咨询与建议

限定检索结果

文献类型

  • 4,639 篇 期刊文献
  • 4,164 篇 会议
  • 41 册 图书

馆藏范围

  • 8,844 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,608 篇 工学
    • 4,242 篇 计算机科学与技术...
    • 3,514 篇 软件工程
    • 1,191 篇 信息与通信工程
    • 769 篇 生物工程
    • 724 篇 控制科学与工程
    • 709 篇 电气工程
    • 532 篇 生物医学工程(可授...
    • 480 篇 光学工程
    • 461 篇 电子科学与技术(可...
    • 280 篇 机械工程
    • 248 篇 化学工程与技术
    • 202 篇 安全科学与工程
    • 197 篇 网络空间安全
    • 194 篇 交通运输工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
  • 3,335 篇 理学
    • 1,761 篇 数学
    • 908 篇 物理学
    • 864 篇 生物学
    • 644 篇 统计学(可授理学、...
    • 298 篇 化学
    • 285 篇 系统科学
  • 1,593 篇 管理学
    • 918 篇 管理科学与工程(可...
    • 745 篇 图书情报与档案管...
    • 471 篇 工商管理
  • 533 篇 医学
    • 465 篇 临床医学
    • 398 篇 基础医学(可授医学...
    • 232 篇 公共卫生与预防医...
    • 222 篇 药学(可授医学、理...
  • 283 篇 法学
    • 241 篇 社会学
  • 164 篇 经济学
  • 106 篇 农学
  • 105 篇 教育学
  • 21 篇 文学
  • 12 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 276 篇 accuracy
  • 272 篇 deep learning
  • 231 篇 machine learning
  • 227 篇 feature extracti...
  • 219 篇 training
  • 184 篇 computational mo...
  • 180 篇 semantics
  • 161 篇 predictive model...
  • 144 篇 data models
  • 133 篇 real-time system...
  • 120 篇 federated learni...
  • 111 篇 optimization
  • 108 篇 convolutional ne...
  • 107 篇 reinforcement le...
  • 105 篇 graph neural net...
  • 94 篇 internet of thin...
  • 90 篇 artificial intel...
  • 88 篇 image segmentati...
  • 88 篇 neural networks
  • 87 篇 contrastive lear...

机构

  • 551 篇 college of compu...
  • 173 篇 university of ch...
  • 131 篇 nanyang technolo...
  • 103 篇 national enginee...
  • 102 篇 college of compu...
  • 98 篇 beijing advanced...
  • 97 篇 school of data a...
  • 84 篇 school of comput...
  • 81 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 70 篇 school of comput...
  • 65 篇 national enginee...
  • 63 篇 department of co...
  • 60 篇 cas key laborato...
  • 50 篇 school of comput...
  • 50 篇 college of intel...
  • 47 篇 college of compu...
  • 46 篇 shandong enginee...
  • 44 篇 school of comput...
  • 41 篇 data science ins...

作者

  • 259 篇 niyato dusit
  • 157 篇 cheng xueqi
  • 70 篇 hai jin
  • 63 篇 guo jiafeng
  • 51 篇 sun geng
  • 51 篇 tao dacheng
  • 48 篇 jin hai
  • 44 篇 shen huawei
  • 37 篇 zheng wei-shi
  • 35 篇 peng hao
  • 35 篇 xiaofei liao
  • 31 篇 jin xiaolong
  • 30 篇 liu yang
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 26 篇 shen linlin
  • 25 篇 chen chen
  • 25 篇 li jianxin
  • 25 篇 guo yike
  • 24 篇 j. b. thayer

