咨询与建议

限定检索结果

文献类型

  • 625 篇 会议
  • 518 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 723 篇 工学
    • 554 篇 计算机科学与技术...
    • 460 篇 软件工程
    • 180 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 73 篇 生物工程
    • 72 篇 电气工程
    • 57 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 生物医学工程(可授...
    • 35 篇 光学工程
    • 32 篇 仪器科学与技术
    • 28 篇 动力工程及工程热...
    • 23 篇 建筑学
    • 22 篇 网络空间安全
    • 21 篇 材料科学与工程(可...
    • 19 篇 交通运输工程
  • 322 篇 理学
    • 171 篇 数学
    • 80 篇 生物学
    • 77 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 42 篇 化学
    • 20 篇 系统科学
  • 295 篇 管理学
    • 172 篇 图书情报与档案管...
    • 148 篇 管理科学与工程(可...
    • 49 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 44 篇 法学
    • 38 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 8 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 semantics
  • 34 篇 data mining
  • 33 篇 knowledge engine...
  • 33 篇 training
  • 26 篇 feature extracti...
  • 22 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 conferences
  • 17 篇 task analysis
  • 17 篇 data engineering
  • 17 篇 machine learning
  • 16 篇 deep learning
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 visualization
  • 14 篇 knowledge manage...
  • 14 篇 knowledge graph

机构

  • 150 篇 school of inform...
  • 103 篇 school of comput...
  • 50 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 38 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 jiangxi key labo...
  • 31 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 28 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 key laboratory o...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 23 篇 key laboratory o...
  • 22 篇 sjtu-pinghu inst...
  • 22 篇 key laboratory o...

作者

  • 47 篇 chen hong
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 29 篇 li cuiping
  • 29 篇 jin hai
  • 28 篇 zhang jing
  • 27 篇 xiaoyong du
  • 26 篇 wang shan
  • 23 篇 sun geng
  • 23 篇 hong chen
  • 23 篇 xindong wu
  • 21 篇 niyato dusit
  • 20 篇 hai jin
  • 19 篇 hong richang
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 huang qingming
  • 17 篇 meng wang

语言

  • 1,054 篇 英文
  • 61 篇 其他
  • 29 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Services"
1144 条 记 录,以下是401-410 订阅
排序:
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
SAMPLING LOVÁSZ LOCAL LEMMA FOR GENERAL CONSTRAINT SATISFACTION SOLUTIONS IN NEAR-LINEAR TIME
arXiv
收藏 引用
arXiv 2022年
作者: He, Kun Wang, Chunyang Yin, Yitong The Key Lab of Data Engineering and Knowledge Engineering MOE Renmin University of China No. 59 Zhongguancun Street Haidian District Beijing China State Key Laboratory for Novel Software Technology Nanjing University 163 Xianlin Avenue Jiangsu Province Nanjing China
We give a fast algorithm for sampling uniform solutions of general constraint satisfaction problems (CSPs) in a local lemma regime. Suppose that the CSP has n variables with domain size at most q, each constraint cont... 详细信息
来源: 评论
A method for measuring journal discriminative capacity and its application in WOS  15th
A method for measuring journal discriminative capacity and i...
收藏 引用
15th International Conference on Sustainable Digital Communities, iConference 2020
作者: Wang, Hao Zhang, Baolong Deng, Sanhong Su, Xinning School of Information Management Nanjing University Nanjing210023 China Jiangsu Key Laboratory of Data Engineering and Knowledge Service Nanjing210023 China
Journal discriminative capacity refers to the degree of difference between the journals in research subjects, and is of great significance for detecting the level of journal differentiation. Current research on journa... 详细信息
来源: 评论
DualConvNet: Enhancing CNN Inference Efficiency Through Compressed Convolutions and Reparameterization
DualConvNet: Enhancing CNN Inference Efficiency Through Comp...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Haipeng Du Muyan Jiao Jiageng Zhang Xin Lv Jie Zhang School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China School of Continuing Education Xi’an Jiaotong University Xi’an China Network Information Center Xi’an Jiaotong University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China
Convolutional Neural Networks (CNNs) have significantly advanced computer vision tasks, but their increasing complexity poses challenges for efficient inference, particularly on resource-constrained devices. We presen... 详细信息
来源: 评论
USER: A unified information search and recommendation model based on integrated behavior sequence
arXiv
收藏 引用
arXiv 2021年
作者: Yao, Jing Dou, Zhicheng Xie, Ruobing Lu, Yanxiong Wang, Zhiping Wen, Ji-Rong Gaoling School of Artificial Intelligence Renmin University of China WeChat Search Application Department Tencent China Beijing Key Laboratory of Big Data Management and Analysis Methods Key Laboratory of Data Engineering and Knowledge Engineering MOE
Search and recommendation are the two most common approaches used by people to obtain information. They share the same goal - satisfying the user's information need at the right time. There are already a lot of In... 详细信息
来源: 评论
Salient Patch Based NAS for Grading of Colorectal Cancer Histology Images  13
Salient Patch Based NAS for Grading of Colorectal Cancer His...
收藏 引用
13th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2022
作者: Meng, Hang Li, Fei Yang, Zhen Zhu, Qiang Fan, Chaogang Zhan, Shu Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei University of Technology Anhui Province Hefei230009 China The Second Affiliated Hospital of Anhui Medical University Anhui Province Hefei230601 China Tongcheng Teachers College Anhui Province Tongcheng231400 China Department of General Surgery The Affiliated BenQ Hospital of Nanjing Medical University Jiangsu Province Nanjing210021 China
Digital histopathological tissue images are gold material for cancer diagnosis and grades. Convolutional Neural Networks (CNNs) are state-of-the-art models in many image classification tasks. However, considering the ... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Access control of blockchain based on dual-policy attribute-based encryption  22
Access control of blockchain based on dual-policy attribute-...
收藏 引用
22nd IEEE International Conference on High Performance Computing and Communications, 18th IEEE International Conference on Smart City and 6th IEEE International Conference on data Science and Systems, HPCC-SmartCity-DSS 2020
作者: Han, Daojun Chen, Jinyu Zhang, Lei Shen, Yatian Wang, Xueheng Gao, Yihua Institute of Data and Knowledge Engineering School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Kaifeng China
In scenarios where multiple parties such as the Internet of Things and Supply Chains participate in data sharing and computing, when accessing data, users not only need to accept the forward access control of the data... 详细信息
来源: 评论
Soft Film Plate Method Based Ultrafine Ag-Cu Nanosheets with Multi-Nanozyme Activities for Neurotransmitter Biosensing
SSRN
收藏 引用
SSRN 2023年
作者: Kong, Lijun Fan, Lin Liu, Hao Zhang, JiaWei Hu, Mengdi Fan, Li Zhu, Hongliang Yan, Shancheng School of Geographic and Biologic Information Smart Health Big Data Analysis and Location Services Engineering Research Center of Jiangsu Province Nanjing University of Posts and Telecommunications Nanjing210023 China State Key Laboratory of Bioelectronics Jiangsu Key Laboratory for Biomaterials and Devices Southeast University Nanjing210096 China Nanjing University Nanjing210093 China
Ag and Cu based nanostructures serve as advanced functional materials for biomedical applications, due to their unique properties. Here, we proposed a novel Neurotransmitter Biosensing method based on Ag-Cu composite ... 详细信息
来源: 评论
DarkFed: A data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论