咨询与建议

限定检索结果

文献类型

  • 3,534 篇 会议
  • 2,549 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,100 篇 工学
    • 2,830 篇 计算机科学与技术...
    • 2,301 篇 软件工程
    • 1,050 篇 信息与通信工程
    • 515 篇 电气工程
    • 472 篇 生物工程
    • 468 篇 控制科学与工程
    • 458 篇 电子科学与技术(可...
    • 383 篇 光学工程
    • 298 篇 生物医学工程(可授...
    • 284 篇 机械工程
    • 256 篇 化学工程与技术
    • 202 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 137 篇 网络空间安全
    • 134 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 106 篇 交通运输工程
  • 2,210 篇 理学
    • 1,192 篇 数学
    • 661 篇 物理学
    • 525 篇 生物学
    • 363 篇 统计学(可授理学、...
    • 270 篇 化学
    • 166 篇 系统科学
  • 1,065 篇 管理学
    • 567 篇 图书情报与档案管...
    • 538 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 249 篇 医学
    • 211 篇 临床医学
    • 186 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 148 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 76 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 262 篇 feature extracti...
  • 234 篇 semantics
  • 164 篇 training
  • 131 篇 accuracy
  • 121 篇 computational mo...
  • 111 篇 deep learning
  • 105 篇 convolution
  • 87 篇 data mining
  • 84 篇 image segmentati...
  • 78 篇 object detection
  • 78 篇 data models
  • 76 篇 visualization
  • 70 篇 contrastive lear...
  • 70 篇 robustness
  • 70 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 61 篇 federated learni...
  • 59 篇 face recognition

机构

  • 210 篇 shandong provinc...
  • 192 篇 key laboratory o...
  • 187 篇 hubei province k...
  • 143 篇 key laboratory o...
  • 141 篇 school of comput...
  • 141 篇 school of inform...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 85 篇 shandong provinc...
  • 76 篇 national key lab...
  • 74 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 62 篇 hubei province k...
  • 62 篇 shanghai key lab...
  • 60 篇 shanghai key lab...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 64 篇 li zuoyong
  • 56 篇 huang qingming
  • 52 篇 zhaohui li
  • 51 篇 li zhaohui
  • 46 篇 li chenglong
  • 44 篇 zhang fuquan
  • 34 篇 tang jin
  • 33 篇 li wei
  • 32 篇 fan li
  • 32 篇 shen linlin
  • 31 篇 guo di
  • 31 篇 wang wei
  • 30 篇 zuoyong li
  • 30 篇 boxin shi
  • 29 篇 feng rui
  • 28 篇 yang zhiyong
  • 27 篇 wang xiao
  • 25 篇 liu yang
  • 25 篇 gao guanglai
  • 25 篇 li fan

