咨询与建议

限定检索结果

文献类型

  • 2,518 篇 期刊文献
  • 2,245 篇 会议
  • 2 册 图书

馆藏范围

  • 4,765 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,231 篇 工学
    • 2,326 篇 计算机科学与技术...
    • 1,859 篇 软件工程
    • 827 篇 信息与通信工程
    • 447 篇 电气工程
    • 411 篇 生物工程
    • 387 篇 控制科学与工程
    • 294 篇 电子科学与技术(可...
    • 238 篇 光学工程
    • 215 篇 生物医学工程(可授...
    • 205 篇 机械工程
    • 190 篇 化学工程与技术
    • 113 篇 交通运输工程
    • 110 篇 动力工程及工程热...
    • 109 篇 仪器科学与技术
    • 106 篇 建筑学
    • 98 篇 土木工程
    • 96 篇 网络空间安全
    • 84 篇 安全科学与工程
  • 1,697 篇 理学
    • 890 篇 数学
    • 481 篇 生物学
    • 409 篇 物理学
    • 284 篇 统计学(可授理学、...
    • 201 篇 化学
    • 114 篇 系统科学
  • 928 篇 管理学
    • 530 篇 管理科学与工程(可...
    • 452 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 216 篇 医学
    • 184 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 146 篇 法学
    • 115 篇 社会学
  • 79 篇 经济学
  • 79 篇 农学
  • 38 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 5 篇 艺术学

主题

  • 145 篇 semantics
  • 141 篇 feature extracti...
  • 137 篇 deep learning
  • 124 篇 training
  • 86 篇 computational mo...
  • 70 篇 data mining
  • 69 篇 data models
  • 67 篇 convolution
  • 67 篇 machine learning
  • 59 篇 predictive model...
  • 58 篇 accuracy
  • 56 篇 object detection
  • 49 篇 graph neural net...
  • 48 篇 task analysis
  • 48 篇 neural networks
  • 47 篇 contrastive lear...
  • 45 篇 federated learni...
  • 44 篇 visualization
  • 43 篇 adaptation model...
  • 42 篇 forecasting

机构

  • 166 篇 school of inform...
  • 97 篇 school of comput...
  • 74 篇 school of comput...
  • 73 篇 school of comput...
  • 69 篇 guangdong key la...
  • 68 篇 henan key labora...
  • 68 篇 fujian provincia...
  • 61 篇 shandong provinc...
  • 57 篇 school of comput...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 52 篇 key laboratory o...
  • 51 篇 peng cheng labor...
  • 51 篇 national enginee...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 46 篇 school of inform...
  • 43 篇 university of ch...
  • 43 篇 key laboratory o...
  • 41 篇 state key labora...

作者

  • 41 篇 niyato dusit
  • 40 篇 zhang rui
  • 39 篇 chen hong
  • 36 篇 chang kuo-chi
  • 33 篇 wang meng
  • 31 篇 liu jun
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 29 篇 liu yang
  • 29 篇 wu xindong
  • 29 篇 pan jeng-shyang
  • 28 篇 li cuiping
  • 27 篇 jin hai
  • 25 篇 chu kai-chun
  • 25 篇 huang qingming
  • 24 篇 wen ji-rong
  • 24 篇 shen linlin
  • 22 篇 yong shi
  • 21 篇 meng wang
  • 21 篇 hu shengshan

