咨询与建议

限定检索结果

文献类型

  • 2,861 篇 会议
  • 2,717 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 5,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,611 篇 工学
    • 2,749 篇 计算机科学与技术...
    • 2,298 篇 软件工程
    • 895 篇 信息与通信工程
    • 618 篇 生物工程
    • 456 篇 控制科学与工程
    • 455 篇 电气工程
    • 403 篇 生物医学工程(可授...
    • 310 篇 光学工程
    • 302 篇 电子科学与技术(可...
    • 235 篇 机械工程
    • 183 篇 化学工程与技术
    • 133 篇 仪器科学与技术
    • 133 篇 动力工程及工程热...
    • 119 篇 建筑学
    • 109 篇 网络空间安全
    • 105 篇 土木工程
  • 1,972 篇 理学
    • 1,045 篇 数学
    • 686 篇 生物学
    • 411 篇 物理学
    • 358 篇 统计学(可授理学、...
    • 213 篇 化学
    • 176 篇 系统科学
  • 1,063 篇 管理学
    • 590 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 247 篇 工商管理
  • 343 篇 医学
    • 294 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 163 篇 药学(可授医学、理...
    • 132 篇 公共卫生与预防医...
  • 176 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 81 篇 农学
  • 60 篇 教育学
  • 15 篇 军事学
  • 14 篇 文学
  • 7 篇 艺术学

主题

  • 197 篇 semantics
  • 192 篇 feature extracti...
  • 192 篇 training
  • 173 篇 deep learning
  • 136 篇 accuracy
  • 132 篇 computational mo...
  • 131 篇 machine learning
  • 116 篇 data models
  • 104 篇 predictive model...
  • 92 篇 data mining
  • 79 篇 federated learni...
  • 78 篇 task analysis
  • 76 篇 optimization
  • 73 篇 neural networks
  • 70 篇 graph neural net...
  • 70 篇 convolutional ne...
  • 68 篇 forecasting
  • 68 篇 adaptation model...
  • 64 篇 image segmentati...
  • 63 篇 visualization

机构

  • 112 篇 college of compu...
  • 110 篇 national enginee...
  • 104 篇 department of el...
  • 102 篇 national enginee...
  • 102 篇 school of comput...
  • 101 篇 shenzhen researc...
  • 92 篇 school of big da...
  • 86 篇 school of comput...
  • 79 篇 school of comput...
  • 73 篇 school of comput...
  • 73 篇 school of scienc...
  • 69 篇 beijing advanced...
  • 63 篇 guangdong key la...
  • 62 篇 school of comput...
  • 59 篇 peng cheng labor...
  • 58 篇 school of comput...
  • 53 篇 shandong provinc...
  • 52 篇 shandong enginee...
  • 52 篇 the department o...
  • 47 篇 college of big d...

作者

  • 110 篇 zhang rui
  • 95 篇 hai jin
  • 74 篇 jin hai
  • 46 篇 xia yong
  • 44 篇 zhu lipeng
  • 42 篇 li haizhou
  • 41 篇 liu jun
  • 40 篇 shen linlin
  • 34 篇 zhou pan
  • 32 篇 pan jeng-shyang
  • 31 篇 wang shuai
  • 30 篇 wang meng
  • 29 篇 xiaofei liao
  • 29 篇 zhang yanning
  • 27 篇 liu yang
  • 27 篇 wu xindong
  • 26 篇 peng hao
  • 26 篇 li jianxin
  • 24 篇 zhu guangxu
  • 23 篇 zhang hongyu

