咨询与建议

限定检索结果

文献类型

  • 644 篇 期刊文献
  • 573 篇 会议
  • 3 册 图书

馆藏范围

  • 1,220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 818 篇 工学
    • 629 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 197 篇 信息与通信工程
    • 130 篇 生物工程
    • 112 篇 控制科学与工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 25 篇 建筑学
    • 24 篇 仪器科学与技术
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 449 篇 理学
    • 232 篇 数学
    • 149 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 247 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 33 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 feature extracti...
  • 41 篇 deep learning
  • 39 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 28 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 contrastive lear...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 17 篇 visualization
  • 17 篇 security
  • 16 篇 optimization
  • 16 篇 correlation
  • 15 篇 task analysis
  • 15 篇 artificial intel...

机构

  • 124 篇 college of compu...
  • 103 篇 national enginee...
  • 48 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of compu...
  • 34 篇 college of big d...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 shenzhen researc...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo
  • 9 篇 jian-tao zhou

语言

  • 1,061 篇 英文
  • 149 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1220 条 记 录,以下是601-610 订阅
排序:
Patch Target Guided Dual-Branch Deep Multiple Instance Learning for 3D MRI Analysis
Patch Target Guided Dual-Branch Deep Multiple Instance Learn...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Mingzhe Dai Xiaoshuang Shi Xiaofeng Zhu Tingrui Pan Kang Li School of Software Engineering University of Science and Technology of China Hefei China West China Biomedical Big Data Center West China Hospital of Sichuan University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Artificial Intelligence Research Institute Yibin China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou China Shanghai Artificial Intelligence Laboratory Shanghai China
Deep multiple instance learning (MIL) has attracted considerable attention in medical image analysis, since it only requires image-level labels for model training without using fine-grained (or patch) annotations. Unf... 详细信息
来源: 评论
Advancements in Cybersecurity Using Deep Learning Techniques Attack Detection for Trojan Horses
Advancements in Cybersecurity Using Deep Learning Techniques...
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Hosanna Princye P Ahila A A. Anna Lakshmi N. Ragavendran K. E. Purushothaman G. Uma Maheswari R. Saravanakumar Department of Electronics and Communication Engineering Sri Sairam College of Engineering Bangalore Anekal India Department of Information Technology R.M.K. Engineering College Chennai Tamil Nadu India Department of Artificial Intelligence and Data Science Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Software Analyst Iconix Software Solution Tirunelveli Tamil Nadu India
Today's computer networks are threatened by Trojan horse assaults and other cybersecurity dangers. We propose and evaluate deep learning methods using the Kaggle-hosted Trojan Detection dataset to detect Trojan ho... 详细信息
来源: 评论
Robust Dynamic Broadcasting for Multi-Hop Wireless Networks Under Time-Varying Connectivity and Dynamic SINR
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Tian, Xiang Yu, Jiguo Luo, Chuanwen Yu, Dongxiao Wang, Guijuan Feng, Bin Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Beijing Forestry University School of Information Science and Technology Beijing100083 China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Taishan University School of Information Science and Technology 271000 China
Throughput-optimal dynamic broadcasting is an essential cornerstone for the efficient operation of Multi-hop Wireless Networks (MWNs). Most existing algorithms for this problem were developed assuming static interfere... 详细信息
来源: 评论
FRSM: A Novel Fault-Tolerant Approach for Redundant-Path-Enabled Service Migration in Mobile Edge Computing  1
收藏 引用
29th International Conference on Web Services, ICWS 2022 Held as Part of the Services Conference Federation, SCF 2022
作者: Zhao, Jiale Dai, Mengxuan Xia, Yunni Ma, Yong He, Meibin Peng, Kai Li, Jianqi Li, Fan Fu, Xiaodong School of Computer Chongqing University Chongqing400030 China School of Computer and Information Engineering Jiangxi Normal University Nanchang330022 China Department of Big Data and AI of Jiangxi Telecom Nanchang330029 China Engineering College Huaqiao University Quanzhou362021 China Global Energy Interconnection Research Institute Co. Ltd. Beijing102209 China Key Laboratory of Fundamental Synthetic Vision Graphics and Image Science for National Defense Sichuan University Chengdu610065 China Data Science Research Center Faculty of Science Kunming University of Science and Technology Kunming650031 China
