咨询与建议

限定检索结果

文献类型

  • 361 篇 期刊文献
  • 284 篇 会议
  • 7 册 图书

馆藏范围

  • 652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 345 篇 计算机科学与技术...
    • 300 篇 软件工程
    • 90 篇 生物工程
    • 80 篇 信息与通信工程
    • 77 篇 生物医学工程(可授...
    • 66 篇 光学工程
    • 51 篇 控制科学与工程
    • 42 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 18 篇 安全科学与工程
    • 13 篇 化学工程与技术
    • 13 篇 交通运输工程
    • 12 篇 建筑学
    • 12 篇 土木工程
  • 240 篇 理学
    • 116 篇 数学
    • 102 篇 生物学
    • 57 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 16 篇 化学
  • 130 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 73 篇 医学
    • 65 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 29 篇 公共卫生与预防医...
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 16 篇 法学
    • 15 篇 社会学
  • 8 篇 教育学
  • 8 篇 农学
  • 2 篇 艺术学

主题

  • 28 篇 deep learning
  • 26 篇 accuracy
  • 22 篇 machine learning
  • 22 篇 training
  • 19 篇 semantics
  • 17 篇 computational mo...
  • 17 篇 feature extracti...
  • 14 篇 image segmentati...
  • 14 篇 federated learni...
  • 14 篇 data models
  • 13 篇 optimization
  • 13 篇 convolutional ne...
  • 12 篇 reinforcement le...
  • 11 篇 predictive model...
  • 10 篇 artificial intel...
  • 9 篇 object detection
  • 9 篇 transformers
  • 9 篇 real-time system...
  • 9 篇 decision making
  • 9 篇 multiobjective o...

机构

  • 34 篇 college of compu...
  • 18 篇 school of big da...
  • 16 篇 department of co...
  • 16 篇 national enginee...
  • 12 篇 shenzhen researc...
  • 10 篇 university of sc...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 university of ch...
  • 9 篇 state key labora...
  • 9 篇 artificial intel...
  • 9 篇 school of big da...
  • 8 篇 national enginee...
  • 8 篇 college of intel...
  • 8 篇 iconix software ...
  • 8 篇 college of compu...
  • 7 篇 institute of art...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 moe key lab of a...

作者

  • 12 篇 seifedine kadry
  • 12 篇 xiaofei wang
  • 11 篇 victor c. m. leu...
  • 11 篇 xiong hui
  • 11 篇 jin hai
  • 10 篇 xiuhua li
  • 10 篇 leung victor c. ...
  • 8 篇 wang shuai
  • 8 篇 jungeun kim
  • 8 篇 r. saravanakumar
  • 7 篇 niyato dusit
  • 7 篇 qilin fan
  • 7 篇 timofte radu
  • 7 篇 shuai wang
  • 7 篇 gao can
  • 7 篇 hai jin
  • 6 篇 wang xiaofei
  • 6 篇 tian chunwei
  • 6 篇 zou deqing
  • 6 篇 wang yan

