咨询与建议

限定检索结果

文献类型

  • 6,189 篇 期刊文献
  • 4,028 篇 会议
  • 4 册 图书

馆藏范围

  • 10,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,002 篇 工学
    • 3,930 篇 计算机科学与技术...
    • 3,195 篇 软件工程
    • 1,414 篇 信息与通信工程
    • 1,008 篇 化学工程与技术
    • 950 篇 电气工程
    • 779 篇 电子科学与技术(可...
    • 724 篇 生物工程
    • 713 篇 控制科学与工程
    • 546 篇 材料科学与工程(可...
    • 525 篇 光学工程
    • 496 篇 生物医学工程(可授...
    • 407 篇 机械工程
    • 342 篇 动力工程及工程热...
    • 281 篇 仪器科学与技术
    • 281 篇 冶金工程
    • 266 篇 交通运输工程
    • 224 篇 土木工程
    • 216 篇 建筑学
  • 4,271 篇 理学
    • 1,792 篇 数学
    • 1,504 篇 物理学
    • 906 篇 生物学
    • 834 篇 化学
    • 613 篇 统计学(可授理学、...
    • 237 篇 系统科学
  • 1,588 篇 管理学
    • 878 篇 管理科学与工程(可...
    • 770 篇 图书情报与档案管...
    • 324 篇 工商管理
  • 545 篇 医学
    • 447 篇 临床医学
    • 323 篇 基础医学(可授医学...
  • 250 篇 法学
    • 205 篇 社会学
  • 213 篇 农学
  • 145 篇 经济学
  • 69 篇 教育学
  • 24 篇 文学
  • 17 篇 军事学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 232 篇 semantics
  • 196 篇 feature extracti...
  • 187 篇 deep learning
  • 145 篇 data mining
  • 128 篇 training
  • 119 篇 computational mo...
  • 110 篇 machine learning
  • 100 篇 data models
  • 93 篇 convolution
  • 89 篇 predictive model...
  • 87 篇 neural networks
  • 83 篇 accuracy
  • 79 篇 object detection
  • 78 篇 reinforcement le...
  • 76 篇 contrastive lear...
  • 76 篇 forecasting
  • 74 篇 optimization
  • 73 篇 knowledge engine...
  • 69 篇 federated learni...
  • 68 篇 image segmentati...

机构

  • 314 篇 university of ch...
  • 184 篇 school of inform...
  • 174 篇 iccub universita...
  • 174 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 164 篇 infn sezione di ...
  • 156 篇 horia hulubei na...
  • 154 篇 yandex school of...
  • 151 篇 h.h. wills physi...
  • 149 篇 van swinderen in...
  • 137 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 université clerm...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 lpnhe sorbonne u...
  • 108 篇 cavendish labora...
  • 108 篇 college of compu...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 117 篇 barter w.
  • 114 篇 brundu d.
  • 111 篇 bellee v.
  • 101 篇 bowcock t.j.v.
  • 101 篇 casse g.
  • 100 篇 bobulska d.
  • 100 篇 blake t.
  • 100 篇 borsato m.
  • 100 篇 betancourt c.
  • 98 篇 belin s.
  • 97 篇 afsharnia h.
  • 95 篇 belavin v.
  • 93 篇 bediaga i.
  • 91 篇 cali s.
  • 89 篇 amato s.
  • 89 篇 baryshnikov f.
  • 86 篇 bjørn m.
  • 76 篇 boettcher t.

