咨询与建议

限定检索结果

文献类型

  • 10,606 篇 期刊文献
  • 9,935 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,618 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,775 篇 工学
    • 9,394 篇 计算机科学与技术...
    • 7,894 篇 软件工程
    • 2,825 篇 信息与通信工程
    • 1,945 篇 生物工程
    • 1,566 篇 控制科学与工程
    • 1,343 篇 电气工程
    • 1,309 篇 生物医学工程(可授...
    • 1,063 篇 光学工程
    • 935 篇 电子科学与技术(可...
    • 683 篇 机械工程
    • 675 篇 化学工程与技术
    • 451 篇 动力工程及工程热...
    • 432 篇 安全科学与工程
    • 417 篇 交通运输工程
    • 406 篇 仪器科学与技术
    • 403 篇 网络空间安全
  • 7,657 篇 理学
    • 3,729 篇 数学
    • 2,308 篇 生物学
    • 2,047 篇 物理学
    • 1,440 篇 统计学(可授理学、...
    • 798 篇 化学
    • 652 篇 系统科学
  • 3,691 篇 管理学
    • 1,962 篇 管理科学与工程(可...
    • 1,871 篇 图书情报与档案管...
    • 1,009 篇 工商管理
  • 1,476 篇 医学
    • 1,194 篇 临床医学
    • 1,015 篇 基础医学(可授医学...
    • 553 篇 公共卫生与预防医...
    • 550 篇 药学(可授医学、理...
  • 649 篇 法学
    • 549 篇 社会学
  • 377 篇 经济学
  • 312 篇 教育学
  • 299 篇 农学
  • 62 篇 文学
  • 32 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 597 篇 deep learning
  • 424 篇 feature extracti...
  • 383 篇 semantics
  • 363 篇 machine learning
  • 358 篇 training
  • 345 篇 accuracy
  • 337 篇 computational mo...
  • 261 篇 predictive model...
  • 221 篇 data mining
  • 212 篇 reinforcement le...
  • 210 篇 internet of thin...
  • 199 篇 neural networks
  • 199 篇 optimization
  • 195 篇 task analysis
  • 187 篇 data models
  • 184 篇 image segmentati...
  • 172 篇 real-time system...
  • 165 篇 support vector m...
  • 162 篇 convolution
  • 150 篇 computer science

