咨询与建议

限定检索结果

文献类型

  • 10,606 篇 期刊文献
  • 9,935 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,618 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,775 篇 工学
    • 9,394 篇 计算机科学与技术...
    • 7,894 篇 软件工程
    • 2,825 篇 信息与通信工程
    • 1,945 篇 生物工程
    • 1,566 篇 控制科学与工程
    • 1,343 篇 电气工程
    • 1,309 篇 生物医学工程(可授...
    • 1,063 篇 光学工程
    • 935 篇 电子科学与技术(可...
    • 683 篇 机械工程
    • 675 篇 化学工程与技术
    • 451 篇 动力工程及工程热...
    • 432 篇 安全科学与工程
    • 417 篇 交通运输工程
    • 406 篇 仪器科学与技术
    • 403 篇 网络空间安全
  • 7,657 篇 理学
    • 3,729 篇 数学
    • 2,308 篇 生物学
    • 2,047 篇 物理学
    • 1,440 篇 统计学(可授理学、...
    • 798 篇 化学
    • 652 篇 系统科学
  • 3,691 篇 管理学
    • 1,962 篇 管理科学与工程(可...
    • 1,871 篇 图书情报与档案管...
    • 1,009 篇 工商管理
  • 1,476 篇 医学
    • 1,194 篇 临床医学
    • 1,015 篇 基础医学(可授医学...
    • 553 篇 公共卫生与预防医...
    • 550 篇 药学(可授医学、理...
  • 649 篇 法学
    • 549 篇 社会学
  • 377 篇 经济学
  • 312 篇 教育学
  • 299 篇 农学
  • 62 篇 文学
  • 32 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 597 篇 deep learning
  • 424 篇 feature extracti...
  • 383 篇 semantics
  • 363 篇 machine learning
  • 358 篇 training
  • 345 篇 accuracy
  • 337 篇 computational mo...
  • 261 篇 predictive model...
  • 221 篇 data mining
  • 212 篇 reinforcement le...
  • 210 篇 internet of thin...
  • 199 篇 neural networks
  • 199 篇 optimization
  • 195 篇 task analysis
  • 187 篇 data models
  • 184 篇 image segmentati...
  • 172 篇 real-time system...
  • 165 篇 support vector m...
  • 162 篇 convolution
  • 150 篇 computer science

机构

  • 820 篇 school of data a...
  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 313 篇 horia hulubei na...
  • 312 篇 university of ch...
  • 308 篇 h.h. wills physi...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 227 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 198 篇 blake t.
  • 197 篇 brundu d.
  • 176 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 147 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 16,926 篇 英文
  • 3,573 篇 其他
  • 158 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Data Science Program School of Computer Science"
20618 条 记 录,以下是4591-4600 订阅
排序:
Structure injected weight normalization for training deep networks
Structure injected weight normalization for training deep ne...
收藏 引用
作者: Yuan, Xu Shen, Xiangjun Mehta, Sumet Li, Teng Ge, Shiming Zha, Zhengjun School of Computer Science and Telecommunication Engineering Jiangsu University Jiangsu Zhenjiang212013 China School of electrical engineering and Automation Anhui University Jiangsu Anhui Hefei230039 China Institute of information engineering CAS Chinese academy of sciences Beijing100086 China School of data science University of science and technology of china Anhui Hefei230026 China
Weight normalization (WN) can help to stabilize the distribution of activations over layers, which boost the performance of DNNs in generalization. In this paper, we further propose deep structural weight normalizatio... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Dual Test-time Training for Out-of-distribution Recommender System
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Xihong Wang, Yiqi Chen, Jin Fan, Wenqi Zhao, Xiangyu Zhu, En Liu, Xinwang Lian, Defu School of Computer National University of Defense Technology Changsha410073 China School of Business and Management Hong Kong University of Science and Technology Hong Kong The Hong Kong Polytechnic University Hong Kong Department of Data Science City University of Hong Kong Hong Kong Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China Anhui Hefei230000 China
Deep learning has been widely applied in recommender systems, which has recently achieved revolutionary progress. However, most existing learning-based methods assume that the user and item distributions remain unchan... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
Image Processing, Electronics and computers (IPEC), Asia-Pacific Conference on
作者: Yuhong Wu Yunshan Lv Xiangdong Hu Key Laboratory of Public Big Data Security Technology Chongqing School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Public Big Data Security Technology School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a...
来源: 评论
Three Preemption Approaches towards EDF Scheduling for Homogeneous Multiprocessors
Three Preemption Approaches towards EDF Scheduling for Homog...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Peng Wu Zhi Li Zhicai Zhang Tao Yan Lu Chen Institute of Big Data Science and Industry Shanxi University Taiyuan China School of Computer and Information Technology Shanxi University Taiyuan China School of Computer Science and Technology Hainan University Haikou China
When scheduling a set of real-time tasks, researchers can choose between preemptive and non-preemptive algorithms. However, these algorithms each have their own advantages and drawbacks, necessitating specific analysi...
来源: 评论
ML_BrainDetection: An Intelligent Model for Brain Tumor Identification Using Machine Learning  3
ML_BrainDetection: An Intelligent Model for Brain Tumor Iden...
收藏 引用
3rd International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2023
作者: Abdelminaam, Diaa Salama Madbouly, Magda M. Farag, Mohamed S Gomaa, Ibrahim A Abd-Elghany Zeid, Magdy Abualigah, Laith Misr International University Faculty of Computer Science Cairo Egypt Benha University Faculty of Computers and Artificial Intelligence Benha Egypt Alexandria University Faculty of Computer and Data Science Alexandria Egypt Alobour High Institute for Computer and Informatics Computer Science Department Cairo Egypt Lebanese American University Department of Electrical and Computer Engineering Byblos13-5053 Lebanon Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19328 Jordan Middle East University Meu Research Unit Amman11831 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia
Brain tumors are one of the greatest causes of death worldwide. Due to that, early diagnosis and classification of the tumor would surely help increase the chance of survival for patients worldwide. However, classifyi... 详细信息
来源: 评论
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Zhigang Fan, Shaojing Liu, Zhenguang Wu, Zheqi Wu, Sifan Jiao, Yingying College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
Dpa-Ei: Long-Tailed Classification by Dual Progressive Augmentation from Explicit and Implicit Perspectives
SSRN
收藏 引用
SSRN 2024年
作者: Zhao, Yan Wenwei, He Zhao, Hong School of Computer Science Minnan Normal University Fujian Zhangzhou363000 China The Key Laboratory of Data Science and Intelligence Application Minnan Normal University Fujian Zhangzhou363000 China
Deep convolutional neural networks have significantly advanced visual recognition tasks;however, handling long-tailed distribution data remains a substantial challenge for machine learning. data augmentation is widely... 详细信息
来源: 评论
Snapshot boosting: a fast ensemble framework for deep neural networks
收藏 引用
science China(Information sciences) 2020年 第1期63卷 77-88页
作者: Wentao ZHANG Jiawei JIANG Yingxia SHAO Bin CUI Center for Data Science Peking University National Engineering Laboratory for Big Data Analysis and Applications Department of Computer Science Beijing Key Lab of Intelligent Telecommunications Software and Multimedia School of Computer ScienceBeijing University of Posts and Telecommunications Key Lab of High Confidence Software Technologies Department of Computer SciencePeking University
Boosting has been proven to be effective in improving the generalization of machine learning models in many fields. It is capable of getting high-diversity base learners and getting an accurate ensemble model by combi... 详细信息
来源: 评论