咨询与建议

限定检索结果

文献类型

  • 4,600 篇 期刊文献
  • 4,148 篇 会议
  • 41 册 图书

馆藏范围

  • 8,789 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,559 篇 工学
    • 4,189 篇 计算机科学与技术...
    • 3,533 篇 软件工程
    • 1,181 篇 信息与通信工程
    • 762 篇 生物工程
    • 698 篇 电气工程
    • 663 篇 控制科学与工程
    • 530 篇 生物医学工程(可授...
    • 489 篇 光学工程
    • 453 篇 电子科学与技术(可...
    • 279 篇 机械工程
    • 246 篇 化学工程与技术
    • 203 篇 安全科学与工程
    • 196 篇 网络空间安全
    • 194 篇 交通运输工程
    • 179 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
  • 3,329 篇 理学
    • 1,760 篇 数学
    • 906 篇 物理学
    • 866 篇 生物学
    • 644 篇 统计学(可授理学、...
    • 291 篇 化学
    • 284 篇 系统科学
  • 1,593 篇 管理学
    • 918 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 471 篇 工商管理
  • 526 篇 医学
    • 464 篇 临床医学
    • 402 篇 基础医学(可授医学...
    • 238 篇 公共卫生与预防医...
    • 221 篇 药学(可授医学、理...
  • 283 篇 法学
    • 239 篇 社会学
  • 163 篇 经济学
  • 110 篇 教育学
  • 105 篇 农学
  • 20 篇 文学
  • 12 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 275 篇 accuracy
  • 265 篇 deep learning
  • 227 篇 machine learning
  • 225 篇 feature extracti...
  • 218 篇 training
  • 184 篇 computational mo...
  • 179 篇 semantics
  • 160 篇 predictive model...
  • 145 篇 data models
  • 132 篇 real-time system...
  • 119 篇 federated learni...
  • 111 篇 optimization
  • 105 篇 reinforcement le...
  • 105 篇 convolutional ne...
  • 104 篇 graph neural net...
  • 93 篇 internet of thin...
  • 90 篇 image segmentati...
  • 88 篇 neural networks
  • 86 篇 contrastive lear...
  • 85 篇 visualization

机构

  • 550 篇 college of compu...
  • 175 篇 university of ch...
  • 129 篇 nanyang technolo...
  • 102 篇 national enginee...
  • 101 篇 college of compu...
  • 99 篇 beijing advanced...
  • 97 篇 school of data a...
  • 85 篇 school of comput...
  • 81 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 70 篇 school of comput...
  • 66 篇 national enginee...
  • 63 篇 department of co...
  • 61 篇 cas key laborato...
  • 50 篇 school of comput...
  • 50 篇 college of intel...
  • 47 篇 college of compu...
  • 46 篇 shandong enginee...
  • 44 篇 school of comput...
  • 41 篇 school of comput...

作者

  • 260 篇 niyato dusit
  • 158 篇 cheng xueqi
  • 70 篇 hai jin
  • 63 篇 guo jiafeng
  • 52 篇 tao dacheng
  • 51 篇 sun geng
  • 44 篇 shen huawei
  • 43 篇 jin hai
  • 37 篇 zheng wei-shi
  • 35 篇 peng hao
  • 35 篇 xiaofei liao
  • 32 篇 liu yang
  • 31 篇 jin xiaolong
  • 28 篇 shen linlin
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 25 篇 p. spinelli
  • 25 篇 chen chen
  • 25 篇 li jianxin
  • 24 篇 j. b. thayer

