咨询与建议

限定检索结果

文献类型

  • 68,035 篇 会议
  • 418 篇 期刊文献
  • 205 册 图书

馆藏范围

  • 68,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,345 篇 工学
    • 31,346 篇 计算机科学与技术...
    • 26,655 篇 软件工程
    • 11,916 篇 信息与通信工程
    • 9,712 篇 控制科学与工程
    • 7,420 篇 生物工程
    • 6,370 篇 电气工程
    • 4,603 篇 生物医学工程(可授...
    • 3,990 篇 电子科学与技术(可...
    • 3,706 篇 机械工程
    • 3,631 篇 光学工程
    • 3,232 篇 动力工程及工程热...
    • 3,159 篇 网络空间安全
    • 2,671 篇 安全科学与工程
    • 2,657 篇 交通运输工程
    • 2,277 篇 化学工程与技术
    • 2,077 篇 仪器科学与技术
  • 21,486 篇 理学
    • 10,260 篇 数学
    • 7,801 篇 生物学
    • 5,408 篇 物理学
    • 3,621 篇 统计学(可授理学、...
    • 2,661 篇 化学
    • 2,021 篇 系统科学
  • 12,162 篇 管理学
    • 7,022 篇 管理科学与工程(可...
    • 5,963 篇 图书情报与档案管...
    • 3,672 篇 工商管理
  • 4,417 篇 医学
    • 3,716 篇 临床医学
    • 3,614 篇 基础医学(可授医学...
    • 2,538 篇 药学(可授医学、理...
    • 2,022 篇 公共卫生与预防医...
  • 2,804 篇 法学
    • 2,250 篇 社会学
  • 1,635 篇 经济学
  • 1,369 篇 农学
  • 1,136 篇 教育学
  • 405 篇 文学
  • 148 篇 军事学
  • 12 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 1,726 篇 deep learning
  • 1,308 篇 machine learning
  • 1,021 篇 internet of thin...
  • 696 篇 support vector m...
  • 686 篇 feature extracti...
  • 675 篇 blockchain
  • 674 篇 computer vision
  • 659 篇 object detection
  • 555 篇 convolutional ne...
  • 522 篇 forecasting
  • 483 篇 training
  • 435 篇 computational mo...
  • 405 篇 artificial intel...
  • 399 篇 covid-19
  • 383 篇 reinforcement le...
  • 337 篇 long short-term ...
  • 317 篇 predictive model...
  • 308 篇 automation
  • 280 篇 big data
  • 279 篇 convolution

机构

  • 506 篇 chitkara univers...
  • 242 篇 school of comput...
  • 201 篇 university of sc...
  • 183 篇 school of automa...
  • 165 篇 computer science...
  • 142 篇 maharishi school...
  • 129 篇 the islamic univ...
  • 115 篇 computer science...
  • 99 篇 karnataka bangal...
  • 92 篇 school of comput...
  • 87 篇 university of el...
  • 86 篇 huazhong univers...
  • 82 篇 department of co...
  • 80 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 university of ch...
  • 76 篇 institute of art...
  • 75 篇 school of comput...
  • 75 篇 medical technica...
  • 74 篇 computer technol...

作者

  • 64 篇 shiva mehta
  • 58 篇 vinay kukreja
  • 54 篇 li yang
  • 48 篇 kukreja vinay
  • 45 篇 sharma vikrant
  • 44 篇 sharma neha
  • 42 篇 wang lei
  • 42 篇 deepak gerard
  • 40 篇 calvo d.
  • 40 篇 wang jing
  • 39 篇 li peng
  • 39 篇 zhang lei
  • 39 篇 rakesh kumar
  • 38 篇 ferrara g.
  • 38 篇 ardid m.
  • 38 篇 gagliardini s.
  • 36 篇 zhang tao
  • 35 篇 vishal jain
  • 34 篇 chen a.
  • 34 篇 benoit d.m.

