咨询与建议

限定检索结果

文献类型

  • 2,518 篇 期刊文献
  • 2,245 篇 会议
  • 2 册 图书

馆藏范围

  • 4,765 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,231 篇 工学
    • 2,326 篇 计算机科学与技术...
    • 1,859 篇 软件工程
    • 827 篇 信息与通信工程
    • 447 篇 电气工程
    • 411 篇 生物工程
    • 387 篇 控制科学与工程
    • 294 篇 电子科学与技术(可...
    • 238 篇 光学工程
    • 215 篇 生物医学工程(可授...
    • 205 篇 机械工程
    • 190 篇 化学工程与技术
    • 113 篇 交通运输工程
    • 110 篇 动力工程及工程热...
    • 109 篇 仪器科学与技术
    • 106 篇 建筑学
    • 98 篇 土木工程
    • 96 篇 网络空间安全
    • 84 篇 安全科学与工程
  • 1,697 篇 理学
    • 890 篇 数学
    • 481 篇 生物学
    • 409 篇 物理学
    • 284 篇 统计学(可授理学、...
    • 201 篇 化学
    • 114 篇 系统科学
  • 928 篇 管理学
    • 530 篇 管理科学与工程(可...
    • 452 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 216 篇 医学
    • 184 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 146 篇 法学
    • 115 篇 社会学
  • 79 篇 经济学
  • 79 篇 农学
  • 38 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 5 篇 艺术学

主题

  • 145 篇 semantics
  • 141 篇 feature extracti...
  • 137 篇 deep learning
  • 124 篇 training
  • 86 篇 computational mo...
  • 70 篇 data mining
  • 69 篇 data models
  • 67 篇 convolution
  • 67 篇 machine learning
  • 59 篇 predictive model...
  • 58 篇 accuracy
  • 56 篇 object detection
  • 49 篇 graph neural net...
  • 48 篇 task analysis
  • 48 篇 neural networks
  • 47 篇 contrastive lear...
  • 45 篇 federated learni...
  • 44 篇 visualization
  • 43 篇 adaptation model...
  • 42 篇 forecasting

机构

  • 166 篇 school of inform...
  • 97 篇 school of comput...
  • 74 篇 school of comput...
  • 73 篇 school of comput...
  • 69 篇 guangdong key la...
  • 68 篇 henan key labora...
  • 68 篇 fujian provincia...
  • 61 篇 shandong provinc...
  • 57 篇 school of comput...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 52 篇 key laboratory o...
  • 51 篇 peng cheng labor...
  • 51 篇 national enginee...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 46 篇 school of inform...
  • 43 篇 university of ch...
  • 43 篇 key laboratory o...
  • 41 篇 state key labora...

作者

  • 41 篇 niyato dusit
  • 40 篇 zhang rui
  • 39 篇 chen hong
  • 36 篇 chang kuo-chi
  • 33 篇 wang meng
  • 31 篇 liu jun
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 29 篇 liu yang
  • 29 篇 wu xindong
  • 29 篇 pan jeng-shyang
  • 28 篇 li cuiping
  • 27 篇 jin hai
  • 25 篇 chu kai-chun
  • 25 篇 huang qingming
  • 24 篇 wen ji-rong
  • 24 篇 shen linlin
  • 22 篇 yong shi
  • 21 篇 meng wang
  • 21 篇 hu shengshan