机构

  • 820 篇 school of data a...
  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 313 篇 horia hulubei na...
  • 312 篇 university of ch...
  • 308 篇 h.h. wills physi...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 227 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 198 篇 blake t.
  • 197 篇 brundu d.
  • 176 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 147 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 16,926 篇 英文
  • 3,573 篇 其他
  • 158 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Data Science Program School of Computer Science"
20618 条 记 录,以下是4571-4580 订阅
排序:
3DMambaIPF: A State Space Model for Iterative Point Cloud Filtering via Differentiable Rendering
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Qingyuan Yang, Weidong Fei, Ben Xu, Jingyi Zhang, Rui Liu, Keyi Luo, Yeqi He, Ying School of Computer Science Fudan University China Department of Information Engineering The Chinese University of Hong Kong Hong Kong College of Computing and Data Science Nanyang Technological University Singapore
Noise is an inevitable aspect of point cloud acquisition, necessitating filtering as a fundamental task within the realm of 3D vision. Existing learning-based filtering methods have shown promising capabilities on com... 详细信息
来源: 评论
Non-convergence to global minimizers in data driven supervised deep learning: Adam and stochastic gradient descent optimization provably fail to converge to global minimizers in the training of deep neural networks with ReLU activation
arXiv
收藏 引用
arXiv 2024年
作者: Hannibal, Sonja Jentzen, Arnulf Thang, Do Minh Applied Mathematics: Institute for Analysis and Numerics Faculty of Mathematics and Computer Science University of Münster Germany School of Data Science Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen [CUHK-Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen [CUHK-Shenzhen China Department of Probability and Statistic Institute of Mathematics Vietnam Academy of Science and Technology Viet Nam
Deep learning (DL) methods – consisting of a class of deep neural networks (DNNs) trained by a stochastic gradient descent (SGD) optimization method – are nowadays key tools to solve data driven supervised learning ... 详细信息
来源: 评论
On the origins of linear representations in large language models  24
On the origins of linear representations in large language m...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Yibo Jiang Goutham Rajendran Pradeep Ravikumar Bryon Aragam Victor Veitch Department of Computer Science University of Chicago Machine Learning Department Carnegie Mellon University Booth School of Business University of Chicago Department of Statistics and Data Science Institute University of Chicago
Recent works have argued that high-level semantic concepts are encoded "linearly" in the representation space of large language models. In this work, we study the origins of such linear representations. To t...
来源: 评论
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
Multi-Grained Feature Pruning for Video-Based Human Pose Est...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Zhigang Fan, Shaojing Liu, Zhenguang Wu, Zheqi Wu, Sifan Jiao, Yingying College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
Leveraging Support Vector Machines for Detection of Network Traffic Attacks
Leveraging Support Vector Machines for Detection of Network ...
收藏 引用
Advancement in Electronics & Communication Engineering (AECE), International Conference on
作者: Anurag Tiwari School of Artificial Intelligence & Data Science Indian Institute of Technology Jodhpur India Department of Computer Science & Engineering Babu Banarasi Das Institute of Technology& Management Lucknow India
Network security is crucial to ensure the protection of information systems in an increasingly connected world, and network traffic attack detection is an important aspect of maintaining system integrity. This study a... 详细信息
来源: 评论
EyeUnderstand: Dashboard for Gaze and Deep-Learning Driven Comprehension Estimation in Online Lectures
收藏 引用
IEEE Access 2025年 13卷 102220-102233页
作者: Ko Watanabe Gitesh Gund Jayasankar Santhosh Haruka Sakagami Yuki Matsuda Andreas Dengel Shoya Ishimaru Smart Data and Knowledge Services German Research Center for Artificial Intelligence (DFKI) GmbH Kaiserslautern Germany Department of Computer Science RPTU Kaiserslautern-Landau Kaiserslautern Germany Graduate School of Science and Technology Nara Institute of Science and Technology (NAIST) Nara Japan Faculty of Environmental Life Natural Science and Technology Okayama University Okayama Japan Graduate School of Informatics Osaka Metropolitan University Sakai Japan
Online videos are a potent tool for educators to disseminate knowledge widely to diverse student audiences. However, collecting student feedback remains a significant challenge for lecturers, particularly in the absen... 详细信息
来源: 评论
Population-Based Incremental Learning for Effective IoT Service Composition with Replication
Population-Based Incremental Learning for Effective IoT Serv...
收藏 引用
Software Services Engineering (SSE) IEEE International Conference on
作者: Fengyang Sun Gang Chen Hui Ma Sven Hartmann Centre for Data Science and Artificial Intelligence & School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand Department of Informatics Clausthal University of Technology Clausthal-zellerfeld Germany
Internet of Things Service Composition (SCIoT) aims to find the best composite IoT service to fulfil users' requirements. Given the NP-hard complexity of SCIoT, Evolutionary Computation methods, especially Estimat... 详细信息
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
When Can Transformers Count to n?
arXiv
收藏 引用
arXiv 2024年
作者: Yehudai, Gilad Kaplan, Haim Ghandeharioun, Asma Geva, Mor Globerson, Amir Center for Data Science New York University United States Google Research United States Blavatnik School of Computer Science Tel Aviv University Google DeepMind United Kingdom
Large language models based on the transformer architecture can solve highly complex tasks. But are there simple tasks that such models cannot solve? Here we focus on very simple counting tasks, that involve counting ... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yujun Zhang Yanqu Chen Jiakai Wang Jin Hu Renshuai Tao Xianglong Liu State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论