语言

  • 580 篇 英文
  • 69 篇 其他
  • 3 篇 中文
检索条件"机构=Big Data Intelligence Lab Department of Computer Science and Software Engineering"
652 条 记 录,以下是241-250 订阅
排序:
SRLinear: Lightweight Long-Term Time Series Forecasting via Symbolic Regression
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial intelligence 2025年
作者: Zhao, Hongbo Zhang, Hengzhe Tian, Chutian Wei, Zhi Zhou, Aimin East China Normal University Lab of Artificial Intelligence for Education School of Computer Science and Technology Shanghai200062 China Victoria University of Wellington Centre for Data Science and Artificial Intelligence School of Engineering and Computer Science Wellington6140 New Zealand New Jersey Institute of Technology Department of Computer Science NewarkNJ07102 United States
Long-term Time Series Forecasting (LTSF) plays a crucial role in various fields, including energy consumption and weather prediction. Recent advancements in deep learning, particularly transformer models, have signifi... 详细信息
来源: 评论
Enhancing Diversity in Multi-Objective Feature Selection
Enhancing Diversity in Multi-Objective Feature Selection
收藏 引用
Congress on Evolutionary Computation
作者: Sevil Zanjani Miyandoab Shahryar Rahnamayan Azam Asilian Bidgoli Sevda Ebrahimi Masoud Makrehchi Nature-Inspired Computational Intelligence (NICI) Lab Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa ON Canada Department of Engineering Brock University St. Catharines ON Canada Paculty of Science Wilfrid Laurier University Waterloo ON Canada
Feature selection plays a pivotal role in the data preprocessing and model-building pipeline, significantly en-hancing model performance, interpretability, and resource efficiency across diverse domains. In population... 详细信息
来源: 评论
Enhancing Dental Caries Identification with Deep Learning: A Study of Convolutional Neural Networks and Transfer Learning Approaches
SSRN
收藏 引用
SSRN 2024年
作者: Mannan, Fayqa Adeel, Muhammad Arif, Erssa Li, Jianqiang Ullah, Amin Nawazish, Samra Mahmood, Tariq Rehman, Amjad Shoukat, Ijaz Faculty of Information Technology Beijing University of Technology Beijing100124 China Department of Computer Science Government College University Faisalabad38000 Pakistan Department of Computer Science School of Science National Textile University Faisalabad37610 Pakistan Department of Computer Science Faculty of Computing Riphah International University Faisalabad38000 Pakistan Beijing Engineering Research Center for IoT Software and Systems 100124 China Department of Computer Science Faculty of IT and Computer Science University of Central Punjab Lahore Pakistan School of Computer Science and Engineering Southeast University Nanjing China Software Engineering Department University of Engineering and Technology Taxila Pakistan Artificial Intelligence & Data Analytics Lab CCIS Prince Sultan University Riyadh11586 Saudi Arabia Faculty of information Sciences University of Education Vehari Campus Vehari61100 Pakistan
Various deep learning techniques have been employed to diagnose dental caries using X-ray images. In this study, we utilized deep learning models, including Convolutional Neural Networks (CNNs) and transfer learning m... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection
Bridging Machine Learning and Formal Concept Analysis for Ef...
收藏 引用
Information Technology (ACIT)
作者: Anas M. Al-Oraiqat Oleksandr Drieiev Ghassan Samara Sattam Almatarneh Karim A. Al-Oraiqat Hazim Alrawashdeh Hanna Drieieva Ali Elrashidi Yassin M. Y. Hasan Department of Computer Science Faculty of Information Technology Zarqa University Jordan Department of Cybersecurity and Software Central Ukrainian National Technical University Kropyvnytskyi Ukraine Department of Data Science and Artificial Intelligence Faculty of Information Technology Zarqa University Jordan Department of Software Engineering Faculty of Information Technology Zarqa University Jordan Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia Electrical Engineering Department Assiut University Egypt
Crowd detection and prevention systems have become essential for managing densely populated areas. Modern systems leverage the combined power of machine learning, data mining, and image processing to extract and analy... 详细信息
来源: 评论
Boosting Fine-Grained Visual Anomaly Detection with Coarse-Knowledge-Aware Adversarial Learning  39
Boosting Fine-Grained Visual Anomaly Detection with Coarse-K...
收藏 引用
39th Annual AAAI Conference on Artificial intelligence, AAAI 2025
作者: Fang, Qingqing Su, Qinliang Lv, Wenxi Xu, Wenchao Yu, Jianxing School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Department of Computing The Hong Kong Polytechnic University Hong Kong School of Artificial Intelligence Sun Yat-sen University Guangdong China Pazhou Lab Guangzhou510330 China
Many unsupervised visual anomaly detection methods train an auto-encoder to reconstruct normal samples and then leverage the reconstruction error map to detect and localize the anomalies. However, due to the powerful ... 详细信息
来源: 评论
How Graph Neural Networks Learn: Lessons from Training Dynamics
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Chenxiao Wu, Qitian Wipf, David Sun, Ruoyu Yan, Junchi School of Artificial Intelligence Department of Computer Science and Engineering MoE Lab of AI Shanghai Jiao Tong University China Amazon Web Services United States School of Data Science The Chinese University of Hong Kong Shenzhen China Shenzhen International Center for Industrial and Applied Mathematics Shenzhen Research Institute of Big Data China
A long-standing goal in deep learning has been to characterize the learning behavior of black-box models in a more interpretable manner. For graph neural networks (GNNs), considerable advances have been made in formal... 详细信息
来源: 评论
Cybersecurity Threat Detection using Machine Learning on Network Traffic
Cybersecurity Threat Detection using Machine Learning on Net...
收藏 引用
International Conference on ent Computing and Control Systems (ICICCS)
作者: R. Rithi N. Nithya A. Akila R. Saravanakumar M. Vargheese S. Jeya Lakshmi Master of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Artificial Intelligence and Data Science R.M.K College of Engineering and Technology Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India Department of Computer Science and Engineering PSN College of Engineering and Technology Tirunelveli Tamil Nadu India
Web phishing is a prevalent online attack in which victims are tricked into revealing their personal information by visiting fraudulent websites. Phishers often use URL shortening tools to disguise malicious links, ma... 详细信息
来源: 评论
Traffic Aware Power Saving Communication Assisted By Double-Faced Active RIS
Traffic Aware Power Saving Communication Assisted By Double-...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuyan Zhou Yang Liu Qingqing Wu Qingjiang Shi Jun Zhao School of Information and Communication Engineering Dalian University of Technology Department of Electronic Engineering Shanghai Jiao Tong University School of Software Engineering Tongji University and Shenzhen Research Institute of Big Data Shenzhen China School of Computer Science and Engineering Nanyang Technological University
Despite its high energy and hardware efficiency, some defects of the reconfigurable intelligence surface (RIS) technology have come to be realized, including the severe fading loss and restricted-to-half-space coverag...
来源: 评论
A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Moubayed, Abdallah Injadat, MohammadNoor Alhindawi, Nouh Samara, Ghassan Abuasal, Sara Alazaidah, Raed School of Computing and Augmented Intelligence Arizona State University GilbertAZ United States Electrical and Computer Engineering Department Lebanese American University Byblos Lebanon Data Science and Artificial Intelligence Department Faculty of Information Technology Zarqa University Zarqa Jordan Electrical and Computer Engineering Department Western University LondonON Canada Faculty of Science and Information Technology Jadara University Irbid Jordan Computer Science Department Faculty of Information Technology Zarqa University Zarqa Jordan Software Engineering Department Faculty of Information Technology Zarqa University Zarqa Jordan
Analyzing and evaluating students’ progress in any learning environment is stressful and time consuming if done using traditional analysis methods. This is further exasperated by the increasing number of students due... 详细信息
来源: 评论