咨询与建议

限定检索结果

文献类型

  • 2,966 篇 会议
  • 174 册 图书
  • 25 篇 期刊文献

馆藏范围

  • 3,164 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,043 篇 工学
    • 1,824 篇 计算机科学与技术...
    • 958 篇 软件工程
    • 331 篇 电气工程
    • 314 篇 信息与通信工程
    • 214 篇 控制科学与工程
    • 207 篇 生物工程
    • 149 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 64 篇 机械工程
    • 62 篇 化学工程与技术
    • 51 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
    • 46 篇 安全科学与工程
    • 36 篇 交通运输工程
  • 649 篇 理学
    • 353 篇 数学
    • 245 篇 生物学
    • 139 篇 物理学
    • 135 篇 统计学(可授理学、...
    • 95 篇 系统科学
    • 63 篇 化学
  • 408 篇 管理学
    • 244 篇 图书情报与档案管...
    • 182 篇 管理科学与工程(可...
    • 83 篇 工商管理
  • 262 篇 医学
    • 241 篇 临床医学
    • 123 篇 基础医学(可授医学...
    • 74 篇 药学(可授医学、理...
    • 40 篇 公共卫生与预防医...
  • 46 篇 法学
    • 42 篇 社会学
  • 38 篇 教育学
    • 32 篇 教育学
  • 33 篇 经济学
    • 31 篇 应用经济学
  • 23 篇 农学
  • 6 篇 艺术学
  • 4 篇 文学

主题

  • 572 篇 machine learning
  • 563 篇 data mining
  • 320 篇 pattern recognit...
  • 209 篇 deep learning
  • 201 篇 feature extracti...
  • 154 篇 support vector m...
  • 145 篇 artificial intel...
  • 128 篇 machine learning...
  • 120 篇 training
  • 117 篇 accuracy
  • 90 篇 data models
  • 89 篇 data mining and ...
  • 71 篇 neural networks
  • 71 篇 classification
  • 67 篇 predictive model...
  • 66 篇 face recognition
  • 61 篇 learning systems
  • 52 篇 computer imaging...
  • 50 篇 convolutional ne...
  • 48 篇 classification a...

机构

  • 9 篇 school of comput...
  • 9 篇 chinese academy ...
  • 8 篇 zhejiang univers...
  • 8 篇 chitkara univers...
  • 7 篇 guangdong univer...
  • 7 篇 school of inform...
  • 6 篇 xi'an university...
  • 6 篇 indian statistic...
  • 6 篇 central south un...
  • 6 篇 department of co...
  • 6 篇 unsw sydney
  • 6 篇 xi'an university...
  • 6 篇 southern univers...
  • 5 篇 study group aust...
  • 5 篇 peking universit...
  • 4 篇 centre for patte...
  • 4 篇 chongqing univer...
  • 4 篇 national laborat...
  • 4 篇 sun yat sen univ...
  • 4 篇 school of inform...

作者

  • 11 篇 de-shuang huang
  • 8 篇 petra perner
  • 7 篇 krasotkina olga
  • 7 篇 mottl vadim
  • 7 篇 ying tan
  • 6 篇 zheng-guang wu
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...
  • 6 篇 phung dinh
  • 6 篇 venkatesh svetha
  • 6 篇 hongyi li
  • 6 篇 jacek m. zurada
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 ilias maglogiann...
  • 6 篇 lotfi a. zadeh
  • 6 篇 leszek rutkowski
  • 6 篇 lazaros iliadis
  • 6 篇 long cheng
  • 5 篇 vitoantonio bevi...

