咨询与建议

限定检索结果

文献类型

  • 626 篇 期刊文献
  • 595 篇 会议

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 830 篇 工学
    • 623 篇 计算机科学与技术...
    • 509 篇 软件工程
    • 184 篇 信息与通信工程
    • 120 篇 电气工程
    • 99 篇 生物工程
    • 98 篇 控制科学与工程
    • 67 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 48 篇 电子科学与技术(可...
    • 43 篇 化学工程与技术
    • 38 篇 机械工程
    • 37 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 23 篇 建筑学
  • 395 篇 理学
    • 208 篇 数学
    • 124 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 74 篇 物理学
    • 44 篇 化学
    • 31 篇 系统科学
  • 224 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 医学
    • 66 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 29 篇 药学(可授医学、理...
  • 54 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 45 篇 deep learning
  • 45 篇 feature extracti...
  • 37 篇 semantics
  • 34 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 22 篇 cloud computing
  • 21 篇 machine learning
  • 20 篇 convolution
  • 19 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 privacy
  • 17 篇 security
  • 16 篇 semantic segment...
  • 16 篇 big data
  • 16 篇 neural networks
  • 16 篇 predictive model...
  • 16 篇 accuracy
  • 16 篇 data models

机构

  • 127 篇 state key labora...
  • 72 篇 state key labora...
  • 34 篇 college of compu...
  • 33 篇 key laboratory o...
  • 32 篇 college of compu...
  • 31 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 23 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 state key labora...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 school of big da...
  • 14 篇 guizhou provinci...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 li shaobo
  • 15 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 changgen peng
  • 13 篇 xiong jinbo
  • 12 篇 qin yongbin
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 tao li
  • 11 篇 zhenyong zhang
  • 11 篇 tan chaoyue

