咨询与建议

限定检索结果

文献类型

  • 2,442 篇 期刊文献
  • 2,175 篇 会议

馆藏范围

  • 4,617 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,124 篇 工学
    • 2,245 篇 计算机科学与技术...
    • 1,851 篇 软件工程
    • 800 篇 信息与通信工程
    • 434 篇 电气工程
    • 408 篇 生物工程
    • 332 篇 控制科学与工程
    • 286 篇 电子科学与技术(可...
    • 239 篇 光学工程
    • 211 篇 生物医学工程(可授...
    • 200 篇 机械工程
    • 192 篇 化学工程与技术
    • 113 篇 交通运输工程
    • 108 篇 动力工程及工程热...
    • 107 篇 仪器科学与技术
    • 102 篇 建筑学
    • 95 篇 土木工程
    • 91 篇 网络空间安全
    • 83 篇 安全科学与工程
  • 1,673 篇 理学
    • 882 篇 数学
    • 478 篇 生物学
    • 406 篇 物理学
    • 282 篇 统计学(可授理学、...
    • 201 篇 化学
    • 112 篇 系统科学
  • 918 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 448 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 209 篇 医学
    • 178 篇 临床医学
    • 137 篇 基础医学(可授医学...
  • 147 篇 法学
    • 115 篇 社会学
  • 82 篇 农学
  • 79 篇 经济学
  • 38 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学

主题

  • 144 篇 semantics
  • 136 篇 feature extracti...
  • 127 篇 deep learning
  • 119 篇 training
  • 84 篇 computational mo...
  • 68 篇 data mining
  • 68 篇 data models
  • 67 篇 convolution
  • 67 篇 machine learning
  • 59 篇 predictive model...
  • 58 篇 accuracy
  • 55 篇 object detection
  • 48 篇 task analysis
  • 47 篇 neural networks
  • 46 篇 graph neural net...
  • 43 篇 visualization
  • 42 篇 forecasting
  • 42 篇 adaptation model...
  • 41 篇 federated learni...
  • 40 篇 convolutional ne...

机构

  • 164 篇 school of inform...
  • 98 篇 school of comput...
  • 73 篇 school of comput...
  • 73 篇 school of comput...
  • 70 篇 henan key labora...
  • 69 篇 fujian provincia...
  • 65 篇 guangdong key la...
  • 60 篇 shandong provinc...
  • 54 篇 school of comput...
  • 53 篇 key laboratory o...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 46 篇 school of inform...
  • 45 篇 national enginee...
  • 43 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 42 篇 university of ch...
  • 41 篇 state key labora...

作者

  • 39 篇 niyato dusit
  • 39 篇 zhang rui
  • 39 篇 chen hong
  • 37 篇 chang kuo-chi
  • 33 篇 wang meng
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 30 篇 wu xindong
  • 30 篇 pan jeng-shyang
  • 29 篇 liu yang
  • 27 篇 liu jun
  • 27 篇 li cuiping
  • 25 篇 wen ji-rong
  • 25 篇 chu kai-chun
  • 24 篇 huang qingming
  • 24 篇 jin hai
  • 22 篇 yong shi
  • 22 篇 wang shan
  • 21 篇 meng wang
  • 21 篇 shen linlin

