咨询与建议

限定检索结果

文献类型

  • 10,551 篇 期刊文献
  • 9,935 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,789 篇 工学
    • 9,396 篇 计算机科学与技术...
    • 7,894 篇 软件工程
    • 2,827 篇 信息与通信工程
    • 1,945 篇 生物工程
    • 1,568 篇 控制科学与工程
    • 1,345 篇 电气工程
    • 1,309 篇 生物医学工程(可授...
    • 1,063 篇 光学工程
    • 936 篇 电子科学与技术(可...
    • 684 篇 机械工程
    • 674 篇 化学工程与技术
    • 451 篇 动力工程及工程热...
    • 432 篇 安全科学与工程
    • 417 篇 交通运输工程
    • 405 篇 仪器科学与技术
    • 403 篇 网络空间安全
  • 7,655 篇 理学
    • 3,738 篇 数学
    • 2,308 篇 生物学
    • 2,046 篇 物理学
    • 1,448 篇 统计学(可授理学、...
    • 798 篇 化学
    • 652 篇 系统科学
  • 3,693 篇 管理学
    • 1,962 篇 管理科学与工程(可...
    • 1,873 篇 图书情报与档案管...
    • 1,009 篇 工商管理
  • 1,469 篇 医学
    • 1,189 篇 临床医学
    • 1,011 篇 基础医学(可授医学...
    • 552 篇 公共卫生与预防医...
    • 550 篇 药学(可授医学、理...
  • 649 篇 法学
    • 549 篇 社会学
  • 376 篇 经济学
  • 313 篇 教育学
  • 299 篇 农学
  • 62 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 596 篇 deep learning
  • 415 篇 feature extracti...
  • 376 篇 semantics
  • 369 篇 machine learning
  • 360 篇 training
  • 348 篇 accuracy
  • 338 篇 computational mo...
  • 258 篇 predictive model...
  • 219 篇 data mining
  • 212 篇 reinforcement le...
  • 209 篇 internet of thin...
  • 201 篇 optimization
  • 199 篇 neural networks
  • 195 篇 task analysis
  • 185 篇 data models
  • 184 篇 image segmentati...
  • 169 篇 real-time system...
  • 165 篇 support vector m...
  • 165 篇 convolution
  • 150 篇 computer science

机构

  • 828 篇 school of data a...
  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 318 篇 horia hulubei na...
  • 313 篇 university of ch...
  • 306 篇 h.h. wills physi...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 van swinderen in...
  • 283 篇 school of physic...

