咨询与建议

限定检索结果

文献类型

  • 3,336 篇 会议
  • 2,031 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,342 篇 工学
    • 2,323 篇 计算机科学与技术...
    • 1,856 篇 软件工程
    • 725 篇 信息与通信工程
    • 545 篇 控制科学与工程
    • 350 篇 电子科学与技术(可...
    • 333 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 机械工程
    • 208 篇 仪器科学与技术
    • 208 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 101 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,776 篇 理学
    • 914 篇 数学
    • 499 篇 物理学
    • 357 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 170 篇 化学
  • 943 篇 管理学
    • 574 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 225 篇 医学
    • 188 篇 临床医学
    • 149 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 农学
  • 63 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 135 篇 feature extracti...
  • 133 篇 deep learning
  • 104 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 optimization
  • 78 篇 machine learning
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 56 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 visualization

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 108 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 school of inform...
  • 37 篇 department of co...
  • 31 篇 college of infor...
  • 30 篇 university of ch...
  • 30 篇 shandong provinc...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 25 篇 ren jiadong
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 255 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5386 条 记 录,以下是481-490 订阅
排序:
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
Handwritten Prescription Recognition Using VGG Based Architecture with Bi-LSTM
Handwritten Prescription Recognition Using VGG Based Archite...
收藏 引用
International Research Conference on Smart Computing and systems Engineering (SCSE)
作者: Isuru Kavinda Harinda Fernando Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer System Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Illegible handwriting on medical prescriptions poses a significant challenge, often leading to the misinterpretation of drug names and dosages. This issue primarily stems from doctors’ use of Latin abbreviations, dri... 详细信息
来源: 评论
Meta-Heuristic Based Multipath Joint Routing and Scheduling of Time-Triggered Traffic for Time-Sensitive Networking in IIoT  2
Meta-Heuristic Based Multipath Joint Routing and Scheduling ...
收藏 引用
2nd International Conference on Green Communication, Network, and Internet of Things, CNIoT 2022
作者: Chen, Chen Li, Zhong The College of Information Science and Technology Donghua University Shanghai201620 China The Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Time-Sensitive networking (TSN) meets the needs of industrial internet of things (IIoT). It solves the challenges of deterministic transmission and reliable communication of time sensitive data streams. Traffic schedu... 详细信息
来源: 评论
Model for Assessment information Security Awareness Level for Data Stewardship by Understanding the Context of Use  2022
Model for Assessment Information Security Awareness Level fo...
收藏 引用
11th International Conference on Software and computer Applications, ICSCA 2022
作者: Lubis, Muharman Azies Muslim, Abdul Ridho Lubis, Arif Alkhowarizmi, Alkhowarizmi Department of Information System Telkom University Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Indonesia Department of Information Technology Universitas Muhammadiyah Sumatera Utara Indonesia
The role of data stewardship satisfies various requirement for the users, employee or staff to provide necessary awareness in ensuring information security strategy take place accordingly. It relates to have properly ... 详细信息
来源: 评论
Robotic Anchoring system with Two Locomotion Modes for Preoperative Localization of Colorectal Cancer
Robotic Anchoring System with Two Locomotion Modes for Preop...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Wang, Jiale Ren, Hao Yang, Liu Zhao, Haoxiang Zhang, Ruijia Shen, Yajing Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong City University of Hong Kong Department of Biomedical Engineering Kowloon Hong Kong Institute of Robotics and Automatic Information System Nankai University China
At present, colorectal cancer is one of the most prevalent cancers in the world. Colectomy serves as an effective treatment option for this disease. Preoperative localization plays a vital role in the colectomy proced... 详细信息
来源: 评论
Cascaded Diffusion Models for Virtual Try-On: Improving Control and Resolution  39
Cascaded Diffusion Models for Virtual Try-On: Improving Cont...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Guangyuan Wang, Yongkang Luan, Junsheng Zhao, Lei Xing, Wei Lin, Huaizhong Ou, Binkai College of Computer Science and Technology Zhejiang University China Innovation Research & Development BoardWare Information System Limited Macao
Previous virtual try-on methods have employed ControlNet architecture in exemplar-based inpainting diffusion models to guide the generation of try-on images, preserving the garment’s features and enhancing the realis... 详细信息
来源: 评论
Preliminary Study on the Effect of Traffic Representation on Accuracy Degradation in Machine Learning-based IoT Device Identification
Preliminary Study on the Effect of Traffic Representation on...
收藏 引用
2022 IEEE International Conference on Computing, ICOCO 2022
作者: Aqil, Nik Afifi, Firdaus Zaki, Faiz Anuar, Nor Badrul Faculty of Computer Science and Information Technology Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia Faculty of Ocean Engineering Technology and Informatics Universiti Malaysia Terengganu Kuala Nerus Terengganu21030 Malaysia
The Internet of Things (IoT) has gained attention for its rapid growth in the past few years. IoT devices such as temperature and humidity sensors and voice controllers are implemented widely, from household appliance... 详细信息
来源: 评论
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Attack Detection Method in Vehicular Networks  3
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Atta...
收藏 引用
3rd International Seminar on Artificial Intelligence, Networking, and information technology, AINIT 2022
作者: Luo, Jie Li, Zhong College of Information Science and Technology Donghua University Shanghai201620 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Vehicular networks improve traffic safety and efficiency by wireless communications among vehicles and infrastructures. However, security has always been a challenge to vehicular networks, which may cause severe harm ... 详细信息
来源: 评论
F-CNN: Faster CNN Exploiting Data Re-Use with Statistical Analysis  5
F-CNN: Faster CNN Exploiting Data Re-Use with Statistical An...
收藏 引用
5th IEEE International Conference on Artificial Intelligence Circuits and systems, AICAS 2023
作者: Alantali, Fatmah Halawani, Yasmin Mohammad, Baker Al-Qutayri, Mahmoud Khalifa University System-on-Chip Lab Electrical Engineering and Computer Science Department Abu Dhabi United Arab Emirates University of Dubai College of Engineering & Information Technology Dubai United Arab Emirates
Many of the current edge computing devices need efficient implementation of Artificial Intelligence (AI) applications due to strict latency, security and power requirements. Nonetheless, such devices, face various cha... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论