语言

  • 4,320 篇 英文
  • 222 篇 其他
  • 83 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4617 条 记 录,以下是141-150 订阅
排序:
Solving Multiobjective Combinatorial Optimization via Learning to Improve Method
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2025年 第3期9卷 2122-2136页
作者: Ye, Te Zhang, Zizhen Zhang, Qingfu Chen, Jinbiao Wang, Jiahai Sun Yat-sen University School of Computer Science and Engineering Guangzhou510275 China Sun Yat-sen University Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou510275 China City University of Hong Kong Department of Computer Science Kowloon Hong Kong
Recently, neural combinatorial optimization (NCO) methods have been prevailing for solving multiobjective combinatorial optimization problems (MOCOPs). Most NCO methods are based on the "Learning to Construct&quo... 详细信息
来源: 评论
PFed-NS: An Adaptive Personalized Federated Learning Scheme Through Neural Network Segmentation
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1936-1948页
作者: Liu, Yuchen He, Ligang Zhang, Zhigao Ren, Shenyuan University of Warwick Department of Computer Science CoventryCV4 7AL United Kingdom Wuhan University School of Computer Science Wuhan430072 China China Hubei Luojia Laboratory Wuhan430072 China Beijing Jiaotong University Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education School of Computer and Information Technology Beijing100044 China
Federated Learning (FL) is typically deployed in a client-server architecture, which makes the Edge-Cloud architecture an ideal backbone for FL. A significant challenge in this setup arises from the diverse data ... 详细信息
来源: 评论
Potato Disease Identification Method based on Improved DeeplabV3+ Network  24
Potato Disease Identification Method based on Improved Deepl...
收藏 引用
7th International Conference on Image and Graphics Processing, ICIGP 2024
作者: Duan, Xiaoyue Gu, Shenming School of Information Engineering Zhejiang Ocean University China Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province Zhejiang Ocean University China
In recent years, the advancement of deep learning technology and convolutional neural networks has presented novel solutions for the swift and precise detection of crop diseases. To address issues such as low segmenta... 详细信息
来源: 评论
Contribution of Transmembrane Protein 68 to Triglyceride Synthesis and Lipid Droplet Formation Differs From Diacylglycerol Acyltransferase
收藏 引用
生物化学与生物物理进展 2025年 第3期52卷 705-715页
作者: YU Qing FU Yang-Yang ZENG Fan-Si PANG Hui-Min HUANG Fei-Fei CHANG Ping-An Chongqing Key Laboratory of Big Data for Bio-Intelligence School of Life Health Information Science and EngineeringChongqing University of Posts and TelecommunicationsChongqing 400065China
Objective To characterize transmembrane protein 68(TMEM68)in an alternative triacylglycerol(TAG)biosynthesis pathway,and determine the interplay between TMEM68 and the canonical TAG synthesis enzyme acyl-CoA:diacylgly... 详细信息
来源: 评论
Machine Learning for Signal Demodulation in Underwater Wireless Optical Communications
收藏 引用
China Communications 2024年 第5期21卷 297-313页
作者: Ma Shuai Yang Lei Ding Wanying Li Hang Zhang Zhongdan Xu Jing Li Zongyan Xu Gang Li Shiyin Department of Strategic and Advanced Interdisciplinary Research Peng Cheng LaboratoryShenzhen 518055China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China Data-driven Intelligent Information System Laboratory Shenzhen Research Institute of Big DataShenzhen 518172China Ocean College Zhejiang UniversityZhoushan 316021China State Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China
The underwater wireless optical communication(UWOC)system has gradually become essential to underwater wireless communication *** other existing works on UWOC systems,this paper evaluates the proposed machine learning... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
Identification of Core Technological Topics in the New Energy Vehicle Industry: The SAO-BERTopic Topic Modeling Approach Based on Patent Text Mining  5
Identification of Core Technological Topics in the New Energ...
收藏 引用
Joint Workshop of the 5th Extraction and Evaluation of knowledge Entities from Scientific Documents and the 4th AI + Informetrics, EEKE-AII 2024
作者: Zhu, Jianxin Chuang, Yutong Wang, Zhinan Li, Yunke Harbin Engineering University School of Economics and Management 150001 China Key Laboratory of Big Data and Business Intelligence Technology Ministry of Industry and Information Technology China
In the new energy vehicle industry, precise identification of core technologies is the key to promoting innovation and maintaining market competitiveness. In this article, a comprehensive approach combining informatio... 详细信息
来源: 评论
Discriminative latent semantics-preserving similarity embedding hashing for cross-modal retrieval
收藏 引用
Neural Computing and Applications 2024年 第18期36卷 10655-10680页
作者: Chen, Yongfeng Tan, Junpeng Yang, Zhijing Cheng, Yongqiang Chen, Ruihan School of Information Engineering Guangdong University of Technology Guangdong Guangzhou510006 China School of Electronic and Information Engineering South China University of Technology Guangdong Guangzhou510641 China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangdong Guangzhou510665 China Department of Computer Science and Technology University of Hull HullHU6 7RX United Kingdom
Recently, there has been a significant increase in interest in cross-modal hashing technology. For hash code learning, most previous supervision methods use label information to create a similarity matrix in a straigh... 详细信息
来源: 评论
Cross-modal image text retrieval based on Cross-optimization and Joint strategy
Cross-modal image text retrieval based on Cross-optimization...
收藏 引用
2024 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2024
作者: Zheng, Wei Han, Na Hu, Yan Kang, Peipei Zhang, Yue Yang, Aqing Zhang, Lei School of Computer Science Guangdong Polytechnic Normal University China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data China School of Computer Science and Technology Guangdong University of Technology China School of Information Engineering East University of Heilongjiang China
In the fields of computer vision and natural language processing, cross-modal retrieval is of great importance that cannot be ignored. In existing multi-granularity alignment methods, significant progress has been mad... 详细信息
来源: 评论
Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised data-Driven Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 550-553页
作者: Zhenyong Zhang Yan Qin Jingpei Wang Hui Li Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China the School of Chemical and Biomedical Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China IEEE
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... 详细信息
来源: 评论