咨询与建议

限定检索结果

文献类型

  • 3,059 篇 期刊文献
  • 2,674 篇 会议
  • 4 册 图书

馆藏范围

  • 5,737 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,728 篇 工学
    • 2,391 篇 计算机科学与技术...
    • 1,969 篇 软件工程
    • 860 篇 信息与通信工程
    • 454 篇 控制科学与工程
    • 453 篇 电气工程
    • 440 篇 生物工程
    • 322 篇 电子科学与技术(可...
    • 296 篇 化学工程与技术
    • 256 篇 生物医学工程(可授...
    • 253 篇 机械工程
    • 233 篇 光学工程
    • 184 篇 材料科学与工程(可...
    • 169 篇 动力工程及工程热...
    • 167 篇 交通运输工程
    • 149 篇 仪器科学与技术
    • 145 篇 建筑学
    • 139 篇 土木工程
  • 2,080 篇 理学
    • 1,022 篇 数学
    • 537 篇 物理学
    • 525 篇 生物学
    • 332 篇 统计学(可授理学、...
    • 312 篇 化学
    • 148 篇 系统科学
  • 1,069 篇 管理学
    • 632 篇 管理科学与工程(可...
    • 489 篇 图书情报与档案管...
    • 228 篇 工商管理
  • 301 篇 医学
    • 245 篇 临床医学
    • 159 篇 基础医学(可授医学...
  • 177 篇 法学
    • 144 篇 社会学
  • 150 篇 农学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 48 篇 教育学
  • 16 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 1 篇 历史学

主题

  • 181 篇 semantics
  • 156 篇 feature extracti...
  • 139 篇 deep learning
  • 135 篇 training
  • 97 篇 computational mo...
  • 85 篇 data models
  • 76 篇 convolution
  • 76 篇 machine learning
  • 75 篇 data mining
  • 70 篇 predictive model...
  • 69 篇 accuracy
  • 61 篇 neural networks
  • 58 篇 object detection
  • 56 篇 visualization
  • 54 篇 federated learni...
  • 53 篇 big data
  • 53 篇 optimization
  • 51 篇 contrastive lear...
  • 50 篇 graph neural net...
  • 50 篇 adaptation model...

机构

  • 166 篇 school of inform...
  • 147 篇 key laboratory o...
  • 132 篇 school of econom...
  • 96 篇 state key labora...
  • 94 篇 school of comput...
  • 82 篇 fujian provincia...
  • 78 篇 henan key labora...
  • 73 篇 college of big d...
  • 73 篇 school of comput...
  • 73 篇 research center ...
  • 73 篇 school of comput...
  • 71 篇 university of ch...
  • 68 篇 guangdong key la...
  • 60 篇 hubei key labora...
  • 53 篇 shandong provinc...
  • 53 篇 key laboratory o...
  • 53 篇 shenzhen researc...
  • 52 篇 shandong enginee...
  • 51 篇 school of softwa...
  • 49 篇 school of inform...

作者

  • 47 篇 shi yong
  • 41 篇 zhang rui
  • 41 篇 yong shi
  • 39 篇 pan jeng-shyang
  • 37 篇 chang kuo-chi
  • 35 篇 wu xindong
  • 35 篇 chen hong
  • 34 篇 wang meng
  • 33 篇 liu yang
  • 33 篇 xue xingsi
  • 33 篇 du xiaoyong
  • 32 篇 liu jun
  • 31 篇 li cuiping
  • 31 篇 zhang jing
  • 30 篇 xindong wu
  • 29 篇 wen ji-rong
  • 29 篇 huang qingming
  • 28 篇 chu kai-chun
  • 25 篇 niyato dusit
  • 25 篇 hong chen

