咨询与建议

限定检索结果

文献类型

  • 9,498 篇 会议
  • 8,349 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,950 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,037 篇 工学
    • 8,329 篇 计算机科学与技术...
    • 6,931 篇 软件工程
    • 2,729 篇 信息与通信工程
    • 1,797 篇 生物工程
    • 1,553 篇 控制科学与工程
    • 1,353 篇 电气工程
    • 1,202 篇 生物医学工程(可授...
    • 1,024 篇 光学工程
    • 921 篇 电子科学与技术(可...
    • 609 篇 机械工程
    • 543 篇 化学工程与技术
    • 495 篇 网络空间安全
    • 456 篇 交通运输工程
    • 444 篇 动力工程及工程热...
    • 436 篇 仪器科学与技术
    • 431 篇 安全科学与工程
  • 6,573 篇 理学
    • 3,297 篇 数学
    • 2,050 篇 生物学
    • 1,747 篇 物理学
    • 1,267 篇 统计学(可授理学、...
    • 692 篇 化学
    • 590 篇 系统科学
  • 3,196 篇 管理学
    • 1,823 篇 管理科学与工程(可...
    • 1,516 篇 图书情报与档案管...
    • 903 篇 工商管理
  • 1,166 篇 医学
    • 972 篇 临床医学
    • 862 篇 基础医学(可授医学...
    • 523 篇 药学(可授医学、理...
    • 513 篇 公共卫生与预防医...
  • 570 篇 法学
    • 488 篇 社会学
  • 348 篇 经济学
  • 278 篇 农学
  • 182 篇 教育学
  • 60 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 712 篇 deep learning
  • 665 篇 accuracy
  • 452 篇 machine learning
  • 446 篇 feature extracti...
  • 411 篇 computational mo...
  • 401 篇 training
  • 355 篇 real-time system...
  • 334 篇 predictive model...
  • 292 篇 semantics
  • 274 篇 internet of thin...
  • 256 篇 optimization
  • 234 篇 support vector m...
  • 224 篇 convolutional ne...
  • 206 篇 reinforcement le...
  • 204 篇 data models
  • 195 篇 neural networks
  • 194 篇 data mining
  • 172 篇 image segmentati...
  • 157 篇 reliability
  • 149 篇 transformers

机构

  • 425 篇 department of ph...
  • 396 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 361 篇 h.h. wills physi...
  • 308 篇 university of ch...
  • 289 篇 van swinderen in...
  • 289 篇 nikhef national ...
  • 288 篇 imperial college...
  • 287 篇 school of physic...
  • 287 篇 center for high ...
  • 283 篇 department of ph...
  • 283 篇 physik-institut ...
  • 283 篇 oliver lodge lab...
  • 283 篇 physikalisches i...
  • 281 篇 cavendish labora...
  • 281 篇 stfc rutherford ...
  • 281 篇 school of physic...
  • 281 篇 school of physic...
  • 280 篇 institute of par...
  • 277 篇 departamento de ...

作者

  • 249 篇 barter w.
  • 240 篇 beiter a.
  • 233 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 203 篇 brundu d.
  • 200 篇 borsato m.
  • 198 篇 betancourt c.
  • 162 篇 niyato dusit
  • 160 篇 bediaga i.
  • 159 篇 baker s.
  • 150 篇 amato s.
  • 146 篇 baryshnikov f.
  • 145 篇 boettcher t.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain
  • 143 篇 f. maciuc

