咨询与建议

限定检索结果

文献类型

  • 625 篇 会议
  • 542 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 740 篇 工学
    • 564 篇 计算机科学与技术...
    • 467 篇 软件工程
    • 182 篇 信息与通信工程
    • 87 篇 电气工程
    • 73 篇 控制科学与工程
    • 73 篇 生物工程
    • 57 篇 电子科学与技术(可...
    • 43 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 光学工程
    • 36 篇 生物医学工程(可授...
    • 32 篇 仪器科学与技术
    • 28 篇 动力工程及工程热...
    • 23 篇 建筑学
    • 23 篇 网络空间安全
    • 21 篇 材料科学与工程(可...
    • 19 篇 土木工程
  • 329 篇 理学
    • 175 篇 数学
    • 80 篇 生物学
    • 79 篇 物理学
    • 53 篇 统计学(可授理学、...
    • 42 篇 化学
    • 20 篇 系统科学
  • 299 篇 管理学
    • 174 篇 图书情报与档案管...
    • 150 篇 管理科学与工程(可...
    • 51 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 45 篇 法学
    • 38 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 8 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 semantics
  • 35 篇 training
  • 34 篇 data mining
  • 33 篇 knowledge engine...
  • 27 篇 feature extracti...
  • 21 篇 computational mo...
  • 21 篇 data models
  • 20 篇 laboratories
  • 19 篇 big data
  • 19 篇 information retr...
  • 18 篇 conferences
  • 17 篇 data engineering
  • 16 篇 deep learning
  • 16 篇 task analysis
  • 16 篇 xml
  • 16 篇 databases
  • 16 篇 machine learning
  • 15 篇 visualization
  • 14 篇 knowledge manage...
  • 14 篇 knowledge graph

机构

  • 151 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 38 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 key laboratory o...
  • 31 篇 jiangxi key labo...
  • 31 篇 school of inform...
  • 28 篇 college of compu...
  • 28 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 sjtu-pinghu inst...
  • 24 篇 cluster and grid...
  • 23 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 22 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 30 篇 li cuiping
  • 30 篇 wang meng
  • 30 篇 jin hai
  • 29 篇 xindong wu
  • 28 篇 zhang jing
  • 27 篇 xiaoyong du
  • 26 篇 hong chen
  • 26 篇 wang shan
  • 24 篇 sun geng
  • 22 篇 hai jin
  • 21 篇 niyato dusit
  • 19 篇 chen jianping
  • 19 篇 zhou linjie
  • 18 篇 meng wang
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 huang qingming

语言

  • 1,081 篇 英文
  • 60 篇 其他
  • 29 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Services"
1170 条 记 录,以下是31-40 订阅
排序:
Towards a Theoretical Understanding of Semi-Supervised Learning Under Class Distribution Mismatch
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第6期47卷 4853-4868页
作者: Pan Du Suyun Zhao Puhui Tan Zisen Sheng Zeyu Gan Hong Chen Cuiping Li School of Information Renmin University of China Beijing China Engineering Research Center of Database and Business Intelligence Ministry of Education (MOE) Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education (MOE) Beijing China School of Statistics Renmin University of China Beijing China
Semi-supervised learning (SSL) confronts a formidable challenge under class distribution mismatch, wherein unlabeled data contain numerous categories absent in the labeled dataset. Traditional SSL methods undergo perf... 详细信息
来源: 评论
A Correlated data-Driven Collaborative Beamforming Approach for Energy-efficient IoT data Transmission
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yangning Kang, Hui Li, Jiahui Sun, Geng Sun, Zemin Wang, Jiacheng Zhao, Changyuan Niyato, Dusit College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University 639798 Singapore College of Computing and Data Science Nanyang Technological University Singapore
An expansion of Internet of Things (IoTs) has led to significant challenges in wireless data harvesting, dissemination, and energy management due to the massive volumes of data generated by IoT devices. These challeng... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
Proceedings of the ACM on Web Conference 2025
作者: Ken Li Bin Shi Jiazhe Wei Bo Dong School of Computer Science and Technology Xi'an Jiaotong University Xi'an China and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China School of Computer Science and Technology Xi'an Jiaotong University Xi'an China and Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an China School of Distance Education Xi'an Jiaotong University Xi'an China and Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural Networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
Deep Learning Based Proactive Anomaly Detection for 5G Core Control Plane Network Function Interactions
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Tan, Yawen Liu, Jiajia Li, Yuanhao Wang, Jiadai Xidian University State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xi'an710071 China Northwestern Polytechnical University National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Cybersecurity Shaanxi Xi'an710072 China
The Service-Based Architecture (SBA) introduced by 3GPP allows the control plane of 5G Core Network (CN) to function through a set of interconnected Network Functions (NFs), which offers significant benefits such as i... 详细信息
来源: 评论
UAV-Assisted Joint Mobile Edge Computing and data Collection via Matching-Enabled Deep Reinforcement Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Boxiong Kang, Hui Li, Jiahui Sun, Geng Sun, Zemin Jilin University College of Computer Science and Technology Changchun130012 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) and data collection (DC) have been popular research issues. Different from existing works that consider MEC and DC scenarios separately, this paper in... 详细信息
来源: 评论
A Correlated data-Driven Collaborative Beamforming Approach for Energy-Efficient IoT data Transmission
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Yangning Kang, Hui Li, Jiahui Sun, Geng Sun, Zemin Wang, Jiacheng Zhao, Changyuan Niyato, Dusit Jilin University College of Computer Science and Technology Changchun130012 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
An expansion of Internet of Things (IoTs) has led to significant challenges in wireless data harvesting, dissemination, and energy management due to the massive volumes of data generated by IoT devices. These challeng... 详细信息
来源: 评论
Exploring Heterogeneity and Uncertainty for Graph-based Cognitive Diagnosis Models in Intelligent Education  25
Exploring Heterogeneity and Uncertainty for Graph-based Cogn...
收藏 引用
Proceedings of the 31st ACM SIGKDD Conference on knowledge Discovery and data Mining V.1
作者: Pengyang Shao Yonghui Yang Chen Gao Lei Chen Kun Zhang Chenyi Zhuang Le Wu Yong Li Meng Wang Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei Anhui China BNRist Tsinghua University Beijing China Department of Electronic Engineering BNRist Tsinghua University Beijing China Ant Group HangZhou Zhejiang China
Graph-based Cognitive Diagnosis (CD) has attracted much research interest due to its strong ability on inferring students' proficiency levels on knowledge concepts. While graph-based CD models have demonstrated re... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Real-Time Proportional-Integral-Derivative(PID)Tuning Based on Back Propagation(BP)Neural Network for Intelligent Vehicle Motion Control
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2375-2401页
作者: Liang Zhou Qiyao Hu Xianlin Peng Qianlong Liu School of Information Science and Technology Northwest UniversityXi’an710127China State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services Northwest UniversityXi’an710127China Generative Artificial Intelligence and Mixed Reality Key Laboratory of Higher Education Institutions in Shaanxi Province Xi’an710127China Shaanxi Silk Road Cultural Heritage Digital Protection and Inheritance Collaborative Innovation Center Xi’an710127China School of Art Northwest UniversityXi’an710127China Network and Data Center Northwest UniversityXi’an710127China
Over 1.3 million people die annually in traffic accidents,and this tragic fact highlights the urgent need to enhance the intelligence of traffic safety and control *** modern industrial and technological applications ... 详细信息
来源: 评论