语言

  • 2,999 篇 英文
  • 152 篇 其他
  • 25 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=5th International Conference on Machine Learning and Data Mining in Pattern Recognition"
3165 条 记 录,以下是611-620 订阅
排序:
SGDE: Secure Generative data Exchange for Cross-Silo Federated learning  5
SGDE: Secure Generative Data Exchange for Cross-Silo Federat...
收藏 引用
5th international conference on Artificial Intelligence and pattern recognition, AIPR 2022
作者: Lomurno, Eugenio Archetti, Alberto Cazzella, Lorenzo Samele, Stefano Di Perna, Leonardo Matteucci, Matteo Politecnico di Milano Italy
Privacy regulation laws, such as GDPR, impose transparency and security as design pillars for data processing algorithms. In this context, federated learning is one of the most influential frameworks for privacy-prese... 详细信息
来源: 评论
Combating Advanced Persistent threats for Imminent Low Earth Orbit Cognitive Communications Systems  16
Combating Advanced Persistent Threats for Imminent Low Earth...
收藏 引用
16th Annual IEEE international Systems conference (SysCon)
作者: LaMar, Suzanna Gosselin, Jordan J. Happel, Lisa Jayasumana, Anura Northrop Grumman Corp 15120 Innovat Dr San Diego CA 92128 USA Colorado State Univ Dept Elect & Comp Engn Ft Collins CO USA
With the proliferation of Low Earth Orbit (LEO) spacecraft constellations, comes the rise of space-based wireless cognitive communications systems (CCS) and the need to safeguard and protect data against potential hos... 详细信息
来源: 评论
Security attack situation awareness based on massive log data mining  5
Security attack situation awareness based on massive log dat...
收藏 引用
5th international conference on Advanced Electronic Materials, Computers and Software Engineering, AEMCSE 2022
作者: Xu, Yin Yu, Pengfei Shen, Wen Li, Ziqian State Grid Customer Service Center Tianjin China State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Nanjing China
Security situation awareness usually uses massive log information to discover abnormal attacks based on basic user attributes, user behavioral actions and user interactions through machine learning and other methods. ... 详细信息
来源: 评论
machine learning Algorithms for Disease Prediction Analysis
Machine Learning Algorithms for Disease Prediction Analysis
收藏 引用
international conference on Smart Systems and Inventive Technology (ICSSIT)
作者: M Govindaraj V Asha Binju Saju M Sagar Rahul Master of Computer Application New Horizon College of Engineering Bengaluru India
People suffer from a wide variety of diseases due to their environment and lifestyle factors. As a result, early disease prediction becomes critical. On the other hand, making a diagnosis solely on symptoms is too dif... 详细信息
来源: 评论
One-Step Multi-view Clustering Based on Low-Rank Tensor Proximity learning  5
One-Step Multi-view Clustering Based on Low-Rank Tensor Prox...
收藏 引用
5th international conference on pattern recognition and Artificial Intelligence, PRAI 2022
作者: Li, Lin Cao, Ying Zhou, Xiaojun Lu, Zhiqiang Li, Dongxiao Song, Li Migu Co. Ltd Beijing China The China Academy of Information and Communications Technology Beijing China Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Shanghai China
Multi-view clustering has achieved impressive performances by employing relationships and complex structures hidden in multi-view data. However, most of methods still suffer from the following two problems. (1) they a... 详细信息
来源: 评论
Analysis of data mining-Based Approach for Intrusion Detection System  5
Analysis of Data Mining-Based Approach for Intrusion Detecti...
收藏 引用
5th international conference on Contemporary Computing and Informatics, IC3I 2022
作者: Soewu, Taiwo Hemant Rakhra, Manik Singh, Dalwinder Olabisi Onabanjo University Department of Computer Engineering Ago Iwoye Nigeria Lovely Professional University School of Computer Science and Enginnering Phagwara India Lovely Professional University Department of Computer Science and Engineering Phagwara India
Due to the widespread usage of computers nowadays, there is also a greater likelihood of cyberattacks on systems or networks than previously thought. Intrusion Detection System (IDS) can be a successful method to iden... 详细信息
来源: 评论
Research on the Construction of Enterprise Financial Risk Early Warning Model Based on data mining  24
Research on the Construction of Enterprise Financial Risk Ea...
收藏 引用
Proceedings of the 2024 5th international conference on Big data Economy and Information Management
作者: Shihui Du Weifang Engineering Vocational College Weifang Shandong China
In order to effectively identify and respond to enterprise financial risks, this study adopts data mining technology to construct an enterprise financial risk early warning model. through data preprocessing and featur... 详细信息
来源: 评论
epiDAMIK 5.0: the 5th international Workshop on Epidemiology meets data mining and Knowledge Discovery  22
epiDAMIK 5.0: The 5th International Workshop on Epidemiology...
收藏 引用
28th ACM SIGKDD conference on Knowledge Discovery and data mining (KKD)
作者: Adhikari, Bijaya Yadav, Amulya Pei, Sen Srivastava, Ajitesh Kefayati, Sarah Rodriguez, Alexander Charpignon, Marie-Laure Vullikanti, Anil Prakash, B. Aditya Univ Iowa Iowa City IA 52240 USA Penn State Univ University Pk PA 16802 USA Columbia Univ New York NY USA Univ Southern Calif Los Angeles CA 90007 USA IBM Corp Boston MA USA Georgia Inst Technol Atlanta GA 30332 USA MIT Boston MA USA Univ Virginia Charlottesville VA USA
Similar to previous iterations, the epiDAMIK @ KDD workshop is a forum to promote data driven approaches in epidemiology and public health research. Even after the devastating impact of COVID-19 pandemic, data driven ... 详细信息
来源: 评论
Classification of Hepatitis Disease Using learning Vector Quantization 3(LVQ3)  5
Classification of Hepatitis Disease Using Learning Vector Qu...
收藏 引用
5th international conference on Information and Communications Technology, ICOIACT 2022
作者: Bagi, Yufika Sari Mihuandayani Stmik Multicom Bolaang Mongondow Department of Information System Kotamobagu Indonesia
Artificial Neural Network (ANN) is one of the fields of science in Artificial Intelligence (AI) that has been widely applied in various problems such as pattern recognition, forecasting, and classification. learning V... 详细信息
来源: 评论
A Credit Card Fraud Detection Model Using machine learning Methods with a Hybrid of Undersampling and Oversampling for Handling Imbalanced datasets for High Scores  1
收藏 引用
5th international conference on Applied machine learning and data Analytics, AMLDA 2022
作者: Sinayobye, Omar Musabe, Richard Uwitonze, Alfred Ngenzi, Alexander School of ICT University of Rwanda Kigali Rwanda
Due to recent advancements in communication technology and e-commerce systems, credit cards are currently the most popular form of payment for online as well as offline purchases. As a consequence, there is substantia... 详细信息
来源: 评论