定检索结果

文献类型

  • 2,880 篇 期刊文献
  • 2,270 篇 会议
  • 1 册 图书

馆藏范围

  • 5,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,250 篇 工学
    • 2,036 篇 计算机科学与技术...
    • 1,710 篇 软件工程
    • 598 篇 信息与通信工程
    • 396 篇 电气工程
    • 380 篇 控制科学与工程
    • 314 篇 生物工程
    • 305 篇 化学工程与技术
    • 266 篇 生物医学工程(可授...
    • 265 篇 电子科学与技术(可...
    • 244 篇 光学工程
    • 203 篇 机械工程
    • 159 篇 仪器科学与技术
    • 137 篇 材料科学与工程(可...
    • 134 篇 建筑学
    • 129 篇 交通运输工程
    • 123 篇 动力工程及工程热...
    • 122 篇 土木工程
    • 114 篇 环境科学与工程(可...
  • 1,946 篇 理学
    • 938 篇 数学
    • 441 篇 物理学
    • 420 篇 生物学
    • 329 篇 统计学(可授理学、...
    • 247 篇 化学
    • 135 篇 地球物理学
    • 126 篇 系统科学
  • 842 篇 管理学
    • 481 篇 管理科学与工程(可...
    • 402 篇 图书情报与档案管...
    • 161 篇 工商管理
  • 370 篇 医学
    • 317 篇 临床医学
    • 175 篇 基础医学(可授医学...
  • 154 篇 农学
  • 120 篇 法学
  • 68 篇 经济学
  • 39 篇 教育学
  • 20 篇 文学
  • 7 篇 艺术学
  • 2 篇 军事学
  • 1 篇 历史学

主题

  • 151 篇 semantics
  • 136 篇 feature extracti...
  • 111 篇 data mining
  • 105 篇 deep learning
  • 95 篇 training
  • 83 篇 computer science
  • 81 篇 knowledge engine...
  • 79 篇 laboratories
  • 79 篇 computational mo...
  • 71 篇 educational tech...
  • 65 篇 educational inst...
  • 65 篇 accuracy
  • 63 篇 image segmentati...
  • 57 篇 data models
  • 56 篇 predictive model...
  • 55 篇 neural networks
  • 55 篇 machine learning
  • 52 篇 visualization
  • 49 篇 reinforcement le...
  • 49 篇 convolution

机构

  • 415 篇 college of compu...
  • 244 篇 key laboratory o...
  • 93 篇 school of inform...
  • 82 篇 national frontie...
  • 81 篇 school of automa...
  • 77 篇 key laboratory o...
  • 74 篇 school of data a...
  • 74 篇 school of comput...
  • 71 篇 shandong provinc...
  • 69 篇 key laboratory o...
  • 68 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 key laboratory o...
  • 50 篇 south china univ...
  • 47 篇 ministry of educ...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 university of ch...
  • 42 篇 school of softwa...
  • 42 篇 department of ph...

作者

  • 49 篇 p.f. he
  • 46 篇 yang bo
  • 46 篇 x. li
  • 44 篇 s.x. zhang
  • 43 篇 dan feng
  • 43 篇 zhang xin
  • 37 篇 wu xindong
  • 37 篇 q. yu
  • 35 篇 sun geng
  • 33 篇 tan mingkui
  • 32 篇 zhang jing-fei
  • 31 篇 niyato dusit
  • 30 篇 du xiaoyong
  • 30 篇 liang yanchun
  • 27 篇 ouyang dantong
  • 26 篇 zheng wei-shi
  • 25 篇 ouyang jihong
  • 25 篇 xindong wu
  • 24 篇 dantong ouyang
  • 23 篇 li cuiping

