咨询与建议

限定检索结果

文献类型

  • 365 篇 期刊文献
  • 285 篇 会议
  • 7 册 图书

馆藏范围

  • 657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 343 篇 计算机科学与技术...
    • 298 篇 软件工程
    • 90 篇 生物工程
    • 80 篇 信息与通信工程
    • 77 篇 生物医学工程(可授...
    • 66 篇 光学工程
    • 50 篇 控制科学与工程
    • 43 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 18 篇 安全科学与工程
    • 13 篇 化学工程与技术
    • 12 篇 建筑学
    • 12 篇 土木工程
    • 12 篇 交通运输工程
  • 241 篇 理学
    • 115 篇 数学
    • 102 篇 生物学
    • 57 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 16 篇 化学
  • 130 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 73 篇 医学
    • 65 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 29 篇 公共卫生与预防医...
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 16 篇 法学
    • 15 篇 社会学
  • 8 篇 教育学
  • 8 篇 农学
  • 2 篇 艺术学

主题

  • 30 篇 deep learning
  • 26 篇 accuracy
  • 22 篇 machine learning
  • 21 篇 training
  • 19 篇 semantics
  • 17 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 image segmentati...
  • 14 篇 data models
  • 13 篇 federated learni...
  • 12 篇 reinforcement le...
  • 12 篇 optimization
  • 12 篇 convolutional ne...
  • 11 篇 predictive model...
  • 10 篇 artificial intel...
  • 9 篇 object detection
  • 9 篇 real-time system...
  • 9 篇 decision making
  • 9 篇 multiobjective o...
  • 8 篇 transformers

机构

  • 34 篇 college of compu...
  • 18 篇 school of big da...
  • 16 篇 department of co...
  • 15 篇 national enginee...
  • 13 篇 shenzhen researc...
  • 10 篇 university of sc...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 university of ch...
  • 9 篇 state key labora...
  • 9 篇 artificial intel...
  • 9 篇 school of big da...
  • 8 篇 national enginee...
  • 8 篇 college of intel...
  • 8 篇 iconix software ...
  • 8 篇 college of compu...
  • 7 篇 institute of art...
  • 7 篇 department of co...
  • 7 篇 moe key lab of a...
  • 7 篇 shenzhen institu...

作者

  • 12 篇 seifedine kadry
  • 12 篇 xiaofei wang
  • 11 篇 victor c. m. leu...
  • 11 篇 xiong hui
  • 11 篇 jin hai
  • 10 篇 xiuhua li
  • 10 篇 leung victor c. ...
  • 8 篇 wang shuai
  • 8 篇 jungeun kim
  • 8 篇 shuai wang
  • 8 篇 r. saravanakumar
  • 7 篇 niyato dusit
  • 7 篇 qilin fan
  • 7 篇 timofte radu
  • 7 篇 gao can
  • 7 篇 hai jin
  • 6 篇 wang xiaofei
  • 6 篇 tian chunwei
  • 6 篇 zou deqing
  • 6 篇 wang yan

