咨询与建议

限定检索结果

文献类型

  • 3,039 篇 期刊文献
  • 2,553 篇 会议
  • 4 册 图书

馆藏范围

  • 5,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,623 篇 工学
    • 2,301 篇 计算机科学与技术...
    • 1,934 篇 软件工程
    • 818 篇 信息与通信工程
    • 443 篇 电气工程
    • 438 篇 生物工程
    • 402 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 302 篇 化学工程与技术
    • 258 篇 生物医学工程(可授...
    • 251 篇 机械工程
    • 238 篇 光学工程
    • 183 篇 材料科学与工程(可...
    • 165 篇 动力工程及工程热...
    • 159 篇 交通运输工程
    • 149 篇 仪器科学与技术
    • 137 篇 建筑学
    • 131 篇 土木工程
  • 2,063 篇 理学
    • 1,007 篇 数学
    • 538 篇 物理学
    • 522 篇 生物学
    • 331 篇 统计学(可授理学、...
    • 313 篇 化学
    • 149 篇 系统科学
  • 1,049 篇 管理学
    • 617 篇 管理科学与工程(可...
    • 478 篇 图书情报与档案管...
    • 223 篇 工商管理
  • 294 篇 医学
    • 236 篇 临床医学
    • 164 篇 基础医学(可授医学...
  • 172 篇 法学
    • 142 篇 社会学
  • 150 篇 农学
  • 115 篇 经济学
    • 114 篇 应用经济学
  • 44 篇 教育学
  • 16 篇 文学
  • 13 篇 军事学
  • 6 篇 艺术学
  • 1 篇 历史学

主题

  • 177 篇 semantics
  • 153 篇 feature extracti...
  • 135 篇 deep learning
  • 132 篇 training
  • 93 篇 computational mo...
  • 83 篇 data models
  • 77 篇 machine learning
  • 76 篇 convolution
  • 73 篇 predictive model...
  • 72 篇 data mining
  • 63 篇 accuracy
  • 61 篇 neural networks
  • 56 篇 visualization
  • 54 篇 object detection
  • 52 篇 big data
  • 49 篇 optimization
  • 48 篇 task analysis
  • 48 篇 graph neural net...
  • 48 篇 forecasting
  • 46 篇 adaptation model...

机构

  • 165 篇 school of inform...
  • 149 篇 key laboratory o...
  • 133 篇 school of econom...
  • 93 篇 school of comput...
  • 89 篇 state key labora...
  • 86 篇 fujian provincia...
  • 77 篇 henan key labora...
  • 75 篇 research center ...
  • 73 篇 college of big d...
  • 73 篇 school of comput...
  • 73 篇 school of comput...
  • 68 篇 university of ch...
  • 66 篇 guangdong key la...
  • 57 篇 hubei key labora...
  • 53 篇 shandong provinc...
  • 52 篇 key laboratory o...
  • 51 篇 shenzhen researc...
  • 50 篇 school of inform...
  • 49 篇 peng cheng labor...
  • 48 篇 school of softwa...

作者

  • 48 篇 shi yong
  • 40 篇 yong shi
  • 39 篇 zhang rui
  • 39 篇 pan jeng-shyang
  • 39 篇 chen hong
  • 38 篇 chang kuo-chi
  • 37 篇 wu xindong
  • 34 篇 liu yang
  • 32 篇 wang meng
  • 32 篇 du xiaoyong
  • 32 篇 zhang jing
  • 31 篇 xue xingsi
  • 31 篇 xindong wu
  • 30 篇 wen ji-rong
  • 30 篇 li cuiping
  • 28 篇 hong chen
  • 28 篇 chu kai-chun
  • 27 篇 huang qingming
  • 26 篇 liu jun
  • 26 篇 li shaobo