语言

  • 7,553 篇 英文
  • 1,190 篇 其他
  • 70 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Computing and Data Science"
8789 条 记 录,以下是621-630 订阅
排序:
Comparative Analysis of Different Approaches to Object Detection: A Survey  3
Comparative Analysis of Different Approaches to Object Detec...
收藏 引用
3rd International Conference on Smart Electronics and Communication, ICOSEC 2022
作者: Sajjad, Mohammed Hemavathi, D. School of Computing Srm Institute of Science and Technology-Kattankulathur Department of Data Science and Business Systems Chennai India
Object detection has a pivotal role in the field of security. Often, a security breach occurs under cover of night when the visibility is reduced. Manual supervision is relatively difficult as visibility is drasticall... 详细信息
来源: 评论
Multi-Stage Transfer Learning Evolutionary Algorithm for Dynamic Multiobjective Optimization  13
Multi-Stage Transfer Learning Evolutionary Algorithm for Dyn...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Wang, Qianhui Zhu, Qingling Ji, Junkai College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Recently, the application of transfer learning within dynamic multiobjective evolutionary algorithms (DMOEAs) has shown significant potential to solve dynamic multiobjective optimization problems (DMOPs). This approac... 详细信息
来源: 评论
Exploring the Efficacy and Limitations of Histogram-Based Fake Image Detection  28th
Exploring the Efficacy and Limitations of Histogram-Based Fa...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and Engineering Systems, KES 2024
作者: Hölscher, Dirk Reich, Christoph Gut, Frank Knahl, Martin Clarke, Nathan Institute for Data Science Cloud Computing and IT Security Furtwangen University Furtwangen78120 Germany Centre for Cyber Security Communications and Network Research Plymouth University Plymouth United Kingdom
Generative image models pose challenges to image authenticity and trustworthiness, blurring the line between real and fake content. This paper addresses these concerns by proposing a histogram-based approach using pre... 详细信息
来源: 评论
Fededrated Learning: Research, Challenges, and Future Directions  5
Fededrated Learning: Research, Challenges, and Future Direct...
收藏 引用
5th IEEE International Conference on computing, Power, and Communication Technologies, IC2PCT 2024
作者: Kaswan, Kuldeep Singh Dhatterwal, Jagjit Singh Yadav, Rishika Malik, Kiran Tripathi, Aanjey Mani Galgotias University School of Computing Science and Engineering UP Greater Noida India Artificial Intelligence and Data Science Koneru Lakshmaiah Education Foundation AP Guntur India Graphic Era Hills University Department of Computer Science and Engineering Uttarakhand Dehradun India Mriem Department of Computer Science and Engineering Rohtak India Galgotias University School of Computing Science and Engineering Greater Noida India
Federated Learning, a disruptive and novel aspect of machine learning, is at the forefront of decentralized, privacy-conscious data processing. This in-depth review study navigates the complex environment of Federated... 详细信息
来源: 评论
data-Driven Analysis of Climate Change Impacts on Public Health: A Systematic Review and Future Directions
Data-Driven Analysis of Climate Change Impacts on Public Hea...
收藏 引用
2024 IEEE International Conference on Big data, Bigdata 2024
作者: Yarmohammadtoosky, Sahar Xie, Ying Kennesaw State University School of Data Science and Analytics MariettaGA United States Kennesaw State University College of Computing and Software Engineering MariettaGA United States
Climate change profoundly impacts human health, ecosystems, and food and water security. This review provides a comprehensive analysis of climate change's effects on human health using data science methods, includ... 详细信息
来源: 评论
Indoor Navigation Using Ultra Wide Band
Indoor Navigation Using Ultra Wide Band
收藏 引用
2023 Intelligent computing and Control for Engineering and Business Systems, ICCEBS 2023
作者: Divya, B. Veeramakali, T. Revathi, S. Harisharajan, R.R. Adhirooban, D. Ebishdon, G.V. Sri Sai Ram Institute of Technology Dept of Computer Science and Engineering India School of Computing Srm Institute of Science and Technology Dept of Data Science and Business Systems Tamilnadu Kattankulathur India
Indoor positioning is a significant and intriguing topic in navigation systems that present numerous use cases for investigation. Researchers are exploring technologies capable of providing accurate locations in indoo... 详细信息
来源: 评论
McGrids: Monte Carlo-Driven Adaptive Grids for Iso-Surface Extraction
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Daxuan Shi, Hezi Zheng, Jianmin Cai, Jianfei College of Computing and Data Science Nanyang Technological University Singapore Department of Data Science & AI Monash University Australia
Iso-surface extraction from an implicit field is a fundamental process in various applications of computer vision and graphics. When dealing with geometric shapes with complicated geometric details, many existing algo... 详细信息
来源: 评论
EQCNN: Enhanced Remote Sensing Imagery Classification with Circuit-Based Error-Corrected Quantum Convolutional Neural Networks  25
EQCNN: Enhanced Remote Sensing Imagery Classification with C...
收藏 引用
25th International Conference on Digital Image computing: Techniques and Applications, DICTA 2024
作者: Zaman, Muhammad Kehkashan, Tanzila Akhunzada, Adnan Alaidaros, Hashem Uddin, Mueen Azeem, Muhammad University of Lahore Faculty of Computer Science Punjab Sargodha40100 Pakistan Universiti Teknologi Malaysia Faculty of Computing Johor Bahru Malaysia College of Computing & It University of Doha for Science & Technology Department of Data and Cybersecurity Doha Qatar Dar Al-Hekma University Department of Cybersecurity Jeddah Saudi Arabia
Quantum information processing is more complex than classical counterpart because of the No-Cloning theorem, decoherence, and issues detecting quantum states. Building a quantum computer without error detection and co... 详细信息
来源: 评论
Conformal prediction based on principal component analysis for high-dimensional outlier detection
Conformal prediction based on principal component analysis f...
收藏 引用
2024 International Conference on Cloud computing, Performance computing, and Deep Learning, CCPCDL 2024
作者: Qian, Xiaoyu Wu, Jinru Lin, Youwu School of Mathematics and Computing Science Guangxi Colleges Universities Key Laboratory of Data Analysis and Computation Guilin University of Electronic Technology Guilin541002 China Guilin541002 China
Current outlier detection methods exhibit many limitations in high-dimensional settings. Traditional statistical approaches rely on strong assumptions and lack practicality and generality. Meanwhile, despite the bette... 详细信息
来源: 评论
CoSafe: Evaluating Large Language Model Safety in Multi-Turn Dialogue Coreference
CoSafe: Evaluating Large Language Model Safety in Multi-Turn...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yu, Erxin Li, Jing Liao, Ming Wang, Siqi Gao, Zuchen Mi, Fei Hong, Lanqing Department of Computing The Hong Kong Polytechnic University Hong Kong Research Centre for Data Science & Artificial Intelligence Hong Kong Huawei Noah's Ark Lab Canada
As large language models (LLMs) constantly evolve, ensuring their safety remains a critical research issue. Previous red teaming approaches for LLM safety have primarily focused on single prompt attack or goal hijacki... 详细信息
来源: 评论