咨询与建议

限定检索结果

文献类型

  • 3,204 篇 会议
  • 19 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 3,233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,933 篇 工学
    • 1,731 篇 计算机科学与技术...
    • 1,587 篇 软件工程
    • 421 篇 信息与通信工程
    • 321 篇 控制科学与工程
    • 318 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 172 篇 电气工程
    • 144 篇 机械工程
    • 115 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 94 篇 安全科学与工程
    • 92 篇 化学工程与技术
    • 91 篇 动力工程及工程热...
    • 79 篇 网络空间安全
  • 891 篇 理学
    • 497 篇 数学
    • 336 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 158 篇 物理学
    • 154 篇 系统科学
    • 84 篇 化学
  • 500 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 185 篇 医学
    • 158 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 133 篇 法学
    • 90 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 78 篇 农学
    • 75 篇 作物学
  • 66 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 493 篇 machine learning
  • 103 篇 deep learning
  • 86 篇 software
  • 62 篇 machine learning...
  • 59 篇 support vector m...
  • 52 篇 internet of thin...
  • 49 篇 decision trees
  • 48 篇 artificial intel...
  • 47 篇 forecasting
  • 44 篇 software enginee...
  • 40 篇 training
  • 39 篇 predictive model...
  • 36 篇 feature extracti...
  • 35 篇 neural networks
  • 33 篇 software testing
  • 31 篇 software algorit...
  • 26 篇 reinforcement le...
  • 26 篇 adversarial mach...
  • 25 篇 covid-19
  • 25 篇 object detection

机构

  • 31 篇 college of compu...
  • 31 篇 chitkara univers...
  • 12 篇 karnataka bangal...
  • 12 篇 school of inform...
  • 11 篇 software enginee...
  • 11 篇 department of so...
  • 10 篇 department of so...
  • 10 篇 school of comput...
  • 9 篇 maharishi school...
  • 8 篇 maharishi school...
  • 7 篇 maharishi school...
  • 7 篇 school of comput...
  • 7 篇 daffodil interna...
  • 7 篇 department of co...
  • 7 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 department of so...

作者

  • 8 篇 patidar sanjay
  • 7 篇 liu han
  • 7 篇 han liu
  • 6 篇 alfurhood badria...
  • 6 篇 ishu sharma
  • 6 篇 sharma ishu
  • 6 篇 badria sulaiman ...
  • 5 篇 bitto abu kowshi...
  • 5 篇 dharshana kasthu...
  • 5 篇 ali raja hashim
  • 5 篇 yibeltal assefa
  • 5 篇 assefa yibeltal
  • 5 篇 ajmeera kiran
  • 5 篇 raja hashim ali
  • 5 篇 sethia divyashik...
  • 4 篇 heyn hans-martin
  • 4 篇 krishna aneesh
  • 4 篇 william p.
  • 4 篇 iqbal muhammad w...
  • 4 篇 zain ul abideen