Mobile Edge Computing (MEC) provides users with low-latency, highly responsive services by deploying Edge Servers (ESs) near applications. MEC allows any edge-hosted application or service to be migrated between diffe... 详细信息
来源: 评论
AI Personalized Mental Health Monitoring System using Machine Learning, and Natural Language Processing
AI Personalized Mental Health Monitoring System using Machin...
收藏 引用
data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: S. Mohamed Jamal Irfan G. Dhivya N. Raghavendran M. C. Babu T. Jasperline R. Saravanakumar Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Artificial Intelligence and Date Science RMK College of Engineering and Technology Chennai Tamil Nadu India Artificial Intelligence and Data Sciences Chennai Institute of Technology Chennai Tamil Nadu India Department of Computer Science and Engineering Dr. G. U. Pope College of Engineering Tuticorin Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
This study introduces an AI-driven customized mental health monitoring system that uses machine learning (ML) and natural language processing (NLP) to provide ongoing mental health evaluation and assistance. The syste... 详细信息
来源: 评论
A spectrum-enhanced attention model for semantic segmentation of remote sensing images
A spectrum-enhanced attention model for semantic segmentatio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xin Li Feng Xu Feifei Tao Yao Tong Xin Lyu Jianyi Zhong André Kaup College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer Engineering Jiangsu Ocean University Lianyungang China School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China Chair of Multimedia Communications and Signal Processing Friedrich-Alexander University Erlangen-Nuremberg Erlangen Germany
Semantic segmentation of remote sensing images (RSIs) is essential for applications such as environmental monitoring, urban planning, and disaster management. Convolutional Neural Networks (CNNs) and their variants st... 详细信息
来源: 评论
UAV Virtual Antenna Array Deployment for Uplink Interference Mitigation in data Collection Networks
arXiv
收藏 引用
arXiv 2024年
作者: Li, Hongjuan Kang, Hui Sun, Geng Li, Jiahui Wang, Jiacheng Wang, Xue Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore College of Computing and Data Science Nanyang Technological University Singapore Department of Communication Engineering Jilin University Changchun130012 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Unmanned aerial vehicles (UAVs) have gained considerable attention as a platform for establishing aerial wireless networks and communications. However, the line-of-sight dominance in air-to-ground communications often... 详细信息
来源: 评论
TPE-H2MWD:an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1169-1180页
作者: Xiuli CHAI Xiuhui CHEN Yakun MA Fang ZUO Zhihua GAN Yushu ZHANG School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of ThingsHenan UniversityZhengzhou450046China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China School of Software Intelligent Data Processing Engineering Research Center of Henan ProvinceInstitute of Intelligent Network SystemHenan UniversityKaifeng475004China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China
With the substantial increase in image transmission,the demand for image security is ***-like images can be obtained by conventional encryption schemes,and although the security of the images can be guaranteed,the noi... 详细信息
来源: 评论
Machine Learning Enabled Healthcare Balancing Patient Privacy and data Utility
Machine Learning Enabled Healthcare Balancing Patient Privac...
收藏 引用
International Conference on science Technology engineering and Management (ICONSTEM)
作者: Manoj Ram Tammina Bhargavi Posinasetty Prabha Shreeraj Nair Santosh Kumar Pavithra G Harpreet Kaur Sr Software Developer Innovation Bread Financial Columbus Ohio Clinical Data Management Sr. Clinical Data Manager PROMETRIKA LLC Department of IT Noida Institute of Engineering and Technology Greater Noida Computer Science ERA University Lucknow Uttar Pradesh Electronics & Communication Engineering Dayananda Sagar College of Engineering Bangalore Karnataka Lovely Professional University Punjab Phagwara
When applied to healthcare, machine learning ushers in a new age of data-driven medical practice that holds great promise for better patient outcomes and individualized treatment. However, this evolution isn't wit... 详细信息
来源: 评论
Low-altitude Friendly-Jamming for Satellite-Maritime Communications via Generative AI-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Jiawei Wang, Aimin Sun, Geng Li, Jiahui Wang, Jiacheng Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channel... 详细信息
来源: 评论