咨询与建议

限定检索结果

文献类型

  • 63,849 篇 会议
  • 566 册 图书
  • 331 篇 期刊文献
  • 3 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 64,749 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 38,072 篇 工学
    • 34,849 篇 计算机科学与技术...
    • 22,871 篇 软件工程
    • 8,678 篇 信息与通信工程
    • 5,245 篇 电气工程
    • 4,759 篇 生物工程
    • 4,726 篇 控制科学与工程
    • 3,791 篇 生物医学工程(可授...
    • 1,619 篇 网络空间安全
    • 1,561 篇 安全科学与工程
    • 1,416 篇 光学工程
    • 1,317 篇 机械工程
    • 1,251 篇 动力工程及工程热...
    • 1,238 篇 电子科学与技术(可...
    • 1,187 篇 化学工程与技术
    • 1,179 篇 仪器科学与技术
  • 13,983 篇 理学
    • 7,885 篇 数学
    • 5,252 篇 生物学
    • 3,573 篇 统计学(可授理学、...
    • 3,109 篇 系统科学
    • 2,308 篇 物理学
    • 1,210 篇 化学
  • 8,713 篇 管理学
    • 5,032 篇 管理科学与工程(可...
    • 4,373 篇 图书情报与档案管...
    • 2,206 篇 工商管理
  • 4,408 篇 医学
    • 3,672 篇 临床医学
    • 3,203 篇 基础医学(可授医学...
    • 2,071 篇 药学(可授医学、理...
    • 1,704 篇 公共卫生与预防医...
  • 1,837 篇 法学
    • 1,594 篇 社会学
  • 1,170 篇 农学
    • 1,140 篇 作物学
  • 986 篇 经济学
  • 723 篇 教育学
  • 337 篇 文学
  • 45 篇 艺术学
  • 38 篇 军事学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 16,939 篇 machine learning
  • 5,269 篇 machine learning...
  • 4,467 篇 deep learning
  • 3,908 篇 support vector m...
  • 3,888 篇 accuracy
  • 3,370 篇 computational mo...
  • 3,265 篇 training
  • 3,125 篇 predictive model...
  • 2,880 篇 feature extracti...
  • 1,977 篇 data models
  • 1,928 篇 cloud computing
  • 1,703 篇 neural networks
  • 1,655 篇 real-time system...
  • 1,601 篇 adversarial mach...
  • 1,525 篇 prediction algor...
  • 1,300 篇 data mining
  • 1,283 篇 artificial intel...
  • 1,266 篇 decision trees
  • 1,133 篇 internet of thin...
  • 1,125 篇 random forests

机构

  • 202 篇 chitkara univers...
  • 134 篇 school of comput...
  • 80 篇 karnataka bangal...
  • 78 篇 school of comput...
  • 68 篇 department of co...
  • 48 篇 lovely professio...
  • 47 篇 chennai
  • 46 篇 centre of interd...
  • 45 篇 univ chinese aca...
  • 41 篇 school of comput...
  • 39 篇 graphic era deem...
  • 37 篇 graphic era deem...
  • 33 篇 shenyang institu...
  • 32 篇 department of co...
  • 30 篇 faculty of compu...
  • 29 篇 shanghai jiao to...
  • 28 篇 department of co...
  • 28 篇 computer science...
  • 28 篇 vishwakarma inst...
  • 27 篇 delhi technologi...

作者

  • 35 篇 anjali t.
  • 29 篇 de-shuang huang
  • 26 篇 isman kurniawan
  • 24 篇 rakesh kumar
  • 23 篇 kumar anil
  • 22 篇 hui wang
  • 21 篇 amandeep nagpal
  • 21 篇 kumar ajay
  • 21 篇 gill kanwarparta...
  • 20 篇 qin zengchang
  • 20 篇 yu wang
  • 20 篇 sharif mhd saeed
  • 19 篇 ajay kumar
  • 18 篇 qomariyah nunung...
  • 18 篇 pareek piyush ku...
  • 16 篇 schuurmans dale
  • 16 篇 andersson karl
  • 16 篇 kumar manish
  • 15 篇 shiva mehta
  • 15 篇 lakshmanarao a.

