咨询与建议

限定检索结果

文献类型

  • 108,400 篇 会议
  • 15,727 册 图书
  • 11,121 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 135,109 篇 电子文献
  • 170 种 纸本馆藏

日期分布

学科分类号

  • 107,605 篇 工学
    • 93,057 篇 计算机科学与技术...
    • 66,619 篇 软件工程
    • 23,096 篇 信息与通信工程
    • 12,539 篇 电气工程
    • 8,337 篇 控制科学与工程
    • 8,184 篇 生物工程
    • 8,077 篇 生物医学工程(可授...
    • 6,286 篇 光学工程
    • 4,393 篇 电子科学与技术(可...
    • 3,853 篇 机械工程
    • 3,609 篇 化学工程与技术
    • 2,781 篇 建筑学
    • 2,343 篇 动力工程及工程热...
    • 2,310 篇 土木工程
    • 2,012 篇 安全科学与工程
  • 55,651 篇 理学
    • 41,048 篇 数学
    • 9,539 篇 生物学
    • 8,447 篇 物理学
    • 7,806 篇 统计学(可授理学、...
    • 4,825 篇 系统科学
    • 3,126 篇 化学
  • 22,326 篇 管理学
    • 13,183 篇 图书情报与档案管...
    • 10,141 篇 管理科学与工程(可...
    • 6,929 篇 工商管理
  • 5,722 篇 医学
    • 5,266 篇 临床医学
    • 4,540 篇 基础医学(可授医学...
    • 3,132 篇 药学(可授医学、理...
  • 3,695 篇 法学
    • 3,129 篇 社会学
  • 2,458 篇 教育学
    • 2,416 篇 教育学
  • 2,158 篇 经济学
    • 2,152 篇 应用经济学
  • 1,824 篇 农学
  • 171 篇 军事学
  • 107 篇 文学
  • 74 篇 艺术学
  • 17 篇 哲学
  • 2 篇 历史学

主题

  • 8,057 篇 artificial intel...
  • 4,840 篇 computer communi...
  • 3,516 篇 information syst...
  • 2,779 篇 algorithm analys...
  • 2,432 篇 software enginee...
  • 2,006 篇 image processing...
  • 1,992 篇 user interfaces ...
  • 1,973 篇 semantics
  • 1,939 篇 computers
  • 1,925 篇 information stor...
  • 1,665 篇 computer applica...
  • 1,526 篇 pattern recognit...
  • 1,469 篇 data mining and ...
  • 1,433 篇 computer vision
  • 1,426 篇 software enginee...
  • 1,371 篇 database managem...
  • 1,251 篇 distributed comp...
  • 1,225 篇 theory of comput...
  • 1,216 篇 computer circuit...
  • 1,181 篇 computer systems...

机构

  • 202 篇 university of sc...
  • 152 篇 huazhong univers...
  • 151 篇 department of co...
  • 145 篇 institute of inf...
  • 121 篇 department of co...
  • 120 篇 tsinghua univers...
  • 116 篇 shanghai jiao to...
  • 112 篇 national institu...
  • 96 篇 school of comput...
  • 93 篇 chinese academy ...
  • 85 篇 école des ponts ...
  • 83 篇 department of co...
  • 81 篇 university of el...
  • 73 篇 karnataka bangal...
  • 72 篇 department of co...
  • 71 篇 college of compu...
  • 68 篇 school of comput...
  • 67 篇 university of ch...
  • 63 篇 school of comput...
  • 63 篇 college of compu...

作者

  • 73 篇 vardi moshe y.
  • 70 篇 wang lei
  • 60 篇 zhang lei
  • 59 篇 pnueli amir
  • 47 篇 hancock edwin r.
  • 41 篇 huang yueh-min
  • 40 篇 li xin
  • 40 篇 marina l. gavril...
  • 38 篇 man ka lok
  • 37 篇 jiang xiaoyi
  • 37 篇 li yang
  • 36 篇 stuckey peter j.
  • 35 篇 zhang tao
  • 34 篇 yu yong
  • 34 篇 liu bo
  • 33 篇 panayiotis zaphi...
  • 33 篇 jianying zhou
  • 32 篇 peleg david
  • 31 篇 hsu tsan-sheng
  • 31 篇 lee dong chun

