咨询与建议

限定检索结果

文献类型

  • 1,926 篇 会议
  • 13 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,949 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,033 篇 工学
    • 909 篇 计算机科学与技术...
    • 491 篇 软件工程
    • 297 篇 控制科学与工程
    • 122 篇 信息与通信工程
    • 116 篇 电气工程
    • 73 篇 生物工程
    • 44 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 34 篇 机械工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 13 篇 光学工程
    • 9 篇 动力工程及工程热...
  • 321 篇 理学
    • 211 篇 数学
    • 91 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 28 篇 物理学
    • 17 篇 化学
  • 287 篇 管理学
    • 218 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 21 篇 药学(可授医学、理...
  • 21 篇 法学
    • 20 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 7 篇 教育学
    • 7 篇 教育学
  • 6 篇 军事学
  • 5 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 493 篇 machine learning
  • 165 篇 data mining
  • 155 篇 computer science
  • 153 篇 machine learning...
  • 141 篇 support vector m...
  • 118 篇 cybernetics
  • 105 篇 neural networks
  • 94 篇 clustering algor...
  • 90 篇 computer network...
  • 88 篇 learning systems
  • 80 篇 educational inst...
  • 80 篇 distributed comp...
  • 66 篇 electronic mail
  • 66 篇 artificial intel...
  • 64 篇 support vector m...
  • 62 篇 algorithm design...
  • 60 篇 humans
  • 59 篇 pattern recognit...
  • 58 篇 computational mo...
  • 58 篇 testing

机构

  • 63 篇 department of co...
  • 40 篇 department of co...
  • 24 篇 school of comput...
  • 23 篇 department of co...
  • 14 篇 machine learning...
  • 14 篇 department of co...
  • 14 篇 college of mecha...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 institute of com...
  • 11 篇 hebei univ coll ...
  • 8 篇 institute of com...
  • 8 篇 school of comput...
  • 7 篇 department of in...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of au...
  • 7 篇 department of in...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...

作者

  • 26 篇 yeung daniel s.
  • 22 篇 d.s. yeung
  • 16 篇 xi-zhao wang
  • 12 篇 hui wang
  • 12 篇 ng wing w. y.
  • 12 篇 tsang eric c. c.
  • 11 篇 e.c.c. tsang
  • 11 篇 daniel s. yeung
  • 11 篇 kuan-quan wang
  • 10 篇 wang xi-zhao
  • 10 篇 yeung
  • 10 篇 tsang
  • 9 篇 jane you
  • 9 篇 you jane
  • 9 篇 zhang david
  • 8 篇 qing he
  • 8 篇 de-gang chen
  • 7 篇 qing-hua li
  • 7 篇 yu zhiwen
  • 7 篇 li le

