咨询与建议

限定检索结果

文献类型

  • 628 篇 期刊文献
  • 596 篇 会议

馆藏范围

  • 1,224 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 868 篇 工学
    • 688 篇 计算机科学与技术...
    • 603 篇 软件工程
    • 185 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 88 篇 生物工程
    • 73 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 55 篇 化学工程与技术
    • 54 篇 电子科学与技术(可...
    • 53 篇 电气工程
    • 46 篇 光学工程
    • 27 篇 仪器科学与技术
    • 24 篇 交通运输工程
    • 22 篇 土木工程
    • 22 篇 航空宇航科学与技...
    • 17 篇 建筑学
    • 17 篇 网络空间安全
  • 480 篇 理学
    • 342 篇 数学
    • 105 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 化学
    • 34 篇 系统科学
  • 293 篇 管理学
    • 156 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 46 篇 工商管理
  • 49 篇 医学
    • 41 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 18 篇 法学
    • 15 篇 社会学
  • 8 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 knowledge engine...
  • 53 篇 laboratories
  • 50 篇 educational tech...
  • 42 篇 data mining
  • 28 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 22 篇 image segmentati...
  • 22 篇 feature extracti...
  • 19 篇 deep learning
  • 16 篇 reinforcement le...
  • 16 篇 genetic algorith...
  • 15 篇 clustering algor...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 topology
  • 13 篇 support vector m...
  • 12 篇 neural networks

机构

  • 514 篇 college of compu...
  • 280 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 46 篇 college of softw...
  • 41 篇 key laboratory o...
  • 40 篇 school of artifi...
  • 35 篇 key laboratory o...
  • 30 篇 college of compu...
  • 29 篇 key laboratory o...
  • 27 篇 jilin university...
  • 21 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 17 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 47 篇 yang bo
  • 36 篇 sun geng
  • 36 篇 liang yanchun
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 30 篇 li xiongfei
  • 28 篇 ouyang jihong
  • 27 篇 liu dayou
  • 27 篇 zuo wanli
  • 27 篇 li ximing
  • 26 篇 yanchun liang
  • 24 篇 bo yang
  • 24 篇 liu yanheng
  • 23 篇 niyato dusit
  • 23 篇 yanheng liu
  • 22 篇 chen haipeng
  • 22 篇 li jiahui
  • 20 篇 da-you liu
  • 19 篇 chang yi
  • 19 篇 guan renchu

语言

  • 1,130 篇 英文
  • 50 篇 中文
  • 44 篇 其他
检索条件"机构=The Key Laboratory of Symbolic Computation and Knowledge Engineering"
1224 条 记 录,以下是1-10 订阅
排序:
Bayesian Network Reconstruction and Iterative Divergence Problem Solving Method Based on Norm Minimization
收藏 引用
Computer Modeling in engineering & Sciences 2025年 第4期143卷 617-637页
作者: Kuo Li Aimin Wang Limin Wang Yuetan Zhao Xinyu Zhu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun130012China College of Software Jilin UniversityChangchun130012China
A Bayesian network reconstruction method based on norm minimization is proposed to address the sparsity and iterative divergence issues in network reconstruction caused by noise and missing *** method achieves precise... 详细信息
来源: 评论
Face Reconstruction-Based Generalized Deepfake Detection Model with Residual Outlook Attention
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2025年 第4期21卷 1-19页
作者: Shi, Zenan Liu, Wenyu Chen, Haipeng College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
With the continuous development of deep counterfeiting technology, the information security in our daily life is under serious threat. While existing face forgery detection methods exhibit impressive accuracy when app... 详细信息
来源: 评论
A level set model with shape prior constraint for intervertebral disc MRI image segmentation
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 6755-6783页
作者: Tian, Zhuangzhou Wang, Shengsheng College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China
Accurate intervertebral disc image segmentation is necessary for further treatment. However, existing methods are difficult to segment due to the intensity inhomogeneity of intervertebral disc MRI images and the simil... 详细信息
来源: 评论
A multi-strategy enhanced circle search algorithm based on adaptive evolutionary framework and its application in image segmentation
收藏 引用
Cluster Computing 2025年 第5期28卷 1-46页
作者: Wang, Wei Lu, Yinan Wang, Shengsheng College of Computer Science and Technology Jilin University Jilin Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Jilin Changchun130012 China
Circle search algorithm (CSA) is a meta-heuristic optimization algorithm based on the characteristics of circle geometry. In order to overcome the shortcomings of the original CSA in the optimization process, such as ... 详细信息
来源: 评论
PBCounter:weighted model counting on pseudo-boolean formulas
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 55-63页
作者: Yong LAI Zhenghang XU Minghao YIN College of Computer Science and Technology Jilin UniversityChangchun 130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun 130012China School of Computer Science and Information Technology Northeast Normal UniversityChangchun 130017China
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **... 详细信息
来源: 评论
Auxiliary Tasks Benefit Skeleton-based Action Recognition
Auxiliary Tasks Benefit Skeleton-based Action Recognition
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yang, Yuheng Chen, Haipeng College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China
Skeleton-based action recognition has long been a fundamental and intriguing problem in machine intelligence. This task is challenging due to pose occlusion and rapid motion, which typically results in incomplete or n... 详细信息
来源: 评论
Enhanced Secure Beamforming for IRS-Assisted IoT Communication Using a Generative Diffusion Model-enabled Optimization Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13398-13414页
作者: Zhang, Jing Liu, Zheng Feng, Xin Yang, Hongwei Liang, Shuang Changchun University of Science and Technology College of Computer Science and Technology Changchun130022 China Northeast Normal University School of Information Science and Technology Changchun130117 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China
The spatial correlation between the main and eavesdropping channels impacts the effectiveness of beamforming technology in securing the IoT communication system. This study proposes an IRS-assisted secure beamforming ... 详细信息
来源: 评论
Dual AAV Cluster-Assisted Maritime Physical-Layer Secure Communications via Collaborative Beamforming
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12589-12607页
作者: Huang, Jiawei Wang, Aimin Sun, Geng Li, Jiahui Wang, Jiacheng Du, Hongyang Niyato, Dusit Jilin University College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore The University of Hong Kong Department of Electrical and Electronic Engineering Hong Kong
Autonomous aerial vehicles (AAVs) can be utilized as relay platforms to assist maritime wireless communications. However, complex channels and multipath effects at sea can adversely affect the quality of AAV transmitt... 详细信息
来源: 评论
Transformer-based multi-level attention integration network for video saliency prediction
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11833-11854页
作者: Tan, Rui Sun, Minghui Liang, Yanhua Software College Jilin University Qianjin Street Jilin Changchun130012 China College of Computer Science and Technology Jilin University Qianjin Street Jilin Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Qianjin Street Jilin Changchun130012 China
Most existing models for video saliency prediction heavily rely on 3D convolutional operations to extract spatio-temporal features. However, it is worth noting that 3D convolution produces a local receptive field, whi... 详细信息
来源: 评论
ETFIDS: An Entropy-Driven, Time-Frequency Analysis Framework for In-Vehicle CAN Signal Intrusion Detection
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Wanning Qin, Guihe Liang, Yanhua Song, Jiaru Liu, Qingxin Zhou, Xue Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Changchun130012 China
In recent years, cyberattacks against automobiles have exposed significant security threats to in-vehicle networks. The vulnerability of communication signals to malicious interference and manipulation can lead to ser... 详细信息
来源: 评论