咨询与建议

限定检索结果

文献类型

  • 3,510 篇 期刊文献
  • 3,396 篇 会议
  • 4 册 图书

馆藏范围

  • 6,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,541 篇 工学
    • 3,198 篇 计算机科学与技术...
    • 2,662 篇 软件工程
    • 1,043 篇 信息与通信工程
    • 588 篇 生物工程
    • 566 篇 电气工程
    • 548 篇 控制科学与工程
    • 419 篇 电子科学与技术(可...
    • 383 篇 生物医学工程(可授...
    • 381 篇 光学工程
    • 324 篇 机械工程
    • 268 篇 化学工程与技术
    • 167 篇 交通运输工程
    • 165 篇 仪器科学与技术
    • 144 篇 材料科学与工程(可...
    • 144 篇 动力工程及工程热...
    • 122 篇 建筑学
    • 116 篇 网络空间安全
  • 2,688 篇 理学
    • 1,487 篇 数学
    • 672 篇 物理学
    • 666 篇 生物学
    • 459 篇 统计学(可授理学、...
    • 288 篇 化学
    • 201 篇 系统科学
  • 1,213 篇 管理学
    • 668 篇 管理科学与工程(可...
    • 592 篇 图书情报与档案管...
    • 243 篇 工商管理
  • 328 篇 医学
    • 280 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 158 篇 药学(可授医学、理...
  • 182 篇 法学
    • 147 篇 社会学
  • 87 篇 经济学
  • 86 篇 农学
  • 63 篇 教育学
  • 27 篇 文学
  • 10 篇 军事学
  • 9 篇 艺术学
  • 4 篇 哲学

主题

  • 268 篇 feature extracti...
  • 222 篇 semantics
  • 180 篇 training
  • 164 篇 deep learning
  • 133 篇 computational mo...
  • 123 篇 accuracy
  • 103 篇 machine learning
  • 92 篇 convolution
  • 92 篇 data models
  • 86 篇 predictive model...
  • 83 篇 federated learni...
  • 82 篇 optimization
  • 81 篇 image segmentati...
  • 78 篇 neural networks
  • 77 篇 data mining
  • 77 篇 contrastive lear...
  • 74 篇 visualization
  • 70 篇 object detection
  • 70 篇 graph neural net...
  • 68 篇 robustness

机构

  • 231 篇 university of ch...
  • 178 篇 key laboratory o...
  • 133 篇 shandong provinc...
  • 131 篇 school of inform...
  • 92 篇 college of compu...
  • 89 篇 peng cheng labor...
  • 89 篇 school of data a...
  • 73 篇 shandong provinc...
  • 68 篇 key laboratory o...
  • 67 篇 school of comput...
  • 66 篇 school of comput...
  • 63 篇 cas key laborato...
  • 59 篇 shandong provinc...
  • 54 篇 beijing advanced...
  • 54 篇 college of compu...
  • 53 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 52 篇 school of comput...
  • 48 篇 school of comput...
  • 44 篇 school of comput...

作者

  • 89 篇 niyato dusit
  • 89 篇 cheng xueqi
  • 55 篇 huang qingming
  • 45 篇 guo jiafeng
  • 41 篇 zhao hai
  • 35 篇 zheng wei-shi
  • 33 篇 liu yang
  • 33 篇 feng zhiquan
  • 33 篇 wang guoyin
  • 31 篇 yang bo
  • 28 篇 shen huawei
  • 28 篇 lu bao-liang
  • 28 篇 yang yang
  • 28 篇 jin xiaolong
  • 28 篇 xu xiaolong
  • 27 篇 zhang lei
  • 27 篇 wang wei
  • 26 篇 jiang kai
  • 26 篇 li di
  • 25 篇 yang zhiyong