语言

  • 4,757 篇 英文
  • 251 篇 其他
  • 151 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Data Engineering and Data Knowledge of the Ministry of Education of China"
5151 条 记 录,以下是141-150 订阅
排序:
Dual-level Mixup for Graph Few-shot Learning with Fewer Tasks  34
Dual-level Mixup for Graph Few-shot Learning with Fewer Task...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Liu, Yonghao Li, Mengyu Giunchiglia, Fausto Huang, Lan Li, Ximing Feng, Xiaoyue Guan, Renchu College of Computer Science and Technology Jilin University Changchun China Department of Information Engineering and Computer Science University of Trento Trento Italy Key Laboratory of Symbolic Computation and Knowledge Engineering of the Ministry of Education China
Graph neural networks have been demonstrated as a powerful paradigm for effectively learning graph-structured data on the web and mining content from it. Current leading graph models require a large number of labeled ... 详细信息
来源: 评论
A Combination Feature-Based Reinforcement Learning Approach via Mathematical Optimization
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年 22卷 12455-12469页
作者: Shi, Fengyuan Meng, Ying Liu, Jiyin Tang, Lixin Northeastern University National Frontiers Science Center for Industrial Intelligence and Systems Optimization Key Laboratory of Data Analytics and Optimization for Smart Industry Ministry of Education Shenyang110819 China Loughborough University School of Business Economics LeicestershireLE11 3TU United Kingdom Northeastern University National Frontiers Science Center for Industrial Intelligence and Systems Optimization Shenyang110819 China
Reinforcement learning is a promising method for solving decision problems, and its potential has been increasingly recognized for large-scale combinatorial optimization problems in recent years. However, the existing... 详细信息
来源: 评论
ETFIDS: An Entropy-Driven, Time-Frequency Analysis Framework for In-Vehicle CAN Signal Intrusion Detection
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Wanning Qin, Guihe Liang, Yanhua Song, Jiaru Liu, Qingxin Zhou, Xue Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Changchun130012 China
In recent years, cyberattacks against automobiles have exposed significant security threats to in-vehicle networks. The vulnerability of communication signals to malicious interference and manipulation can lead to ser... 详细信息
来源: 评论
AAMB: a cross-domain identity authentication scheme based on multilayered blockchains in IoMT
收藏 引用
Journal of Supercomputing 2025年 第7期81卷 1-39页
作者: Zhang, Zheqing Li, Hongzhi Li, Dun Li, Kuan-Ching College of Big Data and Artificial Intelligence Chizhou University Chizhou247000 China Anhui Provincial Joint Construction Key Laboratory of Intelligent Education Equipment and Technology Chizhou247000 China Department of Industrial Engineering Tsinghua University Beijing China Department of Computer Science and Information Engineering Providence University Taichung City Taiwan
The internet of medical things (IoMT) integrates various sensors, smart devices, and fully utilizes medical data to provide high-quality medical services through the Internet of Things (IoT). Smart medical devices can... 详细信息
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
SPAC: Sampling-based Progressive Attribute Compression for Dense Point Clouds
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2939-2953页
作者: Mao, Xiaolong Yuan, Hui Guo, Tian Jiang, Shiqi Hamzaoui, Raouf Kwong, Sam Shandong University School of Software Jinan 250100 China Shandong University School of Control Science and Engineering 250061 China Shandong University School of Control Science and Engineering Jinan 250061 China Ministry of Education Key Laboratory of Machine Intelligence and System Control Jinan 250061 China De Montfort University School of Engineering and Sustainable Development Leicester LE1 9BH United Kingdom Lingnan University School of Data Science Hong Kong
We propose an end-to-end attribute compression method for dense point clouds. The proposed method combines a frequency sampling module, an adaptive scale feature extraction module with geometry assistance, and a globa... 详细信息
来源: 评论
An Encoder-Based Framework for Privacy-Preserving Machine Learning  24th
An Encoder-Based Framework for Privacy-Preserving Machine L...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Jiayun Ren, Wei Zhang, Xianchao Zheng, Xianghan School of Computer Science China University of Geosciences Wuhan430074 China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China Ministry of Education Chengdu China Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing University Jiaxing China Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing University Jiaxing China College of Computer and Big Data Fuzhou University Fujian Fuzhou China School of Information and Intelligent Engineering Sanya College Hainan China
As a data-driven science, machine learning requires vast amounts of training data and computational resources. However, for highly privacy-sensitive data, it is crucial to protect the privacy of the data during both t... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
Temperature distribution and damage of thrombus induced by pulsed laser
收藏 引用
Infrared Physics and Technology 2025年 148卷
作者: Zhao, Xiaoli Qiu, Pengtianyu Xie, Enci Zhang, Chenxi Wang, Guangyu Fu, Bo Key Laboratory of Precision Opto-Mechatronics Technology of Education Ministry School of Instrumentation and Optoelectronic Engineering Beihang University Beijing100191 China Key Laboratory of Big Data-Based Precision Medicine Ministry of Industry and Information Technology School of Engineering Medicine Beihang University Beijing100191 China
In the process of laser thermal ablation, real-time observation of temperature distribution and damage is helpful to guide the laser thrombolysis process. However, in actual operation, it is difficult to predict the e... 详细信息
来源: 评论