咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是321-330 订阅
排序:
A Comparison of Model Confidence Metrics on Visual Manufacturing Quality Data  1
收藏 引用
international conference on Computer Vision and machine Intelligence, CVMI 2022
作者: Mascha, Philipp University of Augsburg Universitätsstraße 2 Augsburg86159 Germany
After ground-breaking achievements through the application of modern deep learning, there is a considerable push towards using machine learning systems for visual inspection tasks part of most industrial manufacturing... 详细信息
来源: 评论
Task-oriented Approach to Guide Visually Impaired People During Smart Device Usage
Task-oriented Approach to Guide Visually Impaired People Dur...
收藏 引用
IEEE international conference on Big Data and Smart computing (BigComp)
作者: Akkapusit, Peerapon Ko, In-Young Korea Adv Inst Sci & Technol Sch Comp Daejeon South Korea
Visually impaired persons often experience limited user accessibility regarding smart devices. Particularly, it is challenging for such persons to precisely touch a button or icon to operate smart devices. Existing st... 详细信息
来源: 评论
Analysis of Boosting Mechanisms in Cloud-based Intrusion Detection Systems
Analysis of Boosting Mechanisms in Cloud-based Intrusion Det...
收藏 引用
international conference on Contemporary computing and Informatics (IC3I)
作者: Mohd Zuhair Pronaya Bhattacharya Vivek Kumar Prasad Manav Barot Monil Modi CSE Department Institute of Technology Nirma University Ahmedabad India Department of CSE Amity School of Engineering and Technology Amity University Kolkata India
In modern cloud ecosystems, cloud users request service sets for software, platform, and infrastructures. Due to open channels (Internet), cloud networks become soft targets for malicious intruders. Recent literature ... 详细信息
来源: 评论
Privacy Threats and Countermeasures in Federated learning for Internet of Things: A Systematic Review
Privacy Threats and Countermeasures in Federated Learning fo...
收藏 引用
IEEE/ACM Int'l conference on & Int'l conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Adel ElZemity Budi Arief School of Computing University of Kent Canterbury United Kingdom
Federated learning (FL) in the Internet of Things (IoT) environments can enhance machine learning by utilising decentralised data, but at the same time, it might introduce significant privacy and security concerns due... 详细信息
来源: 评论
TEA-Fed: Time-Efficient Asynchronous Federated learning for Edge computing  21
TEA-Fed: Time-Efficient Asynchronous Federated Learning for ...
收藏 引用
18th ACM international conference on computing Frontiers (CF)
作者: Zhou, Chendi Tian, Hao Zhang, Hong Zhang, Jin Dong, Mianxiong Jia, Juncheng Soochow Univ Suzhou Jiangsu Peoples R China Southern Univ Sci & Technol Shenzhen Guangdong Peoples R China Muroran Inst Technol Muroran Hokkaido Japan
Federated learning (FL) has attracted more and more attention recently. The integration of FL and edge computing makes the edge system more efficient and intelligent. FL usually uses the server to actively select cert... 详细信息
来源: 评论
Novel soft Sensor Model based on Spatio-Temporal Attention
Novel Soft Sensor Model based on Spatio-Temporal Attention
收藏 引用
international Joint conference on Neural Networks (IJCNN)
作者: Hu, Xuan Geng, Zhiqiang Han, Yongming Huang, Wei Chen, Kai Xie, Feng Guizhou Prov Key Lab Publ Big Data Guiyang 550025 Peoples R China Beijing Univ Chem Technol Coll Informat Sci Technol Beijing Peoples R China
Industrial process data is usually time series data collected by sensors with high non-linearity, dynamics and high noise. Many existing soft sensor models usually focus on the temporal features of industrial process ... 详细信息
来源: 评论
Optimizing Instance Selection Strategies in Interactive machine learning: An Application to Fraud Detection  1
收藏 引用
20th international conference on Hybrid Intelligent Systems, HIS 2020 and 12th World Congress on Nature and Biologically Inspired computing, NaBIC 2020
作者: Carneiro, Davide Guimarães, Miguel Sousa, Miguel CIICESI Escola Superior de Tecnologia e Gestão Instituto Politécnico do Porto Felgueiras Portugal
machine learning systems are generally thought of as fully automatic. However, in recent years, interactive systems in which Human experts actively contribute towards the learning process have shown improved performan... 详细信息
来源: 评论
A Network Malicious Traffic Detection Method Based on Semi-Supervised Deep learning
A Network Malicious Traffic Detection Method Based on Semi-S...
收藏 引用
2021 IEEE international conference on Signal Processing, Communications and computing, ICSPCC 2021
作者: Lu, Wanzhi Ding, Yaojun Gansu University of Political Science and Law School of Cyberspace Security Lanzhou730070 China
As an effective means of network security protection, the key technology of network malicious traffic detection was to accurately identify various attacks in the network. Although many supervised learning and unsuperv... 详细信息
来源: 评论
Analysis and Application of Multispectral Data for Water Segmentation Using machine learning
Analysis and Application of Multispectral Data for Water ...
收藏 引用
international conference on Computer Vision and machine Intelligence, CVMI 2022
作者: Gupta, Shubham Uma, D. Hebbar, R. PES University KA Bangaluru560085 India Regional Remote Sensing Centre–South ISRO KA Bengaluru560037 India
Monitoring water is a complex task due to its dynamic nature, added pollutants, and land build-up. The availability of high-resolution data by Sentinel-2 multispectral products makes implementing remote sensing applic... 详细信息
来源: 评论
Strengthening IDS against Evasion Attacks with GAN-based Adversarial Samples in SDN-enabled network  15
Strengthening IDS against Evasion Attacks with GAN-based Adv...
收藏 引用
15th RIVF international conference on computing and Communication Technologies (RIVF)
作者: Cao Phan Xuan Qui Dang Hong Quang Phan The Duy Do Thi Thu Hien Van-Hau Pham Univ Informat Technol Informat Secur Lab Hochiminh City Vietnam Vietnam Natl Univ Ho Chi Minh City Hochiminh City Vietnam
With the spread of the number of smart devices in the context of Smart City, software Defined Networking (SDN) is considered as a vital principle to manage a large-scale heterogeneous network within centralized contro... 详细信息
来源: 评论