咨询与建议

限定检索结果

文献类型

  • 575 篇 会议
  • 15 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 594 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 480 篇 工学
    • 454 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 85 篇 电气工程
    • 45 篇 信息与通信工程
    • 30 篇 控制科学与工程
    • 15 篇 机械工程
    • 15 篇 生物工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 7 篇 航空宇航科学与技...
    • 7 篇 生物医学工程(可授...
    • 6 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
  • 153 篇 理学
    • 113 篇 物理学
    • 23 篇 数学
    • 15 篇 生物学
    • 11 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 4 篇 化学
  • 40 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 15 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 14 篇 教育学
    • 14 篇 教育学
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 农学
  • 4 篇 军事学

主题

  • 144 篇 machine learning
  • 105 篇 artificial intel...
  • 65 篇 deep learning
  • 28 篇 adversarial mach...
  • 24 篇 reinforcement le...
  • 16 篇 object detection
  • 15 篇 learning systems
  • 14 篇 neural networks
  • 14 篇 federated learni...
  • 13 篇 computer vision
  • 12 篇 cybersecurity
  • 12 篇 security
  • 12 篇 accuracy
  • 12 篇 machine learning...
  • 12 篇 training
  • 11 篇 computer applica...
  • 10 篇 multi-domain ope...
  • 9 篇 ai
  • 9 篇 explainable arti...
  • 9 篇 unsupervised lea...

机构

  • 6 篇 marwadi universi...
  • 6 篇 national univers...
  • 5 篇 us army engineer...
  • 5 篇 us army res lab ...
  • 4 篇 college of compu...
  • 4 篇 siemens corporat...
  • 4 篇 univ maryland co...
  • 4 篇 carnegie mellon ...
  • 4 篇 foundation for r...
  • 3 篇 mcmaster univ 12...
  • 3 篇 korea univ dept ...
  • 3 篇 us mil acad army...
  • 3 篇 ibm tj watson re...
  • 2 篇 johns hopkins un...
  • 2 篇 penn state univ ...
  • 2 篇 the high school ...
  • 2 篇 howard univ wash...
  • 2 篇 wroclaw universi...
  • 2 篇 univ southern ca...
  • 2 篇 shanghai ai lab ...

作者

  • 8 篇 rawat danda b.
  • 6 篇 divyakant meva
  • 6 篇 kalpesh popat
  • 6 篇 sunil bajeja
  • 6 篇 pankaj mudholkar
  • 6 篇 sridaran rajagop...
  • 4 篇 surucu onur
  • 4 篇 giuliano alessan...
  • 4 篇 alsadi naseem
  • 4 篇 helmut degen
  • 4 篇 hilal waleed
  • 4 篇 stavroula ntoa
  • 4 篇 raglin adrienne
  • 4 篇 asher derrik e.
  • 4 篇 yawney john
  • 4 篇 markowitz jared
  • 3 篇 bastian nathanie...
  • 3 篇 schutte klamer
  • 3 篇 kwak heon-gyu
  • 3 篇 price stanton r.

