咨询与建议

限定检索结果

文献类型

  • 9,285 篇 会议
  • 8,298 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,940 篇 工学
    • 8,265 篇 计算机科学与技术...
    • 6,860 篇 软件工程
    • 2,669 篇 信息与通信工程
    • 1,801 篇 生物工程
    • 1,532 篇 控制科学与工程
    • 1,301 篇 电气工程
    • 1,194 篇 生物医学工程(可授...
    • 1,016 篇 光学工程
    • 905 篇 电子科学与技术(可...
    • 591 篇 机械工程
    • 538 篇 化学工程与技术
    • 454 篇 网络空间安全
    • 441 篇 交通运输工程
    • 437 篇 动力工程及工程热...
    • 414 篇 仪器科学与技术
    • 414 篇 安全科学与工程
  • 6,512 篇 理学
    • 3,264 篇 数学
    • 2,049 篇 生物学
    • 1,737 篇 物理学
    • 1,251 篇 统计学(可授理学、...
    • 669 篇 化学
    • 593 篇 系统科学
  • 3,140 篇 管理学
    • 1,781 篇 管理科学与工程(可...
    • 1,492 篇 图书情报与档案管...
    • 901 篇 工商管理
  • 1,147 篇 医学
    • 956 篇 临床医学
    • 862 篇 基础医学(可授医学...
    • 518 篇 药学(可授医学、理...
    • 489 篇 公共卫生与预防医...
  • 563 篇 法学
    • 483 篇 社会学
  • 339 篇 经济学
  • 275 篇 农学
  • 171 篇 教育学
  • 60 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 683 篇 deep learning
  • 612 篇 accuracy
  • 440 篇 feature extracti...
  • 437 篇 machine learning
  • 398 篇 computational mo...
  • 390 篇 training
  • 325 篇 predictive model...
  • 323 篇 real-time system...
  • 294 篇 semantics
  • 262 篇 internet of thin...
  • 244 篇 optimization
  • 226 篇 support vector m...
  • 224 篇 convolutional ne...
  • 200 篇 reinforcement le...
  • 193 篇 neural networks
  • 187 篇 data mining
  • 185 篇 data models
  • 162 篇 image segmentati...
  • 147 篇 reliability
  • 143 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 372 篇 horia hulubei na...
  • 363 篇 h.h. wills physi...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 291 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 235 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 200 篇 borsato m.
  • 198 篇 betancourt c.
  • 165 篇 bediaga i.
  • 158 篇 niyato dusit
  • 157 篇 baker s.
  • 150 篇 amato s.
  • 147 篇 baryshnikov f.
  • 146 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 15,616 篇 英文
  • 1,973 篇 其他
  • 122 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering with Data Science"
17686 条 记 录,以下是4651-4660 订阅
排序:
Balancing Usability and Security Innovative Approaches to Privacy in Digital Environments
Balancing Usability and Security Innovative Approaches to Pr...
收藏 引用
Communication, computer sciences and engineering (IC3SE), International Conference on
作者: Swathi Baswaraju M Geeta Yadav Ginni Nijhawan Ajay Rana T K. Pushpa Rani Taqi Mohammed Khattab Al-Rubaye Department of Computer Science – Data Science New Horizon College of Engineering Bangalore India Department of Computer Science And Engineering Institute Of Aeronautical Engineering Hyderabad Telangana India Lovely Professional University Phagwara India Amity School of Engineering and Technology Amity University Greater Noida India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India Department of Medical Laboratory Technology College Of Medical Technologies The Islamic University Najaf Iraq
data analysis, private protection, detecting unusual things, identifying people, and transferring data are part of the study's unique security design. The major system method is AUA. Your authentication level depe... 详细信息
来源: 评论
Channel-wise attention based binarization for CNN Architectures
Channel-wise attention based binarization for CNN Architectu...
收藏 引用
Emerging Systems and Intelligent Computing (ESIC), International Conference on
作者: Ipsita Paul Mainak Bandyopadhyay Satya Ranjan Dash Tanjim Taharat Aurpa School of Computer Engineering KIIT D.U. Bhubaneswar India School of Computer Applications KIIT D.U. Bhubaneswar India Department of Data Science Engineering BSMR Digital University Bangladesh
Attention mechanisms are known to effectively increase the performance of a model by focusing on specific sections of the input while executing a task. Squeeze and Excitation module (SE-Net) and Efficient channel atte... 详细信息
来源: 评论
Exploring the Potential of Large Vision-Language Models for Unsupervised Text-Based Person Retrieval  39
Exploring the Potential of Large Vision-Language Models for ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Zongyi Jianbo, Li Shi, Yuxuan Chen, Jiazhong Huang, Shijuan Tu, Linnan Shen, Fei Ling, Hefei Department of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center of Educational Big Data The Faculty of Artificial Intelligence in Education Central China Normal University China Nanjing University of Science and Technology China
The aim of text-based person retrieval is to identify pedestrians using natural language descriptions within a large-scale image gallery. Traditional methods rely heavily on manually annotated image-text pairs, which ... 详细信息
来源: 评论
Earthquake Damage Prediction and Rapid Assessment of Building Damage Using Machine Learning.
Earthquake Damage Prediction and Rapid Assessment of Buildin...
收藏 引用
Advancement in Technology (ICONAT), International Conference for
作者: Yuvaraj Natarajan Gitanjali Wadhwa Preethi Akshaya Ranganathan Karthika Natarajan Dept. of Computer Science and Engineering KPR Institute of Engineering and Technology Coimbatore India Dept. of Artificial Intelligence and Data Science KPR Institute of Engineering and Technology Coimbatore India
A quick forecast of the region’s structural damage following an earthquake is crucial for community relief and rescue efforts. Following an earthquake, getting detailed information about buildings in seismic disaster... 详细信息
