咨询与建议

限定检索结果

文献类型

  • 464 篇 期刊文献
  • 398 篇 会议

馆藏范围

  • 862 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 606 篇 工学
    • 485 篇 计算机科学与技术...
    • 417 篇 软件工程
    • 139 篇 信息与通信工程
    • 69 篇 控制科学与工程
    • 65 篇 生物工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 机械工程
    • 39 篇 电子科学与技术(可...
    • 38 篇 电气工程
    • 37 篇 化学工程与技术
    • 29 篇 光学工程
    • 21 篇 航空宇航科学与技...
    • 17 篇 交通运输工程
    • 16 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 13 篇 土木工程
    • 10 篇 网络空间安全
  • 330 篇 理学
    • 233 篇 数学
    • 75 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 41 篇 物理学
    • 37 篇 化学
    • 28 篇 系统科学
  • 212 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 103 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 32 篇 医学
    • 24 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 12 篇 法学
    • 10 篇 社会学
  • 9 篇 农学
  • 5 篇 经济学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 49 篇 computer science
  • 41 篇 educational inst...
  • 41 篇 laboratories
  • 39 篇 educational tech...
  • 37 篇 knowledge engine...
  • 23 篇 computer science...
  • 21 篇 data mining
  • 16 篇 semantics
  • 14 篇 reinforcement le...
  • 11 篇 deep learning
  • 11 篇 image segmentati...
  • 11 篇 ontologies
  • 11 篇 artificial intel...
  • 10 篇 authentication
  • 10 篇 feature extracti...
  • 9 篇 recommender syst...
  • 9 篇 topology
  • 8 篇 contrastive lear...
  • 8 篇 computational mo...
  • 8 篇 genetic algorith...

机构

  • 415 篇 college of compu...
  • 273 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 college of softw...
  • 32 篇 college of compu...
  • 32 篇 school of artifi...
  • 29 篇 key laboratory o...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 16 篇 school of comput...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 13 篇 college of compu...
  • 13 篇 international ce...

作者

  • 38 篇 yang bo
  • 34 篇 sun geng
  • 28 篇 li ximing
  • 27 篇 ouyang jihong
  • 25 篇 dantong ouyang
  • 25 篇 liu dayou
  • 23 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 21 篇 li jiahui
  • 21 篇 liu yanheng
  • 20 篇 bo yang
  • 19 篇 li xiongfei
  • 18 篇 chen haipeng
  • 18 篇 dayou liu
  • 18 篇 huang lan
  • 17 篇 chang yi
  • 17 篇 wang jian
  • 16 篇 guan renchu
  • 16 篇 wang jiacheng