语言

  • 1,010 篇 英文
  • 200 篇 其他
  • 15 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1221 条 记 录,以下是911-920 订阅
排序:
JGC-IAGCL: Fusing joint graph convolution and intent-aware graph contrastive learning for explainable recommendation
收藏 引用
Information Fusion 2025年 123卷
作者: Yang, Zhi Lin, Chuan Qin, Yongbin Huang, Ruizhang Chen, Yanping Qin, Jiwei State Key Laboratory of Public Big Data Guizhou University Guiyang Guizhou550025 China Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry College of Computer Science and Technology Guizhou University Guiyang Guizhou550025 China College of Information Science and Engineering Xinjiang University Xinjiang Uygur Autonomous Region Urumqi830046 China
Graph contrastive learning (GCL) enhances recommendation accuracy by leveraging self-supervised features to refine node representations from large-scale unlabeled data. Traditional GCL-based recommendation models typi... 详细信息
来源: 评论
big data driven product design: A survey
arXiv
收藏 引用
arXiv 2021年
作者: Quan, Huafeng Li, Shaobo Zeng, Changchang Wei, Hongjing Hu, Jianjun College of Big Data and Statistics Guizhou Universify of Finance and Economics Guiyang550050 China State Key Laboratory of Public Big Data Guizhou University Guiyang550050 China Chengdu Institute of Computer Application Chinese Academy of Sciences Chengdu610041 China School of Mechanical Engineering Guizhou Institute of Technology Guiyang550050 China Department of Computer Science and Engineering University of South Carolina ColumbiaSC29201 United States
With the improvement of living standards, user requirements of modern products are becoming increasingly more diversified and personalized. Traditional product design methods can no longer satisfy the market needs due... 详细信息
来源: 评论
data privacy quantification and de-identification model based on information theory
Data privacy quantification and de-identification model base...
收藏 引用
2019 International Conference on Networking and Network Applications, NaNA 2019
作者: Zhang, Zeyu Lu, Zhiyang Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China College of Electrical Engineering Guizhou University Guiyang550025 China
De-identification enables to protect privacy of data from different attacks. At present, the specific de-identification standards and privacy quantification methods are given in many models, such as K-anonymity model ... 详细信息
来源: 评论
Discrete-time quantum walk approach to high-dimensional quantum state transfer and quantum routing
arXiv
收藏 引用
arXiv 2021年
作者: Li, Heng-Ji Li, Jian Chen, Xiu-Bo Information Security Center State Key Laboratory Networking and Switching Technology Beijing University of Posts Telecommunications Beijing100876 China School of Computer Science Beijing University of Posts Telecommunications Beijing100876 China GuiZhou University Guizhou Provincial Key Laboratory of Public Big Data Guizhou Guiyang550025 China
High-dimensional quantum systems can offer extended possibilities and multiple advantages while developing advanced quantum technologies. In this paper, we propose a class of quantum-walk ar-chitecture networks that a... 详细信息
来源: 评论
Chronic Disease Detection Via Non-negative Latent Feature Analysis
Chronic Disease Detection Via Non-negative Latent Feature An...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Leming Zhou Qing Li Mingsheng Shang College of Computer Science and Technology Chongqing University of Posts and Telecommunications Academy of Sciences Chongqing China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing China
Chronic diseases such as coronary heart disease (CHD) are of significant harm to human health. However, chronic disease detection commonly relies on many examinations to implement reliable diagnosis, resulting in a fa... 详细信息
来源: 评论
SODU2-NET: a novel deep learning-based approach for salient object detection utilizing U-NET
收藏 引用
PeerJ computer science 2025年 11卷 e2623-e2623页
作者: Abbas, Hyder Ren, Shen Bing Asim, Muhammad Hassan, Syeda Iqra El-Latif, Ahmed A. Abd State Key Laboratory of Public Big Data College of Computer Science and Technology Institute for Artificial Intelligence Guizhou University Guizhou Guiyang China School of Computer Science and Engineering Central South University Changsha China EIAS Data Science and Blockchain Laboratory College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia School of Computer Science and Technology Guangdong University of Technology Guangzhou China Department of Electrical and Electronic Engineering British Malaysian Institute Universiti of Kuala Lumpur Kuala Lumpur Malaysia Software Engineering Department Sir Syed University of Engineering and Technology Karachi Pakistan Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt
Detecting and segmenting salient objects from natural scenes, often referred to as salient object detection, has attracted great interest in computer vision. To address this challenge posed by complex backgrounds in s... 详细信息
来源: 评论
Masked latent transformer with random masking ratio to advance the diagnosis of dental fluorosis
收藏 引用
Journal of Visual Communication and Image Representation 2025年 111卷
作者: Xu, Hao Wu, Yun Wu, Junpeng Xie, Rui Gu, Maohua Wang, Rongpin State Key Laboratory of Public Big Data Guizhou University Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Zhijin County People's Hospital Bijie552102 China Department of Medical Imaging Guizhou Provincial People's Hospital Guiyang550002 China
Dental fluorosis is a chronic condition caused by long-term overconsumption of fluoride, which leads to changes in the appearance of tooth enamel. Diagnosing its severity can be challenging for dental professionals, a... 详细信息
来源: 评论
Q-learning-based exponential distribution optimizer with multi-strategy guidance for solving engineering design problems and robot path planning
收藏 引用
Results in Engineering 2025年
作者: Fengbin Wu Shaobo Li Junxing Zhang Liya Yu Xuan Xiong Libang Wu State Key Laboratory of Public Big Data Guizhou University Guiyang 550025 China Guizhou Institute of Technology Guiyang 550025 China Key Laboratory of Advanced Manufacturing Technology Ministry of Education Guizhou University Guiyang 550025 China School of Mechanical Engineering Guizhou University Guiyang 550025 China School of Computer Science and Technology Guizhou University Guiyang 550025 China
Exponential distribution optimizer (EDO) is an effective mathematics-based optimization technique with widespread application across numerous domains. However, it still suffers from insufficient exploitation capabilit... 详细信息
来源: 评论
DE-RSTC: A rational secure two-party computation protocol based on direction entropy
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Yuling Ma, Juan Wang, Xianmin Zhang, Xinyu Zhou, Huiyu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University Of Electronic Technology Guilin541000 China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou510000 China University of Leicester LeicesterLe1 7RH United Kingdom
Rational secure multi-party computation (RSMC) means two or more rational parties to complete a function on private inputs. In the process, the rational parties choose strategies to maximize utility, which will cause ... 详细信息
来源: 评论
An Asymmetric Controlled Bidirectional Quantum state Transmission Protocol
收藏 引用
computers, Materials & Continua 2019年 第4期59卷 215-227页
作者: Yiru Sun Yuling Chen Haseeb Ahmad Zhanhong Wei GuiZhou University Sate Key Laboratory of Public Big DataGuizhou550025China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile University Faisalabad37610Pakistan College of Information Engineering Beijing Institute of Petrochemical TechnologyBeijing102617China
In this paper,we propose an asymmetric controlled bidirectional transmission *** the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubit equato... 详细信息
来源: 评论