咨询与建议

限定检索结果

文献类型

  • 1,681 篇 期刊文献
  • 1,556 篇 会议
  • 1 册 图书

馆藏范围

  • 3,238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,109 篇 工学
    • 1,377 篇 计算机科学与技术...
    • 1,191 篇 软件工程
    • 390 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 227 篇 电气工程
    • 215 篇 化学工程与技术
    • 212 篇 生物工程
    • 181 篇 机械工程
    • 178 篇 生物医学工程(可授...
    • 160 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 101 篇 仪器科学与技术
    • 83 篇 材料科学与工程(可...
    • 78 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 63 篇 土木工程
    • 61 篇 交通运输工程
    • 59 篇 冶金工程
  • 1,147 篇 理学
    • 646 篇 数学
    • 260 篇 生物学
    • 215 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 158 篇 化学
    • 98 篇 系统科学
  • 602 篇 管理学
    • 356 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 162 篇 医学
    • 129 篇 临床医学
    • 93 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 65 篇 法学
  • 61 篇 农学
  • 41 篇 经济学
  • 14 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 121 篇 semantics
  • 88 篇 feature extracti...
  • 86 篇 data mining
  • 79 篇 knowledge engine...
  • 77 篇 computer science
  • 74 篇 deep learning
  • 67 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 43 篇 predictive model...
  • 42 篇 data models
  • 41 篇 image segmentati...
  • 41 篇 computational mo...
  • 39 篇 accuracy
  • 38 篇 convolution
  • 37 篇 conferences
  • 35 篇 reinforcement le...
  • 35 篇 machine learning

机构

  • 453 篇 college of compu...
  • 277 篇 key laboratory o...
  • 108 篇 school of automa...
  • 91 篇 school of inform...
  • 87 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 84 篇 school of comput...
  • 57 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 school of softwa...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 44 篇 college of softw...
  • 39 篇 key laboratory o...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 key laboratory o...
  • 30 篇 college of compu...
  • 29 篇 key laboratory o...

作者

  • 41 篇 yang bo
  • 35 篇 sun geng
  • 35 篇 liang yanchun
  • 32 篇 wu xindong
  • 30 篇 niyato dusit
  • 29 篇 kaixiang peng
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 xindong wu
  • 27 篇 dantong ouyang
  • 27 篇 chen hong
  • 26 篇 li xiongfei
  • 25 篇 ouyang jihong
  • 24 篇 li ximing
  • 24 篇 jie dong
  • 23 篇 bo yang
  • 23 篇 yanchun liang
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 li cuiping

