咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 780 篇 软件工程
    • 488 篇 电气工程
    • 436 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 538 篇 理学
    • 280 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 109 篇 统计学(可授理学、...
    • 108 篇 系统科学
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是461-470 订阅
排序:
Video Tampering Detection Using machine learning and Deep learning  14th
Video Tampering Detection Using Machine Learning and Deep Le...
收藏 引用
12th international Advanced computing conference, IACC 2022
作者: Deo, Siddhi Mehta, Simran Jain, Digha Tiwari, Charu Thorat, Aniket Mahara, Sudhanshu Gonge, Sudhanshu Joshi, Rahul Gite, Shilpa Kotecha, Ketan Department of Computer Science and Engineering Symbiosis Institute of Technology Pune India
Digital recordings are now affordable, quick to make, and straightforward to upload on web platforms because of the widespread availability of video recording technology in smartphones and other digital devices. The t... 详细信息
来源: 评论
Comparative Analysis of Epidemic Alert System using machine learning for Dengue and Chikungunya  10
Comparative Analysis of Epidemic Alert System using Machine ...
收藏 引用
10th international conference on Cloud computing, Data Science and Engineering (Confluence)
作者: Dhaka, Aahhas Singh, Prabhishek Amity Univ Uttar Pradesh Amity Sch Engn & Technol Dept CSE Noida India
The Rapid spread of a disease is known as an epidemic. The catastrophe brought by an epidemic not only effects the people of an area, hut also brings about a lot of distress in every sector of social strata. An epidem... 详细信息
来源: 评论
machine learning-Based Profiling Attack Method in RSA Prime Multiplication
Machine Learning-Based Profiling Attack Method in RSA Prime ...
收藏 引用
2020 ACM international conference on Intelligent computing and its Emerging Applications, ICEA 2020
作者: Park, Han-Byeol Sim, Bo-Yeon Han, Dong-Guk Dept. of Financial Information Security Kookmin University Korea Republic of Dept. of Mathematics Kookmin University Korea Republic of Dept. of Information Security Cryptology and Mathematics Kookmin University Korea Republic of
In this paper, we propose a machine learning-based profiling attack on the prime multiplication operation of RSA's key generation algorithm. The proposed attack takes advantage of the fact that a prime word value,... 详细信息
来源: 评论
ParSecureML: An Efficient Parallel Secure machine learning Framework on GPUs  20
ParSecureML: An Efficient Parallel Secure Machine Learning F...
收藏 引用
49th international conference on Parallel Processing (ICPP)
作者: Chen, Zheng Zhang, Feng Zhou, Amelie Chi Zhai, Jidong Zhang, Chenyang Du, Xiaoyong Renmin Univ China Key Lab Data Engn & Knowledge Engn MOE Beijing Peoples R China Renmin Univ China Sch Informat Beijing Peoples R China Shenzhen Univ Guangdong Prov Engn Ctr China made High Performan Shenzhen Peoples R China Tsinghua Univ Dept Comp Sci & Technol BNRist Beijing Peoples R China
machine learning has been widely used in our daily lives. Large amounts of data have been continuously produced and transmitted to the cloud for model training and data processing, which raises a problem: how to prese... 详细信息
来源: 评论
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning  7
LSTM-based Network Attack Detection: Performance Comparison ...
收藏 引用
7th IEEE international conference on Cyber Security and Cloud computing (CSCloud) / 6th IEEE international conference on Edge computing and Scalable Cloud (EdgeCom)
作者: Hossain, Md Delwar Ochiai, Hideya Fall, Doudou Kadobayashi, Youki Nara Inst Sci & Technol Div Informat Sci Ikoma Nara Japan Univ Tokyo Grad Sch Info Sci & Tech Tokyo Japan
Network attacks have been around since the beginning of the Internet and they are still relevant due to the numerous attempts of independent hackers, cybercrime organizations and state-sponsored hacking squads to intr... 详细信息
来源: 评论
Application of Quantum Generative Adversarial learning in Quantum Image Processing  2
Application of Quantum Generative Adversarial Learning in Qu...
收藏 引用
2nd international conference on Information Technology and Computer Application, ITCA 2020
作者: Ren, Wanghao Li, Zhiming Li, Hailing Li, Yang Zhang, Chunwei Fu, Xiaoqian University of Jinan School of Information Science and Engineering Jinan250022 China Shandong College of Electronic Technology Jinan250022 China
Quantum machine learning is a hot topic in the quantum community recently. The combination of quantum machine learning and image processing is also one of the researchers' concerns. With the promotion of deep lear... 详细信息
来源: 评论
A Deep learning Framework for Stock Prediction Using LSTM  1
收藏 引用
international conference on Decision Economics, DECON 2019
作者: Lin, Yaohu Liu, Shancun Yang, Haijun Wu, Harris School of Economics and Management Beihang University Beijing China Key Laboratory of Complex System Analysis Management and Decision Beihang University Ministry of Education Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China Strome College of Business Old Dominion University NorfolkVA United States
In order to test the predictive power of the deep learning model, several machine learning methods were introduced for comparison. Empirical case results for the period of 2000 to 2017 show the forecasting power of de... 详细信息
来源: 评论
A User-Centered Active learning Approach for Appliance Recognition  6
A User-Centered Active Learning Approach for Appliance Recog...
收藏 引用
6th IEEE international conference on Smart computing (SMARTCOMP)
作者: Shin, Eura Khamesi, Atieh R. Bahr, Zachary Silvestri, Simone Baker, D. A. Univ Kentucky Dept Comp Sci Lexington KY 40506 USA Missouri Univ Sci & Technol Dept Psychol Sci Rolla MO 65409 USA
Smart homes offer new possibilities for energy management. One key enabler of these systems is the ability to monitor energy consumption at the appliance level. Existing approaches rely mainly on data from aggregated ... 详细信息
来源: 评论
Deep and shallow feature fusion and recognition of recording devices based on attention mechanism  12th
Deep and shallow feature fusion and recognition of recording...
收藏 引用
12th international conference on Intelligent Networking and Collaborative Systems, INCoS 2020
作者: Zeng, Chunyan Zhu, Dongliang Wang, Zhifeng Yang, Yao Hubei Key Laboratory for High-Efficiency Utilization of Solar Energy and Operation Control of Energy Storage System Hubei University of Technology WuhanHubei430068 China Department of Digital Media Technology Central China Normal University WuhanHubei430079 China
In the device source identification task, there is a lot of redundant information in the traditional MFCC, GSV and i-vector features, which affects the accuracy of device source identification. In this paper, in order... 详细信息
来源: 评论
Improving deep learning performance with missing values via deletion and compensation
收藏 引用
NEURAL computing & APPLICATIONS 2020年 第17期32卷 13233-13244页
作者: Sanchez-Morales, Adrian Sancho-Gomez, Jose-Luis Martinez-Garcia, Juan-Antonio Figueiras-Vidal, Anibal R. Univ Politecn Cartagena Dept Tecnol Informac & Comunicac Plaza Hosp1 Edificio Cuartel Antigones Murcia 30202 Spain Univ Carlos III Madrid Dept Teoria Senal & Comunicac Avda Univ 30 Madrid 28911 Spain
Missing values in a dataset is one of the most common difficulties in real applications. Many different techniques based on machine learning have been proposed in the literature to face this problem. In this work, the... 详细信息
来源: 评论