语言

  • 67,100 篇 英文
  • 1,534 篇 其他
  • 386 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2023 International Conference on Computer Science and Automation Technology, CSAT 2023"
68658 条 记 录,以下是391-400 订阅
排序:
Efficient and Privacy-Preserving Ranking-Based Federated Learning  24th
Efficient and Privacy-Preserving Ranking-Based Federated Le...
收藏 引用
24th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Liu, Tao Ren, Xuhao Wang, Yajie Wu, Huishu Zhang, Chuan China Academy of Information and Communications Technology Beijing100081 China Beijing Institute of Technology Beijing100081 China China University of Political Science and Law Beijing100081 China
Recently, a lot of works have proposed privacy-preserving schemes to address the privacy issues in federated learning (FL). However, FL also faces the challenge of high communication overhead due to limited client res... 详细信息
来源: 评论
Numerical Analysis of Optimal Control of Assets and Liabilities by a Bank  4th
Numerical Analysis of Optimal Control of Assets and Liabi...
收藏 引用
4th international conference on Numerical Computations: Theory and Algorithms, NUMTA 2023
作者: Zhukova, Aleksandra Flerova, Anna Chernov, Alexey Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences Vavilov str 44 bld. 2 Moscow Russia Moscow Institute of Physics and Technology Institutki per. 9 Dolgoprudny141701 Russia
The formal description of the assets and liabilities management (ALM) by a bank within regulatory requirements leads to an optimal control problem with phase constraints. The phase constraints arise from the restricti... 详细信息
来源: 评论
Distance-Adaptive Quaternion Knowledge Graph Embedding with Bidirectional Rotation  31
Distance-Adaptive Quaternion Knowledge Graph Embedding with ...
收藏 引用
31st international conference on Computational Linguistics, COLING 2025
作者: Wang, Weihua Liang, Qiuyu Bao, Feilong Gao, Guanglai College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Inner Mongolia Key Laboratory of Multilingual Artificial Intelligence Technology Hohhot China
Quaternion contains one real part and three imaginary parts, which provided a more expressive hypercomplex space for learning knowledge graph. Existing quaternion embedding models measure the plausibility of a triplet... 详细信息
来源: 评论
Digital Human Techniques for Education Reform  24
Digital Human Techniques for Education Reform
收藏 引用
7th international conference on Educational technology Management, ICETM 2024
作者: Guo, Peirong Zhang, Qi Tian, Chunwei Xue, Wanli Feng, Xiaocheng School of Software Northwestern Polytechnical University Shaanxi Xi’an China School of Economics and Management Harbin Institute of Technology at Weihai Shandong Weihai China Shenzhen Research Institute of Northwestern Polytechnical University Northwestern Polytechnical University Guangdong Shenzhen China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology Heilongjiang Harbin China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Guangdong Shenzhen China
The rapid evolution of artificial intelligence, big data, and generative AI models has ushered in significant transformations across various sectors, including education. Digital Human Technique, an innovative technol... 详细信息
来源: 评论
SafeHome: automation and Security System Using Internet of Things with Mobile Application  5
SafeHome: Automation and Security System Using Internet of T...
收藏 引用
5th international conference on Advanced Research in Computing, ICARC 2025
作者: Abas, Patricia A. Reyes, Bryll Christopher O. Serquina, Jazzy Niega, Juliet O. Medina, Oliver A. National University - Philippines Department of Computer Engineering Calamba City Philippines
The rapid advancements in Internet of Things (IoT) technology have transformed home automation and security, addressing the demand for convenience, comfort, and energy efficiency. Despite global market growth, barrier... 详细信息
来源: 评论
Blockchain-Based Anomaly Detection and Intrusion Prevention in IoT Networks  8th
Blockchain-Based Anomaly Detection and Intrusion Prevention ...
收藏 引用
8th international conference on Internet of Things and Connected Technologies, ICIoTCT 2023