来源: 评论
An Encoder-Based Framework for Privacy-Preserving Machine Learning  24th
An Encoder-Based Framework for Privacy-Preserving Machine L...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Jiayun Ren, Wei Zhang, Xianchao Zheng, Xianghan School of Computer Science China University of Geosciences Wuhan430074 China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China Ministry of Education Chengdu China Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing University Jiaxing China Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing University Jiaxing China College of Computer and Big Data Fuzhou University Fujian Fuzhou China School of Information and Intelligent Engineering Sanya College Hainan China
As a data-driven science, machine learning requires vast amounts of training data and computational resources. However, for highly privacy-sensitive data, it is crucial to protect the privacy of the data during both t... 详细信息
来源: 评论
An Attention-Based Model for Clinical Time Series Prediction: Enhancing ICU Readmission Prediction
An Attention-Based Model for Clinical Time Series Prediction...
收藏 引用
International eConference on computer and Knowledge engineering (ICCKE)
作者: Hananeh Sadat Madinei Mohammad Reza Keyvanpour Seyed Vahab Shojaedini Department of Computer Engineering Data Mining Laboratory Faculty of Engineering Alzahra University Tehran Iran Department of Electrical Engineering Iranian Research Organization for Science and Technology Tehran Iran
In recent years, time series prediction has become a highly interesting topic in various applied areas, including clinical time series analysis. Hospitals and other clinical healthcare systems collect Electronic Healt... 详细信息
来源: 评论
Video Stabilization via Prediction with Time-Series Network and Image Inpainting with Pyramid Fusion
收藏 引用
Chinese Journal of Electronics 2021年 第6期30卷 1103-1110页
作者: CHENG Keyang LI Shichao RONG Lan WANG Wenshan SHI Wenxi ZHAN Yongzhao School of Computer Science and Communication Engineering Jiangsu University Jiangsu Province Big Data Ubiquitous Perception and Intelligent Agricultural Application Engineering Research Center Cyber Space Security Academy of Jiangsu University National Engineering Laboratory for Public Safety Risk Perception and Control by Big Data Xinjiang Lianhaichuangzhi Information Technology Co. Ltd.
Due to the poor filling effect of the video image defect commonly used in the video stabilization field, the video is seemed still unstable after the image stabilization process, which seriously affects the visual eff... 详细信息
来源: 评论
Negative Adversarial Example Generation Against Naver's Celebrity Recognition API  1
Negative Adversarial Example Generation Against Naver's Cele...
收藏 引用
1st ACM Workshop on Security Implications of Deepfakes and Cheapfakes, WDC 2022, co-located with ACM AsiaCCS 2022
作者: Kim, Keeyoung Woo, Simon S. State University of New York Korea Republic of Stony Brook University & IngenioAI Seoul Korea Republic of Department of Artificial Intelligence Applied Data Science Department Computer Science & Engineering Department Sungkyunkwan University Suwon Korea Republic of
Deep Neural Networks (DNNs) are very effective in image classification, detection and recognition due to a large number of available data. However, they can be easily fooled by adversarial examples and produce incorre... 详细信息
来源: 评论
Deep learning Arabic printed document knowledge extraction  5
Deep learning Arabic printed document knowledge extraction
收藏 引用
5th International Conference on Future Networks and Distributed Systems: The Premier Conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Alghamdi, Taghreed Snoussi, Samia Hsairi, Lobna Department of Computer Science College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Data Science Department University of Jeddah Saudi Arabia University of Tunis ElManar University Tunisia
This paper presents how to utilize deep learning to extract knowledge from Arabic printed document images. The fundamental goal of deep learning is automatically extracting significant features from images, eliminatin... 详细信息
来源: 评论
A consensus model for linguistic group decision making considering emotion analysis  10
A consensus model for linguistic group decision making consi...
收藏 引用
10th International Conference on Information Technology and Quantitative Management, ITQM 2023
作者: Xu, Mengru Jing, Fuying Chao, Xiangrui Herrera-Viedma, Enrique School of Management Science and Engineering Chongqing Technology and Business University Chongqing400067 China National Research Base of Intelligent Manufacturing Service Chongqing Technology and Business University Chongqing400067 China School of Business Sichuan University Chengdu610065 China Andalusian Research Institute in Data Science and Computational Intelligence Department of Computer Science and Artificial Intelligence University of Granada Granada18071 Spain
In a problem of linguistic group decision-making (GDM), various emotional characteristics of decision-makers' (DMs) behind their preference series, which is defined as emotion factor, can impact consensus reaching... 详细信息
来源: 评论