咨询与建议

限定检索结果

文献类型

  • 631 篇 期刊文献
  • 543 篇 会议
  • 1 册 图书

馆藏范围

  • 1,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 825 篇 工学
    • 554 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 77 篇 电气工程
    • 74 篇 化学工程与技术
    • 72 篇 生物医学工程(可授...
    • 70 篇 电子科学与技术(可...
    • 67 篇 控制科学与工程
    • 43 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
    • 27 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 23 篇 仪器科学与技术
  • 431 篇 理学
    • 197 篇 数学
    • 126 篇 生物学
    • 118 篇 物理学
    • 62 篇 统计学(可授理学、...
    • 51 篇 化学
    • 24 篇 系统科学
  • 205 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 108 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 57 篇 医学
    • 51 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 32 篇 法学
    • 27 篇 社会学
  • 19 篇 农学
  • 16 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 training
  • 21 篇 deep learning
  • 20 篇 object detection
  • 19 篇 forecasting
  • 15 篇 deep neural netw...
  • 14 篇 task analysis
  • 12 篇 conferences
  • 12 篇 data mining
  • 12 篇 contrastive lear...
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking
  • 9 篇 embeddings

机构

  • 39 篇 school of cyber ...
  • 37 篇 university of ch...
  • 33 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 school of inform...
  • 22 篇 sjtu-pinghu inst...
  • 21 篇 pazhou lab
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 14 篇 school of softwa...
  • 14 篇 beijing key lab ...

作者

  • 29 篇 jin hai
  • 28 篇 li xirong
  • 22 篇 hai jin
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 lu liangjun
  • 14 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 13 篇 chen hong
  • 13 篇 li minghui
  • 12 篇 li cuiping
  • 12 篇 zhou ziqi
  • 10 篇 jia weijia
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi
  • 9 篇 linjie zhou
  • 9 篇 zhang lingling