语言

  • 12,995 篇 英文
  • 4,876 篇 其他
  • 136 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science Engineering-Data Science"
17950 条 记 录,以下是421-430 订阅
排序:
Harnessing Large Language Models for Text-Rich Sequential Recommendation  24
Harnessing Large Language Models for Text-Rich Sequential Re...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Zheng, Zhi Chao, WenShuo Qiu, Zhaopeng Zhu, Hengshu Xiong, Hui School of Data Science University of Science and Technology of China China Career Science Lab BOSS Zhipin China China China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Recent advances in Large Language Models (LLMs) have been changing the paradigm of Recommender Systems (RS). However, when items in the recommendation scenarios contain rich textual information, such as product descri... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
RoyaltyChain: A Blockchain-Powered Big data Framework for Accurate Music Royalties Prediction  21
RoyaltyChain: A Blockchain-Powered Big Data Framework for Ac...
收藏 引用
21st IEEE India Council International Conference, INDICON 2024
作者: Shah, Megh H. Sheth, Parth V. Kumari, Aparna Tanwar, Sudeep Chawra, Vrajesh Kumar, Sunil Institute of Technology Nirma University Department of Computer Science and Engineering Ahmedabad India Guru Jambheshwar University of Science & Technology Department of Ai and Data Science Haryana Hisar India
The growth of the commodification of music in the present age has made royalties allocation in an efficient, straight-forward manner to the stakeholders, in general, a complex issue. To address these challenges, this ... 详细信息
来源: 评论
Collaborative Filtering of Malicious Information from the MULTimedia data Using s  1
Collaborative Filtering of Malicious Information from the MU...
收藏 引用
1st International Conference on computer science and Emerging Technologies, CSET 2023
作者: Parasuraman, Manikandan Abirami, G. Arockia Raj, A. Krishnan, Batri Munnangi, Ashok Kumar Kumaresan, M. School of Computer Science and Engineering Jain Deemed to Be University Bengaluru India Sathyabama Institute of Science and Technology Department of Computer Science Chennai India Madanapalle Institute of Technology and Science Department of Computer Science and Engineering - Data Science Madanapalle India Velagapudi Ramakrishna Siddhartha Engineering College Vijayawada India
Due to high proliferation of unsolicited information in the text, image and video files, the social media analytics engine suffers from losing its user, user privacy and others. The unsolicited information is been a h... 详细信息
来源: 评论
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation
收藏 引用
Visual computer 2024年 第9期40卷 6421-6447页
作者: Su, Guo-Dong Chang, Ching-Chun Lin, Chia-Chen Chang, Chin-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Fujian Province University Fuzhou China Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preservation in ... 详细信息
来源: 评论
Efficient Robustness Evaluation via Constraint Relaxation  39
Efficient Robustness Evaluation via Constraint Relaxation
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Pan, Chao Wu, Yu Tang, Ke Li, Qing Yao, Xin Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China The Hong Kong Polytechnic University Hong Kong School of Data Science Lingnan University Hong Kong
The study of enhancing model robustness against adversarial examples has become increasingly critical in the security of deep learning, leading to the development of numerous adversarial defense techniques. While thes... 详细信息
来源: 评论
An Amalgamated CNN-Transformer Network for Lightweight Image Super-Resolution
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1376-1387页
作者: Fang, Jinsheng Lin, Hanjiang Zeng, Kun School of Computer Science and Engineering Minnan Normal University Zhangzhou363000 China Key Laboratory of Data Science and Intelligence Application Fujian Province University Fujian Zhangzhou363000 China School of Computer and Control engineering Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350108 China
Recently, Transformer-based methods for single image super-resolution (SISR) have achieved better performance advantages than the methods based on convolutional neural network (CNN). Exploiting self-attention mechanis... 详细信息
来源: 评论
Grassland Mouse Hole Recognition Model Based on UAV Remote Sensing and Improved YOLOv7
Grassland Mouse Hole Recognition Model Based on UAV Remote S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Han, Yu Bai, Xiangyu Gao, Xiaochen Cheng, Haoran Zhou, Kexin College of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China School of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China
As the most widely distributed vegetation type on Earth, grasslands are the second largest ecosystem after forests, and are known as the 'skin of the earth'. However, the frequency of rodent infestation has be... 详细信息
来源: 评论
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images
收藏 引用
Frontiers of computer science 2022年 第4期16卷 131-146页
作者: Guoshuai Zhou Xiuxia Tian Aoying Zhou School of Computer Science and Technology ShangHai University of Electric PowerShanghai200090China School of Data Science and Engineering East China Normal UniversityShanghai200062China
Image forgery detection remains a challenging *** the most common copy-move forgery detection,the robustness and accuracy of existing methods can still be further *** the best of our knowledge,we are the first to prop... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论