语言

  • 3,025 篇 英文
  • 136 篇 其他
  • 89 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education"
3238 条 记 录,以下是21-30 订阅
排序:
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Cyber Science Research Institute Sichuan University China Ministry of Education Key Laboratory of Data Protection and Intelligent Management Sichuan University Chengdu610065 China Ministry of Education Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology China Hefei University of Technology School of Computer Science and Information Engineering China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology China University of Padua Department of Mathematics HIT Center Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
MS-SAM: Multi-scale SAM Based on Dynamic Weighted Agent Attention  31st
MS-SAM: Multi-scale SAM Based on Dynamic Weighted Agent Att...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Yang, Enhui Zhang, Zhibin Engineering Research Center of Ecological Big Data Ministry of Education Key Laboratory of Wireless Networks and Mobile Computing Inner Mongolia University Hohhot010021 China
The Segment Anything Model (SAM), introduced in 2023, has made significant advancements in the field of computer vision. However, SAM faces two major challenges: limitations related to single-scale processing and high... 详细信息
来源: 评论
SlagNet: A Real-Time Slag Segmentation Model Based on Context and Edge Fusion  16th
SlagNet: A Real-Time Slag Segmentation Model Based on Conte...
收藏 引用
16th International Conference on Modelling, Identification and Control, ICMIC 2024
作者: Liu, Kecheng Li, Jiangyun Yuan, Li School of Automation and Electrical Engineering University of Science and Technology Beijing Beijing100083 China Key Laboratory of Knowledge Automation for Industrial Processes Ministry of Education Beijing100083 China
In the process of iron and steel smelting, steel slag is inevitably produced as a byproduct. Accurately identifying steel slag is a prerequisite for controlling the content of steel slag. Conventional vision-based ste... 详细信息
来源: 评论
Prediction of Rolling Force in Hot Rolling Process Based on Rollformer Model  16th
Prediction of Rolling Force in Hot Rolling Process Based on ...
收藏 引用
16th International Conference on Modelling, Identification and Control, ICMIC 2024
作者: Li, Qing Jiang, Pengyuan Yuan, Li School of Automation and Electrical Engineering University of Science and Technology Beijing Beijing100083 China Key Laboratory of Knowledge Automation for Industrial Processes Ministry of Education Beijing100083 China
In the steel manufacturing industry, the precise forecasting of rolling forces in the hot rolling process is vital for enhancing production efficiency and ensuring product quality. Traditional forecasting methods exhi... 详细信息
来源: 评论
Rethinking-based Code Summarization with Chain of Comments  31
Rethinking-based Code Summarization with Chain of Comments
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Cao, Liuwen He, Hongkui Huang, Hailin Wang, Jiexin Cai, Yi School of Software Engineering South China University of Technology China Key Laboratory of Big Data and Intelligent Robot South China University of Technology Ministry of Education China
Automatic code summarization aims to generate concise natural language descriptions (summary) for source code, which can free software developers from the heavy burden of manual commenting and software maintenance. Ex... 详细信息
来源: 评论
Enhanced Secure Beamforming for IRS-Assisted IoT Communication Using a Generative Diffusion Model-enabled Optimization Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13398-13414页
作者: Zhang, Jing Liu, Zheng Feng, Xin Yang, Hongwei Liang, Shuang Changchun University of Science and Technology College of Computer Science and Technology Changchun130022 China Northeast Normal University School of Information Science and Technology Changchun130117 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China
The spatial correlation between the main and eavesdropping channels impacts the effectiveness of beamforming technology in securing the IoT communication system. This study proposes an IRS-assisted secure beamforming ... 详细信息
来源: 评论
Lightweight Dual Grouped Large-Kernel Convolutions for Salient Object Detection Network  31st
Lightweight Dual Grouped Large-Kernel Convolutions for Sali...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Liu, Jiajie Zhang, Zhibin Engineering Research Center of Ecological Big Data Ministry of Education Beijing China Key Laboratory of Wireless Networks and Mobile Computing Inner Mongolia University Hohhot010021 China
Most existing Salient Object Detection (SOD) methods focus on achieving better performance, often resulting in models with a large number of parameters. However, there is limited research on lightweight models in this... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on data Security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论
Transformer-based multi-level attention integration network for video saliency prediction
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11833-11854页
作者: Tan, Rui Sun, Minghui Liang, Yanhua Software College Jilin University Qianjin Street Jilin Changchun130012 China College of Computer Science and Technology Jilin University Qianjin Street Jilin Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Qianjin Street Jilin Changchun130012 China
Most existing models for video saliency prediction heavily rely on 3D convolutional operations to extract spatio-temporal features. However, it is worth noting that 3D convolution produces a local receptive field, whi... 详细信息
来源: 评论
Towards a Theoretical Understanding of Semi-Supervised Learning Under Class Distribution Mismatch
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第6期47卷 4853-4868页
作者: Pan Du Suyun Zhao Puhui Tan Zisen Sheng Zeyu Gan Hong Chen Cuiping Li School of Information Renmin University of China Beijing China Engineering Research Center of Database and Business Intelligence Ministry of Education (MOE) Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education (MOE) Beijing China School of Statistics Renmin University of China Beijing China
Semi-supervised learning (SSL) confronts a formidable challenge under class distribution mismatch, wherein unlabeled data contain numerous categories absent in the labeled dataset. Traditional SSL methods undergo perf... 详细信息
来源: 评论