咨询与建议

限定检索结果

文献类型

  • 3,544 篇 期刊文献
  • 3,246 篇 会议
  • 4 册 图书

馆藏范围

  • 6,794 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,555 篇 工学
    • 3,189 篇 计算机科学与技术...
    • 2,667 篇 软件工程
    • 1,064 篇 信息与通信工程
    • 627 篇 电气工程
    • 586 篇 生物工程
    • 543 篇 控制科学与工程
    • 432 篇 电子科学与技术(可...
    • 385 篇 生物医学工程(可授...
    • 383 篇 光学工程
    • 337 篇 机械工程
    • 273 篇 化学工程与技术
    • 175 篇 交通运输工程
    • 168 篇 仪器科学与技术
    • 150 篇 材料科学与工程(可...
    • 147 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 120 篇 安全科学与工程
  • 2,699 篇 理学
    • 1,486 篇 数学
    • 681 篇 物理学
    • 663 篇 生物学
    • 459 篇 统计学(可授理学、...
    • 294 篇 化学
    • 203 篇 系统科学
  • 1,226 篇 管理学
    • 674 篇 管理科学与工程(可...
    • 600 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 322 篇 医学
    • 275 篇 临床医学
    • 235 篇 基础医学(可授医学...
    • 158 篇 药学(可授医学、理...
  • 183 篇 法学
    • 144 篇 社会学
  • 90 篇 经济学
  • 84 篇 农学
  • 61 篇 教育学
  • 27 篇 文学
  • 10 篇 军事学
  • 8 篇 艺术学
  • 4 篇 哲学

主题

  • 256 篇 feature extracti...
  • 217 篇 semantics
  • 172 篇 training
  • 161 篇 deep learning
  • 125 篇 computational mo...
  • 105 篇 accuracy
  • 102 篇 machine learning
  • 91 篇 convolution
  • 89 篇 data models
  • 88 篇 predictive model...
  • 80 篇 image segmentati...
  • 79 篇 neural networks
  • 76 篇 optimization
  • 74 篇 data mining
  • 72 篇 graph neural net...
  • 71 篇 visualization
  • 70 篇 contrastive lear...
  • 68 篇 object detection
  • 68 篇 federated learni...
  • 67 篇 task analysis

机构

  • 224 篇 university of ch...
  • 176 篇 key laboratory o...
  • 133 篇 shandong provinc...
  • 130 篇 school of inform...
  • 93 篇 school of data a...
  • 86 篇 peng cheng labor...
  • 79 篇 college of compu...
  • 73 篇 shandong provinc...
  • 69 篇 key laboratory o...
  • 64 篇 school of comput...
  • 64 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 62 篇 school of comput...
  • 62 篇 college of compu...
  • 55 篇 college of mathe...
  • 54 篇 school of comput...
  • 54 篇 beijing advanced...
  • 48 篇 school of comput...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...

作者

  • 90 篇 niyato dusit
  • 88 篇 cheng xueqi
  • 53 篇 huang qingming
  • 45 篇 guo jiafeng
  • 40 篇 zhao hai
  • 35 篇 zheng wei-shi
  • 35 篇 feng zhiquan
  • 34 篇 yang bo
  • 32 篇 wang guoyin
  • 31 篇 liu yang
  • 31 篇 chen yanping
  • 29 篇 shen huawei
  • 29 篇 wang wei
  • 29 篇 xu xiaolong
  • 28 篇 lu bao-liang
  • 28 篇 jin xiaolong
  • 28 篇 jiang kai
  • 27 篇 zhang lei
  • 27 篇 yang yang
  • 26 篇 li di