语言

  • 62,022 篇 英文
  • 2,552 篇 其他
  • 468 篇 中文
  • 4 篇 葡萄牙文
  • 3 篇 法文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Machine Learning and Computing"
64750 条 记 录,以下是4991-5000 订阅
排序:
Addressing Catastrophic Forgetting in Federated learning on Resource-Constrained Devices: A Feature Replay Approach  20th
Addressing Catastrophic Forgetting in Federated Learning on ...
收藏 引用
20th international conference on Intelligent computing (ICIC)
作者: Gao, Zhipeng Zhang, Junyao Yu, Xinlei Beijing Univ Posts & Telecommun State Key Lab Switching & Networking Technol Beijing Peoples R China
Federated learning is a new type of privacy-preserving distributed machine learning method. Despite its advantages, Federated learning suffers from catastrophic forgetting due to the temporal variability of data on pa... 详细信息
来源: 评论
A Comparative Study of machine learning and Deep learning Algorithm for Handwritten Digit Recognition  6
A Comparative Study of Machine Learning and Deep Learning Al...
收藏 引用
6th international conference on Contemporary computing and Informatics, IC3I 2023
作者: Sohail, Mohammed Lal Saini, Madan Singh, Vedant Pratap Dhir, Sarthak Patel, Vishal Apex Institute of Technology Department of CSE Chandigarh University Punjab India
Handwritten digit recognition is a complex task in various real-world applications such as bank check processing, postal automation recognition etc. In recent time, different kind of learning algorithms are used to an... 详细信息
来源: 评论
machine learning in Soil Borne Diseases, Soil Data Analysis & Crop Yielding: A Review
Machine Learning in Soil Borne Diseases, Soil Data Analysis ...
收藏 引用
2023 IEEE international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2023
作者: Kiruthiga, C. Dharmarajan, K. School of Computer Science Vels University Chennai India Vels University Department of Information Technology Chennai India
The agricultural study is critically important from a financial perspective. Research areas in agriculture are demand prediction, crop yielding prediction, soil classification, diseases, and weed detection Another dim... 详细信息
来源: 评论
SoulNourish: A Comprehensive machine learning Based Recommendation Yoga Prediction System Based on Health and Lifestyle Data  4
SoulNourish: A Comprehensive Machine learning Based Recommen...
收藏 引用
4th international conference on Sustainable Expert Systems, ICSES 2024
作者: Kirankumar, M. Saikiran, P. Sabarivasan, N. Manoj Kumaran, S. Thangavel, Senthil Kumar Somasundaram, K. Kumar, B. Senthil Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Tamil Nadu Coimbatore India Amrita School of Physical Sciences Amrita Vishwa Vidyapeetham Department of Mathematics Tamil Nadu Coimbatore India Amrita Vishwa Vidyapeetham Amrita Darshanam-International Centre for Spiritual Studies Tamil Nadu Coimbatore India
The modern sedentary lifestyle has escalated health risks, underscoring the importance of tailored health solutions like yoga. This paper pioneers a method to determine yoga'srelevance for individuals by analyzing... 详细信息
来源: 评论
Credit Card Fraud Detection Scheme Using machine learning and Synthetic Minority Oversampling Technique (SMOTE)  5
Credit Card Fraud Detection Scheme Using Machine Learning an...
收藏 引用
5th international conference on Inventive Research in computing Applications, ICIRCA 2023
作者: Jabeen, Uqba Singh, Karan Vats, Satvik School of Computer & Systems Sciences Jawaharlal Nehru University New Delhi India Graphic Era Hill University Computer Science and Engineering Dehradun India
Credit Card Fraud Detection is one of the vital issues nowadays which needs to be tackled urgently. In today's world, everyone is shifting to an online and cashless world for easiness in the transaction. However, ... 详细信息