语言

  • 9,226 篇 英文
  • 777 篇 其他
  • 229 篇 中文
  • 4 篇 德文
  • 4 篇 法文
检索条件"机构=Renmin University of China and Key Laboratory of Data Engineering and Knowledge Engineering"
10221 条 记 录,以下是951-960 订阅
排序:
Detecting Ethereum Phishing Scams via Multi-transaction-view Graph Attention Network  29
Detecting Ethereum Phishing Scams via Multi-transaction-view...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhuo, Shaoxuan Li, Guang Wu, Weigang Bian, Jing Sun Yat-Sen University School of Computer Science and Engineering Guangzhou China Guangdong Province Key Laboratory of Big Data Analysis and Processing China Sun Yat-Sen University Guangdong Province Key Laboratory of Computational Science Guangzhou China
Cryptocurrency phishing scams is a significant treat to Ethereum, one of the most popular blockchain platforms. Most of existing Ethereum phishing detection methods are based on traditional machine learning or graph r... 详细信息
来源: 评论
M-DFCPP: A runtime library for multi-machine dataflow computing
M-DFCPP: A runtime library for multi-machine dataflow comput...
收藏 引用
作者: Luo, Qiuming Liu, Senhong Huang, Jinke Li, Jinrong College of Computer Science and Software Engineering Shenzhen University Shenzhen China SKT Group Guangdong Province Key Laboratory of Popular High-Performance Computers Shenzhen China SKT Group Guangdong Province Engineering Center of China-made High Performance Data Computing System Shenzhen China
This article designs and implements a runtime library for general dataflow programming, DFCPP (Luo Q, Huang J, Li J, Du Z. Proceedings of the 52nd International Conference on Parallel Processing Workshops. ACM;2023:14... 详细信息
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论
Improved Power Conversion Efficiency and Stability of Perovskite Solar Cells Induced by Dual Interface Passivation
Improved Power Conversion Efficiency and Stability of Perovs...
收藏 引用
2023 International Conference on Optoelectronic Materials and Devices, ICOMD 2023
作者: Guan, Nianci Han, Qizhuo Institute of Biomedical Materials & Engineering Northwestern Polytechnical University Xi'an710072 China The School of Computer Science National Engineering Laboratory for Integrated Aero-Space-Ground- Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech and Image Information Processing Northwestern Polytechnical University Xi’an710072 China
Efficient and stable Perovskite solar cells (PSCs) have been successfully produced using a dual-layer modified (DLM) perovskite thin film. This method simultaneously modifies both the bottom (SnO2/perovskite) and top ... 详细信息
来源: 评论
Composition of interval-valued fuzzy relations with Bandler-Kohout subproduct in marine pollution assessment
Composition of interval-valued fuzzy relations with Bandler-...
收藏 引用
2022 International Conference on Statistics, data Science, and Computational Intelligence, CSDSCI 2022
作者: Deng, Jianglin School of Information and Engineering Zhejiang Ocean University Zhoushan316000 China Key Laboratory of Oceanographic Big Data Mining and Application of Zhejiang Province Zhoushan316022 China
With the increasing exploitation of marine resources, there is worldwide concern about the marine environment. It is a hot topic how to assert the marine pollution. Concentrating on dissolved oxygen and suspended soli... 详细信息
来源: 评论
Making Passive Daytime Radiative Cooling Metafabrics on a Large Scale
收藏 引用
Advanced Fiber Materials 2022年 第1期4卷 3-4页
作者: Shaowu Pan Huisheng Peng State Key Laboratory for Modifcation of Chemical Fibers and Polymer Materials College of Materials Science and EngineeringDonghua University2999 Renmin RoadShanghai 201620China State Key Laboratory of Molecular Engineering of Polymers Department of Macromolecular Scienceand Laboratory of Advanced MaterialsFudan UniversityShanghai 200438China
Cooling is pervasive in modern society and contributes signifcantly to global energy use.A hierarchical-morphology metafabric has been recently reported to show efcient passive daytime radiative cooling ability and ma... 详细信息
来源: 评论
Review and prospect of remote sensing monitoring methods for inland black and malodorous water bodies  24
Review and prospect of remote sensing monitoring methods for...
收藏 引用
2024 International Conference on Image Processing, Intelligent Control and Computer engineering, IPICE 2024
作者: Liao, Yansong Huang, Fenghua The Academy of Digital China Fuzhou University China Fujian University Engineering Research Center of Spatial Data Mining and Application Yango University China Fujian Key Laboratory of Spatial Information Perception and Intelligent Processing Yango University China College of Artificial Intelligence Yango University China
Black and malodorous water bodies represent a severe water pollution phenomenon that urgently needs addressing due to the discomfort and health risks they pose. Since the release of the"Action Plan for Prevention... 详细信息
来源: 评论
2D-3D Feature Co-Embedding Network with Sparse Annotation for 3D Medical Image Segmentation
2D-3D Feature Co-Embedding Network with Sparse Annotation fo...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhu, Mingzhu Guo, Shuyu Wang, Ziwei Jiao, Jianhang Bai, Tian Jilin University College of Computer Science and Technology Changchun China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China Jilin University College of Software Changchun China The Second Norman Bethune Hospital Jilin University Department of Orthopedics Changchun China
Supervised methods on 3D medical image segmentation need large amounts of annotated data, but annotating is time-consuming. Also, existing 3D segmentation methods capture more global structural information but overloo... 详细信息
来源: 评论
CARDnet: A denoiser based on contrast-aware and residual-dense block  19th
CARDnet: A denoiser based on contrast-aware and residual-den...
收藏 引用
19th Chinese Intelligent Systems Conference, CISC 2023
作者: Cai, Qiang Cao, Ying Wang, Chen Li, Haisheng Ma, Mengxu School of Computer Science and Engineering Beijing Technology and Business University Beijing100048 China Beijing Key Laboratory of Big Data Technology for Food Safety Beijing100048 China National Engineering Laboratory for Agri-Product Quality Traceability Beijing100048 China
In recent years, deep convolutional neural networks have shown good performance on images with spatially invariant noise, but their performance is limited on real-world noisy images. In order to improve the practicali... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and Computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论