咨询与建议

限定检索结果

文献类型

  • 631 篇 期刊文献
  • 543 篇 会议
  • 1 册 图书

馆藏范围

  • 1,175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 825 篇 工学
    • 554 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 77 篇 电气工程
    • 74 篇 化学工程与技术
    • 72 篇 生物医学工程(可授...
    • 70 篇 电子科学与技术(可...
    • 67 篇 控制科学与工程
    • 43 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
    • 27 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 23 篇 仪器科学与技术
  • 431 篇 理学
    • 197 篇 数学
    • 126 篇 生物学
    • 118 篇 物理学
    • 62 篇 统计学(可授理学、...
    • 51 篇 化学
    • 24 篇 系统科学
  • 205 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 108 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 57 篇 医学
    • 51 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 32 篇 法学
    • 27 篇 社会学
  • 19 篇 农学
  • 16 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 training
  • 21 篇 deep learning
  • 20 篇 object detection
  • 19 篇 forecasting
  • 15 篇 deep neural netw...
  • 14 篇 task analysis
  • 12 篇 conferences
  • 12 篇 data mining
  • 12 篇 contrastive lear...
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking
  • 9 篇 embeddings

机构

  • 39 篇 school of cyber ...
  • 37 篇 university of ch...
  • 33 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 school of inform...
  • 22 篇 sjtu-pinghu inst...
  • 21 篇 pazhou lab
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 18 篇 school of softwa...
  • 16 篇 fujian provincia...
  • 16 篇 school of inform...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 14 篇 school of softwa...
  • 14 篇 beijing key lab ...

作者

  • 29 篇 jin hai
  • 28 篇 li xirong
  • 22 篇 hai jin
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 lu liangjun
  • 14 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 13 篇 chen hong
  • 13 篇 li minghui
  • 12 篇 li cuiping
  • 12 篇 zhou ziqi
  • 10 篇 jia weijia
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi
  • 9 篇 linjie zhou
  • 9 篇 zhang lingling

语言

  • 1,109 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1175 条 记 录,以下是311-320 订阅
排序:
FlexiFed: Personalized Federated Learning for Edge Clients with Heterogeneous Model Architectures  23
FlexiFed: Personalized Federated Learning for Edge Clients w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Chen, Chunyang Huang, Faliang Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Information Technology Monash University Australia Guangxi Key Lab of Human-machine Interaction and Intelligent Decision Nanning Normal University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Mobile and Web-of-Things (WoT) devices at the network edge account for more than half of the world's web traffic, making a great data source for various machine learning (ML) applications, particularly federated l... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
Improved Bounds for Sampling Solutions of Random CNF Formulas
arXiv
收藏 引用
arXiv 2022年
作者: He, Kun Wu, Kewen Yang, Kuan The Key Lab of Data Engineering and Knowledge Engineering MOE Renmin University of China China University of California at Berkeley United States John Hopcroft Center for Computer Science Shanghai Jiao Tong University China
Let Φ be a random k-CNF formula on n variables and m clauses, where each clause is a disjunction of k literals chosen independently and uniformly. Our goal is to sample an approximately uniform solution of Φ (or equ...
来源: 评论
Feature-wise and Sample-wise Adaptive Transfer Learning for High-dimensional Linear Regression
arXiv
收藏 引用
arXiv 2024年
作者: He, Zelin Sun, Ying Liu, Jingyuan Li, Runze Department of Statistics Pennsylvania State University United States School of Electrical Engineering and Computer Science Pennsylvania State University United States MOE Key Laboratory of Econometrics Department of Statistics and Data Science School of Economics Wang Yanan Institute for Studies in Economics Fujian Key Lab of Statistics Xiamen University China
We consider the transfer learning problem in the high dimensional linear regression setting, where the feature dimension is larger than the sample size. To learn transferable information, which may vary across feature... 详细信息
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jiaoli Shi Chao Hu Shimao Yao Zhuolin Mei Bin Wu Hui Li School of Computer and Big Data Jiujiang Univ. Jiujiang China School of Software IoT Engineering Jiangxi Univ. of Finance and Economics Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China School of Computer and Big Data Jiujiang University Jiujiang China School of Elec. and Comp. Engineering Peking University Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user’s private key to the priva...
来源: 评论
What matters for ad-hoc video search? A large-scale evaluation on TRECVID
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Aozhu Hu, Fan Wang, Zihan Zhou, Fangming Li, Xirong AIMC Lab. School of Information Renmin University of China Key Lab of Data Engineering and Knowledge Engineering Renmin University of China
For quantifying progress in Ad-hoc Video Search (AVS), the annual TRECVID AVS task is an important international evaluation. Solutions submitted by the task participants vary in terms of their choices of cross-modal m...
来源: 评论
Unifying Large Language Models and Knowledge Graphs: A Roadmap
arXiv
收藏 引用
arXiv 2023年
作者: Pan, Shirui Luo, Linhao Wang, Yufei Chen, Chen Wang, Jiapu Wu, Xindong Griffith University QLD Australia The Department of Data Science and AI Monash University Melbourne Australia The Nanyang Technological University Singapore The Faculty of Information Technology Beijing University of Technology Beijing China The Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China Hefei University of Technology Hefei China The Research Center for Knowledge Engineering Zhejiang Lab Hangzhou China
Large language models (LLMs), such as ChatGPT and GPT4, are making new waves in the field of natural language processing and artificial intelligence, due to their emergent ability and generalizability. However, LLMs a... 详细信息
来源: 评论
Research on 3D geometric modeling of urban buildings based on airborne lidar point cloud and image  4
Research on 3D geometric modeling of urban buildings based o...
收藏 引用
4th International Conference on Geology, Mapping, and Remote Sensing, ICGMRS 2023
作者: Guo, Tianwei Dong, Kunfeng College of Mapping and Information Engineering West Yunnan University of Applied Sciences Yunnan Province Dali China Key Lab. of Mt. Real Scene Point Cloud Data Proc. and Applic. for Universities in Yunnan Province West Yunnan University of Applied Sciences Yunnan Province Dali China Multi Src. Data Fusion Real Scene 3D Constr. Research Scientific and Technological Innovation Team West Yunnan University of Applied Sciences Yunnan Province Dali China Yunnan Construction Investment First Investigation and Design Co. Yunnan Province Kunming China
Buildings are the most important elements in cities. Building urban building models is of great significance for the establishment of digital cities. The level of its modeling technology restricts the development of u... 详细信息
来源: 评论
SDformer: similarity-driven discrete transformer for time series generation  24
SDformer: similarity-driven discrete transformer for time se...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Zhicheng Chen Shibo Feng Zhong Zhang Xi Xiao Xingyu Gao Peilin Zhao Shenzhen International Graduate School Tsinghua University and Tencent AI Lab School of Computer Science and Engineering Nanyang Technological University Tencent AI Lab Shenzhen International Graduate School Tsinghua University and Key Laboratory of Data Protection and Intelligent Management (Sichuan University) Ministry of Education Institute of Microelectronics Chinese Academy of Sciences
The superior generation capabilities of Denoised Diffusion Probabilistic Models (DDPMs) have been effectively showcased across a multitude of domains. Recently, the application of DDPMs has extended to time series gen...
来源: 评论