咨询与建议

限定检索结果

文献类型

  • 3,483 篇 期刊文献
  • 3,238 篇 会议
  • 4 册 图书

馆藏范围

  • 6,725 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,474 篇 工学
    • 3,129 篇 计算机科学与技术...
    • 2,632 篇 软件工程
    • 1,030 篇 信息与通信工程
    • 606 篇 电气工程
    • 586 篇 生物工程
    • 516 篇 控制科学与工程
    • 404 篇 电子科学与技术(可...
    • 386 篇 生物医学工程(可授...
    • 381 篇 光学工程
    • 331 篇 机械工程
    • 270 篇 化学工程与技术
    • 167 篇 交通运输工程
    • 165 篇 仪器科学与技术
    • 150 篇 材料科学与工程(可...
    • 144 篇 动力工程及工程热...
    • 118 篇 网络空间安全
    • 115 篇 建筑学
  • 2,671 篇 理学
    • 1,469 篇 数学
    • 674 篇 物理学
    • 656 篇 生物学
    • 450 篇 统计学(可授理学、...
    • 290 篇 化学
    • 202 篇 系统科学
  • 1,217 篇 管理学
    • 671 篇 管理科学与工程(可...
    • 592 篇 图书情报与档案管...
    • 247 篇 工商管理
  • 317 篇 医学
    • 268 篇 临床医学
    • 228 篇 基础医学(可授医学...
    • 158 篇 药学(可授医学、理...
  • 179 篇 法学
    • 144 篇 社会学
  • 92 篇 经济学
  • 84 篇 农学
  • 55 篇 教育学
  • 27 篇 文学
  • 10 篇 军事学
  • 8 篇 艺术学
  • 4 篇 哲学

主题

  • 259 篇 feature extracti...
  • 217 篇 semantics
  • 176 篇 training
  • 158 篇 deep learning
  • 126 篇 computational mo...
  • 108 篇 accuracy
  • 102 篇 machine learning
  • 91 篇 convolution
  • 91 篇 predictive model...
  • 89 篇 data models
  • 80 篇 neural networks
  • 78 篇 image segmentati...
  • 78 篇 optimization
  • 75 篇 data mining
  • 73 篇 contrastive lear...
  • 73 篇 visualization
  • 70 篇 graph neural net...
  • 68 篇 federated learni...
  • 67 篇 object detection
  • 66 篇 task analysis

机构

  • 223 篇 university of ch...
  • 175 篇 key laboratory o...
  • 134 篇 school of inform...
  • 133 篇 shandong provinc...
  • 93 篇 school of data a...
  • 88 篇 peng cheng labor...
  • 74 篇 college of compu...
  • 73 篇 shandong provinc...
  • 69 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 64 篇 school of comput...
  • 63 篇 cas key laborato...
  • 61 篇 school of comput...
  • 58 篇 college of compu...
  • 55 篇 college of mathe...
  • 54 篇 beijing advanced...
  • 52 篇 school of comput...
  • 49 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 nanyang technolo...

作者

  • 88 篇 cheng xueqi
  • 82 篇 niyato dusit
  • 55 篇 huang qingming
  • 45 篇 guo jiafeng
  • 40 篇 zhao hai
  • 35 篇 zheng wei-shi
  • 34 篇 feng zhiquan
  • 33 篇 wang guoyin
  • 31 篇 yang bo
  • 31 篇 liu yang
  • 29 篇 shen huawei
  • 28 篇 lu bao-liang
  • 28 篇 jin xiaolong
  • 28 篇 xu xiaolong
  • 27 篇 zhang lei
  • 27 篇 jiang kai
  • 27 篇 qiang zhang
  • 26 篇 li di
  • 25 篇 yang yang
  • 25 篇 chen yanping

