咨询与建议

限定检索结果

文献类型

  • 630 篇 会议
  • 526 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 728 篇 工学
    • 557 篇 计算机科学与技术...
    • 460 篇 软件工程
    • 180 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 73 篇 生物工程
    • 72 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 37 篇 化学工程与技术
    • 37 篇 生物医学工程(可授...
    • 35 篇 光学工程
    • 32 篇 仪器科学与技术
    • 28 篇 动力工程及工程热...
    • 23 篇 建筑学
    • 22 篇 网络空间安全
    • 21 篇 材料科学与工程(可...
    • 19 篇 交通运输工程
  • 323 篇 理学
    • 171 篇 数学
    • 80 篇 生物学
    • 77 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 42 篇 化学
    • 21 篇 系统科学
  • 295 篇 管理学
    • 172 篇 图书情报与档案管...
    • 148 篇 管理科学与工程(可...
    • 49 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 44 篇 法学
    • 38 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 8 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 semantics
  • 34 篇 data mining
  • 33 篇 knowledge engine...
  • 33 篇 training
  • 26 篇 feature extracti...
  • 22 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 conferences
  • 17 篇 task analysis
  • 17 篇 data engineering
  • 17 篇 machine learning
  • 16 篇 deep learning
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 visualization
  • 14 篇 knowledge manage...
  • 14 篇 knowledge graph

机构

  • 150 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 39 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 jiangxi key labo...
  • 31 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 28 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 key laboratory o...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 23 篇 key laboratory o...
  • 22 篇 sjtu-pinghu inst...
  • 22 篇 key laboratory o...

作者

  • 47 篇 chen hong
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 29 篇 li cuiping
  • 29 篇 jin hai
  • 28 篇 zhang jing
  • 27 篇 xiaoyong du
  • 26 篇 wang shan
  • 25 篇 xindong wu
  • 23 篇 sun geng
  • 23 篇 hong chen
  • 22 篇 hai jin
  • 21 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 huang qingming
  • 17 篇 meng wang

语言

  • 1,069 篇 英文
  • 61 篇 其他
  • 29 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Services"
1159 条 记 录,以下是501-510 订阅
排序:
Document-level Relation Extraction with Relation Correlations
arXiv
收藏 引用
arXiv 2022年
作者: Han, Ridong Peng, Tao Wang, Benyou Liu, Lu Wan, Xiang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education China College of Software Jilin University China Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China
Document-level relation extraction faces two overlooked challenges: long-tail problem and multi-label problem. Previous work focuses mainly on obtaining better contextual representations for entity pairs, hardly addre... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-Sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
UAV Swarm-enabled Collaborative Post-disaster Communications in Low Altitude Economy via a Two-stage Optimization Approach
arXiv
收藏 引用
arXiv 2025年
作者: Zheng, Xiaoya Sun, Geng Li, Jiahui Wang, Jiacheng Wu, Qingqing Niyato, Dusit Jamalipour, Abbas College of Computer Science d Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University 639798 Singapore College of Computing and ta Science Nanyang Technological University 639798 Singapore Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China School of Electrical and Computer Engiering The University of Sydney SydneyNSW2006 Australia
The low-altitude economy (LAE), as a new economic paradigm, plays an indispensable role in cargo transportation, healthcare, infrastructure inspection, and especially post-disaster communication. Specifically, unmanne... 详细信息
来源: 评论
Article Reranking by Memory-Enhanced key Sentence Matching for Detecting Previously Fact-Checked Claims
arXiv
收藏 引用
arXiv 2021年
作者: Sheng, Qiang Cao, Juan Zhang, Xueyao Li, Xirong Zhong, Lei Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Key Lab of Data Engineering and Knowledge Engineering Renmin University of China China
False claims that have been previously fact-checked can still spread on social media. To mitigate their continual spread, detecting previously fact-checked claims is indispensable. Given a claim, existing works retrie... 详细信息
来源: 评论
Counterfactual Faithful data Generation Based on Disentangled Representation for Compound Fault Diagnosis of Rolling Bearings
Counterfactual Faithful Data Generation Based on Disentangle...
收藏 引用
Sensing, Measurement & data Analytics in the era of Artificial Intelligence (ICSMD), International Conference on
作者: Xu Ding Qiang Zhu Song Wang Yiqi Zhang Hui Wang Juan Xu Institute of Industry and Equipment Technology Hefei University of Technology Hefei China School of Mechanical Engineering Hefei University of Technology Hefei China Bengbu Triumph Engineering Technology Co. Ltd Bengbu China Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information Hefei University of Technology Hefei China
Recently, deep learning and human-out-of-the-loop methods enjoy their prosperous applications in mechanical fault diagnosis. Nonetheless, the None-IID(independent and identically distributed) issue radicated in acquir... 详细信息
来源: 评论
Evaluation of China’s Digital Economy: A Case Study using Entropy and TOPSIS
收藏 引用
Procedia Computer Science 2024年 242卷 1256-1262页
作者: Junjie Liu Boya Wang Jiayu Xue Yi Qu Yong Shi Sino-Danish College University of Chinese Academy of Sciences Beijing 100049 China Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing 100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing 100190 China Faculty of Science and Engineering University of Nottingham Ningbo China Ningbo Zhejiang 315100 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 101408 China School of Economics and Management University of Chinese Academy of Sciences Beijing 100190 China College of Information Science and Technology University of Nebraska at Omaha Omaha NE 68182 USA
Recently, digital economy in social science has become increasingly significant. A well-constructed evaluation structure could generally and promptly describe and reveal its overall social digitalization development. ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Multi-objective Aerial Collaborative Secure Communication Optimization via Generative Diffusion Model-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chuang Sun, Geng Li, Jiahui Wu, Qingqing Wang, Jiacheng Niyato, Dusit Liu, Yuanwei The College of Computer Science and Technology Jilin University Changchun130012 China The Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China The College of Computer Science and Technology Jilin University Changchun130012 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China The College of Computing and Data Science Nanyang Technological University 639798 Singapore The School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom
Due to flexibility and low-cost, unmanned aerial vehicles (UAVs) are increasingly crucial for enhancing coverage and functionality of wireless networks. However, incorporating UAVs into next-generation wireless commun... 详细信息
来源: 评论