语言

  • 564 篇 英文
  • 30 篇 其他
  • 2 篇 中文
检索条件"任意字段=Conference on Artificial Intelligence and Machine Learning in Defense Applications IV"
594 条 记 录,以下是111-120 订阅
排序:
Distributed hierarchical reinforcement learning in multi-agent adversarial environments  4
Distributed hierarchical reinforcement learning in multi-age...
收藏 引用
conference on artificial intelligence and machine learning for Multi-Domain Operations applications iv
作者: Naderializadeh, Navid Soleyman, Sean Hung, Fan Khosla, Deepak Chen, Yang Fadaie, Joshua G. HRL Labs LLC 3011 Malibu Canyon Rd Malibu CA 90265 USA Univ Penn 200 South 33rd St Philadelphia PA 19104 USA
We develop a hierarchical approach for controlling a team of aircraft in multi-agent adversarial environments. Each individual aircraft is equipped with a high-level agent that is solely responsible for target assignm... 详细信息
来源: 评论
Recent Advances in Multi-modal Data Fusion: Status, Challenges and Perspectives  4
Recent Advances in Multi-modal Data Fusion: Status, Challeng...
收藏 引用
conference on artificial intelligence and machine learning for Multi-Domain Operations applications iv
作者: Rawal, Atul McCoy, James Raglin, Adrienne Rawat, Danda B. Sadler, Brian M. Howard Univ Ctr Excellence AI ML CoE AIML Dept Elect Engn & Comp Sci Washington DC 20059 USA US Army Res Lab Adelphi MD USA
Advancements in computer science, especially artificial intelligence (AI) and machine learning(ML) have brought about a scientific revolution in a plethora of military and commercial applications. One of such area has... 详细信息
来源: 评论
Advancing Malware defense: A Hybrid Approach with Explainable Deep Neural Networks  2
Advancing Malware Defense: A Hybrid Approach with Explainabl...
收藏 引用
2nd DMIHER International conference on artificial intelligence in Healthcare, Education and Industry, IDICAIEI 2024
作者: Sharma, Deepika Devare, Manoj Department of Engineering and Technology Navi Mumbai India Amity University Amity Institute of Information Technology Mumbai India
Malware detection and classification remain critical challenges in cybersecurity, necessitating advanced techniques for combating increasingly sophisticated threats. This paper presents a novel hybrid approach that le... 详细信息
来源: 评论
Evaluating the Effectiveness of Attacks and defenses on machine learning Through Adversarial Samples  16
Evaluating the Effectiveness of Attacks and Defenses on Mach...
收藏 引用
16th IEEE International conference on Software Testing, Verification and Validation (ICST)
作者: Gala, Viraj R. Schneider, Martin A. Fraunhofer FOKUS Business Unit Qual Engn Berlin Germany
Adversarial attacks can compromise the robustness of machine learning models, including neural networks. Adversarial defenses can be employed to mitigate the impact of adversarial attacks. Due to adaptive attacks, how... 详细信息
来源: 评论
Toward ML-Based Application for Vehicles Operation Cost Management  1
收藏 引用
8th International Scientific-Technical conference (MANUFACTURING)
作者: Rojek, Izabela Mikolajewski, Dariusz Przybylinski, Slawomir Dostatni, Ewa Sapietova, Alzbeta Kazimierz Wielki Univ Bydgoszcz Poland Poznan Univ Tech Poznan Poland Univ Zilina Zilina Slovakia
This paper presents the design and implementation of a web-based application for managing vehicle operating costs. The application is intended to help vehicle users control and optimize the money spent on the maintena... 详细信息
来源: 评论
learning Disentangled Discrete Representations
Learning Disentangled Discrete Representations
收藏 引用
5th International Workshop on learning with Imbalanced Domains - Theory and applications / European conference on machine learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)
作者: Friede, David Reimers, Christian Stuckenschmidt, Heiner Niepert, Mathias Univ Mannheim Mannheim Germany Max Planck Inst Biogeochem Jena Germany Univ Stuttgart Stuttgart Germany NEC Labs Europe Heidelberg Germany
Recent successes in image generation, model-based reinforcement learning, and text-to-image generation have demonstrated the empirical advantages of discrete latent representations, although the reasons behind their b... 详细信息
来源: 评论
2nd International conference on Next-Generation Computing and Information Systems, ICNGCIS 2023
2nd International Conference on Next-Generation Computing an...
收藏 引用
2nd International conference on Next-Generation Computing and Information Systems, ICNGCIS 2023
The proceedings contain papers. The special focus in this conference is on . The topics include: Impact of artificial intelligence on high-penetration renewable physical infrastructure;collaborative attacks and defens...
来源: 评论
Literature Review on the Current State-of-the-Art in Research and Technological Advancements in the Field of machine learning Applied to Predictive Maintenance  43rd
Literature Review on the Current State-of-the-Art in Researc...
收藏 引用
43rd IFIP WG 5.7 International conference on Advances in Production Management Systems (APMS)
作者: Resanovic, Daniel Balc, Nicolae Univ Appl Sci CAMPUS 02 Graz Austria Tech Univ Cluj Napoca Cluj Napoca Romania
This literature review examines the technologies of machine learning (ML) in Predictive Maintenance (PdM), highlighting the necessity for industries to boost production efficiency for competitive advantage amid growin... 详细信息
来源: 评论
SeqSHAP: Subsequence Level Shapley Value Explanations for Sequential Predictions  29th
SeqSHAP: Subsequence Level Shapley Value Explanations for Se...
收藏 引用
29th International conference on Database Systems for Advanced applications (DASFAA)
作者: Jiang, Guanyu Zhuang, Fuzhen Song, Bowen Zhu, Yongchun Sun, Ying Wang, Weiqiang Wang, Deqing Beihang Univ Inst Artificial Intelligence Beijing Peoples R China Beihang Univ Sch Comp Sci SKLSDE Beijing Peoples R China Chinese Acad Sci Inst Comp Technol Beijing Peoples R China Hong Kong Univ Sci & Technol Guangzhou Thrust Artificial Intelligence Guangzhou Guangdong Peoples R China
With the rapid development of AI techniques, models built on deep learning techniques have been applied to an increasing number of real-world scenarios. As the predictive performance of deep learning models continues ... 详细信息
来源: 评论
Leveraging Model Distillation as a defense Against Adversarial Attacks Based on Deep learning  2
Leveraging Model Distillation as a Defense Against Adversari...
收藏 引用
2nd IEEE International conference on Communication, Security and artificial intelligence, ICCSAI 2023
作者: Suresh, K. Radha, J. Thilagaraj, T. Subramani, R. Lakineni, Prasanna Kumar Taqui, Syed Noeman Department of Computer Science Bangalore India Nandha Engineering College Department of Computer Science and Engineering Tamilnadu Perundurai India Moodlakatte Institute of Technology Department of Computer Science and Engineering Moodalakatte Karnataka Kundapura India Department of Mathematics Bangalore India Gitam School of Technology Gitam University Department of Computer Science and Engineering Visakhapatnam India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Vlsi Microelectronics Tamil Nadu Chennai India
Adversarial attacks on deep learning models threaten machine learning system security and reliability. The above attacks use modest data alterations to produce erroneous model results while being undetected by humans.... 详细信息
来源: 评论