语言

  • 127,590 篇 英文
  • 5,876 篇 其他
  • 1,495 篇 中文
  • 284 篇 德文
  • 4 篇 法文
  • 1 篇 加泰罗尼亚文
  • 1 篇 俄文
检索条件"任意字段=Lecture Notes in Computer Science"
135251 条 记 录,以下是1551-1560 订阅
排序:
Invisible Backdoor Attack with Image Contours Triggers  24th
Invisible Backdoor Attack with Image Contours Triggers
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Hou, Yangzhi Yang, Ying Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, backdoor attack techniques on neural networks have been widely studied and researched. In this attack mode, the model implanted with a backdoor behaves normally when processing normal inputs, but once... 详细信息
来源: 评论
COVER: A Heuristic Greedy Adversarial Attack on Prompt-Based Learning in Language Models  20th
COVER: A Heuristic Greedy Adversarial Attack on Prompt-Base...
收藏 引用
20th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2023
作者: Tan, Zihao Chen, Qingliang Zhu, Wenbin Huang, Yongjian Department of Computer Science Jinan University Guangzhou510632 China Guangzhou Xuanyuan Research Institute Co. Ltd. Guangzhou510006 China
Prompt-based learning has been proved to be an effective way in pre-trained language models (PLMs), especially in low-resource scenarios like few-shot settings. However, the trustworthiness of PLMs is of paramount sig... 详细信息
来源: 评论
Adaptive Threshold-Driven Semi-Supervised Facial Expression Recognition  21st
Adaptive Threshold-Driven Semi-Supervised Facial Expression ...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Wang, Yiqi Zhu, Aiqing Yuan, Junbin Xu, Qingzhen School of Computer Science South China Normal University Guangzhou China
Semi-supervised learning (SSL) methods are renowned for their capacity to utilise unlabelled data. In most SSLs, the threshold settings are fixed. They ignored the fact that learning difficulty varies among different ... 详细信息
来源: 评论
OPECE: Optimal Placement of Edge Servers in Cloud Environment  18th
OPECE: Optimal Placement of Edge Servers in Cloud Environm...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Tao Chen, Fengmei Xue, Shengjun Li, Zheng Tian, Yachong Cheng, Xianyi School of Computer Science and Technology Silicon Lake College Suzhou215332 China School of Computer Secience Nanjing University of Information Science and Technology Nanjing210044 China
Cloud computing offloads user tasks to remote cloud servers, which can effectively enhance the user’s network experience, but in recent years, as the number of offloaded tasks increases and users’ real-time requirem... 详细信息
来源: 评论
Semantic Network Analysis of a Learning Task Among Japanese Students of Psychology  29th
Semantic Network Analysis of a Learning Task Among Japanese ...
收藏 引用
29th International Conference on Collaboration Technologies and Social Computing (CollabTech)
作者: Xanat, Vargas Meza Shigen, Shimojo Hayashi, Yugo Kyoto Univ Inst Adv Study Human Biol Yoshida Konoe ChoSakyoku Kyoto 6068303 Japan Ritsumeikan Univ Grad Sch Human Sci 2-150 Iwakura Cho Osaka Ibaraki 5678570 Japan Ritsumeikan Univ Dept Comprehens Psychol 2-150 Iwakura Cho Osaka Ibaraki 5678570 Japan
The complexity of the learning process includes cognitive elements that are difficult to visualize in real time. Collaborative learning adds a social factor. In this study, we examined the case of Japanese university ... 详细信息
来源: 评论
LTNER: Large Language Model Tagging for Named Entity Recognition with Contextualized Entity Marking  27th
LTNER: Large Language Model Tagging for Named Entity Recogni...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Yan, Faren Yu, Peng Chen, Xin Computer Network Information Center Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
The use of LLMs for natural language processing has become a popular trend in the past two years, driven by their formidable capacity for context comprehension and learning, which has inspired a wave of research from ... 详细信息
来源: 评论
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine  2nd
Embedding Data in Bitcoin Transaction Values with Restrict...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: An, Jiayi Tian, Haibo Guangdong Province Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China
Constructing covert channels on blockchains has recently become a significant research focus. A major challenge lies in embedding data into blockchain transactions, while maintaining strong concealment. This stud... 详细信息
来源: 评论
Automated Maternal Fetal Ultrasound Image Identification Using a Hybrid Vision Transformer Model  27th
Automated Maternal Fetal Ultrasound Image Identification Usi...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Krishna, Thunakala Bala Poreddy, Ajay Kumar Reddy Sindhu, Kolla Gnapika Kokil, Priyanka Lab Department of Electronics and Communication Engineering Indian Institute of Information Technology Design and Manufacturing Kancheepuram Chennai600127 India Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Chennai India
Ultrasound (US) technology has revolutionized prenatal care by offering noninvasive, real-time visualization of maternal-fetal anatomy. The accurate classification of maternal-fetal US planes is a critical segment of ... 详细信息
来源: 评论
Gaze2Atten: Analyzing Explainable Gaze Dynamics to Monitor Human Attention  17th
Gaze2Atten: Analyzing Explainable Gaze Dynamics to Monitor H...
收藏 引用
17th International Conference on Intelligent Robotics and Applications
作者: Mu, Fengjun Zhang, Jingting Zou, Chaobin Univ Elect Sci & Technol China Chengdu Sichuan Peoples R China
Attention monitoring is an essential task to evaluate the human cognitive status in human-computer interaction. Prior works either employ an inconvenient invasive method or struggle to provide an explainable mechanism... 详细信息
来源: 评论
6-DOF Motion Blur Synthesis and Performance Evaluation of Object Detection  27th
6-DOF Motion Blur Synthesis and Performance Evaluation of Ob...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Yang, Hanjin Li, Feng Zhang, Lei School of Computer Science and Technology Donghua University Shanghai201600 China National Innovation Center of Advanced Dyeing and Finishing Technology Shandong Tai’an271000 China
The current state-of-the-art deep learning vision networks commonly employs synthetic approaches for data augmentation when confronted with scenes requiring motion blur. However, existing blur synthesis methods often ... 详细信息
来源: 评论