语言

  • 5,248 篇 英文
  • 243 篇 其他
  • 120 篇 中文
  • 6 篇 德文
  • 6 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data"
5596 条 记 录,以下是71-80 订阅
排序:
Electrochemical dissolution, reduction, and nucleation mechanisms of molybdenum in NaCl-KCl molten salt systems
收藏 引用
Journal of Materials Science and Technology 2025年 238卷 45-54页
作者: Lv, Hongzhan Zhang, Liwen Xi, Xiaoli Nie, Zuoren Collaborative Innovation Center of Capital Resource-Recycling Material Technology Beijing University of Technology Beijing100124 China Key Laboratory of Advanced Functional Materials Ministry of Education Faculty of Materials and Manufacturing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Industrial Big-data Application Technology Beijing University of Technology Beijing100124 China
This study investigates the anodic dissolution and electrochemical behavior of molybdenum in a NaCl-KCl molten salt system at 1023 K. The anodic dissolution process was systematically analyzed, revealing a sequential ... 详细信息
来源: 评论
Efficient Homomorphic Approximation of Max Pooling for Privacy-Preserving Deep Learning  6th
Efficient Homomorphic Approximation of Max Pooling for Pri...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Zhang, Peng Qiu, Dongyan Duan, Ao Liu, Hongwei The Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen518060 China College of Big Data and Internet Shenzhen Technology University Guangdong Shenzhen518118 China
Privacy-Preserving Deep Learning (PPDL) using Fully Homomorphic Encryption (FHE) addresses potential data privacy exposure risks associated with deploying deep learning models in untrusted cloud environments. FHE-base... 详细信息
来源: 评论
First-principles investigation of adhesion strength and interfacial bonding in Mg/X(X=Ti,Zr,Hf,V,Nd,Cr,Mo,Mn,and Fe)interface
收藏 引用
Journal of Magnesium and Alloys 2025年 第1期13卷 83-89页
作者: Longke Bao Zhifu Yao Yuhui Zhang Cuiping Wang Kaihong Zheng Rongpei Shi Xingjun Liu Fusheng Pan State Key Laboratory of Advanced Welding and Joining Harbin Institute of TechnologyShenzhen 518055China College of Materials Science and Engineering and Institute of Materials Genome and Big DataHarbin Institute of TechnologyShenzhen 518055China Institute of New Materials Guangdong Academy of SciencesGuangzhou 510650China College of Materials Science and Engineering Xiamen UniversityXiamen 361005China College of Materials Science and Engineering Chongqing UniversityChongqing 400045China
Magnesium alloys have gained extensive applications across various industries,including aerospace,transportation,and civil construction,owing to their excellent combinations of high specific strength and stiffness[1].... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Yijun Hao Shusen Yang Fang Li Yifan Zhang Cong Zhao Xuebin Ren Peng Zhao Chenren Xu Shibo Wang National Engineering Laboratory for Big Data Analytics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Computer Science Peking University Beijing China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China National Engineering Laboratory for Big Data Analytics XiÃan Jiaotong University XiÃan China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Controlled-source electromagnetic noise attenuation via a deep convolutional neural network and high-quality sounding curve screening mechanism
收藏 引用
Geophysics 2025年 第3期90卷 WA125-WA140页
作者: Liu, Yecheng Li, Diquan Li, Jin Zhang, Xian Central South University Monitoring Ministry of Education Key Laboratory of Metallogenic Prediction of Nonferrous Metals and Geological Environment Changsha China Hunan Provincial Key Laboratory of Non-ferrous Resources and Geological Hazard Detection Changsha China Central South University School of Geoscience and Info-physics Changsha China Hunan Normal University College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha China Hunan University of Finance and Economics School of Information Technology and Management Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology Changsha China
Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation... 详细信息
来源: 评论
Wind turbine detection based on high spatial resolution four-band reflectance images  6
Wind turbine detection based on high spatial resolution four...
收藏 引用
6th International Conference on Geoscience and Remote Sensing Mapping, GRSM 2024
作者: Deng, Fengying Qiao, Baojun Li, Kaitao Zhao, Limin Chen, Xingfeng Li, Jiaguo Liu, Jun Sun, Yuan Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China Aerospace Information Research Institute Chinese Academy of Science Beijing China School of Space Information Space Engineering University Beijing China
Wind turbine detection is essential for the power industry and regulatory agencies to efficiently and accurately determine their number and spatial distribution. Under complex underlying surface conditions, the detect... 详细信息
来源: 评论
Calibration of Car-Following Behavior Based on Monocular Camera  11th
Calibration of Car-Following Behavior Based on Monocular Cam...
收藏 引用
11th International Conference on Traffic and Transportation Studies, ICTTS 2024
作者: Liu, Yufei Wei, Chong MOT Key Laboratory of Transport Industry of Big Data Application Technologies for Comprehensive Transport School of Traffic and Transportation Beijing Jiaotong University Beijing100044 China School of Mechanical and Electrical Engineering Hainan University Haikou China
In the past, most of the research on car-following models in China focused on physical statistics, with relatively little collection and analysis of car-following data. Therefore, it is essential to establish a car-fo... 详细信息
来源: 评论
An intelligent solar flare prediction model based on X-ray flux curves using Long Short-Term Memory
收藏 引用
Astronomical Techniques and Instruments 2025年 第2期2卷 65-72页
作者: Yan Gao Li Zhang Long Xu College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang 550025China Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China
Solar flares are violent solar outbursts which have a great influence on the space environment surrounding Earth,potentially causing disruption of the ionosphere and interference with the geomagnetic field,thus causin... 详细信息
来源: 评论
DMC-Watermark: A backdoor richer watermark for dual identity verification by dynamic mask covering
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-15页
作者: Zhu, Yujia Wang, Ruoxi Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Key Laboratory of Advanced Computing Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the increasing use of neural networks, the importance of copyright protection for these models has gained significant attention. Backdoor watermarking is one of the key methods for protecting copyright. However, ... 详细信息
来源: 评论
Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Xia, Na Chen, Lei Li, Meng Yin, Yutao Zhang, Ke Ministry of Education School of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China State Grid Electric Power Research Institute Co. Ltd Hefei230088 China
In wireless networks, utilizing sniffers for fault analysis, traffic traceback, and resource optimization is a crucial task. However, existing centralized algorithms cannot be applied to high-density wireless networks... 详细信息
来源: 评论