咨询与建议

限定检索结果

文献类型

  • 1,335 篇 期刊文献
  • 936 篇 会议
  • 19 册 图书

馆藏范围

  • 2,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,578 篇 工学
    • 1,116 篇 计算机科学与技术...
    • 933 篇 软件工程
    • 311 篇 信息与通信工程
    • 277 篇 生物工程
    • 233 篇 生物医学工程(可授...
    • 206 篇 光学工程
    • 149 篇 电气工程
    • 149 篇 控制科学与工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 化学工程与技术
    • 78 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 材料科学与工程(可...
    • 53 篇 动力工程及工程热...
    • 45 篇 交通运输工程
    • 42 篇 安全科学与工程
  • 899 篇 理学
    • 389 篇 数学
    • 305 篇 生物学
    • 250 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 91 篇 化学
    • 61 篇 系统科学
  • 402 篇 管理学
    • 212 篇 图书情报与档案管...
    • 198 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 196 篇 医学
    • 174 篇 临床医学
    • 155 篇 基础医学(可授医学...
    • 104 篇 药学(可授医学、理...
    • 59 篇 公共卫生与预防医...
  • 75 篇 法学
    • 66 篇 社会学
  • 37 篇 经济学
  • 25 篇 农学
  • 16 篇 教育学
  • 5 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 62 篇 semantics
  • 43 篇 deep learning
  • 43 篇 training
  • 42 篇 feature extracti...
  • 42 篇 machine learning
  • 36 篇 computational mo...
  • 33 篇 deep neural netw...
  • 31 篇 task analysis
  • 29 篇 forecasting
  • 28 篇 predictive model...
  • 28 篇 accuracy
  • 26 篇 image segmentati...
  • 23 篇 object detection
  • 23 篇 graph neural net...
  • 23 篇 data models
  • 22 篇 recommender syst...
  • 21 篇 optimization
  • 19 篇 data mining
  • 18 篇 neural networks
  • 18 篇 visualization

机构

  • 103 篇 national enginee...
  • 55 篇 research center ...
  • 51 篇 school of comput...
  • 43 篇 zhejiang lab
  • 41 篇 school of cyber ...
  • 32 篇 national enginee...
  • 31 篇 university of ch...
  • 31 篇 college of compu...
  • 28 篇 hubei key labora...
  • 28 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 huazhong univers...
  • 24 篇 tencent ai lab
  • 22 篇 department of co...
  • 22 篇 cluster and grid...
  • 21 篇 sjtu-pinghu inst...
  • 21 篇 shenzhen researc...
  • 20 篇 school of inform...
  • 20 篇 pazhou lab
  • 18 篇 columbia univers...