语言

  • 1,945 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"任意字段=International Conference on Machine Learning and Computing(ICMLC 2009)"
1949 条 记 录,以下是61-70 订阅
排序:
Ensemble Two Stage machine learning for Network Abnormal Detection  23
Ensemble Two Stage Machine Learning for Network Abnormal Det...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Du, Runze Li, Runzhi Zhang, Zijiao School of Cyberspace Security Zhengzhou University Zhengzhou China Network Center Zhengzhou University Zhengzhou China
With the endless emergence of network security problems, it also brings the corresponding security threats to the society. IDS is an effective means to deal with network threats, but in the modern large-scale network ... 详细信息
来源: 评论
Multi-missile Path Planning algorithm based on Reinforcement learning  23
Multi-missile Path Planning algorithm based on Reinforcement...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Ma, Xianlong Yin, Wei Gao, Zhiqiang Hu, Weijun Northwestern Polytechnical University China Shanghai Electro-Mechanical Engineering Institute China
Aiming at the problem that the on-line path planning of multiple targets hit by multiple missiles requires high real-time performance and optimal results of the algorithm, the Deep Q-network (DQN) algorithm is designe... 详细信息
来源: 评论
Enhanced Feature Importance learning for the Click-Through Rate Prediction  23
Enhanced Feature Importance Learning for the Click-Through R...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Sun, Hongbin Zeng, Wei University of Electronic Science and Technology of China China
The prediction of click-through rate (CTR) is critical in the recommender system, which aims to predict the probability of the user clicking on the recommended item. Considering the increasing number of features used ... 详细信息
来源: 评论
Contrastive learning of Graph-Kernel-based Representations for Proteins  23
Contrastive Learning of Graph-Kernel-based Representations f...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Hu, Wei Zhang, Fan Feng, Yajuan School of Information Science and Technology University of Science and Technology of China Hefei China
Protein property prediction is to infer protein properties by finding proteins with similar sequences, structures, surface clefts, and chemical properties. Since the acquisition of protein molecular property labels us... 详细信息
来源: 评论
A Self-attention Feature Metric learning Method for Remote Sensing Image Retrieval  23
A Self-attention Feature Metric Learning Method for Remote S...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Wu, Jiahui Wang, Zhuowei Zhao, Genping Qu, Shuo School of Computer Science and Technology Guangdong University of Technology China
Remote sensing image retrieval (RSIR) is a challenging task due to the complex backgrounds of the image and the inclusion of various semantic objects. This paper presents a novel self-attention mechanism for RSIR usin... 详细信息
来源: 评论
Multiclass Classification of Software Vulnerabilities with Deep learning  23
Multiclass Classification of Software Vulnerabilities with D...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Contreras, Crystal Dokic, Hristina Huang, Zhen Stan Raicu, Daniela Furst, Jacob Tchoua, Roselyne *** Inc. East Palo AltoCA United States DePaul University ChicagoIL United States
Detecting software vulnerabilities has been a challenge for decades. Many techniques have been developed to detect vulnerabilities by reporting whether a vulnerability exists in the code of software. But few of them h... 详细信息
来源: 评论
A Hybrid Binary Neural Tree for Malicious URL Detection  23
A Hybrid Binary Neural Tree for Malicious URL Detection
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Hu, Zhiqi Xu, Guoliang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China
Criminals use malicious URLs to distribute unsolicited content as a primary distribution method. Aiming at the problems of low detection accuracy caused by insufficient representation of URL character-level local feat... 详细信息
来源: 评论
IoT based monitoring model to identifying and classifying heart disease through machine learning
IoT based monitoring model to identifying and classifying he...
收藏 引用
international conference on Artificial Intelligence, Blockchain, computing and Security, ICABCS 2023
作者: Parisha Kumar, Santosh Shrivastava, Gaurav Kumar Department of Computer Science & Engineering Babu Banarasi Das University Lucknow India School of Computing & Engineering Galgotias University Uttar Pradesh Greater Noida India
Healthcare research has advanced thanks to artificial intelligence. Because there is free access to healthcare information, researchers have developed methods to help with the heart disease diagnosis and prognosis. Fo... 详细信息
来源: 评论
Preserving model privacy for Federated Reinforcement learning in Complementary Environments  23
Preserving model privacy for Federated Reinforcement Learnin...
收藏 引用
15th international conference on machine learning and computing, icmlc 2023
作者: Xuan, Pengyu Chen, Aiguo Sha, Zexin University of Electronic Science and Technology of China Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu China
Federated reinforcement learning (FRL) uses data from multiple partners interacting with the environment to train a global decision model while maintaining data privacy. In specific situations, it is necessary to prot... 详细信息
来源: 评论
Prediction and Detection of Cancer Through machine learning: A review  1
Prediction and Detection of Cancer Through Machine Learning:...
收藏 引用
1st IEEE international conference on Advances in computing, Communication and Networking, ICAC2N 2024
作者: Saxena, Nikita Yadav, Sudeept Singh Dujawara, Asmita Kumar, Avneesh Galgotias University School of Computing and Engineering Greater Noida India Galgotias University School of Computing Science and Engineering Greater Noida India Galgotias University School of Allied Health Sciences Greater Noida India
Expertise in the medical field is growing thanks to artificial intelligence. Free health data has led to the development of ways by experts to help in tumor detection and prediction. For those difficult illnesses, dee... 详细信息
来源: 评论