语言

  • 780 篇 英文
  • 47 篇 其他
  • 35 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computation and Knowledge Engineering of MOE"
862 条 记 录,以下是71-80 订阅
排序:
Underwater Target Detection Based on Reinforcement Learning and Ant Colony Optimization
收藏 引用
Journal of Ocean University of China 2022年 第2期21卷 323-330页
作者: WANG Xinhua ZHU Yungang LI Dayu ZHANG Guang School of Computer Science Northeast Electric Power UniversityJilin 132012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and TechnologyJilin UniversityChangchun 130012China State Key Laboratory of Applied Optics Changchun Institute of OpticsFine Mechanics and PhysicsChinese Academy of SciencesChangchun 130033China
Underwater optical imaging produces images with high resolution and abundant information and hence has outstanding advantages in short-distance underwater target ***,low-light and high-noise scenarios pose great chall... 详细信息
来源: 评论
Research on Ethnic Pattern Generation Based on Generative Adversarial Networks
Research on Ethnic Pattern Generation Based on Generative Ad...
收藏 引用
International Workshop on Advanced computational Intelligence (IWACI)
作者: Hao Wu Wenze He Xiongfei Li Yanchun Liang Zhuhai Sub Laboratory of Key Laboratory of Symbolic Computation and Knowledge Engineering of the Ministry of Education Zhuhai College of Science and Technology Zhuhai China Key Laboratory of Symbolic Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Jilin University Changchun China
In this paper, we take Mongolian ethnic patterns as the research object and conduct a technical study on ethnic pattern generation and super-resolution reconstruction based on deep learning generative adversarial netw...
来源: 评论
2D-3D Feature Co-Embedding Network with Sparse Annotation for 3D Medical Image Segmentation
2D-3D Feature Co-Embedding Network with Sparse Annotation fo...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhu, Mingzhu Guo, Shuyu Wang, Ziwei Jiao, Jianhang Bai, Tian Jilin University College of Computer Science and Technology Changchun China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China Jilin University College of Software Changchun China The Second Norman Bethune Hospital Jilin University Department of Orthopedics Changchun China
Supervised methods on 3D medical image segmentation need large amounts of annotated data, but annotating is time-consuming. Also, existing 3D segmentation methods capture more global structural information but overloo... 详细信息
来源: 评论
Structure-and Logic-Aware Heterogeneous Graph Learning for Recommendation  40
Structure-and Logic-Aware Heterogeneous Graph Learning for R...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Li, Anchen Yang, Bo Huo, Huan Hussain, Farookh Khadeer Xu, Guandong College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education China Aalto University Espoo Finland School of Computer Science University of Technology Sydney Sydney Australia Education University of Hong Kong Hong Kong Hong Kong
Recently, there has been a surge in recommendations based on heterogeneous information networks (HINs), attributed to their ability to integrate complex and rich semantics. Despite this advancement, most HIN-based rec... 详细信息
来源: 评论
A Method for Extracting Electronic Medical Record Entities by Fusing Multichannel Self-Attention Mechanism with Location Relationship Features
A Method for Extracting Electronic Medical Record Entities b...
收藏 引用
作者: Hongyan Xu Hong Wang Yong Feng Rongbing Wang Yonggang Zhang College of Information Liaoning University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University
With the implementation of the "Internet+" strategy, electronic medical records are generally applied in the medical field. Deep mining of electronic medical record content data is an effective means to obta...
来源: 评论
Simple-Sampling and Hard-Mixup with Prototypes to Rebalance Contrastive Learning for Text Classification
arXiv
收藏 引用
arXiv 2024年
作者: Li, Mengyu Liu, Yonghao Giunchiglia, Fausto Feng, Xiaoyue Guan, Renchu Key Laboratory of Symbolic Computation and Knowledge Engineering The Ministry of Education College of Computer Science and Technology Jilin University China University of Trento Italy
Text classification is a crucial and fundamental task in natural language processing. Compared with the previous learning paradigm of pre-training and fine-tuning by cross entropy loss, the recently proposed supervise... 详细信息
来源: 评论
Enabling Generalized Zero-Shot Vulnerability Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Hu, Jinghao Guo, Jinsong Luo, Chen Hu, Yang Lanzinger, Matthias Li, Zhanshan Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education College of Software Changchun130012 China University College London Department of Computer Science United Kingdom Amazon United States United Kingdom University of Oxford Department of Computer Science United Kingdom Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education College of Computer Science and Technology Changchun130012 China
Regarding computer security, the growth of code vulnerability types presents a persistent challenge. These vulnerabilities, which may cause severe consequences, necessitate precise classification for effective mitigat... 详细信息
来源: 评论
Multi-Target Track Initiation in Heavy Clutter
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4489-4507页
作者: Li Xu Ruzhen Lou Chuanbin Zhang Bo Lang Weiyue Ding College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun130012China Norinco Group Air Ammunition Research Institute Co.Ltd. Harbin150036China Harvard Medical School Boston02115USA
In the heavy clutter environment, the information capacity is large,the relationships among information are complicated, and track initiationoften has a high false alarm rate or missing alarm rate. Obviously, it is ad... 详细信息
来源: 评论
COVID-19 knowledge Graph for Drug and Vaccine Development
COVID-19 Knowledge Graph for Drug and Vaccine Development
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Huang, Lan Guan, Hongrui Liang, Yanchun Guan, Renchu Feng, Xiaoyue Jilin University The Key Laboratory for Symbolic Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Changchun China Zhuhai College of Science and Technology Zhuhai Sub Laboratory Key Laboratory of Symbolic Computation and Knowledge Engineering of the Ministry of Education Zhuhai China
The worldwide spread of COVID-19 has made a severe impact on human health and life. It has shown rapid propagation, long in vitro survival, and a long incubation period. More seriously, COVID-19 is more susceptible to... 详细信息
来源: 评论
Efficient Sharing of Energy Consumption Data: A Privacy-Preserving Threshold Aggregation Approach
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Guohao Zhou, Lu Lian, Jiale Liu, Siyi Yang, Li Zhong, Yantao Li, Qiang Xidian University School of Computer Science and Technology Xi’an China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China Co. Ltd Guangdong Shenzhen China
Energy consumption data collected by smart meters is increasingly used by various subscribers in the smart grid for load management, energy monitoring, and policy planning. To protect user privacy, edge-assisted priva... 详细信息
来源: 评论