语言

  • 4,325 篇 英文
  • 366 篇 其他
  • 87 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4765 条 记 录,以下是691-700 订阅
排序:
An evaluation and query algorithm for the influence of spatial location based on RkNN
收藏 引用
Frontiers of computer Science 2021年 第2期15卷 81-89页
作者: Jingke XU Yidan ZHAO Ge YU School of Computer Science and Engineering Northeastern UniversityShenyang110819China School of Information and Control Engineering Shenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang110168China
This paper is devoted to the investigation of the evaluation and query algorithm problem for the influence of spatial location based on RkNN(reverse k nearest neighbor).On the one hand,an object can make contribution ... 详细信息
来源: 评论
Akane: Perplexity-Guided Time Series data Cleaning
收藏 引用
Proceedings of the ACM on Management of data 2024年 第3期2卷 1-26页
作者: Xiaoyu Han Haoran Xiong Zhenying He Peng Wang Chen Wang X. Sean Wang School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai China National Engineering Research Center for Big Data Software EIRI Tsinghua University Beijing China
Dirty data are prevalent in time series, such as energy consumption or stock data. Existing data cleaning algorithms present shortcomings in dirty data identification and unsatisfactory cleaning decisions. To handle t... 详细信息
来源: 评论
Contrastive Learning for Adapting Language Model to Sequential Recommendation  24
Contrastive Learning for Adapting Language Model to Sequenti...
收藏 引用
24th IEEE International Conference on data Mining, ICDM 2024
作者: Liang, Fei-Yao Xi, Wu-Dong Xing, Xing-Xing Wan, Wei Wang, Chang-Dong Chen, Min Guizani, Mohsen School of Computer Science and Engineering Sun Yat-sen University Guangzhou China NetEase Games China UX Center NetEase Games Guangzhou China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Machine Learning Department Abu Dhabi United Arab Emirates
With the explosive growth of information, recommendation systems have emerged to alleviate the problem of information overload. In order to improve the performance of recommendation systems, many existing methods intr... 详细信息
来源: 评论
Cutting Learned Index into Pieces: An In-depth Inquiry into Updatable Learned Indexes
Cutting Learned Index into Pieces: An In-depth Inquiry into ...
收藏 引用
International Conference on data engineering
作者: Jiake Ge Boyu Shi Yanfeng Chai Yuanhui Luo Yunda Guo Yinxuan He Yunpeng Chai Key Laboratory of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China
Numerous high-performance updatable learned indexes have recently been designed to support the writing requirements in practical systems. Researchers have proposed various strategies to improve the availability of upd...
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
Rethink Video Retrieval Representation for Video Captioning
SSRN
收藏 引用
SSRN 2024年
作者: Tian, Mingkai Li, Guorong Qi, Yuankai Wang, Shuhui Sheng, Quan Z. Huang, Qingming School of Computer Science and Technology Key Lab of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences China School of Computing Macquarie University Australia Key Laboratory of Intelligent Information Processing Institute of Computer Technology Chinese Academy of Sciences China
Video captioning, a challenging task targeting the automatic generation of accurate and comprehensive descriptions based on video content, has witnessed substantial success recently driven by bridging video representa... 详细信息
来源: 评论
Each Fake News is Fake in its Own Way: An Attribution Multi-Granularity Benchmark for Multimodal Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Hao Ma, Zihan Zeng, Zhi Luo, Minnan Zeng, Weixin Tang, Jiuyang Zhao, Xiang Laboratory for Big Data and Decision Nation University of Defence Technology China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China
Social platforms, while facilitating access to information, have also become saturated with a plethora of fake news, resulting in negative consequences. Automatic multimodal fake news detection is a worthwhile pursuit... 详细信息
来源: 评论
RecCoder: Reformulating Sequential Recommendation as Large Language Model-Based Code Completion  24
RecCoder: Reformulating Sequential Recommendation as Large L...
收藏 引用
24th IEEE International Conference on data Mining, ICDM 2024
作者: Lai, Kai-Huang Xi, Wu-Dong Xing, Xing-Xing Wan, Wei Wang, Chang-Dong Chen, Min Guizani, Mohsen School of Computer Science and Engineering Sun Yat-sen University Guangzhou China NetEase Games China UX Center NetEase Games Guangzhou China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Machine Learning Department Abu Dhabi United Arab Emirates
In the evolving landscape of sequential recommendation systems, the application of Large Language Models (LLMs) is increasingly prominent. However, current attempts typically utilize general-purpose LLMs, which presen... 详细信息
来源: 评论
Video Stabilization via Prediction with Time-Series Network and Image Inpainting with Pyramid Fusion
收藏 引用
Chinese Journal of Electronics 2021年 第6期30卷 1103-1110页
作者: CHENG keyang LI Shichao RONG Lan WANG Wenshan SHI Wenxi ZHAN Yongzhao School of Computer Science and Communication Engineering Jiangsu University Jiangsu Province Big Data Ubiquitous Perception and Intelligent Agricultural Application Engineering Research Center Cyber Space Security Academy of Jiangsu University National Engineering Laboratory for Public Safety Risk Perception and Control by Big Data Xinjiang Lianhaichuangzhi Information Technology Co. Ltd.
Due to the poor filling effect of the video image defect commonly used in the video stabilization field, the video is seemed still unstable after the image stabilization process, which seriously affects the visual eff... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论