咨询与建议

限定检索结果

文献类型

  • 698 篇 期刊文献
  • 655 篇 会议

馆藏范围

  • 1,353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 852 篇 工学
    • 646 篇 计算机科学与技术...
    • 483 篇 软件工程
    • 162 篇 信息与通信工程
    • 145 篇 控制科学与工程
    • 135 篇 生物工程
    • 119 篇 电气工程
    • 91 篇 生物医学工程(可授...
    • 80 篇 光学工程
    • 71 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 41 篇 仪器科学与技术
    • 39 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 35 篇 交通运输工程
    • 35 篇 网络空间安全
    • 29 篇 安全科学与工程
  • 524 篇 理学
    • 258 篇 数学
    • 156 篇 生物学
    • 140 篇 物理学
    • 104 篇 统计学(可授理学、...
    • 50 篇 系统科学
    • 46 篇 化学
  • 258 篇 管理学
    • 163 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 96 篇 医学
    • 77 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
    • 31 篇 药学(可授医学、理...
  • 41 篇 法学
    • 37 篇 社会学
  • 25 篇 农学
  • 23 篇 经济学
  • 20 篇 教育学
  • 6 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 65 篇 deep learning
  • 41 篇 machine learning
  • 41 篇 accuracy
  • 38 篇 artificial intel...
  • 33 篇 mcda
  • 33 篇 convolutional ne...
  • 28 篇 decision making
  • 27 篇 feature extracti...
  • 21 篇 real-time system...
  • 21 篇 comet
  • 19 篇 internet of thin...
  • 19 篇 training
  • 17 篇 support vector m...
  • 17 篇 predictive model...
  • 17 篇 topsis
  • 16 篇 data models
  • 15 篇 computer science
  • 15 篇 data mining
  • 14 篇 computational mo...
  • 13 篇 covid-19

机构

  • 26 篇 school of applie...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 hourani center f...
  • 22 篇 department of el...
  • 22 篇 meu research uni...
  • 20 篇 research team on...
  • 16 篇 department of ap...
  • 15 篇 law college dehr...
  • 15 篇 uttaranchal inst...
  • 15 篇 applied science ...
  • 14 篇 department of co...
  • 14 篇 hourani center f...
  • 13 篇 vector institute...
  • 13 篇 artificial intel...
  • 13 篇 school of comput...
  • 12 篇 meu research uni...
  • 12 篇 department of co...
  • 12 篇 school of life a...
  • 12 篇 department of ap...

作者

  • 25 篇 kotecha ketan
  • 24 篇 seifedine kadry
  • 22 篇 aspuru-guzik alá...
  • 22 篇 laith abualigah
  • 21 篇 ketan kotecha
  • 20 篇 wojciech sałabun
  • 19 篇 choudhury tanupr...
  • 19 篇 abualigah laith
  • 17 篇 salabun wojciech
  • 15 篇 belinkov yonatan
  • 15 篇 tanupriya choudh...
  • 14 篇 shweta pandey
  • 14 篇 mansi sahu
  • 13 篇 han jinyoung
  • 13 篇 kizielewicz bart...
  • 12 篇 pandey shweta
  • 11 篇 wieckowski jakub
  • 11 篇 jakub więckowski
  • 10 篇 alrajeh nabil
  • 10 篇 javaid nadeem