来源: 评论
An Automated Deep learning Model for Detecting Image Forgeries
An Automated Deep Learning Model for Detecting Image Forgeri...
收藏 引用
2024 international conference on Electrical, Electronics and computing Technologies, ICEECT 2024
作者: Raj, Shishir Kumar Mohanty, Bhabani Shankar Rout, Jayanti Soni, Ashutosh Nanda, Surendra Kumar C.V. Raman Global University Department of CSE Odisha Bhubaneswar India
Fake image detection has emerged as a critical research area in response to the widespread dissemination of manipulated visual content across various online platforms. This paper introduces a novel approach for detect... 详细信息
来源: 评论
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior  41
Efficient Black-box Adversarial Attacks via Bayesian Optimiz...
收藏 引用
41st international conference on machine learning (ICML)
作者: Cheng, Shuyu Miao, Yibo Dong, Yinpeng Yang, Xiao Gao, Xiao-Shan Zhu, Jun Tsinghua Univ BNRist Ctr Tsinghua Bosch Joint ML Ctr Inst AIDept Comp Sci & TechTHBI Lab Beijing 100084 Peoples R China JQ Investments Hong Kong Peoples R China Chinese Acad Sci Acad Math & Syst Sci Beijing 100190 Peoples R China Univ Chinese Acad Sci Beijing 100049 Peoples R China RealAI Beijing Peoples R China Kaiyuan Int Math Sci Inst Changsha Peoples R China
This paper studies the challenging black-box adversarial attack that aims to generate adversarial examples against a black-box model by only using output feedback of the model to input queries. Some previous methods i... 详细信息
来源: 评论
Spam Email Filtering using machine learning Algorithm  7
Spam Email Filtering using Machine Learning Algorithm
收藏 引用
7th international conference on computing Methodologies and Communication, ICCMC 2023
作者: Komarasamy, Dinesh Duraisamy, Oviya Mohana Saranya, S. Krishnamoorthy, Sandhiya Rajendran, SanjeevKumar Dharani, M.K. Computer Science and Engineering Kongu Engineering College Erode India
Email is one of the most used modes of communication by many industries and IT sectors. Even common people used to communicate through email about business related information over the internet. As technology grows, t... 详细信息
来源: 评论
A Recent Systematic Review of Ransomware Attack detection in machine learning techniques  4
A Recent Systematic Review of Ransomware Attack detection in...
收藏 引用
4th international conference on Artificial Intelligence and Data Sciences, AiDAS 2023
作者: Ahmad, Samsiah Zulkifli, Zalikha Nasarudin, Nur Hasni Imran, Mohamed Ariff, Mohamed College of Computing Informatics and Mathematics Universiti Teknologi Mara Perak Computing Sciences Studies Tapah Malaysia
Ransomware attacks have emerged as a significant threat to organizations and individuals, causing substantial financial and operational damages worldwide. With the increasing sophistication and frequency of ransomware... 详细信息
来源: 评论
machine learning Strategies in Quantum-Resistant Network Security Protocols  3
Machine Learning Strategies in Quantum-Resistant Network Sec...
收藏 引用
3rd IEEE international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Dhote, Vijay Sadim, Mohd Tanna, Paresh Tiwari, Annapurna Nand Ies College of Technology Department of Computer Science & Engineering Madhya Pradesh Bhopal462044 India Ies University Department of Computer Science & Engineering Madhya Pradesh Bhopal462044 India Computer Engineering Rk University India Ies College of Technology Department of Electronics & Communication Engineering Madhya Pradesh Bhopal462044 India
The cryptographic techniques that underpin current network security standards run the risk of becoming outdated due to the advancement of quantum computing. Researchers and industry professionals are working to create... 详细信息
来源: 评论