咨询与建议

限定检索结果

文献类型

  • 2,522 篇 期刊文献
  • 2,179 篇 会议
  • 2 册 图书

馆藏范围

  • 4,703 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,202 篇 工学
    • 2,293 篇 计算机科学与技术...
    • 1,868 篇 软件工程
    • 818 篇 信息与通信工程
    • 475 篇 电气工程
    • 409 篇 生物工程
    • 343 篇 控制科学与工程
    • 297 篇 电子科学与技术(可...
    • 240 篇 光学工程
    • 213 篇 生物医学工程(可授...
    • 203 篇 机械工程
    • 191 篇 化学工程与技术
    • 121 篇 交通运输工程
    • 109 篇 动力工程及工程热...
    • 108 篇 仪器科学与技术
    • 104 篇 建筑学
    • 99 篇 网络空间安全
    • 95 篇 土木工程
    • 88 篇 安全科学与工程
  • 1,720 篇 理学
    • 906 篇 数学
    • 490 篇 生物学
    • 418 篇 物理学
    • 295 篇 统计学(可授理学、...
    • 205 篇 化学
    • 112 篇 系统科学
  • 936 篇 管理学
    • 535 篇 管理科学与工程(可...
    • 460 篇 图书情报与档案管...
    • 191 篇 工商管理
  • 215 篇 医学
    • 183 篇 临床医学
    • 139 篇 基础医学(可授医学...
  • 147 篇 法学
    • 115 篇 社会学
  • 83 篇 农学
  • 79 篇 经济学
  • 40 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学

主题

  • 148 篇 semantics
  • 145 篇 feature extracti...
  • 132 篇 deep learning
  • 124 篇 training
  • 89 篇 computational mo...
  • 72 篇 data mining
  • 69 篇 machine learning
  • 69 篇 data models
  • 68 篇 convolution
  • 64 篇 predictive model...
  • 63 篇 accuracy
  • 56 篇 object detection
  • 48 篇 task analysis
  • 47 篇 neural networks
  • 46 篇 graph neural net...
  • 44 篇 visualization
  • 43 篇 adaptation model...
  • 43 篇 convolutional ne...
  • 42 篇 contrastive lear...
  • 42 篇 federated learni...

机构

  • 164 篇 school of inform...
  • 100 篇 school of comput...
  • 75 篇 school of comput...
  • 74 篇 school of comput...
  • 70 篇 fujian provincia...
  • 69 篇 henan key labora...
  • 66 篇 guangdong key la...
  • 60 篇 shandong provinc...
  • 54 篇 school of comput...
  • 53 篇 key laboratory o...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 46 篇 school of inform...
  • 45 篇 national enginee...
  • 44 篇 key laboratory o...
  • 43 篇 university of ch...
  • 43 篇 key laboratory o...
  • 42 篇 shenzhen researc...

作者

  • 40 篇 niyato dusit
  • 39 篇 zhang rui
  • 38 篇 chen hong
  • 37 篇 chang kuo-chi
  • 33 篇 wang meng
  • 32 篇 wu xindong
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 30 篇 pan jeng-shyang
  • 28 篇 liu yang
  • 27 篇 liu jun
  • 27 篇 li cuiping
  • 25 篇 wen ji-rong
  • 25 篇 chu kai-chun
  • 24 篇 huang qingming
  • 24 篇 jin hai
  • 22 篇 xindong wu
  • 21 篇 meng wang
  • 21 篇 yong shi
  • 21 篇 shen linlin