语言

  • 1,272 篇 英文
  • 76 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Artificial Intelligence and Applied Computer Science"
1353 条 记 录,以下是11-20 订阅
排序:
Composite Concept Extraction Through Backdooring  27th
Composite Concept Extraction Through Backdooring
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Ghosh, Banibrata Harikumar, Haripriya Doan, Khoa D. Venkatesh, Svetha Rana, Santu Applied Artificial Intelligence Institute Deakin University Waurn Ponds Geelong Australia College of Engineering and Computer Science VinUniversity Hanoi Viet Nam
Learning composite concepts, such as "red car", from individual examples—like a white car representing the concept of "car" and a red strawberry representing the concept of "red"—is inh... 详细信息
来源: 评论
Faster R-CNN in Healthcare and Disease Detection: A Comprehensive Review
Faster R-CNN in Healthcare and Disease Detection: A Comprehe...
收藏 引用
2025 International Conference on Electronics, Information, and Communication, ICEIC 2025
作者: Tian, Jiawei Lee, Seungho Kang, Kyungtae Major in Bio Artificial Intelligence Hanyang University Dept. of Computer Science and Engineering Ansan-si Korea Republic of Hanyang University Dept. of Applied Artificial Intelligence Ansan-si Korea Republic of Hanyang University Dept. of Artificial Intelligence Ansan-si Korea Republic of
This review examines the applications, challenges, and prospects of Faster Region-based Convolutional Neural Networks (Faster R-CNN) in healthcare and disease detection. Through a meta-analysis of Web of science liter... 详细信息
来源: 评论
Generative AI for Radiological Image Data: Current Trends and Outlook  14
Generative AI for Radiological Image Data: Current Trends an...
收藏 引用
14th International Conference on Information and Communication Technology Convergence, ICTC 2023
作者: Han, Ji-Won Lee, Yeon-Joon Hanyang University Major in Bio Artificial Intelligence Department of Applied Artificial Intelligence Seoul Korea Republic of Hanyang University Major in Bio Artificial Intelligence Department of Computer Science and Engineering Seoul Korea Republic of
Generative artificial intelligence (AI) has gained prominence, particularly in the field of radiological image data. This study investigates current trends and prospects of generative AI in X-ray, CT, MRI, and PET ima... 详细信息
来源: 评论
Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3565-3583页
作者: Sameh Zarif Eman Morad Khalid Amin Abdullah Alharbi Wail S.Elkilani Shouze Tang Department of Information Technology Faculty of Computers and InformationMenoufia UniversityMenoufia32511Egypt Department of Artificial Intelligence Faculty of Artificial IntelligenceEgyptian Russian UniversityBader11829Egypt Department of Computer Science Community CollegeKing Saud UniversityRiyadh11362Saudi Arabia College of Applied Computer Science King Saud UniversityAl-Muzahmiya19676Saudi Arabia School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China
Due to the exponential growth of video data,aided by rapid advancements in multimedia *** became difficult for the user to obtain information from a large video *** process of providing an abstract of the entire video... 详细信息
来源: 评论
Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification
收藏 引用
Neutrosophic Sets and Systems 2025年 82卷 781-799页
作者: Abdellah, Mohamed Refaat Oudah, Hasan H. Badawy, Ahmed Mohamed Ahmed Mohamed, Abdelfattah Abdelfattah M. Bedier, Shady Ahmed Metwaly, Ahmed A. Eassa, Mohamed Abdelhafeez, Ahmed The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt College of Arts Department of Journalism Ahl Al Bayt University Karbala Iraq Cybersecurity Department Faculty of Computers and Artificial Intelligence Helwan University Egypt Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Department of Computer Science Faculty of Computers and Informatics Zagazig University Zagazig44519 Egypt Applied Science Research Center Applied Science Private University Amman Jordan
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar... 详细信息
来源: 评论
Data Augmentation for Messenger Phishing Detection Using Large Language Models
Data Augmentation for Messenger Phishing Detection Using Lar...
收藏 引用
2025 International Conference on Electronics, Information, and Communication, ICEIC 2025
作者: Noh, Keonwoong Oh, Seokjin Kim, Sunyub An, Dohyung Jung, Woohwan Hanyang University Dept. of Applied Artificial Intelligence Seoul Korea Republic of Hanyang University Dept. of Computer Science Ansan Korea Republic of
In this study, we introduce a new dataset specifically designed for detecting messenger phishing, an increasingly significant issue in cybercrime. To overcome the scarcity of labeled phishing data, we employ large lan... 详细信息
来源: 评论
Improving Messenger Phishing Detection Using Heterogeneous Phishing Data
Improving Messenger Phishing Detection Using Heterogeneous P...
收藏 引用
2025 International Conference on Electronics, Information, and Communication, ICEIC 2025
作者: Oh, Seokjin Noh, Keonwoong Kim, Sunyub An, Dohyung Jung, Woohwan Hanyang University Dept. of Applied Artificial Intelligence Seoul Korea Republic of Hanyang University Dept. of Computer Science Ansan Korea Republic of
Recently, as messenger phishing has been occurring more frequently, the need for its detection has increased;however, datasets for messenger phishing detection are publicly unavailable. In this paper, we address the d... 详细信息
来源: 评论
BoT-FaceSORT: Bag-of-Tricks for Robust Multi-face Tracking in Unconstrained Videos  17th
BoT-FaceSORT: Bag-of-Tricks for Robust Multi-face Tracking ...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: Kim, Jonghyeon Ju, Chan-Yang Kim, Gun-Woo Lee, D.-H. Department of Applied Artificial Intelligence Hanyang University Ansan Korea Republic of Department of Computer Science and Engineering Gyeongsang National University Jinju Korea Republic of
Multi-face tracking (MFT) is a subtask of multi-object tracking (MOT) that focuses on detecting and tracking multiple faces across video frames. Modern MOT trackers adopt the Kalman filter (KF), a linear model that es... 详细信息
来源: 评论
IMPROVING OUT-OF-DISTRIBUTION GENERALIZATION WITH INDIRECTION REPRESENTATIONS  11
IMPROVING OUT-OF-DISTRIBUTION GENERALIZATION WITH INDIRECTIO...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Pham, Kha Le, Hung Ngo, Man Tran, Truyen Applied Artificial Intelligence Institute Deakin University Australia Faculty of Mathematics and Computer Science VNUHCM-University of Science Viet Nam
We propose a generic module named Indirection Layer (InLay), which leverages indirection and data internal relationships to effectively construct symbolic indirect representations to improve out-of-distribution genera... 详细信息
来源: 评论
Don’t Train, Just Prompt: Towards a Prompt Engineering Approach for a More Generative Container Orchestration Management  14
Don’t Train, Just Prompt: Towards a Prompt Engineering Appr...
收藏 引用
14th International Conference on Cloud Computing and Services science, CLOSER 2024
作者: Kratzke, Nane Drews, André Department of Electrical Engineering and Computer Science Lübeck University of Applied Sciences Germany Expert Group Artificial Intelligence in Applications Lübeck University of Applied Sciences Germany
Background: The intricate architecture of container orchestration systems like Kubernetes relies on the critical role of declarative manifest files that serve as the blueprints for orchestration. However, managing the... 详细信息
来源: 评论