语言

  • 4,329 篇 英文
  • 1,228 篇 其他
  • 58 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Big Data Analytics Computer Science and Engineering"
5592 条 记 录,以下是101-110 订阅
排序:
Analysing the Twitter Sentiments in COVID-19 Using Machine Learning Algorithms
Analysing the Twitter Sentiments in COVID-19 Using Machine L...
收藏 引用
2022 IEEE International Conference on Advances in Computing, Communication and Applied Informatics, ACCAI 2022
作者: Katarya, Rahul Nath, G Amar Singhal, Divit Shukla, Aryaman Delhi Technological University Big Data Analytics and Web Intelligence Laboratory Department of Computer Science Engineering New Delhi India
The coronavirus emanated in Wuhan city of China, in the last month of 2019 and was even announced as a global threat. Social media could be an utterly noteworthy supply of facts during a time of crisis. User-generated... 详细信息
来源: 评论
A Transmission and Transformation Fault Detection Algorithm Based on Improved YOLOv5
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 2997-3011页
作者: Xinliang Tang Xiaotong Ru Jingfang Su Gabriel Adonis School of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuang050000China Department of Computer Science and Information Systems Birkbeck Institute for Data AnalyticsLondonB100ABWC1E 7HXUK
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s... 详细信息
来源: 评论
Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 695-712页
作者: Fangjun Luan Xuewen Mu Shuai Yuan Department of Computer Technology School of Computer Science and EngineeringShenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Jianzhu UniversityShenyang110168China Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang Jianzhu UniversityShenyang110168China
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd... 详细信息
来源: 评论
Structure Balance and Gradient Matching-Based Signed Graph Condensation  39
Structure Balance and Gradient Matching-Based Signed Graph C...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Rong Xu, Long Liu, Songbai Ji, Junkai Li, Lingjie Lin, Qiuzhen Ma, Lijia College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Big Data and Internet Shenzhen Technology University Shenzhen China
Training graph neural networks (GNNs) for graph representation has received increasing concerns due to its outstanding performance in the link prediction and node classification tasks, but it incurs much time and stor... 详细信息
来源: 评论
CMNEE: A Large-Scale Document-Level Event Extraction dataset based on Open-Source Chinese Military News  30
CMNEE: A Large-Scale Document-Level Event Extraction Dataset...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhu, Mengna Xu, Zijie Zeng, Kaisheng Xiao, Kaiming Wang, Mao Ke, Wenjun Huang, Hongbin Laboratory for Big Data and Decision National University of Defense Technology China School of Computer Science and Engineering Southeast University China Computer Science and Technology Tsinghua University China
Extracting structured event knowledge, including event triggers and corresponding arguments, from military texts is fundamental to many applications, such as intelligence analysis and decision assistance. However, eve... 详细信息
来源: 评论
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation Learning  26th
TSR-Jack: An In-Browser Crypto-Jacking Detection Method Base...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Cui, Bo Liu, Shuai Engineering Research Center of Ecological Big Data Ministry of Education Beijing China College of Computer Science Inner Mongolia University Hohhot China
As the economic value of cryptocurrencies continues to ascend, an increasing number of cybercriminals exploit malicious browser scripts to commandeer the system and network resources of victims for unauthorized crypto... 详细信息
来源: 评论
Exploring More from Multiple Gait Modalities for Human Identification  39
Exploring More from Multiple Gait Modalities for Human Ident...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Jin, Dongyang Fan, Chao Chen, Weihua Yu, Shiqi Department of Computer Science and Engineering Southern University of Science and Technology China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Alibaba Group China
The gait, as a kind of soft biometric characteristic, can reflect the distinct walking patterns of individuals at a distance, exhibiting a promising technique for unrestrained human identification. With largely exclud...
来源: 评论
Bootstrap-Based Layerwise Refining for Causal Structure Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2708-2722页
作者: Xiang, Guodu Wang, Hao Yu, Kui Guo, Xianjie Cao, Fuyuan Song, Yukun Hefei University of Technology Key Laboratory of Knowledge Engineering with the Big Data of Ministry of Education Hefei230601 China Hefei University of Technology School of Computer Science and Information Engineering Hefei230601 China Shanxi University School of Computer and Information Technology Taiyuan030006 China
Learning causal structures from observational data is critical for causal discovery and many machine learning tasks. Traditional constraint-based methods first adopt conditional independence (CI) tests to learn a glob... 详细信息
来源: 评论
Adversarial Contrastive Graph Augmentation with Counterfactual Regularization  39
Adversarial Contrastive Graph Augmentation with Counterfactu...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Long, Tao Zhang, Lei Zhang, Liang Cui, Laizhong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China Shenzhen Research Institute of Big Data Guangdong Shenzhen China
With the advancement of graph representation learning, self-supervised graph contrastive learning (GCL) has emerged as a key technique in the field. In GCL, positive and negative samples are generated through data aug... 详细信息
来源: 评论
Tree Regularization for Visual Explanations of Cancer Cell Classification
Tree Regularization for Visual Explanations of Cancer Cell C...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Raza, Muhammad Umair Chen, Jie Wang, Li Nawaz, Adil Leung, Victor C.M. Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China
The challenge of interpretability remains a significant barrier to adopting deep neural networks in healthcare domains. Although tree regularization aims to align a deep neural network's decisions with a single ax... 详细信息
来源: 评论