语言

  • 5,516 篇 英文
  • 432 篇 其他
  • 145 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6084 条 记 录,以下是811-820 订阅
排序:
Mining Alarm Association Rules in Optical Transmission Networks Using a Statistical Approach  24
Mining Alarm Association Rules in Optical Transmission Netwo...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Deng, Miao Li, Peng Liu, Yu Zhu, Rongjing Zhang, Yujie School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
Due to the interconnection between devices in the optical transmission network (OTN), when one device fails and generates alarm information, a large number of other invalid alarms are generated in OTN. How to mining a... 详细信息
来源: 评论
Fair Incentive Allocation for Secure Data Sharing in Blockchain Systems: A Shapley Value Based Mechanism  3rd
Fair Incentive Allocation for Secure Data Sharing in Block...
收藏 引用
3rd International Conference on Autonomous Unmanned Systems, ICAUS 2023
作者: Yang, Ming Feng, Honglin Wang, Xin Jiao, Xuguo Wu, Xiaoming Qin, Shuwei Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Department of Public Security of Shandong Province Shandong Intelligent Public Security Joint Innovation Center Jinan China
In the contemporary era of information technology, the exponential surge in data has rendered colossal potential value, which would be fully unlocked through data circulation and sharing. However, when the data contai... 详细信息
来源: 评论
Duration-Aware Task Assignment for Heterogeneous Mobility Users in Crowdsensing  25
Duration-Aware Task Assignment for Heterogeneous Mobility Us...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Liu, Zhiyuan Li, Peng Huang, Weiyi Wang, Jiahu Nie, Lei Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing Real-Time Industrial System China
This paper investigates the duration-aware task assignment problem for heterogeneous mobility users in MCS (DTAH problem). There are two types of users in MCS, vehicle users and pedestrian users. The vehicle user gets... 详细信息
来源: 评论
Task Priority Aware Incentive Mechanism with Reward Privacy-Preservation in Mobile Crowdsensing  25
Task Priority Aware Incentive Mechanism with Reward Privacy-...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Jiahu Li, Peng Huang, Weiyi Chen, Zeqiang Nie, Lei Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing Real-Time Industrial System China
In mobile crowdsensing, there are generally two types of tasks, popular tasks, and unpopular tasks. For popular tasks, many people can perform that task, and the budget is overallocated. For unpopular tasks, fewer or ... 详细信息
来源: 评论
Decoupling Dipole Antennas with Dielectric Resonator
Decoupling Dipole Antennas with Dielectric Resonator
收藏 引用
Antennas and Propagation & USNC/URSI National Radio Science Meeting
作者: Zhichao Jin Kai Lu Nan Yang Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems School of Electronics and Information Technology (School of Microelectronics) Sun Yat-sen University Guangzhou China
A decoupling method using a dielectric resonator (DR) is investigated for 1 × 2 multiple-input and multiple-output (MIMO) dipole antenna. The decoupling DR is placed between two dipole antennas separated by a hal... 详细信息
来源: 评论
Label Noise Correction via Fuzzy Learning Machine  39
Label Noise Correction via Fuzzy Learning Machine
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liang, Jiye Li, Yixiao Cui, Junbiao Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University Shanxi Taiyuan 030006 China
The ubiquitous and unavoidable label noise brings great challenges to the generalization performance of learning methods. Label noise correction aims to detect and correct label noise in the data, which is one of the ... 详细信息
来源: 评论
Time Series Data Association Mining With High-Frequency Data Interference  24
Time Series Data Association Mining With High-Frequency Data...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Zhu, Rongjing Li, Peng Liu, Yu Deng, Miao School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
Time series data mining is an important problem in data mining. It discovers the intrinsic correlation rules by analyzing a large amount of time series data. However, high-frequency data may exist in the dataset. High... 详细信息
来源: 评论
Ridge Gap Waveguide Fed Slot Array Antenna with Low Sidelobe Level
Ridge Gap Waveguide Fed Slot Array Antenna with Low Sidelobe...
收藏 引用
Cross Strait Quad-Regional Radio Science and Wireless technology Conference (CSRWTC)
作者: Shi-Kang Xie Nan Yang Kai Lu Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems School of Electronics and Information Technology (School of Microelectronics) Sun Yat-sen University Guangzhou China
A low sidelobe slot array antenna based on ridge gap waveguide (RGW) is presented in this paper. Fed by two-layer RGW structure centrally, the slot array features symmetric field distribution. Offsetting the slots can... 详细信息
来源: 评论
Embedding expert demonstrations into clustering buffer for effective deep reinforcement learning
收藏 引用
Frontiers of information technology & Electronic Engineering 2023年 第11期24卷 1541-1556页
作者: Shihmin WANG Binqi ZHAO Zhengfeng ZHANG Junping ZHANG Jian PU Shanghai Key Laboratory of Intelligent Information Processing School of Computer ScienceFudan UniversityShanghai 200433China Institute of Science and Technology for Brain-inspired Intelligence Fudan UniversityShanghai 200433China
As one of the most fundamental topics in reinforcement learning(RL),sample efficiency is essential to the deployment of deep RL *** most existing exploration methods that sample an action from different types of poste... 详细信息
来源: 评论
A Defense Framework for Backdoor Attacks in Federated Learning Based on Client-Server Detection  4
A Defense Framework for Backdoor Attacks in Federated Learni...
收藏 引用
4th International Conference on Industrial Automation, Robotics and Control Engineering, IARCE 2024
作者: Chen, Ding Li, Tianrui Yu, Cai Al-Huthaifi, Rasha Huang, Wei School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China School of Cybersecurity Chengdu University of Information Technology Sichuan Provincial Key Laboratory of Cyberspace Security Chengdu610225 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China College of Computer and Data Science Fuzhou University Fuzhou350108 China
Addressing the challenge of backdoor attacks in federated learning (FL), various defense schemes are examined, resulting in the proposal of a comprehensive strategy that incorporates both client-side and server-side m... 详细信息
来源: 评论