作者

  • 109 篇 hai jin
  • 102 篇 jin hai
  • 40 篇 xiaofei liao
  • 29 篇 chen yen-wei
  • 27 篇 liu jun
  • 25 篇 lin lanfen
  • 23 篇 hu shengshan
  • 22 篇 liao xiaofei
  • 21 篇 liu jing
  • 20 篇 haikun liu
  • 19 篇 long zheng
  • 19 篇 zhou linjie
  • 18 篇 chen jianping
  • 17 篇 zou deqing
  • 17 篇 li haizhou
  • 17 篇 lu liangjun
  • 16 篇 v.i.belousov
  • 16 篇 j.beringer
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,064 篇 英文
  • 210 篇 其他
  • 15 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Data Science and Engineering Lab"
2290 条 记 录,以下是471-480 订阅
排序:
FedMoS: Taming Client Drift in Federated Learning with Double Momentum and Adaptive Selection
FedMoS: Taming Client Drift in Federated Learning with Doubl...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Xiong Wang Yuxin Chen Yuqing Li Xiaofei Liao Hai Jin Bo Li National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Wuhan University Wuhan China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Federated learning (FL) enables massive clients to collaboratively train a global model by aggregating their local updates without disclosing raw data. Communication has become one of the main bottlenecks that prolong...
来源: 评论
Predicting visual acuity with machine learning in treated ocular trauma patients
收藏 引用
International Journal of Ophthalmology(English edition) 2023年 第7期16卷 1005-1014页
作者: Zhi-Lu Zhou Yi-Fei Yan Jie-Min Chen Rui-Jue Liu Xiao-Ying Yu Meng Wang Hong-Xia Hao Dong-Mei Liu Qi Zhang Jie Wang Wen-Tao Xia Department of Forensic Medicine Guizhou Medical UniversityGuiyang 550009Guizhou ProvinceChina Shanghai Key Laboratory of Forensic Medicine Shanghai Forensic Service PlatformInstitute of Forensic ScienceMinistry of JusticeShanghai 200063China The SMART(Smart Medicine and AI-based Radiology Technology)Lab Shanghai Institute for Advanced Communication and Data ScienceShanghai UniversityShanghai 200444China School of Communication and Information Engineering Shanghai UniversityShanghai 200444China Basic Medical College Jiamusi UniversityJiamusi 154007Heilongjiang ProvinceChina
AIM:To predict best-corrected visual acuity(BCVA)by machine learning in patients with ocular trauma who were treated for at least ***:The internal dataset consisted of 850 patients with 1589 eyes and an average age of... 详细信息
来源: 评论
Collaborative Recommendation Model Based on Multi-modal Multi-view Attention Network: Movie and literature cases
arXiv
收藏 引用
arXiv 2023年
作者: Hu, Zheng Cai, Shi-Min Wang, Jun Zhou, Tao Compleχ Lab School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China Big Data Research Center University of Electronic Science and Technology of China Chengdu610054 China
The existing collaborative recommendation models that use multi-modal information emphasize the representation of users’ preferences but easily ignore the representation of users’ dislikes. Nevertheless, modelling u... 详细信息
来源: 评论
Modeling the Temporal Dynamics of EEG Signals in Selective Listening
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Cai, Siqi Zhang, Ran Zhu, Hongxu Li, Haizhou National University of Singapore Department of Electrical and Computer Engineering Singapore Singapore South China University of Technology Shien-Ming Wu School of Intelligent Engineering China Fano Hong Kong Hong Kong The Chinese University of Hon g Kong Shenzhen Research Institute of Big Data School of Data Science Shenzhen518172 China University of Bremen Machine Listening Lab Bremen28359 Germany
Human brain possesses an extraordinary ability to attend to a specific sound source in a multi-talk, noisy environment such as a cocktail party. Auditory attention detection (AAD) aims to automatically identify such a... 详细信息
来源: 评论
Speech Separation for Low-Resource Languages
Speech Separation for Low-Resource Languages
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Marvin Borsdorf Zexu Pan Pascal Himmelmann Haizhou Li Tanja Schultz Machine Listening Lab University of Bremen Bremen Germany Alibaba Group Singapore Department of Mathematics and Computer Science FernUniversität in Hagen Hagen Germany School of Data Science Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China Department of Electrical and Computer Engineering National University of Singapore Singapore Cognitive Systems Lab University of Bremen Bremen Germany
Speech separation aims to equip machines with the human ability of selective listening, i.e. to focus attention on specific information in spoken communication. Studies have shown that the language spoken in a cocktai... 详细信息
来源: 评论
Deep Learning-based Risk Prediction Model for Recurrence-free Survival in Patients with Hepatocellular Carcinoma Using Multi-phase CT Image  11
Deep Learning-based Risk Prediction Model for Recurrence-fre...
收藏 引用
11th IEEE Global Conference on Consumer Electronics, GCCE 2022
作者: Wang, Weibin Wang, Fang Yang, Yunjun Li, Yinhao Liu, Jing Han, Xianhua Lin, Lanfen Tong, Ruofeng Hu, Hongjie Chen, Yen-Wei Ritsumeikan University Graduate School of Information Science and Engineering Kusatsu Japan Zhejiang University Department of Radiology Sir Run Run Shaw Hospital Hangzhou China Wenzhou Medical University Department of Radiology the First Affiliated Hospital Wenzhou China Ritsumeikan University College of Information Science and Engineering Kusatsu Japan Research Center for Healthcare Data Science Zhejiang Lab Hangzhou China College of Information Science and Engineering Yamaguchi University Yamaguchi Japan Zhejiang University College of Computer Science and Technology Hangzhou China
Risk prediction for recurrence is a critical task for patients with hepatocellular carcinoma (HCC). Effective prediction can evaluate treatment options and guide personalized medicine. Traditional approaches use clini... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Rethinking CLIP-based Video Learners in Cross-Domain Open-Vocabulary Action Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Kun-Yu Ding, Henghui Zhou, Jiaming Tang, Yu-Ming Peng, Yi-Xing Zhao, Zhilin Loy, Chen Change Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China S-Lab Nanyang Technological University Singapore Institute of Big Data Fudan University China AI Thrust Hong Kong University of Science and Technology Guangzhou China Data Science Lab School of Computing & DataX Research Centre Macquarie University Australia
Building upon the impressive success of CLIP (Contrastive Language-Image Pretraining), recent pioneer works have proposed to adapt the powerful CLIP to video data, leading to efficient and effective video learners for... 详细信息
来源: 评论
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Validating SMT Solvers via Skeleton Enumeration Empowered by...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Maolin Sun Yibiao Yang Ming Wen Yongcong Wang Yuming Zhou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security National Engineering Research Center for Big Data Technology and System State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Huazhong University of Science and Technology China
SMT solvers check the satisfiability of logic formulas over first-order theories, which have been utilized in a rich number of critical applications, such as software verification, test case generation, and program sy...
来源: 评论