咨询与建议

限定检索结果

文献类型

  • 628 篇 期刊文献
  • 537 篇 会议
  • 1 册 图书

馆藏范围

  • 1,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 823 篇 工学
    • 554 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 195 篇 信息与通信工程
    • 112 篇 生物工程
    • 88 篇 光学工程
    • 77 篇 电气工程
    • 74 篇 化学工程与技术
    • 71 篇 生物医学工程(可授...
    • 70 篇 电子科学与技术(可...
    • 67 篇 控制科学与工程
    • 43 篇 机械工程
    • 29 篇 交通运输工程
    • 27 篇 材料科学与工程(可...
    • 27 篇 建筑学
    • 25 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 23 篇 仪器科学与技术
  • 430 篇 理学
    • 197 篇 数学
    • 126 篇 生物学
    • 118 篇 物理学
    • 62 篇 统计学(可授理学、...
    • 51 篇 化学
    • 23 篇 系统科学
  • 205 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 108 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 57 篇 医学
    • 51 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 药学(可授医学、理...
  • 32 篇 法学
    • 27 篇 社会学
  • 19 篇 农学
  • 16 篇 经济学
  • 11 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 38 篇 semantics
  • 31 篇 feature extracti...
  • 23 篇 machine learning
  • 22 篇 training
  • 20 篇 object detection
  • 20 篇 deep learning
  • 19 篇 forecasting
  • 15 篇 deep neural netw...
  • 14 篇 task analysis
  • 12 篇 conferences
  • 12 篇 data mining
  • 12 篇 contrastive lear...
  • 10 篇 neural networks
  • 10 篇 computational mo...
  • 10 篇 classification (...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 graph neural net...
  • 9 篇 benchmarking
  • 9 篇 embeddings

机构

  • 38 篇 school of cyber ...
  • 37 篇 university of ch...
  • 33 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 hubei key labora...
  • 26 篇 hubei engineerin...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 22 篇 school of inform...
  • 22 篇 sjtu-pinghu inst...
  • 21 篇 pazhou lab
  • 18 篇 key lab of data ...
  • 18 篇 department of co...
  • 16 篇 fujian provincia...
  • 16 篇 school of softwa...
  • 15 篇 state key lab of...
  • 15 篇 research center ...
  • 15 篇 school of inform...
  • 14 篇 school of softwa...
  • 14 篇 beijing key lab ...

作者

  • 29 篇 jin hai
  • 28 篇 li xirong
  • 20 篇 hai jin
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 18 篇 liu jun
  • 18 篇 hu shengshan
  • 18 篇 lu liangjun
  • 14 篇 zhang leo yu
  • 14 篇 pan jeng-shyang
  • 13 篇 chen hong
  • 13 篇 li minghui
  • 12 篇 li cuiping
  • 12 篇 zhou ziqi
  • 10 篇 jia weijia
  • 10 篇 yang gang
  • 9 篇 li jingbing
  • 9 篇 xue xingsi
  • 9 篇 linjie zhou
  • 9 篇 zhang lingling

