咨询与建议

限定检索结果

文献类型

  • 640 篇 期刊文献
  • 600 篇 会议

馆藏范围

  • 1,240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 849 篇 工学
    • 639 篇 计算机科学与技术...
    • 517 篇 软件工程
    • 196 篇 信息与通信工程
    • 130 篇 电气工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 68 篇 生物医学工程(可授...
    • 54 篇 光学工程
    • 52 篇 电子科学与技术(可...
    • 44 篇 化学工程与技术
    • 41 篇 网络空间安全
    • 40 篇 机械工程
    • 31 篇 动力工程及工程热...
    • 27 篇 安全科学与工程
    • 23 篇 建筑学
  • 401 篇 理学
    • 209 篇 数学
    • 126 篇 生物学
    • 77 篇 物理学
    • 75 篇 统计学(可授理学、...
    • 46 篇 化学
    • 31 篇 系统科学
  • 231 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 81 篇 医学
    • 68 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 54 篇 法学
    • 35 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 24 篇 农学
  • 8 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 45 篇 deep learning
  • 45 篇 feature extracti...
  • 38 篇 semantics
  • 34 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 22 篇 cloud computing
  • 21 篇 machine learning
  • 20 篇 convolution
  • 19 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 privacy
  • 17 篇 semantic segment...
  • 17 篇 security
  • 16 篇 big data
  • 16 篇 image segmentati...
  • 16 篇 neural networks
  • 16 篇 predictive model...
  • 16 篇 accuracy

机构

  • 129 篇 state key labora...
  • 74 篇 state key labora...
  • 35 篇 key laboratory o...
  • 34 篇 college of compu...
  • 34 篇 college of compu...
  • 33 篇 fujian provincia...
  • 27 篇 national enginee...
  • 26 篇 college of compu...
  • 25 篇 college of compu...
  • 23 篇 college of compu...
  • 22 篇 guizhou universi...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 19 篇 state key labora...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 school of big da...
  • 14 篇 guizhou universi...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 29 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 li shaobo
  • 17 篇 peng changgen
  • 15 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 changgen peng
  • 13 篇 xiong jinbo
  • 12 篇 qin yongbin
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 tao li
  • 11 篇 zhenyong zhang
  • 11 篇 tan chaoyue