语言

  • 5,751 篇 英文
  • 1,059 篇 其他
  • 135 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Data Science and Intelligent Computing"
6910 条 记 录,以下是281-290 订阅
Efficient QoS data Prediction Based on Tensor Kernel Paradigm-Tensor Decomposition
Efficient QoS Data Prediction Based on Tensor Kernel Paradig...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Hong Xia Jing Xu Qingyi Dong Hui Jia Yanping Chen Xi’an Key Laboratory of Big Data and Intelligent Computing Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an Shaanxi China
In the Mobile Edge computing (MEC) environment, the prediction efficiency is low when user recommendation is based on Quality of Service (QoS) data due to network environment and other factors. Traditional methods use... 详细信息
来源: 评论
An Adaptive Speech Noise Reduction Method Based on Noise Classification  13
An Adaptive Speech Noise Reduction Method Based on Noise Cla...
收藏 引用
13th IEEE International Conference on CYBER Technology in Automation, Control, and intelligent Systems, CYBER 2023
作者: Niu, Ben Wei, Yangjie College of Computer Science and Engineering Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China
To improve the accuracy and robustness of existing speech denoising methods, this study proposes an adaptive speech noise reduction method based on noise classification. First, to adapt to different time-varying chara... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
A Graph with Adaptive AdjacencyMatrix for Relation Extraction
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4129-4147页
作者: Run Yang YanpingChen Jiaxin Yan Yongbin Qin Engineering Research Center of Text Computing&Cognitive Intelligence Ministry of EducationGuizhou UniversityGuiyang550025China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China College of Computer Science and Technology Guizhou UniversityGuiyang550025China
The relation is a semantic expression relevant to two named entities in a *** a sentence usually contains several named entities,it is essential to learn a structured sentence representation that encodes dependency in... 详细信息
来源: 评论
Personalized Review Recommendation based on Implicit dimension mining
Personalized Review Recommendation based on Implicit dimensi...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Xu, Bei Xu, Yifan School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Users usually browse product reviews before buying products from e-commerce websites. Lots of e-commerce websites can recommend reviews. However, existing research on review recommendation mainly focuses on the genera... 详细信息
来源: 评论
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Gang Chen, Tianjiao Li, Min Han, Delong Zhou, MingLe Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
GLSNet: A Global Guided Local Feature Stepwise Aggregation Network for polyp segmentation
收藏 引用
Biomedical Signal Processing and Control 2024年 87卷
作者: Pan, Xiaoying Ma, Chenyang Mu, Yaya Bi, Manrong Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi‘an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi‘an710121 China School of Computer Science & Technology Xi'an University of Post & Telecommunications Xi‘an710121 China
Accurate polyp segmentation is of great significance for the prevention and diagnosis of early colon cancer. Transformer-based image segmentation models have been proposed for polyp segmentation with good results, how... 详细信息
来源: 评论
Byzantine-robust distributed support vector machine
收藏 引用
science China Mathematics 2025年 第3期68卷 707-728页
作者: Xiaozhou Wang Weidong Liu Xiaojun Mao School of Statistics East China Normal UniversityShanghai 200062China Key Laboratory of Advanced Theory and Application in Statistics and Data Science(Ministry of Education) East China Normal UniversityShanghai 200062China School of Mathematical Sciences Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Artificial Intelligence(Ministry of Education) Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Scientific and Engineering Computing(Ministry of Education) Shanghai Jiao Tong UniversityShanghai 200240China
The development of information technology brings diversification of data sources and large-scale data sets and calls for the exploration of distributed learning algorithms. In distributed systems, some local machines ... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Min He, Jinghui Ying, Zuobin Li, Gang Zhou, Mingle Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme...
来源: 评论
A new RCNN-RF for efficient and robust parking lot available detection  16
A new RCNN-RF for efficient and robust parking lot available...
收藏 引用
16th International Conference on Digital Image Processing, ICDIP 2024
作者: Zhang, Qian Ran, Yaqin Luo, Di Xu, Kaili Shi, Jilaing School of Data Science and Information Engineering GuiZhou MinZu University Guiyang550025 China Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guiyang550025 China
It's very meaningful to conduct the driver to the parking space available in the parking lot clearly and accurately by computer vision and computational intelligence. While it is an extremely difficult task, becau... 详细信息
来源: 评论