咨询与建议

限定检索结果

文献类型

  • 521 篇 会议
  • 503 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 671 篇 工学
    • 498 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 143 篇 信息与通信工程
    • 97 篇 电气工程
    • 89 篇 控制科学与工程
    • 88 篇 生物工程
    • 64 篇 化学工程与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 31 篇 光学工程
    • 29 篇 安全科学与工程
    • 28 篇 动力工程及工程热...
    • 28 篇 交通运输工程
    • 19 篇 材料科学与工程(可...
  • 343 篇 理学
    • 194 篇 数学
    • 98 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 54 篇 物理学
    • 38 篇 化学
    • 33 篇 系统科学
  • 203 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 62 篇 医学
    • 48 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 27 篇 法学
    • 19 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 农学
  • 6 篇 教育学
  • 3 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 39 篇 deep learning
  • 36 篇 accuracy
  • 34 篇 training
  • 32 篇 data models
  • 29 篇 computational mo...
  • 25 篇 semantics
  • 25 篇 cloud computing
  • 22 篇 predictive model...
  • 21 篇 big data
  • 19 篇 federated learni...
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 18 篇 machine learning
  • 17 篇 internet of thin...
  • 17 篇 visualization
  • 16 篇 security
  • 15 篇 conferences
  • 14 篇 image segmentati...
  • 14 篇 convolution

机构

  • 136 篇 college of compu...
  • 77 篇 national enginee...
  • 39 篇 school of big da...
  • 38 篇 school of big da...
  • 37 篇 college of compu...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 college of compu...
  • 23 篇 big data institu...
  • 22 篇 college of compu...
  • 21 篇 college of data ...
  • 19 篇 college of compu...
  • 18 篇 shenzhen univers...
  • 17 篇 state key labora...
  • 16 篇 school of data a...
  • 16 篇 shenzhen univers...
  • 15 篇 college of big d...
  • 14 篇 college of big d...
  • 14 篇 college of scien...
  • 13 篇 shenzhen researc...

作者

  • 20 篇 shen linlin
  • 19 篇 li jianqiang
  • 18 篇 huang joshua zhe...
  • 18 篇 lan li
  • 15 篇 victor c. m. leu...
  • 14 篇 li leixiao
  • 13 篇 jianqiang li
  • 13 篇 leung victor c.m...
  • 13 篇 xiaofei wang
  • 12 篇 niyato dusit
  • 11 篇 xiuhua li
  • 10 篇 gao can
  • 10 篇 jie chen
  • 9 篇 shi qingjiang
  • 9 篇 li xiuhua
  • 9 篇 zhong ming
  • 9 篇 jian-tao zhou
  • 9 篇 leung victor c. ...
  • 9 篇 gao jing
  • 9 篇 lyu shen-huan

语言

  • 940 篇 英文
  • 81 篇 其他
  • 12 篇 中文
检索条件"机构=College of Data Science and Software Engineering"
1029 条 记 录,以下是101-110 订阅
排序:
AI Personalized Mental Health Monitoring System using Machine Learning, and Natural Language Processing
AI Personalized Mental Health Monitoring System using Machin...
收藏 引用
data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: S. Mohamed Jamal Irfan G. Dhivya N. Raghavendran M. C. Babu T. Jasperline R. Saravanakumar Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Artificial Intelligence and Date Science RMK College of Engineering and Technology Chennai Tamil Nadu India Artificial Intelligence and Data Sciences Chennai Institute of Technology Chennai Tamil Nadu India Department of Computer Science and Engineering Dr. G. U. Pope College of Engineering Tuticorin Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
This study introduces an AI-driven customized mental health monitoring system that uses machine learning (ML) and natural language processing (NLP) to provide ongoing mental health evaluation and assistance. The syste... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yujun Zhang Yanqu Chen Jiakai Wang Jin Hu Renshuai Tao Xianglong Liu State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
RFWNet: A Lightweight Remote Sensing Object Detector Integrating Multi-Scale Receptive Fields and Foreground Focus Mechanism
arXiv
收藏 引用
arXiv 2025年
作者: Lei, Yujie Sun, Wenjie Jia, Sen Li, Qingquan Zhang, Jie College of Information and Electrical Engineering China Agricultural University Beijing100083 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Key Laboratory of Spatial Smart Sensing and Services Shenzhen University Shenzhen518060 China Key Laboratory of Agricultural Machinery Monitoring and Big Data Applications Ministry of Agriculture and Rural Affairs Beijing100083 China
Challenges in remote sensing object detection (RSOD), such as high inter-class similarity, imbalanced foreground-background distribution, and the small size of objects in remote sensing images significantly hinder det... 详细信息
来源: 评论
Hyper-IIoT: A Smart Contract-inspired Access Control Scheme for Resource-constrained Industrial Internet of Things
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年
作者: Li, Dun Li, Hongzhi Crespi, Noel Minerva, Roberto Li, Ming Liang, Wei Li, Kuan-Ching Tsinghua University Department of Industrial Engineering China Institut Polytechnique de Paris Samovar Telecom SudParis Palaiseau91120 France Chizhou University College of Big Data and Artificial Intelligence Chizhou247100 China The Hong Kong Polytechnic University Research Institute for Advanced Manufacturing Hung Hom Hong Kong Hunan University of Science and Technology School of Computer Science and Engineering Hunan University of Science and Technology Sanya Research Institute Hunan Key Laboratory for Service Computing and Novel Software Technology China Providence University Dept. of Computer Science and Information Engineering Taiwan
In recent years, the refinements in industrial processes and the increasing complexity of managing privacy-sensitive data in Industrial Internet of Things (IIoT) devices have highlighted the need for secure, robust, a... 详细信息
来源: 评论
VMeta: A QoS dataset for Metaverse Services  6th
VMeta: A QoS Dataset for Metaverse Services
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Ge, Zhiyuan Jin, Huiying Dong, Hai Ji, Shunhui Li, Jiajia Yang, Shuhan Wang, Qi Zhang, Pengcheng Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing210000 China College of Computer Science and Software Engineering Hohai University Nanjing210000 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210000 China School of Computing Technologies RMIT University Melbourne3000 Australia
The metaverse is undergoing repaid evolution with metaverse services emerging as a significant focal point of research across virtual reality, augmented reality, and metaverse social networking. However, a key challen... 详细信息
来源: 评论
Low-altitude Friendly-Jamming for Satellite-Maritime Communications via Generative AI-enabled Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Jiawei Wang, Aimin Sun, Geng Li, Jiahui Wang, Jiacheng Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channel... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Multi-Disease Prediction Based on Deep Learning: A Survey
收藏 引用
Computer Modeling in engineering & sciences 2021年 第8期128卷 489-522页
作者: Shuxuan Xie Zengchen Yu Zhihan Lv College of Data Science Software Engineering Qingdao UniversityQingdao2660712China
In recent years, the development of artificial intelligence (AI) and the gradual beginning of AI’s research in themedical field have allowed people to see the excellent prospects of the integration of AI and healthca... 详细信息
来源: 评论
Multi-objective Aerial IRS-assisted ISAC Optimization via Generative AI-enhanced Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Xie, Wenwen Sun, Geng Wang, Jiacheng Du, Hongyang Kang, Jiawen Huang, Kaibin Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Department of Electrical and Electronic Engineering The University of Hong Kong 999077 Hong Kong School of Automation Guangdong University of Technology Guangzhou510006 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Integrated sensing and communication (ISAC) has garnered substantial research interest owing to its pivotal role in advancing the development of next-generation (6G) wireless networks. However, achieving a performance... 详细信息
来源: 评论