语言

  • 954 篇 英文
  • 275 篇 其他
  • 17 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1240 条 记 录,以下是711-720 订阅
排序:
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Vulnerability Detection with Graph Simplification and Enhanc...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Xin-Cheng Wen Yupan Chen Cuiyun Gao Hongyu Zhang Jie M. Zhang Qing Liao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory and Guangdong Provincial Key Laboratory Novel Security Intelligence Technologies School of Big Data and Software Engineering Chongqing University China Department of Informatics King's College London UK Peng Cheng Laboratory
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
来源: 评论
Question generation based on chat-response conversion
Question generation based on chat-response conversion
收藏 引用
作者: Zhong, Sheng-Hua Peng, Jianfeng Liu, Peiqi College of Computer Science and Software Engineering Shenzhen University Shenzhen China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
Today, thanks to the major breakthrough of sequences to sequences model in the field of natural language, most of the dialogue generation tasks are focused on generating more effective responses. However, the response... 详细信息
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
A Low Energy-Consuming Security data Aggregation Protocol  3rd
A Low Energy-Consuming Security Data Aggregation Protocol
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Dou, Hui Chen, Yuling Long, Yangyang Tu, Yuanchao State Key Laboratory of Public Big Date College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science Nankai University Tianjin China
With the popularization of wireless sensor network (WSN), its security problem has attracted more and more attention and research. In the process of node transmission, a mass of redundant information will be generated... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Artificial intelligence for geoscience:Progress,challenges,and perspectives
收藏 引用
The Innovation 2024年 第5期5卷 136-160,135页
作者: Tianjie Zhao Sheng Wang Chaojun Ouyang Min Chen Chenying Liu Jin Zhang Long Yu Fei Wang Yong Xie Jun Li Fang Wang Sabine Grunwald Bryan MWong Fan Zhang Zhen Qian Yongjun Xu Chengqing Yu Wei Han Tao Sun Zezhi Shao Tangwen Qian Zhao Chen Jiangyuan Zeng Huai Zhang Husi Letu Bing Zhang Li Wang Lei Luo Chong Shi Hongjun Su Hongsheng Zhang Shuai Yin Ni Huang Wei Zhao Nan Li Chaolei Zheng Yang Zhou Changping Huang Defeng Feng Qingsong Xu Yan Wu Danfeng Hong Zhenyu Wang Yinyi Lin Tangtang Zhang Prashant Kumar Antonio Plaza Jocelyn Chanussot Jiabao Zhang Jiancheng Shi Lizhe Wang Aerospace Information Research Institute Chinese Academy of SciencesBeijing 100094China School of Computer Science China University of GeosciencesWuhan 430078China State Key Laboratory of Mountain Hazards and Engineering Resilience Institute of Mountain Hazards and EnvironmentChinese Academy of SciencesChengdu 610299China Key Laboratory of Virtual Geographic Environment(Ministry of Education of PRC) Nanjing Normal UniversityNanjing 210023China Data Science in Earth Observation Technical University of Munich80333 MunichGermany The National Key Laboratory of Water Disaster Prevention Yangtze Institute for Conservation and DevelopmentHohai UniversityNanjing 210098China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Soil and Sustainable Agriculture Institute of Soil ScienceChinese Academy of SciencesNanjing 210008China Soil Water and Ecosystem Sciences DepartmentUniversity of FloridaPO Box 110290GainesvilleFLUSA Materials Science Engineering Program Cooperating Faculty Member in the Department of Chemistry and Department of Physics Astronomy University of CaliforniaCaliforniaRiversideCA 92521USA Institute of Remote Sensing and Geographical Information System School of Earth and Space SciencesPeking UniversityBeijing 100871China Key Laboratory of Computational Geodynamics University of Chinese Academy of SciencesBeijing 100049China International Research Center of Big Data for Sustainable Development Goals Beijing 100094China College of Geography and Remote Sensing Hohai UniversityNanjing 211100China Department of Geography The University of Hong KongHong Kong 999077SARChina Jiangsu Key Laboratory of Atmospheric Environment Monitoring and Pollution Control Nanjing 210044China School of Environmental Science and Engineering Nanjing University of Information Science&TechnologyNanjing 210044China Collaborative Inno
This paper explores the evolution of geoscientific inquiry,tracing the progression from traditional physics-based models to modern data-driven approaches facilitated by significant advancements in artificial intellige... 详细信息
来源: 评论
Hierarchical Local Global Transformer for Point Clouds Analysis
SSRN
收藏 引用
SSRN 2023年
作者: Li, Dilong Zheng, Shenghong Chen, Ziyi Li, Xiang Wang, Lanying Du, Jixiang College of Computer Science and Technology Fujian Key Laboratory of Big Data Intelligence and Security Xiamen Key Laboratory of Computer Vision and Pattern Recognition Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University FJ Xiamen361021 China School of Economics and Finance Huaqiao University FJ Quanzhou362021 China Department of Geography and Environmental Management University of Waterloo WaterlooONN2L 3G1 Canada
Transformer networks have demonstrated remarkable performance in point cloud analysis. However, achieving a balance between local regional context and global long-range context learning remains a significant challenge... 详细信息
来源: 评论
Inductive Meta-path Learning for Schema-complex Heterogeneous Information Networks
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Shixuan Fan, Changjun Cheng, Kewei Wang, Yunfei Cui, Peng Sun, Yizhou Liu, Zhong Laboratory for Big Data and Decision College of Systems Engineering National University of Defense Technology Hunan China National Key Laboratory of Information Systems Engineering College of Systems Engineering National University of Defense Technology Hunan China University of California Los Angeles United States Department of Computer Science and Technology Tsinghua University Beijing China
Heterogeneous Information Networks (HINs) are information networks with multiple types of nodes and edges. The concept of meta-path, i.e., a sequence of entity types and relation types connecting two entities, is prop... 详细信息
来源: 评论
Research on patent recommendation method based on graph neural network
Research on patent recommendation method based on graph neur...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Enchao Zhang Weidong Liu Shi Liu Yan Cao College of Computer Science Inner Mongolia University China Institute of Scientific and Technical Information of China China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China Inner Mongolia Key Laboratory of Social Computing and Data Processing China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
Intellectual property transactions have shown a strong growth momentum in recent years, but the patent transaction market has been plagued by the matching degree of consumers and sellers, resulting in frequent problem...
来源: 评论
Exploring Patent Transformation Event: Forecasting Patent Transfer Time
Exploring Patent Transformation Event: Forecasting Patent Tr...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jinchen Huo Weidong Liu Yang Li Yan Cao College of Computer Science Inner Mongolia University China Institute of Scientific and Technical Information of China China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China Inner Mongolia Key Laboratory of Social Computing and Data Processing China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
As the largest source of technical information around the world, patents are regarded as an essential crystallization and carrier of knowledge and technological innovation. Patent transformation is conducive not only ...
来源: 评论