语言

  • 7,512 篇 英文
  • 1,285 篇 其他
  • 74 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Computing and Data Science"
8844 条 记 录,以下是4901-4910 订阅
排序:
Self-organization Preserved Graph Structure Learning with Principle of Relevant Information
arXiv
收藏 引用
arXiv 2022年
作者: Sun, Qingyun Li, Jianxin Yang, Beining Fu, Xingcheng Peng, Hao Yu, Philip S. Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China Department of Computer Science University of Illinois at Chicago Chicago United States
Most Graph Neural Networks follow the message-passing paradigm, assuming the observed structure depicts the ground-truth node relationships. However, this fundamental assumption cannot always be satisfied, as real-wor... 详细信息
来源: 评论
Characteristic Decomposition: From Regular Sets to Normal Sets
收藏 引用
Journal of Systems science & Complexity 2019年 第1期32卷 37-46页
作者: MOU Chenqi WANG Dongming LMIB–School of Mathematics and Systems Science/Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University LMIB–SKLSDE–School of Mathematics and Systems Science/Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Centre National de la Recherche Scientifique
In this paper it is shown how to transform a regular triangular set into a normal triangular set by computing the W-characteristic set of their saturated ideal and an algorithm is proposed for decomposing any polynomi... 详细信息
来源: 评论
Cross-diffusion induced instability on networks
arXiv
收藏 引用
arXiv 2023年
作者: Kuehn, Christian Soresina, Cinzia Department of Mathematics Technical University of Munich Garching b. München85748 Germany Munich Data Science Institute Technical University of Munich Garching b. München85748 Germany Complexity Science Hub Vienna Vienna1080 Austria Department of Mathematics and Scientific Computing University of Graz Graz8010 Austria
The concept of Turing instability, namely that diffusion can destabilize the uniform steady state, is well known either in the context of partial differential equations (PDEs) or in networks of dynamical systems. Rece... 详细信息
来源: 评论
Complex Dispersion of Detonation Nanodiamond Revealed by Machine Learning Assisted Cryo-TEM and Coarse-Grained Molecular Dynamics Simulations
收藏 引用
ACS Nanoscience Au 2023年 第3期3卷 211-221页
作者: Kuschnerus, Inga C. Wen, Haotian Ruan, Juanfang Zeng, Xinrui Su, Chun-Jen Jeng, U-Ser Opletal, George Barnard, Amanda S. Liu, Ming Nishikawa, Masahiro Chang, Shery L. Y. School of Materials Science and Engineering University of New South Wales Sydney 2052 NSW Australia Electron Microscope Unit Mark Wainwright Analytical Centre University of New South Wales Sydney 2052 NSW Australia National Synchrotron Radiation Research Center Hsinchu 30076 Taiwan Department of Chemical Engineering National Tsing Hua University Hsinchu 30013 Taiwan CSIRO Data61 Clayton 3168 VIC Australia School of Computing Australian National University Acton 2601 ACT Australia Daicel Corporation Osaka 530-0011 Japan
Understanding the polydispersity of nanoparticles is crucial for establishing the efficacy and safety of their role as drug delivery carriers in biomedical applications. Detonation nanodiamonds (DNDs), 3-5 nm diamond ... 详细信息
来源: 评论
Learning trivializing gradient flows for lattice gauge theories
收藏 引用
Physical Review D 2023年 第5期107卷 L051504-L051504页
作者: Simone Bacchio Pan Kessel Stefan Schaefer Lorenz Vaitl Computation-based Science and Technology Research Center The Cyprus Institute Nicosia Cyprus Machine Learning Group Technische Universität Berlin Berlin Germany BIFOLD Berlin Institute for the Foundations of Learning and Data Berlin Germany John von Neumann-Institut für Computing NIC Deutsches Elektronen-Synchrotron DESY Germany
We propose a unifying approach that starts from the perturbative construction of trivializing maps by Lüscher and then improves on it by learning. The resulting continuous normalizing flow model can be implemente... 详细信息
来源: 评论
Automatic Detection and Characterization of Human Veins Using Infra-Red Image Processing
收藏 引用
Journal of Computer and Communications 2024年 第9期12卷 141-159页
作者: Jean Ndoumbe Brice Ekobo Akoa Gaelle Patricia Talotsing Frederic Franck Kounga Samuel Kaissassou Bertin Chouanmo Njo Laboratory of Computer Engineering Data Science and Artificial Intelligence Department of Computer & Telecommunications Engineering National Higher Polytechnic School Douala Cameroon Laboratory of Electrical Engineering Mechatronics and Signal Processing Department of Electrical & Telecommunications Engineering National Advanced School of Engineering Yaound Cameroon Mobile Computing and Networking Research Laboratory Department of Computer and Software Engineering Polytechnique Montreal Montreal Canada DigiPlus SARL Bonamoussadi Douala Cameroon
The detection and characterization of human veins using infrared (IR) image processing have gained significant attention due to its potential applications in biometric identification, medical diagnostics, and vein-bas... 详细信息
来源: 评论
Towards Secure Semantic Communications in the Presence of Intelligent Eavesdroppers
arXiv
收藏 引用
arXiv 2025年
作者: Tang, Shunpu Chen, Yuhao Yang, Qianqian Zhang, Ruichen Niyato, Dusit Shi, Zhiguo College of Information Science and Electronic Engineering Zhejiang University Hangzhou China College of Control Science and Engineering China College of Computing and Data Science Nanyang Technological University Singapore
Semantic communication (SemCom) has emerged as a promising paradigm for enhancing communication efficiency in sixth-generation (6G) networks. However, the broadcast nature of wireless channels makes SemCom systems vul... 详细信息
来源: 评论
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defences
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Shang Gao, Yansong Fu, Anmin Zhang, Zhi Zhang, Yuqing Susilo, Willy Liu, Dongxi School of Computer Science and Engineering Nanjing University of Science and Technology China CSIRO’s Data61 Australia University of Western Australia Australia University of Chinese Academy of Sciences China School of Computing and Information Technology University of Wollongong Australia
As a critical threat to deep neural networks (DNNs), backdoor attacks can be categorized into two types, i.e., source-agnostic backdoor attacks (SABAs) and source-specific backdoor attacks (SSBAs). Compared to traditi... 详细信息
来源: 评论
An asymptotically compatible coupling formulation for nonlocal interface problems with jumps
arXiv
收藏 引用
arXiv 2022年
作者: Glusa, Christian D'Elia, Marta Capodaglio, Giacomo Gunzburger, Max Bochev, Pavel B. Center for Computing Research Sandia National Laboratories AlbuquerqueNM United States Data Science and Computing Group Sandia National Laboratories LivermoreCA United States Computational Physics and Methods Group Los Alamos National Laboratory Los AlamosNM United States Department of Scientific Computing Florida State University TallahasseeFL United States
We introduce a mathematically rigorous formulation for a nonlocal interface problem with jumps and propose an asymptotically compatible finite element discretization for the weak form of the interface problem. After p... 详细信息
来源: 评论
Distilling the Unknown to Unveil Certainty
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Zhilin Cao, Longbing Zhang, Yixuan Lin, Kun-Yu Zheng, Wei-Shi The Data Science Lab School of Computing Macquarie University SydneyNSW2109 Australia The DataX Research Centre Macquarie University SydneyNSW2109 Australia The China-Austria Belt and Road Joint Laboratory on Artificial Intelligence and Advanced Manufacturing Hangzhou Dianzi University Zhejiang Hangzhou310005 China The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510275 China The School of Computer Science and Engineering Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Sun Yat-sen University Guangzhou510275 China
Out-of-distribution (OOD) detection is essential in identifying test samples that deviate from the in-distribution (ID) data upon which a standard network is trained, ensuring network robustness and reliability. This ... 详细信息
来源: 评论