语言

  • 4,325 篇 英文
  • 366 篇 其他
  • 87 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4765 条 记 录,以下是761-770 订阅
排序:
AMOD-Net: Atention-based Multi-Scale Object Detection Network for X-Ray Baggage Security Inspection  5
AMOD-Net: Atention-based Multi-Scale Object Detection Networ...
收藏 引用
5th International Conference on computer Science and Artificial Intelligence, CSAI 2021
作者: Zhu, Xiaoke Zhang, Jitong Chen, Xiaopan Li, Danyang Wang, Yufei Zheng, Minghao School of Computer and Information Engineering Henan University China Henan Key Laboratory of Big Data Analysis and Processing Henan University China
X-ray baggage security checking is an extremely important task, which can detect various dangerous objects in airports, stations and other public places to prevent crimes and protect personal safety. However, at prese... 详细信息
来源: 评论
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware  15
SQLStateGuard: Statement-Level SQL Injection Defense Based o...
收藏 引用
15th Annual ACM Symposium on Cloud Computing, SoCC 2024
作者: Liu, Xin Huang, Yuanyuan Wang, Tianyi Li, Song Niu, Weina Shen, Jun Zhou, Qingguo Zhou, Xiaokang School of Information Science and Engineering Lanzhou University Gansu Lanzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou China School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu China School of Computing and Information Technology University of Wollongong WollongongNSW Australia Kansai University Osaka Suita Japan
SQL injection is a significant and persistent threat to web services. Most existing protections against SQL injections rely on traffic-level anomaly detection, which often results in high false-positive rates and can ... 详细信息
来源: 评论
Research on Task Allocation Method of Mobile Swarm Intelligence Perception Based on Hybrid Artificial Fish Swarm Algorithm
Research on Task Allocation Method of Mobile Swarm Intellige...
收藏 引用
作者: Li, Jianjun Su, Fangyuan Yang, Yu Liu, Junjun School of Computer and Information Engineering Harbin University of Commerce Harbin150028 China Heilongjiang Cultural Big Data Theory Application Research Center Harbin150028 China Heilongjiang Key Laboratory of E-Commerce and Information Processing Harbin150028 China
In this study, the task allocation mechanism in mobile swarm intelligence perception is studied and analyzed. Considering how to allocate tasks under specified time constraints and optimize for the goal, a hybrid arti... 详细信息
来源: 评论
PP-Grading: Hierarchical Authorization using Polarization Pruning
PP-Grading: Hierarchical Authorization using Polarization Pr...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Yujia Zhu Ruoxi Wang Daoxun Xia School of Big Data and Computer Science Guizhou Normal University Guiyang China Key Laboratory of Information and Computing Science Guizhou Province Guizhou Normal University Guiyang China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang China
With the popularity of neural networks, more and more service providers are providing us with convenient neural network services. In this situation, it is necessary for service providers to grant hierarchical authoriz... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Yujun Chen, Yanqu Wang, Jiakai Hu, Jin Tao, Renshuai Liu, Xianglong State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
DC-Instruct: An Effective Framework for Generative Multi-intent Spoken Language Understanding
DC-Instruct: An Effective Framework for Generative Multi-int...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Xing, Bowen Liao, Lizi Huang, Minlie Tsang, Ivor W. Beijing Key Laboratory of Knowledge Engineering for Materials Science School of Computer and Communication Engineering University of Science and Technology Beijing China Singapore Management University Singapore Group Tsinghua University China CFAR and IHPC Agency for Science Technology and Research Singapore College of Computing and Data Science Nanyang Technological University Singapore
In the realm of multi-intent spoken language understanding, recent advancements have leveraged the potential of prompt learning frameworks. However, critical gaps exist in these frameworks: the lack of explicit modeli... 详细信息
来源: 评论
Prediction of Hepatocellular Carcinoma Diseases Based on Methylation data and Screening of Hub Genes  5
Prediction of Hepatocellular Carcinoma Diseases Based on Met...
收藏 引用
5th International Conference on computer Science and Artificial Intelligence, CSAI 2021
作者: Zhang, Yawei Ren, Fangtao Liu, Xi Zhang, Fan School of Computer and Information Engineering Henan University China Henan Key Laboratory of Big Data Analysis and Processing Henan University China
DNA methylation is of great significance to the diagnosis, treatment and disease prediction of hepatocellular carcinoma (HCC). The commonly used DNA methylation microarrays have high data dimensions, and different CpG... 详细信息
来源: 评论
Gradient sparsification for efficient wireless federated learning with differential privacy
收藏 引用
Science China(information Sciences) 2024年 第4期67卷 272-288页
作者: Kang WEI Jun LI Chuan MA Ming DING Feng SHU Haitao ZHAO Wen CHEN Hongbo ZHU School of Electronic and Optical Engineering Nanjing University of Science and Technology Zhejiang Lab Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education Data61 Commonwealth Scientific and Industrial Research Organisation School of Information and Communication Engineering Hainan University School of Communications and Information Engineering Nanjing University of Posts and Telecommunications School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University
Federated learning(FL) enables distributed clients to collaboratively train a machine learning model without sharing raw data with each other. However, it suffers from the leakage of private information from uploading... 详细信息
来源: 评论
High-Fidelity Editable Portrait Synthesis with 3D GAN Inversion
High-Fidelity Editable Portrait Synthesis with 3D GAN Invers...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jindong Xie Jiachen Liu Yupei Lin Jinbao Wang Xianxu Hou Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Information Engineering Guangdong University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University
The 3D generative adversarial network (GAN) inversion converts an image into 3D representation to attain high-fidelity reconstruction and facilitate realistic image manipulation within the 3D latent space. However, pr... 详细信息
来源: 评论
Dynamic Tracking with Fuzzy Rules for Evolutionary Dynamic Constrained Optimization
Dynamic Tracking with Fuzzy Rules for Evolutionary Dynamic C...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Chenyang Bu Yuxin Liu Lizhong Zhang Tao Zhu Wenjian Luo Ministry of Education Key Laboratory of Knowledge Engineering with Big Data School of Computer Science and Information Engineering Hefei University of Technology Hefei Anhui China School of Computer Science and Information Engineering University of South China Hengyang Hunan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Guangdong China
Nature-inspired population-based stochastic search algorithms (SSA) have demonstrated effectiveness in solving many real-world dynamic optimization problems (DOPs), such as dynamic optimal power flow (DOPF) problems. ...
来源: 评论