语言

  • 516 篇 英文
  • 138 篇 其他
  • 3 篇 中文
检索条件"机构=Big Data Intelligence Lab Department of Computer Science and Software Engineering"
657 条 记 录,以下是251-260 订阅
排序:
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection  39
Look Inside for More: Internal Spatial Modality Perception f...
收藏 引用
39th Annual AAAI Conference on Artificial intelligence, AAAI 2025
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Natural Language Processing in Virtual Assistants Current Approaches and Challenges
Natural Language Processing in Virtual Assistants Current Ap...
收藏 引用
science, Technology, engineering and Management (ICSTEM), International Conference on
作者: Gautam Solaimalai J. Maria Shanthi Sampath Kumar S Priyanka Khabiya K. Geetha Gokul Talele US. Bank Software Engineering Manager Georgia United States of America Department of Artificial Intelligence and Machine Learning J B. Institute of Engineering and Technology Hyderabad Telangana India Department of Computer Science and Engineering Sri Eshwar College of Engineering Coimbatore Tamil Nadu India Department of Computer Science Engineering Mandsaur University Mandsaur Madhya Pradesh India Department of Computer Science G. T.N Arts College Dindigul Tamil Nadu India Department of Data Science Organization name Accenture Pune Maharashtra India
The proliferation of virtual sidekicks in colorful disciplines has prodded a swell of interest in advancing Natural Language Processing(NLP) ways to enhance their effectiveness. This paper provides a comprehensive rev... 详细信息
来源: 评论
Active Learning with the nnUNet and Sample Selection with Uncertainty-Aware Submodular Mutual Information Measure  7
Active Learning with the nnUNet and Sample Selection with Un...
收藏 引用
7th International Conference on Medical Imaging with Deep Learning, MIDL 2024
作者: Föllmer, Bernhard Schulze, Kenrick Wald, Christian Stober, Sebastian Samek, Wojciech Dewey, Marc Department of Radiology Charité-Universitätsmedizin Berlin Freie Universität Berlin Humboldt-Universität zu Berlin Berlin10117 Germany Institute of Mathematics Technical University of Berlin Berlin Germany Artificial Intelligence Lab. Otto-von-Guericke-Universität Magdeburg Germany Department of Artificial Intelligence Fraunhofer Heinrich Hertz Institute Berlin Germany BIFOLD – Berlin Institute for the Foundations of Learning and Data Berlin Germany Department of Electrical Engineering and Computer Science Technical University of Berlin Berlin Germany partner site Berlin Berlin Germany
Annotating medical images for segmentation tasks is a time-consuming process that requires expert knowledge. Active learning can reduce this annotation cost and achieve optimal model performance by selecting only the ... 详细信息
来源: 评论
Deepwalk-aware graph convolutional networks
收藏 引用
science China(Information sciences) 2022年 第5期65卷 81-95页
作者: Taisong JIN Huaqiang DAI Liujuan CAO Baochang ZHANG Feiyue HUANG Yue GAO Rongrong JI Media Analytics and Computing Lab Department of Computer Science and Technology School of InformaticsXiamen University Media Analytics and Computing Lab Department of Artificial Intelligence School of InformaticsXiamen University School of Automation Science and Electrical Engineering Beihang University Tencent Youtu Lab School of Software Tsinghua University
Graph convolutional networks(GCNs) provide a promising way to extract the useful information from graph-structured data. Most of the existing GCNs methods usually focus on local neighborhood information based on speci... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Secrecy Energy Efficiency Maximization in IRS-Assisted VLC MISO Networks with RSMA: A DS-PPO Approach
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Yangbo Fan, Jianhui Zhang, Ruichen Chang, Baofang Ng, Derrick Wing Kwan Niyato, Dusit Kim, Dong In Henan Normal University School of Computer and Information Engineering Xinxiang453007 China Engineering Lab of Intelligence Business and Internet of Things Henan453007 China Nanyang Technological University College of Computing and Data Science Singapore Singapore University of New South Wales School of Electrical Engineering and Telecommunications NSW2052 Australia Sungkyunkwan University Department of Electrical and Computer Engineering Suwon16419 Korea Republic of
This paper investigates intelligent reflecting surface (IRS)-assisted multiple-input single-output (MISO) visible light communication (VLC) networks utilizing the rate-splitting multiple access (RSMA) scheme. In these... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A Secure Authentication Framework for Consumer Mobile Crowdsourcing Networks
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Aldosary, Abdallah Tanveer, Muhammad Ahmad, Musheer Maghrabi, Louai A. Ahmed, Emad A. Hussain, Amir El-Latif, Ahmed A. Abd Department of Computer Engineering Prince Sattam bin Abdulaziz University Riyadh Wadi Addwasir11991 Saudi Arabia University of Management and Technology Department of Computer Science Lahore54770 Pakistan Jamia Millia Islamia Department of Computer Engineering New Delhi110025 India University of Business and Technology College of Engineering Department of Software Engineering Jeddah Saudi Arabia South Valley University Faculty of Computers and Information Department of Computer Science Qena Egypt Edinburgh Napier University United Kingdom Prince Sultan University EIAS Data Science Lab College of Computer and Information Sciences Center of Excellence in Quantum and Intelligent Computing Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science Shebin El-Koom32511 Egypt
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve complex tasks through group cooperation. It comprises three main components: the end-user, the service provider, and the mobile user... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Training Artificial Neural Networks by Coordinate Search Algorithm
arXiv
收藏 引用
arXiv 2024年
作者: Rokhsatyazdi, Ehsan Rahnamayan, Shahryar Miyandoab, Sevil Zanjani Bidgoli, Azam Asilian Tizhoosh, H.R. Lab Department of Electrical Computer and Software Engineering Ontario Tech University OshawaON Canada Department of Engineering Brock University St. CatharinesON Canada Faculty of Science Wilfrid Laurier University WaterlooON Canada Rhazes Lab Department of Artificial Intelligence and Informatics Mayo Clinic RochesterMN United States
Training Artificial Neural Networks (ANNs) poses a challenging and critical problem in machine learning. Despite the effectiveness of gradient-based learning methods, such as Stochastic Gradient Descent (SGD), in trai... 详细信息
来源: 评论