语言

  • 6,252 篇 英文
  • 377 篇 其他
  • 117 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Data Science and Intelligent Computing"
6725 条 记 录,以下是181-190 订阅
排序:
Approximating the total variation distance between spin systems
arXiv
收藏 引用
arXiv 2025年
作者: Feng, Weiming Liu, Hongyang Yang, Minji School of Computing and Data Science The University of Hong Kong Hong Kong State Key Laboratory for Novel Software Technology New Cornerstone Science Laboratory Nanjing University China
Spin systems form an important class of undirected graphical models. For two Gibbs distributions µ and ν induced by two spin systems on the same graph G = (V, E), we study the problem of approximating the total ... 详细信息
来源: 评论
LSDK-LegalSum: improving legal judgment summarization using logical structure and domain knowledge
收藏 引用
Journal of King Saud University - Computer and Information sciences 2025年 第1期37卷 1-15页
作者: Gao, Wei Yu, Shuai Qin, Yongbin Yang, Caiwei Huang, Ruizhang Chen, Yanping Lin, Chuan Engineering Research Center of Text Computing & CognitiveIntelligence Ministry of Education Guizhou University Guizhou Huaxi Guiyang 550025 China State Key Laboratory of Public Big Data Guizhou University Guizhou Huaxi Guiyang 550025 China College of Computer Science and Technology Guizhou University Guizhou Huaxi Guiyang 550025 China
Legal judgment summarization enhances the efficiency and accuracy of processing and retrieving similar cases by distilling key information from legal judgment documents. Legal judgments, which record the trial process... 详细信息
来源: 评论
BAST: Blockchain-Assisted Secure and Traceable data Sharing Scheme for Vehicular Networks
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4664-4678页
作者: Liu, Xinzhong Cui, Jie Zhang, Jing Yin, Rongwang Zhong, Hong Wei, Lu Bolodurina, Irina He, Debiao School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Hefei 230039 China Anhui University Anhui Engineering Laboratory of IoT Security Technologies Hefei 230039 China Hefei University Department of Basic Experiment and Training Hefei 230601 China Orenburg State University Faculty of Mathematics and Information Technologies Orenburg 460018 Russian Federation Wuhan University School of Cyber Science and Engineering 430072 China MatrixElements Technologies Shanghai Key Laboratory of Privacy Preserving Computation Shanghai 201204 China
In vehicular networks, caching service content on edge servers (ESs) is a widely accepted strategy for promptly responding to vehicle requests, reducing communication overhead, and improving service experience. Howeve... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
DMC-Watermark: A backdoor richer watermark for dual identity verification by dynamic mask covering
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-15页
作者: Zhu, Yujia Wang, Ruoxi Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Advanced Computing Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the increasing use of neural networks, the importance of copyright protection for these models has gained significant attention. Backdoor watermarking is one of the key methods for protecting copyright. However, ... 详细信息
来源: 评论
Unified Graph and Hypergraph Neural Network for Next-item Recommendation
Unified Graph and Hypergraph Neural Network for Next-item Re...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinyu Zhang Qize Jiang Hanyuan Zhang Weiwei Sun School of Computer Science Shanghai Key Laboratory of Data Science Fudan University Shanghai China Shanghai Institute of Intelligent Electronics & Systems Shanghai China
The task of next-item recommendation is a crucial component in recommendation systems. The challenge of this task lies in extracting complex interaction information from users’ historical interactions with items. Whi... 详细信息
来源: 评论
Position-aware Hypergraph Message-Passing Neural Network
Position-aware Hypergraph Message-Passing Neural Network
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinyu Zhang Qize Jiang Hanyuan Zhang Weiwei Sun School of Computer Science Shanghai Key Laboratory of Data Science Fudan University Shanghai China Shanghai Institute of Intelligent Electronics & Systems Shanghai China
Hypergraph neural networks can model more flexible connectivity relationships, are used to model higher-order interactions, and have produced strong results in many real-world applications. However, the currently exis... 详细信息
来源: 评论
UNeLF: Unconstrained Neural Light Field for Self-Supervised Angular Super-Resolution
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Zhao, Mingyuan Sheng, Hao Chen, Rongshan Cong, Ruixuan Cui, Zhenglong Yang, Da Beihang University State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beijing100191 China Beihang University Data Science and Intelligent Computing Laboratory Hangzhou International Innovation Institute Hangzhou311115 China Macao Polytechnic University Faculty of Applied Sciences 999078 China
Compared to supervised learning methods, self-supervised learning methods address the domain gap problem between light field (LF) datasets collected under varying acquisition conditions, which typically leads to decre... 详细信息
来源: 评论
PD-SDF: Dynamic Surface Reconstruction Based on Plane Decomposition for Single View RGB-D Videos
PD-SDF: Dynamic Surface Reconstruction Based on Plane Decomp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Jinwen Xie, Weixing Yao, Junfeng Wu, Shaoqi Peng, Youhong Ge, Mengyuan Dong, Xiao Center for Digital Media Computing School of Film School of Informatics Xiamen University China National Institute for Data Science in Health and Medicine Xiamen University China Jiujiang Research Institute of Xiamen University Jiujiang China Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and Tourism China Guangdong Provincial/Zhuhai Key Laboratory of IRADS BNU-HKBU United International College Zhuhai China
Surface reconstruction of dynamic scenes from single view videos is a challenging task due to the highly ill-posed and under-constrained nature. Existing single view reconstruction methods suffer from severe quality i... 详细信息
来源: 评论
Deep anomaly detection with partition contrastive learning for tabular data
收藏 引用
data Mining and Knowledge Discovery 2025年 第4期39卷 1-38页
作者: Li, Yizhou Wang, Yijie Xu, Hongzuo Li, Bin Zhou, Xiaohui National Key Laboratory of Parallel and Distributed Computing College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab (IGDL) Beijing China
Self-supervised anomaly detection (AD) methods define transformations and surrogate tasks to deeply learn data “normality”, presenting superior performance. Different from most existing work designed for images, thi... 详细信息
来源: 评论