语言

  • 1,910 篇 英文
  • 1,322 篇 其他
  • 53 篇 中文
  • 1 篇 德文
检索条件"任意字段=2023 International Conference on Software Engineering and Machine Learning, CONF-SEML 2023"
3233 条 记 录,以下是3181-3190 订阅
排序:
Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model  15th
Reducing False Positives in Intrusion Detection System Alert...
收藏 引用
15th EAI international conference on Digital Forensics and Cyber Crime, ICDF2C 2024
作者: Hadi, Hassan Jalil Cao, Yue Hussain, Faisal Bashir Ahamad, Naveed Alshara, Mohammed Ali Ullah, Insaf Javed, Yasir He, Yinglong Jamil, Abdul Majid School of Cyber Science and Engineering Wuhan University Wuhan China Department of Computer Science Bahria University Islamabad Pakistan College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Institute for Analytics and Data Science University of Essex ColchesterCO4 3SQ United Kingdom University of Surrey Guildford United Kingdom
Network security involves safeguarding and preventing unauthorized access to networks through various methodologies, including access control, firewalls, and intrusion detection and prevention systems (IDS/IPS). Despi... 详细信息
来源: 评论
SAMRS: scaling-up remote sensing segmentation dataset with segment anything model  23
SAMRS: scaling-up remote sensing segmentation dataset with s...
收藏 引用
Proceedings of the 37th international conference on Neural Information Processing Systems
作者: Di Wang Jing Zhang Bo Du Minqiang Xu Lin Liu Dacheng Tao Liangpei Zhang School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Computer Science Faculty of Engineering The University of Sydney Australia National Engineering Research Center of Speech and Language Information Processing China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University China
The success of the Segment Anything Model (SAM) demonstrates the significance of data-centric machine learning. However, due to the difficulties and high costs associated with annotating Remote Sensing (RS) images, a ...
来源: 评论
Reservoir Flood Prediction Service Based on Seq2seq Model  17th
Reservoir Flood Prediction Service Based on Seq2seq Model
收藏 引用
CCF 17th international conference on Service Science, CCF ICSS 2024
作者: Liu, Lincong Liu, Shijun Pan, Li School of Software Engineering Shandong University Jinan China
Reliable reservoir flood prediction model is an indispensable part to improve the digital construction of small and medium-sized reservoirs. Flood flow, as one of the important bases for measuring flood prediction, it... 详细信息
来源: 评论
MMF-DRL: Multimodal Fusion-Deep Reinforcement learning Approach with Domain-Specific Features for Classifying Time Series Data  23
MMF-DRL: Multimodal Fusion-Deep Reinforcement Learning Appro...
收藏 引用
Proceedings of the 33rd Annual international conference on Computer Science and software engineering
作者: Sharma Asmita Lakhanpal Pranshul Litoiu Marin Sergio Lauren E. Mukhopadhyay Sumona California Polytechnic State University San Luis Obispo California USA Lassonde School of Engineering York University Toronto Ontario Canada Faculty of Health York University Toronto Ontario Canada
In this work, we try to address the two challenging problems in machine learning (ML) which are: (a) the need for large amounts of labeled images for training supervised classifiers and (b) the supervised classificati... 详细信息
来源: 评论
Utilizing Digital Twin Simulation Technologies to Build ICS Cyber Ranges  2nd
Utilizing Digital Twin Simulation Technologies to Build ICS ...
收藏 引用
2nd international conference on Network Simulation and Evaluation, NSE 2023
作者: Zhou, Haifeng Li, Mohan Sun, Yanbin Cyberspace Institute of Advanced Technology GuangzhouUniversity Guangzhou China Guangdong Key Laboratory of Industrial Control System Security Guangzhou China
With the integration of IT and OT, cyberattacks against ICS have been on the rise recently, and more and more advanced methods are resorted to by attackers to break down the physical system. To do further research in ... 详细信息
来源: 评论
Paraphrase Detection in Indian Languages Using Deep learning  1st
Paraphrase Detection in Indian Languages Using Deep Learnin...
收藏 引用
1st international conference on Speech and Language Technologies for Low-resource Languages, SPELLL 2022
作者: Thenmozhi, Durairaj Mahibha, C. Jerin Kayalvizhi, S. Rakesh, M. Vivek, Y. Poojesshwaran, V. Sri Sivasubramaniya Nadar College of Engineering Kalavakkam India Meenakshi Sundararajan Engineering College Chennai India
Multiple sentences that reveal the same meaning are considered to be paraphrases. Paraphrases restate a given text, passage or statement using different words in which the original context and the meaning are kept int... 详细信息
来源: 评论
Malware Detection in URL Using machine learning Approach  14th
Malware Detection in URL Using Machine Learning Approach
收藏 引用
12th international Advanced Computing conference, IACC 2022
作者: Kumar, Rajesh Talwar, Rachit Sharma, Manik Kumari, Suchi Goel, Shivani Malhotra, Kanika Ahmed, Faiz College of Engineering and Design Alliance University Bangalore Bengaluru India Department of CSE Bharati Vidyapeeth’s College of Engineering New Delhi India School of Computer Science Engineering and Technology Bennett University Greater Noida India
The most common technique to host fraudulent or harmful content, such as spam, malicious ads, etc., is using a Uniform Resource Locator (URL). Malicious URLs hold harmful contents that cause loss of information, malwa... 详细信息
来源: 评论
Development and Initial Validation of Two Simulation Workflows Using GATE for a Total-Body PET/CT Scanner
Development and Initial Validation of Two Simulation Workflo...
收藏 引用
IEEE Symposium on Nuclear Science (NSS/MIC)
作者: C. Pommranz E. Elmoujarkach J. Cabello W. Lan M. Rafecas J. Mannheim A. Santangelo C. La Fougère B. Pichler F. Schmidt Department of Preclinical Imaging and Radiopharmacy Werner Siemens Imaging Center Eberhard Karls University Tuebingen Tuebingen Baden-Württemberg Germany Institute for Astronomy and Astrophysics Eberhard Karls University Tuebingen Tuebingen Baden-Württemberg Germany Institute of Medical Engineering University of Lübeck Lübeck Schleswig-Holstein Germany Siemens Medical Solutions USA Inc. Knoxville Tennessee United States of America Department of Nuclear Medicine and Clinical Molecular Imaging University Hospital Tuebingen Tuebingen Baden-Württemberg Germany Cluster of Excellence iFIT (EXC 2180) "Image Guided and Functionally Instructed Tumor Therapies" University of Tuebingen Tuebingen Germany
Monte Carlo simulation studies potentially support understanding and characterizing new total-body PET/CT scanners such as the Biograph Vision Quadra (Siemens Healthineers), which enable a broad field of novel applica...
来源: 评论
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE  22
AntiCopyPaster: Extracting Code Duplicates As Soon As They A...
收藏 引用
Proceedings of the 37th IEEE/ACM international conference on Automated software engineering
作者: Eman Abdullah Alomar Anton Ivanov Zarina Kurbatova Yaroslav Golubev Mohamed Wiem Mkaouer Ali Ouni Timofey Bryksin Le Nguyen Amit Kini Aditya Thakur Stevens Institute of Technology United States of America HSE University Russian Federation Huawei Russia JetBrains Research Serbia Rochester Institute of Technology United States of America Ecole de Technologie Superieure (ETS) Canada JetBrains Research Cyprus Rochester Institute of Technology USA
We developed a plugin for IntelliJ IDEA called AntiCopyPaster, which tracks the pasting of code fragments inside the IDE and suggests the appropriate Extract Method refactoring to combat the propagation of duplicates.... 详细信息
来源: 评论
Monocular Vision-Based Prediction of Cut-In Manoeuvres with LSTM Networks  1
收藏 引用
Science, engineering Management and Information Technology First international conference, SEMIT 2022
作者: Nalcakan, Yagiz Bastanlar, Yalin Izmir Institute of Technology Izmir Urla Turkey TTTech Auto Turkey Software Izmir Turkey
Advanced driver assistance and automated driving systems should be capable of predicting and avoiding dangerous situations. In this paper, we first discuss the importance of predicting dangerous lane changes and provi... 详细信息
来源: 评论