语言

  • 1,109 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1175 条 记 录,以下是131-140 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Chain-Based Outlier Detection for Complex data Scenarios
Chain-Based Outlier Detection for Complex Data Scenarios
收藏 引用
2023 IEEE International Conference on Big data, Bigdata 2023
作者: Dong, Huiwen Wang, Qing-Guo Ding, Wei Institute of Artificial Intelligence and Future Networks Beijing Normal University Beijing China Institute for Advanced Study Guangdong Key Lab of Ai and Mm Data ProcessingGuangdong Provincial Key Laboratory Irads Ias Dst BNU-HKBU United International College Zhuhai China Changshu Institute of Technology Faculty of Electrical Engineering and Automation Changshu China
Outlier detection is a challenging problem due to the complexity of real-life data. Specifically, an effective outlier detection method should be able to handle (1) different types of outliers: local outliers, global ... 详细信息
来源: 评论
Domain adaptation for large-vocabulary object detectors  24
Domain adaptation for large-vocabulary object detectors
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Kai Jiang Jiaxing Huang Weiying Xie Jie Lei Yunsong Li Ling Shao Shijian Lu State Key Laboratory of Integrated Services Networks Xidian University Xi'an China S-lab School of Computer Science and Engineering Nanyang Technological University School of Electrical and Data Engineering at the University of Technology Sydney UCAS-Terminus AI Lab University of Chinese Academy of Sciences China
Large-vocabulary object detectors (LVDs) aim to detect objects of many categories, which learn super objectness features and can locate objects accurately while applied to various downstream data. However, LVDs often ...
来源: 评论
Research on Classification label Denoising Algorithm Based on Granular Ball  7
Research on Classification Label Denoising Algorithm Based o...
收藏 引用
7th International Conference on Cloud Computing and Big data Analytics, ICCCBDA 2022
作者: Kong, Weiyu Wu, Yanmin Qi, Jinli Chen, Yanyi Chongqing Key Lab. of Comp. Sci. and Technology Chongqing University of Posts and Telecommunications ChongQing China ChongQing College of Electronic Engineering Department of Artificial Intelligence and Big Data ChongQing China Chongqing University of Posts and Telecommunications Department of Software Engineering ChongQing China
This paper presents a granular ball denoising method (GBD) which can effectively improve the accuracy and robustness of classification algorithm. GBD method first uses the self-Adaptive hypersphere to cover the data s... 详细信息
来源: 评论
Potential Transmission Choice for Internet of Things(IoT):Wireless and Batteryless Communications and Open Problems
收藏 引用
China Communications 2021年 第2期18卷 241-249页
作者: Zhan Xu Guanjie Hu Minzheng Jia Lan Dong School of Information and Communication Engineering and with Key Laboratory of Modern Measurement&Control Technology Ministry of EducationBeijing Information Science&Technology UniversityChina Beijing Key Lab of Transportation Data Analysis and Mining School of Computer and Information TechnologyBeijing Jiaotong UniversityBeijingChina Department of Information Engineering Beijing Polytechnic CollegeBeijingChina
The 5th generation mobile communications aims at connecting everything and future Internet of Things(IoT)will get everything smartly *** realize it,there exist many *** key challenge is the battery problem for small d... 详细信息
来源: 评论
Hyperbolic Geometric Latent Diffusion Model for Graph Generation  41
Hyperbolic Geometric Latent Diffusion Model for Graph Genera...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
BIM: Improving Graph Neural Networks with Balanced Influence Maximization  40
BIM: Improving Graph Neural Networks with Balanced Influence...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Zhang, Wentao Gao, Xinyi Yang, Ling Cao, Meng Huang, Ping Shan, Jiulong Yin, Hongzhi Cui, Bin Peking University Center for Machine Learning Research China Institute of Advanced Algorithms Research Shanghai China National Engineering Labratory for Big Data Analytics and Applications The University of Queensland Australia Peking University Key Lab of High Confidence Software Technologies China Apple Inc. Institute of Computational Social Science Peking University Qingdao China
The imbalanced data classification problem has aroused lots of concerns from both academia and industry since data imbalance is a widespread phenomenon in many real-world scenarios. Although this problem has been well... 详细信息
来源: 评论
Individual tree detection and counting based on high-resolution imagery and the canopy height model data
收藏 引用
地球空间信息科学学报(英文版) 2024年 第6期27卷 中插23,2162-2178页
作者: Ye Zhang Moyang Wang Joseph Mango Liang Xin Chen Meng Xiang Li Key Laboratory of Geographic Information Science(Ministry of Education)and School of Geographic Sciences East China Normal UniversityShanghaiChina Department of Transportation and Geotechnical Engineering University of Dar es SalaamDar es salaamTanzania College of Surveying and Geographic Informatics Tongji UniversityShanghaiChina Cadre School of Shanghai Municipal Bureau of Planning and Natural Resources ShanghaiChina School of Ecology and Environmental Sciences East China Normal UniversityShanghaiChina Key Laboratory of Geographic Information Science(Ministry of Education)and School of Geographic Sciences East China Normal UniversityShanghaiChina Shanghai Key Lab for Urban Ecological Processes and Eco-Restoration East China Normal UniversityShanghaiChina Key Laboratory of Spatial-Temporal Big Data Analysis and Application of Natural Resources in Megacities(Ministry of Natural Resources) East China Normal UniversityShanghaiChina
Individual Tree Detection-and-Counting(ITDC)is among the important tasks in town areas,and numerous methods are proposed in this *** their many advantages,still,the proposed methods are inadequate to provide robust re... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Joint Participation Incentive and Network Pricing Design for Federated Learning  42
Joint Participation Incentive and Network Pricing Design for...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Ding, Ningning Gao, Lin Huang, Jianwei Northwestern University Department of Electrical and Computer Engineering EvanstonIL60208 United States Shenzhen Research Institute of Big Data Shenzhen518172 China Harbin Institute of Technology Sch. of Electronics and Info. Eng. and the Guangdong Prov. Key Lab. of Aerosp. Commun. and Networking Technol. Shenzhen China The Chinese University of Hong Kong Shenzhen School of Science and Engineering Shenzhen Research Institute of Big Data Shenzhen518172 China
Federated learning protects users' data privacy though sharing users' local model parameters (instead of raw data) with a server. However, when massive users train a large machine learning model through federa... 详细信息
来源: 评论