咨询与建议

限定检索结果

文献类型

  • 625 篇 会议
  • 518 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 723 篇 工学
    • 554 篇 计算机科学与技术...
    • 460 篇 软件工程
    • 180 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 73 篇 生物工程
    • 72 篇 电气工程
    • 57 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 生物医学工程(可授...
    • 35 篇 光学工程
    • 32 篇 仪器科学与技术
    • 28 篇 动力工程及工程热...
    • 23 篇 建筑学
    • 22 篇 网络空间安全
    • 21 篇 材料科学与工程(可...
    • 19 篇 交通运输工程
  • 322 篇 理学
    • 171 篇 数学
    • 80 篇 生物学
    • 77 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 42 篇 化学
    • 20 篇 系统科学
  • 295 篇 管理学
    • 172 篇 图书情报与档案管...
    • 148 篇 管理科学与工程(可...
    • 49 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 44 篇 法学
    • 38 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 8 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 semantics
  • 34 篇 data mining
  • 33 篇 knowledge engine...
  • 33 篇 training
  • 26 篇 feature extracti...
  • 22 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 conferences
  • 17 篇 task analysis
  • 17 篇 data engineering
  • 17 篇 machine learning
  • 16 篇 deep learning
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 visualization
  • 14 篇 knowledge manage...
  • 14 篇 knowledge graph

机构

  • 150 篇 school of inform...
  • 103 篇 school of comput...
  • 50 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 38 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 jiangxi key labo...
  • 31 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 28 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 key laboratory o...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 23 篇 key laboratory o...
  • 22 篇 sjtu-pinghu inst...
  • 22 篇 key laboratory o...

作者

  • 47 篇 chen hong
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 29 篇 li cuiping
  • 29 篇 jin hai
  • 28 篇 zhang jing
  • 27 篇 xiaoyong du
  • 26 篇 wang shan
  • 23 篇 sun geng
  • 23 篇 hong chen
  • 23 篇 xindong wu
  • 21 篇 niyato dusit
  • 20 篇 hai jin
  • 19 篇 hong richang
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 huang qingming
  • 17 篇 meng wang

语言

  • 1,054 篇 英文
  • 61 篇 其他
  • 29 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Services"
1144 条 记 录,以下是501-510 订阅
排序:
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
Multi-objective Aerial Collaborative Secure Communication Optimization via Generative Diffusion Model-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chuang Sun, Geng Li, Jiahui Wu, Qingqing Wang, Jiacheng Niyato, Dusit Liu, Yuanwei The College of Computer Science and Technology Jilin University Changchun130012 China The Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China The College of Computer Science and Technology Jilin University Changchun130012 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China The College of Computing and Data Science Nanyang Technological University 639798 Singapore The School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom
Due to flexibility and low-cost, unmanned aerial vehicles (UAVs) are increasingly crucial for enhancing coverage and functionality of wireless networks. However, incorporating UAVs into next-generation wireless commun... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
AutoSTL: Automated Spatio-Temporal Multi-Task Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zijian Zhao, Xiangyu Miao, Hao Zhang, Chunxu Zhao, Hongwei Zhang, Junbo College of Computer Science and Technology Jilin University China School of Data Science City University of Hong Kong Hong Kong Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University China Department of Computer Science Aalborg University Denmark JD Intelligent Cities Research China JD iCity JD Technology China Hong Kong Institute for Data Science City University of Hong Kong Hong Kong
Spatio-temporal prediction plays a critical role in smart city construction. Jointly modeling multiple spatio-temporal tasks can further promote an intelligent city life by integrating their inseparable relationship. ... 详细信息
来源: 评论
ER: Equivariance Regularizer for knowledge Graph Completion
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Zongsheng Xu, Qianqian Yang, Zhiyong Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China
Tensor factorization and distanced based models play important roles in knowledge graph completion (KGC). However, the relational matrices in KGC methods often induce a high model complexity, bearing a high risk of ov... 详细信息
来源: 评论
Geometry Interaction knowledge Graph Embeddings
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Zongsheng Xu, Qianqian Yang, Zhiyong Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China
knowledge graph (KG) embeddings have shown great power in learning representations of entities and relations for link prediction tasks. Previous work usually embeds KGs into a single geometric space such as Euclidean ... 详细信息
来源: 评论
Collaborative wi-fi fingerprinting indoor positioning using near relation  24
Collaborative wi-fi fingerprinting indoor positioning using ...
收藏 引用
2020 24th ISPRS Congress - Technical Commission IV on Spatial Information Science
作者: Wang, Y. Wang, W. Li, X. Zhang, W. Guo, R. National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Urban Informatics Shenzhen Key Laboratory of Spatial Smart Sensing and Services Research Institute for Smart Cities School of Architecture and Urban Planning Shenzhen University Shenzhen China
Indoor positioning is of great importance to the era of mobile computing. Currently, much attention has been paid to RSS-based location for that it can provide position information without additional equipment. Howeve... 详细信息
来源: 评论
A Scheme for Kinship Reasoning based on Ontology
A Scheme for Kinship Reasoning based on Ontology
收藏 引用
IEEE International Conference on Big knowledge (ICBK)
作者: Ru Chen Guliu Liu Yi Zhu Xindong Wu Ministry of Education Key Laboratory of Knowledge Engineering with Big Data School of Computer Science and Information Engineering Hefei University of Technology School of Information Engineering Yangzhou University Mininglamp Academy of Sciences Mininglamp Technology
With the rapid development of artificial intelligence and semantic networks, knowledge graphs have received extensive attention in various application domains. As a domain knowledge graph, a genealogical knowledge gra... 详细信息
来源: 评论
Digital Mahjong System: Towards Precise Cognitive Assessment with IoT Technologies  1
收藏 引用
24th International Conference on Human-Computer Interaction, HCII 2022
作者: An, Ning Hu, Enze Guo, Yanrui Yang, Jiaoyun Au, Rhoda Ding, Huitong School of Computer Science and Information Engineering Hefei University of Technology Hefei China Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine Hefei University of Technology Hefei China National Smart Eldercare International S&T Cooperation Base Hefei University of Technology Hefei China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology Hefei China Shenzhen Corecloud Innovation Technology Co. Ltd. Shenzhen China Key Laboratory of Knowledge Engineering with Big Data of Ministry of Education Hefei University of Technology Hefei China Department of Anatomy and Neurobiology Neurology and Framingham Heart Study Boston University School of Medicine Boston United States Department of Epidemiology Boston University School of Public Health Boston United States
To the best of our knowledge, this paper is the first to apply IoT technologies to transform the popular Mahjong game into a Digital Mahjong System (DMS) for digitally performing cognitive assessments. People have sta... 详细信息
来源: 评论