作者

  • 246 篇 barter w.
  • 241 篇 beiter a.
  • 227 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 198 篇 blake t.
  • 197 篇 brundu d.
  • 176 篇 borsato m.
  • 167 篇 betancourt c.
  • 156 篇 baker s.
  • 148 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 amato s.
  • 144 篇 bediaga i.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 16,871 篇 英文
  • 3,573 篇 其他
  • 158 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Data Science Program School of Computer Science"
20563 条 记 录,以下是4691-4700 订阅
排序:
Human intracortical responses to varying electrical stimulation conditions are separable in low-dimensional subspaces
Human intracortical responses to varying electrical stimulat...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Sun, Samantha Levinson, Lila H. Paschall, Courtnie J. Herron, Jeffrey Weaver, Kurt Hauptman, Jason Ko, Andrew Ojemann, Jeffrey Rao, Rajesh P. N. University of Washington Paul G. Allen School of Computer Science & Engineering Department of Bioengineering SeattleWA98195 United States University of Washington Graduate Program in Neuroscience Paul G. Allen School of Computer Science & Engineering SeattleWA98195 United States University of Washington Paul G. Allen School of Computer Science & Engineering Department of Neurological Surgery SeattleWA98195 United States University of Washington Paul G. Allen School of Computer Science & Engineering Department of Radiology SeattleWA98195 United States
Electrical stimulation is a powerful tool for targeted neurorehabilitation, and recent work in adaptive stimulation where stimulation can be adjusted in real-time has shown promise in improving stimulation outcomes an... 详细信息
来源: 评论
GANTEE: Generative Adversatial Network for Taxonomy Entering Evaluation
arXiv
收藏 引用
arXiv 2023年
作者: Gu, Zhouhong Jiang, Sihang Liu, Jingping Xiao, Yanghua Feng, Hongwei Li, Zhixu Liang, Jiaqing Zhong, Jian Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Information Science and Engineering East China University of Science and Technology China Fudan-Aishu Cognitive Intelligence Joint Research Center China School of Data Science Fudan University China HUAWEI CBG Edu AI Lab. China
Taxonomy is formulated as directed acyclic concepts graphs or trees that support many downstream tasks. Many new coming concepts need to be added to an existing taxonomy. The traditional taxonomy expansion task aims o... 详细信息
来源: 评论
Towards an Attention Maps Guided Adversarial Attack Approach for Object Detection  5
Towards an Attention Maps Guided Adversarial Attack Approach...
收藏 引用
5th International Conference on Frontiers Technology of Information and computer, ICFTIC 2023
作者: Ma, Zhicheng Zhao, Jinxiong Zhao, Hong Yin, Bangguo Yu, Jun Geng, Jiangyi Digital and Communication Technology Research Institute State Grid Gansu Electric Power Company Electric Power Science Research Institute Lanzhou China Wuhan University School of Computer Science Wuhan China Co. Ltd Baoding China Hubei Intelligent Linked Open Data Technology Co. Ltd Wuhan China
The deep learning based object detection has been widely used. The adversarial attack algorithms reduce the accuracy of the recognition model by adding perturbation noise to the target image to achieve the purpose of ... 详细信息
来源: 评论
Exfiltration-resistant Proxy Re-Encryption for IoT data Sharing in Unreliable Clouds
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Yuyang Zhao, Liang Li, Fagen Takagi, Tsuyoshi School of Cyberspace Security Hainan University Haikou570000 China Department of Mathematical Informatics Graduate School of Information Science and Technology The university of Tokyo Tokyo113-8656 Japan School of Cyber Science and Engineering Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management [Sichuan University Ministry of Education China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The sharing of Internet of Things (IoT) data plays an extensive role in our everyday lives. Exploring secure and efficient methods for data sharing is a prominent area of research. Proxy re-encryption (PRE) in the clo... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
An Advanced Intrusion Detection Solution for Networks based on Honeypot Servers
An Advanced Intrusion Detection Solution for Networks based ...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: K. Veena K. Meena Mercy Theresa M Hemalatha C D. Rajalakshmi Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Computer Science and Engineering GITAM School of Technology GITAM- Bangalore India Department of Data Science and Business Systems School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Computer Science and Engineering Sri Sairam Institute of Technology Chennai
Network security is a critical issue in modern technology. Honey pot-based intrusion detection methods provide an additional layer of security and enhance network performance by analyzing hacker behaviour and detectin...
来源: 评论
Test-Driven Feature Extraction of Web Components
收藏 引用
Journal of computer science & Technology 2022年 第2期37卷 389-404页
作者: Yong-Hao Long Yan-Cheng Chen Xiang-Ping Chen Xiao-Hong Shi Fan Zhou School of Computer Science and Engineering National Engineering Research Center of Digital Life Sun Yat-sen UniversityGuangzhou 510006China School of Design The Hong Kong Polytechnic UniversityHong KongChina Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion The School of Communication and DesignSun Yat-sen UniversityGuangzhou 510006China School of Information Technology and Engineering Guangzhou College of CommerceGuangzhou 511363China
With the growing requirements of web applications,web components are developed to package the implementation of commonly-used features for *** some cases,the developer may want to reuse some features which cannot be c... 详细信息
来源: 评论
Intelligent Decision Support System for Higher Education Institutions
Intelligent Decision Support System for Higher Education Ins...
收藏 引用
International Conference of Signal Processing and Intelligent Systems (ICSPIS)
作者: Nunik Afriliana Meyliana Ford Lumban Gaol Haryono Soeparno Computer Science Department Binus Graduate Program Computer Science Program Bina Nusantara University Jakarta Indonesia Information System Department School of Information System Bina Nusantara University Jakarta Indonesia
To ensure the sustainability of their operations, higher education institutions have to establish a robust strategic plan. Higher education institutions have an obligation to continuously assess the quality of their e...
来源: 评论
Contactless Respiratory Rate Monitoring For ICU Patients Based On Unsupervised Learning
Contactless Respiratory Rate Monitoring For ICU Patients Bas...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Liu, Zimeng Huang, Bin Lin, Chun-Liang Wu, Chieh-Liang Zhao, Changchen Chao, Wen-Cheng Wu, Yu-Cheng Zheng, Yadan Wang, Zhiru Beihang University Hangzhou Innovataion Institute China Beihang University School of Automation Science and Electrical Engineering China National Chung Hsing University College of Electrical Engineering and Computer Science Taiwan Taichung Veterans General Hospital Department of Critical Care Medicine Taiwan National Chung Hsing University College of Medicine Department of Post-Baccalaureate Medicine Taiwan National Chung Hsing University Big Data Center Taiwan Beijing University of Posts and Telecommunications Computer Science School China Beijing Foreign Studies University Graduate School of Translation and Interpretation China
Recently, the task of contactless physiological signal monitoring based on deep learning technologies has attracted a large number of scholars. However, few studies focus on the application of real-world scenarios, es... 详细信息
来源: 评论
Optimizing for the Shortest Path in Denoising Diffusion Model
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Ping Zhang, Xingpeng Liu, Zhaoxiang Hu, Huan Liu, Xiang Wang, Kai Wang, Min Qian, Yanlin Lian, Shiguo Data Science & Artificial Intelligence Research Institute China Unicom China Unicom Data Intelligence China Unicom China DJI Technology Co. Ltd. China School of Computer Science and Software Engineering Southwest Petroleum University Chengdu China
In this research, we propose a novel denoising diffusion model based on shortest-path modeling that optimizes residual propagation to enhance both denoising efficiency and quality. Drawing on Denoising Diffusion Impli... 详细信息
来源: 评论