语言

  • 1,100 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=The Key Lab of Data Engineering and Kowledge Engineering"
1166 条 记 录,以下是31-40 订阅
排序:
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Self-similarity in single-point turbulent statistics across different quadrants in turbulent rotor wakes
收藏 引用
Physical Review Fluids 2024年 第5期9卷 054608-054608页
作者: Xue-Lu Xiong (熊雪露) Shujin Laima (赖马树金) Hui Li (李惠) Yi Zhou (周毅) School of Energy and Power Engineering Key Lab of Smart Prevention and Mitigation of Civil Engineering Disasters of the Ministry of Industry and Information Technology Key Lab of Structures Dynamic Behavior and Control of the Ministry of Education Guangdong-Hong Kong-Macao Joint Laboratory for Data-Driven Fluid Mechanics and Engineering Applications
This paper presents a quadrant analysis of turbulent rotor wakes, placing a particular emphasis on the self-similarity in single-point turbulent statistics. The self-similarity analysis reveals that within the wake se... 详细信息
来源: 评论
Anatomical Prior Guided Spatial Contrastive Learning for Few-Shot Medical Image Segmentation  24
Anatomical Prior Guided Spatial Contrastive Learning for Few...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Huang, Wendong Hu, Jinwu Bi, Xiuli Xiao, Bin Chongqing Key Laboratory of Image Cognition Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Post and Telecommunications Chongqing China Pazhou Lab School of Software Engineering South China University of Technology Guangzhou China
Few-shot semantic segmentation has considerable potential for low-data scenarios, especially for medical images that require expert-level dense annotations. Existing few-shot medical image segmentation methods strive ... 详细信息
来源: 评论
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 306-312页
作者: Han Wang Fida Hussain Memon Xianpeng Wang Xingwang Li Ning Zhao Kapal Dev College of Physical Science&Engineering Yichun UniversityYichun336000China State Key Laboratoty of Marine Resource Utilization in South China Sea Hainan UniversityHaikou570228China Faculty of Data Science City University of MacaoMacao999078China Physics and Electronic Information Engineering Henan Polytechnic UniversityJiaozuo454000China Department of Mechatronics AMM Lab Jeju National UniversitySouth Korea Department of Electrical Engineering Sukkur IBA UniversityPakistan Department of Institute of Intellligent Systems University of JohannesburgSouth Africa
Compressed Sensing(CS)is a Machine Learning(ML)method,which can be regarded as a single-layer unsupervised learning *** mainly emphasizes the sparsity of the *** this paper,we study an ML-based CS Channel Estimation(C... 详细信息
来源: 评论
Leverage Learning Behaviour data for Students' Learning Performance Prediction and Influence Factor Analysis
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2422-2433页
作者: Ni, Qin Zhu, Yanjin Zhang, Lingying Lu, Xiaochen Zhang, Lei Shanghai International Studies University Key Laboratory of Multilingual Education with AI Shanghai201620 China Donghua University College of Information Science and Technology Shanghai201620 China Donghua University Engineering Research Center of Digitized Textile and Apparel Technology Ministry of Education Shanghai201620 China Shanghai Normal University Shanghai Engineering Research Center of Intelligent Education and Bigdata and Lab for Educational Big Data and Policymaking Shanghai200234 China
Online education has become increasingly significant for university students and faculty, especially in the context of the modern remote education landscape. However, the inherent space-time separation in online educa... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
A Symbolic Rule Integration Framework with Logic Transformer for Inductive Relation Prediction  24
A Symbolic Rule Integration Framework with Logic Transformer...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Pan, Yudai Liu, Jun Zhao, Tianzhe Zhang, Lingling Lin, Yun Dong, Jin Song School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Shaanxi Xi'an China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'an China Shanghai Jiao Tong University Shanghai China National University of Singapore Singapore Singapore
Relation prediction in knowledge graphs (KGs) aims at predicting missing relations in incomplete triples, whereas the dominant paradigm by KG embeddings has a limitation to predict the relation between unseen entities... 详细信息
来源: 评论
Hybrid Parallel Inference for Large Model on Heterogeneous Clusters for High Throughput  29
Hybrid Parallel Inference for Large Model on Heterogeneous C...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Xu, Chaonong Kong, Weiming Liu, Min Zhang, Mingming Li, Chao Gong, Luqi Beijing Key Lab of Petroleum Data Mining Beijing China Institute of Intelligent Computing Zhejiang Lab Hangzhou China Bupt School of Computer Science National Pilot Software Engineering School Beijing China
In high-throughput intelligent computing scenarios, multi-device parallelism strategies based on data parallelism or pipeline parallelism have been extensively utilized to accelerate large deep neural network model in... 详细信息
来源: 评论
Learning to Communicate Among Agents for Large-Scale Dynamic Path Planning With Genetic Programming Hyperheuristic
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1269-1283页
作者: Liao, Xiao-Cheng Hu, Xiao-Min Chen, Xiang-Ling Mei, Yi Jia, Ya-Hui Chen, Wei-Neng Victoria University of Wellington Centre for Data Science and Artificial Intelligence School of Engineering and Computer Science Wellington6140 New Zealand Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Hanyang University Department of Electrical and Electronic Engineering Ansan15588 Korea Republic of South China University of Technology School of Future Technology Guangzhou510006 China Pazhou Lab Guangzhou510005 China South China University of Technology School of Computer Science and Engineering State Key Laboratory of Subtropical Building and Urban Science Guangzhou510006 China
Genetic programming hyperheuristic (GPHH) has recently become a promising methodology for large-scale dynamic path planning (LDPP) since it can produce reusable heuristics rather than disposable solutions. However, in... 详细信息
来源: 评论