语言

  • 4,396 篇 英文
  • 232 篇 其他
  • 83 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4703 条 记 录,以下是11-20 订阅
排序:
An overview on IRS-enabled sensing and communications for 6G: architectures, fundamental limits, and joint beamforming designs
收藏 引用
Science China(information Sciences) 2025年 第5期68卷 170-193页
作者: Xianxin SONG Yuan FANG Feng WANG Zixiang REN Xianghao YU Ye ZHANG Fan LIU Jie XU Derrick Wing Kwan NG Rui ZHANG Shuguang CUI School of Science and Engineering (SSE) Shenzhen Future Network of Intelligence Institute (FNii-Shenzhen)and Guangdong Provincial Key Laboratory of Future Networks of Intelligence The Chinese University of Hong Kong Department of Electrical Engineering City University of Hong Kong School of Information Engineering Guangdong University of Technology Key Laboratory of Wireless-Optical Communications Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China Computer School Beijing Information Science and Technology University National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University School of Electrical Engineering and Telecommunications University of New South Wales School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Department of Electrical and Computer Engineering National University of Singapore
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv... 详细信息
来源: 评论
A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy fusion memetic algorithm
收藏 引用
Frontiers of information Technology & Electronic engineering 2025年 第3期26卷 415-426页
作者: Mengyu ZHANG Zhenxue HE Yijin WANG Xiaojun ZHAO Xiaodan ZHANG Limin XIAO Xiang WANG Intelligent Agricultural Equipment Research Institute Hebei Agricultural UniversityBaoding 071001China Key Laboratory of Agricultural Big Data of Hebei Province Hebei Agricultural UniversityBaoding 071001China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Electronic Information Engineering Beihang UniversityBeijing 100191China
The power optimization of mixed polarity Reed–Muller(MPRM)logic circuits is a classic combinatorial optimization *** optimization approaches often suffer from slow convergence and a propensity to converge to local op... 详细信息
来源: 评论
Robust primary quantization step estimation on resized and double JPEG compressed images
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 11097-11118页
作者: Zhang, Lei Chen, XuGuang Niu, YaKun Zuo, XianYu Wang, Huaqing School of Computer and Information Engineering Henan Kaifeng475004 China Henan Key Laboratory of Big Data Analysis and Processing Kaifeng Henan Henan Kaifeng475004 China National Internet Emergency Center Henan Zhengzhou450000 China
As one of the most important forensic tasks, reconstruction of the original information in tampered images is a key step for tampering detection and localization. Currently, a number of methods have been designed to e... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
Two efficient beamforming methods for hybrid IRS-aided AF relay wireless networks
收藏 引用
Science China(information Sciences) 2025年 第4期68卷 363-379页
作者: Xuehui WANG Qingbo LI Wen ZHU Feng SHU Mengxing HUANG Fuhui ZHOU Riqing CHEN Cunhua PAN Yongpeng WU Jiangzhou WANG School of Mathematics and Statistics Hainan Normal University Key Laboratory of Data Science and Smart Education Ministry of Education Hainan Normal University School of Information and Communication Engineering Hainan University Collaborative Innovation Center of Information Technology Hainan University School of Electronic and Optical Engineering Nanjing University of Science and Technology College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Digital Fujian Institute of Big Data for Agriculture Fujian Agriculture and Forestry University National Mobile Communications Research Laboratory Southeast University Shanghai Key Laboratory of Navigation and Location Based Services Shanghai Jiao Tong University School of Engineering University of Kent
Owing to its ability to mitigate the double-fading effect by amplifying the reflected signal, the active intelligent reflecting surface(IRS) has garnered significant attention. In this paper, an amplify-and-forward(AF... 详细信息
来源: 评论
Skeleton-Based Action Recognition Using Graph Convolutional Network with Pose Correction and Channel Topology Refinement
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 701-718页
作者: Yuxin Gao Xiaodong Duan Qiguo Dai School of Engineering Guangzhou College of Technology and BusinessFoshan528138China School of Computer Science and Engineering Dalian Minzu UniversityDalian116000China SEAC key Laboratory of Big Data Applied Technology Dalian Minzu UniversityDalian116000China
Graph convolutional network(GCN)as an essential tool in human action recognition tasks have achieved excellent performance in previous ***,most current skeleton-based action recognition using GCN methods use a shared ... 详细信息
来源: 评论
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 482-492页
作者: Puning Zhang Lei Tan Zhigang Yang Fengyi Huang Lijun Sun Haiying Peng School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Chongqing Innovation Center of Industrial Big-Data Co.Lt
The lack of facial features caused by wearing masks degrades the performance of facial recognition systems. Traditional occluded face recognition methods cannot integrate the computational resources of the edge layer ... 详细信息
来源: 评论
AI-Enhanced Secure data Aggregation for Smart Grids with Privacy Preservation
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 799-816页
作者: Congcong Wang Chen Wang Wenying Zheng Wei Gu School of Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Science and Engineering Zhejiang Sci-Tech UniversityHangzhou310018China State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Computer Science and Technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China School of Computer Science(School of Cyber Science and Engineering) Nanjing University of Information Science and TechnologyNanjing210044China
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce... 详细信息
来源: 评论
PBCounter:weighted model counting on pseudo-boolean formulas
收藏 引用
Frontiers of computer Science 2025年 第3期19卷 55-63页
作者: Yong LAI Zhenghang XU Minghao YIN College of Computer Science and Technology Jilin UniversityChangchun 130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun 130012China School of Computer Science and Information Technology Northeast Normal UniversityChangchun 130017China
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **... 详细信息
来源: 评论
Unsigned Road Incidents Detection Using Improved RESNET From Driver-View Images
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1203-1216页
作者: Li, Changping Wang, Bingshu Zheng, Jiangbin Zhang, Yongjun Chen, C.L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Frequent road incidents cause significant physical harm and economic losses globally. The key to ensuring road safety lies in accurately perceiving surrounding road incidents. However, the highly dynamic nature o... 详细信息
来源: 评论