语言

  • 4,718 篇 英文
  • 913 篇 其他
  • 128 篇 中文
  • 4 篇 德文
  • 4 篇 法文
检索条件"机构=The Key Laboratory of Knowledge Engineering with Big Data"
5737 条 记 录,以下是941-950 订阅
排序:
Learning Group-Disentangled Representation for Interpretable Thoracic Pathologic Prediction
Learning Group-Disentangled Representation for Interpretable...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Li, Hao Wu, Yirui Hu, Hexuan Lu, Hu Lai, Yong Wan, Shaohua Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources China College of Computer and Information Hohai University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China School of Computer Science and Communication Engineering Jiangsu University China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China China
Deep learning methods have shown significant performance in medical image analysis tasks. However, they generally act like 'black box' without explanations in both feature extraction and decision processes, le... 详细信息
来源: 评论
An Exact Potential Game-Based End-Edge-Cloud Collaborative Task Offloading Approach  19
An Exact Potential Game-Based End-Edge-Cloud Collaborative T...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Shen, Yue Liu, Bowen Dai, Fei Dou, Wanchun Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Shenzhen China Southwest Forestry University College of Big Data and Intelligent Engineering Kunming China
With the development of Industrial Internet of Things(IIoT), massive industrial devices produce a large number of delay-sensitive and computing-intensive tasks. Offloading tasks under the end-edge-cloud collaboration ... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
SGSH: Stimulate Large Language Models with Skeleton Heuristics for knowledge Base Question Generation
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Shasha Liao, Lizi Zhang, Jing Wang, Yanling Li, Cuiping Chen, Hong School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education China Singapore Management University Singapore Zhongguancun Laboratory China
knowledge base question generation (KBQG) aims to generate natural language questions from a set of triplet facts extracted from KB. Existing methods have significantly boosted the performance of KBQG via pre-trained ... 详细信息
来源: 评论
A Query Optimization Method Utilizing Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Yao, Zhiming Li, Haoyang Zhang, Jing Li, Cuiping Chen, Hong School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering MOE China Engineering Research Center of Database and Business Intelligence MOE China
Query optimization is a critical task in database systems, focused on determining the most efficient way to execute a query from an enormous set of possible strategies. Traditional approaches rely on heuristic search ... 详细信息
来源: 评论
Research on Production Condition Identification Method of Pumping Well Based on an Improved Pattern Recognition Algorithm  9
Research on Production Condition Identification Method of Pu...
收藏 引用
9th Annual International Conference on Network and Information Systems for Computers, ICNISC 2023
作者: Wu, Haili Zhang, Xiangyang Wu, Dan Li, Qun Yao, Gang Research Institute of Petroleum Exploration and Development-Northwest PetroChina Key Laboratory of Internet of Things Cnpc Petroleum and Petrochemical Research Center of National Engineering Laboratory of Big Data Collaborative Security Cnpc Lanzhou China Research Institute of Petroleum Exploration and Development-Northwest PetroChina Lanzhou China
In the process of oil and gas production, indicator diagram is an important basis for production management. Diagnosing the working condition of pumping unit based on indicator diagram can quickly grasp the working st... 详细信息
来源: 评论
Analysis on the causes of massive stranding of Yellow Sea green tide on Lianyungang and Rizhao coasts in 2022
收藏 引用
Journal of Oceanology and Limnology 2024年 第3期42卷 816-830页
作者: Lingjuan WU Juan HUANG Yi DING Guiyan LIU Shuai HUANG Song GAO Chao YUAN Jiangling XU Ping WU Rui HUANG Ruobing WEN Jie MEI North China Sea Marine Forecasting and Hazard Mitigation Center Ministry of Natural ResourcesQingdao 266061China Shandong Key Laboratory of Marine Ecological Environment and Disaster Prevention and Mitigation Qingdao 266061China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi’an 710129China East China Sea Marine Forecasting and Hazard Mitigation Center Ministry of Natural ResourcesShanghai 200136China North China Sea Ecological Center Ministry of Natural ResourcesQingdao 266033China
In 2022,Yellow Sea green tide caused by Ulva prolifera reached a historic minimum and the coastal areas of Shandong Peninsula were less ***,the largest amount of seaweed biomass has been washed ashore on Lianyungang a... 详细信息
来源: 评论
Preprocessing technology of consuming big data based on user interest with internet of location mining
收藏 引用
International Journal of Computers and Applications 2021年 第2期43卷 147-152页
作者: Dagao, Duan Yang, Gao Department of Computer Science and Information Engineering Beijing Technology and Business University Beijing China Beijing Key Laboratory of Big Data Technology for Food Safety Beijing China
The current group discovery research mainly uses the communication relationship to mine user groups and fails to make full use of the user social relationships implied in the network, so that the mining groups can not... 详细信息
来源: 评论
Explicit and Implicit Consumer Electronics Information Integration via Automatic Large Language Model Construction
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xue, Xingsi Li, Xingwang the Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou China the School of Physics and Electronic Information Engineering Henan Polytechnic University China
—Integrating diverse Consumer Electronics (CE) information is essential to enhance and optimize user experiences, but CE Information Integration (CEII) faces challenges arising from differences in entity descriptions... 详细信息
来源: 评论