作者: Ganesh Kumar, G. Kanakaprabha, S. Venu Gopal, Gaddam Shaik, Riaz Senthil Kumar, T. Udhaya Kumar, T. Department of Information Technology Hindusthan Institute of Technology Tamilnadu Coimbatore641032 India Department of Computer Science and Engineering Rathinam Technical Campus Anna University Coimbatore India B V Raju Institute of Technology Telangana Narsapur Medak502313 India Department of Internet of Things KL Deemed to be University Vijayawada India Department of Information Technology Hindusthan Institute of Technology Tamilnadu Coimbatore India Department of Computer Science and Engineering Hindusthan Institute of Technology Coimbatore India
The increasing adoption of IoT devices has raised significant concerns about security and privacy. This paper proposes a blockchain-based approach for anomaly detection and intrusion prevention in IoT networks. The me... 详细信息
来源: 评论
Retrieval-Augmented Generation for Large Language Model based Few-shot Chinese Spell Checking  31
Retrieval-Augmented Generation for Large Language Model base...
收藏 引用
31st international conference on Computational Linguistics, COLING 2025
作者: Dong, Ming Cheng, Zhiwei Luo, Changyin He, Tingting Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning China National Language Resources Monitoring Research Center for Network Media China School of Computer Central China Normal University Wuhan China
Large language models (LLMs) are naturally suitable for Chinese spelling check (CSC) task in few-shot scenarios due to their powerful semantic understanding and few-shot learning capabilities. Recent CSC research has ... 详细信息
来源: 评论
Forecasting Influenza-like Illness in Compulsory Education Schools in Macau Using Google Search Queries and Machine Learning Models  24
Forecasting Influenza-like Illness in Compulsory Education S...
收藏 引用
13th international conference on Bioinformatics and Biomedical science, ICBBS 2024
作者: Chen, Ying Luo, Jinsong Liang, Deyi Xie, Yewei Zhou, Yi Wu, Dan Cheng, Weibin Tang, Weiming Jing, Fengshi Faculty of Data Science City University of Macau China School of Automation Central South University Hunan Changsha China Institute for Hospital Management Tsinghua University Guangdong Shenzhen China Guangdong Women and Children's Hospital Guangdong Guangzhou China Programme in Health Services and Systems Research Duke-NUS Medical School Singapore Singapore Singapore Zhuhai Center for Disease Control and Prevention Guangdong Zhuhai China School of Public Health Nanjing Medical University Jiangsu Nanjing China School of Data Science City University of Hong Kong Hong Kong Hong Kong Guangdong Second Provincial General Hospital Guangdong Guangzhou China School of Medicine University of North Carolina at Chapel Hill Chapel HillNC United States
This study investigates the predictive utility of Google search queries for forecasting influenza-like illness (ILI) in compulsory education schools in Macau. The increasing availability of online data offers a novel ... 详细信息
来源: 评论
Heart Disease Identification Using Ensemble Learning and Deep Learning  3rd
Heart Disease Identification Using Ensemble Learning and Dee...
收藏 引用
3rd international conference on Intelligent Systems and Sustainable Computing, ICISSC 2023
作者: Siruvoru, Vahini Nampally, Vijay Kumar Thati, Deepak Devanaboyina, Sai Abhinav Sanagala, Sai Dheeraj Reddy Department of Computer Science and Business System B V Raju Institute of Technology Telangana Medak Narsapur India
technology in the field of health care has been constantly enhanced incorporating machine learning and various other technologies for clinical decision support systems or computer-aided healthcare systems which assist... 详细信息
来源: 评论
A Whale Falls, All Thrive: Mitigating Attention Gap to Improve Adversarial Transferability  27th
A Whale Falls, All Thrive: Mitigating Attention Gap to Impro...
收藏 引用
27th international conference on Pattern Recognition, ICPR 2024
作者: Wan, Qiang Chen, Biwei Peng, Anjie Zeng, Hui Southwest University of Science and Technology Mianyang China Beijing Normal University Zhuhai China
Deep neural networks (DNNs) are deemed vulnerable to adversarial examples (AEs). Transfer-based attacks enable attackers to craft adversarial images based on local surrogate models without feedback from remote ones. O... 详细信息
来源: 评论