语言

  • 6,291 篇 英文
  • 405 篇 其他
  • 118 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Data Science and Intelligent Computing"
6794 条 记 录,以下是181-190 订阅
排序:
An Unsupervised Malicious Web Request Detection based on Transformer and Contrastive Learning
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: He, Shiming Zhang, Ying Liang, Diqing Sharma, Pradip Kumar Changsha University of Science and Technology School of Computer Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha410114 China University of Aberdeen Department of Computing Science AberdeenAB24 3UE United Kingdom
The World Wide Web (Web) is a crucial part of the Internet. Web attacks are becoming more and more serious and complex. Malicious Web request detection aims to rapidly and accurately identify abnormal attacks on the n... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning
收藏 引用
Information and Software Technology 2025年 184卷
作者: Tian, Zhenzhou Teng, Yudong Ke, Xianqun Chen, Yanping Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Department of Computer Science and Engineering Wright State University DaytonOH45435 United States
Context: Reliable and effective similarity analysis for the smart contracts facilitates the maintenance and quality assurance of the smart contract ecosystem. However, existing signature-based methods and code represe... 详细信息
来源: 评论
Comments and extensions on "State-equivalent form and minimum-order compensator design for rectangular descriptor systems"
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Shuo Zhang, Juan Hunan Key Laboratory for Computation and Simulation in Science and Engineering Key Laboratory of Intelligent Computing and Information Processing Ministry of Education School of Mathematics and Computational Science Xiangtan University Xiangtan411105 China
This technical note presents a counterexample showing that the equivalence conditions proposed by Geng et al. (IEEE Trans. Automat. Control, 2024), which use a minimum-order compensator (MOC) to achieve desired design... 详细信息
来源: 评论
A Lightweight and High-Fidelity Model for Generalized Audio-Driven 3D Talking Face Synthesis  27th
A Lightweight and High-Fidelity Model for Generalized Audi...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Liu, Shunce Zhong, Yuwei Wang, Huixuan Peng, Jingliang Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China School of Information Science and Engineering University of Jinan Jinan China School of Software and Microelectronics Peking University Beijing China School of Software Shandong University Jinan China
We present LW-GeneFace, a lightweight and high-fidelity model for generalized audio-driven facial animation, in this paper. We develop this model by reducing the size while maintaining the synthetic quality of Ge... 详细信息
来源: 评论
Time-independent Spiking Neuron via Membrane Potential Estimation for Efficient Spiking Neural Networks
Time-independent Spiking Neuron via Membrane Potential Estim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Hanqi Chen Lixing Yu Shaojie Zhan Penghui Yao Jiankun Shao Yunnan Key Laboratory of Intelligent Systems and Computing School of Information Science and Engineering Yunnan University China State Key Laboratory of Explosion Science and Technology Beijing Institute of Technology Beijing China
The computational inefficiency of spiking neural networks (SNNs) is primarily due to the sequential updates of membrane potential, which becomes more pronounced during extended encoding periods compared to artificial ... 详细信息
来源: 评论
Simplicial complexes graph convolution networks with higher-order features learning for limited samples diagnosis
收藏 引用
Control Engineering Practice 2025年 162卷
作者: Zhang, Xian-Jie Zhang, Hai-Feng Zhong, Kai Zhang, Xiao-Ming The Key Laboratory of Intelligent Computing and Signal Processing of the Ministry of Education School of Mathematical Science Anhui University Hefei 230601 Anhui China The Key Laboratory of Intelligent Computing and Signal Processing of the Ministry of Education Institutes of Physical Science and Information Technology Anhui University Hefei 230601 Anhui China
With the advancement of industrial automation, there is an increasing focus on research concerning limited fault samples. Although meta-learning and other methods can address this issue, they often necessitate the inc... 详细信息
来源: 评论
A Model-Agnostic Hierarchical Framework Towards Trajectory Prediction
收藏 引用
Journal of Computer science and Technology 2025年 第2期40卷 322-339页
作者: Qian, Tang-Wen Wang, Yuan Xu, Yong-Jun Zhang, Zhao Wu, Lin Qiu, Qiang Wang, Fei Domain-Oriented Intelligent System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100190 China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
Predicting the future trajectories of multiple agents is essential for various applications in real life, such as surveillance systems, autonomous driving, and social robots. The trajectory prediction task is influenc... 详细信息
来源: 评论
Joint Multi-Scale Contextual and Noise Suppression for Group Emotion Recognition
Joint Multi-Scale Contextual and Noise Suppression for Group...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Guo, Wangdong Zhu, Qing Mao, Qirong School of Computer Science and Communication Engineering Jiangsu University China Jiangsu Engineering Research Center of Big Data Ubiquitous Perception and Intelligent Agriculture Applications China Provincial Key Laboratory of Computational Intelligence and New Technologies in Low-Altitude Digital Agriculture Zhenjiang China
Group Emotion Recognition (GER) seeks to identify emotional states within multi-person groups. The complexity of the environment and the reliance on a single group emotion label often result in noisy individuals with ... 详细信息
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论