咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 709 篇 会议
  • 9 册 图书

馆藏范围

  • 2,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,542 篇 工学
    • 912 篇 计算机科学与技术...
    • 767 篇 软件工程
    • 266 篇 生物工程
    • 265 篇 信息与通信工程
    • 256 篇 生物医学工程(可授...
    • 197 篇 电气工程
    • 176 篇 光学工程
    • 166 篇 控制科学与工程
    • 146 篇 核科学与技术
    • 138 篇 电子科学与技术(可...
    • 126 篇 化学工程与技术
    • 69 篇 机械工程
    • 61 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 49 篇 交通运输工程
    • 46 篇 安全科学与工程
  • 1,413 篇 理学
    • 782 篇 物理学
    • 369 篇 数学
    • 340 篇 生物学
    • 179 篇 统计学(可授理学、...
    • 160 篇 化学
    • 70 篇 系统科学
    • 48 篇 地球物理学
  • 342 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 253 篇 医学
    • 214 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 99 篇 药学(可授医学、理...
    • 79 篇 公共卫生与预防医...
  • 61 篇 法学
  • 56 篇 农学
  • 29 篇 经济学
  • 26 篇 教育学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 150 篇 hadron colliders
  • 85 篇 deep learning
  • 76 篇 hadrons
  • 59 篇 machine learning
  • 47 篇 hadronic decays
  • 42 篇 bottom mesons
  • 38 篇 branching fracti...
  • 38 篇 accuracy
  • 36 篇 particle decays
  • 34 篇 training
  • 32 篇 w & z bosons
  • 30 篇 artificial intel...
  • 29 篇 feature extracti...
  • 28 篇 higgs bosons
  • 28 篇 flavor changing ...
  • 27 篇 leptonic, semile...
  • 25 篇 computational mo...
  • 25 篇 predictive model...
  • 24 篇 charmed mesons
  • 22 篇 magnetic resonan...

机构

  • 456 篇 department of ph...
  • 388 篇 iccub universita...
  • 386 篇 cavendish labora...
  • 377 篇 university of ch...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 357 篇 school of physic...
  • 339 篇 department of ph...
  • 335 篇 imperial college...
  • 335 篇 center for high ...
  • 334 篇 yandex school of...
  • 330 篇 oliver lodge lab...
  • 329 篇 stfc rutherford ...
  • 328 篇 institute of par...
  • 321 篇 infn sezione di ...
  • 320 篇 physikalisches i...
  • 314 篇 henryk niewodnic...
  • 311 篇 nikhef national ...
  • 310 篇 infn sezione di ...

作者

  • 233 篇 beiter a.
  • 217 篇 barter w.
  • 212 篇 bellee v.
  • 196 篇 casse g.
  • 193 篇 bowcock t.j.v.
  • 189 篇 blake t.
  • 187 篇 borsato m.
  • 187 篇 betancourt c.
  • 187 篇 bediaga i.
  • 187 篇 amato s.
  • 185 篇 boettcher t.
  • 185 篇 braun s.
  • 184 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 183 篇 baryshnikov f.
  • 181 篇 bencivenni g.
  • 175 篇 brundu d.
  • 173 篇 back j.j.
  • 173 篇 bay a.
  • 169 篇 bursche a.

语言

  • 2,412 篇 英文
  • 194 篇 其他
  • 23 篇 中文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering and AI and Data Science Application and Research Center"
2629 条 记 录,以下是291-300 订阅
排序:
Longitudinal Patterns of Functional Network Changes Over Four-Year Period Associated with Sex in the Developing Brain  22
Longitudinal Patterns of Functional Network Changes Over Fou...
收藏 引用
22nd IEEE International Symposium on Biomedical Imaging, ISBI 2025
作者: Saha, Rekha Saha, Debbrata K. Fu, Zening Adali, Tulay Calhoun, Vince D. Georgia State University Georgia Institute of Technology Emory University Tri-institutional Center for Translational Research in Neuroimaging and Data Science (TReNDS) Atlanta 30303 GA United States University of Maryland Department of Computer Science and Electrical Engineering Baltimore County 21250 MD United States
Functional network connectivity (FNC) is a valuable measure for assessing the temporal interdependence and intrinsic functional relationships among brain networks. While longitudinal research on intrinsic functional c... 详细信息
来源: 评论
A Survey of Vietnamese Automatic Speech Recognition  9
A Survey of Vietnamese Automatic Speech Recognition
收藏 引用
9th International Conference on Orange Technology, ICOT 2021
作者: Nga, Cao Hong Li, Chung-Ting Li, Yung-Hui Wang, Jia-Ching National Central University Department of Computer Science and Information Engineering Taiwan Hon Hai Research Institute Ai Research Center Taiwan
In this paper, we survey Vietnamese automatic speech recognition (ASR). The objective of this survey is to provide an overview of the current status and remaining challenges of implementing a Vietnamese ASR. Recently,... 详细信息
来源: 评论
Reveal training performance mystery between Tensor Flow and PyTorch in the single GPU environment
收藏 引用
science China(Information sciences) 2022年 第1期65卷 147-163页
作者: Hulin Dai Xuan PENG Xuanhua SHI Ligang HE Qian XIONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabSchool of Computer Science and Technology Huazhong University of Science and Technology Department of Computer Science University of Warwick
Deep learning has gained tremendous success in various fields while training deep neural networks(DNNs) is very compute-intensive, which results in numerous deep learning frameworks that aim to offer better usability ... 详细信息
来源: 评论
Analysis of N-Way K-Shot Malware Detection Using Few-Shot Learning  1
收藏 引用
International Conference on Cyber Security, Privacy and Networking, ICSPN 2022
作者: Chui, Kwok Tai Gupta, Brij B. Lee, Lap-Kei Torres-Ruiz, Miguel Kowloon Hong Kong Department of Computer Science and Information Engineering International Center for AI and Cyber Security Research and Innovations Asia University Taichung41354 Taiwan Lebanese American University Beirut1102 Lebanon Department of Electronic Engineering and Computer Science School of Science and Technology Hong Kong Metropolitan University Kowloon Hong Kong Instituto Politécnico Nacional Centro de Investigacion en Computacion UPALM-Zacatenco Mexico City07320 Mexico
Solving machine learning problems with small-scale training datasets becomes an emergent research area to fill the opposite end of big data applications. Attention is drawn to malware detection using few-shot learning... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Model Based on Siamese Network  7th
Smart Contract Vulnerability Detection Model Based on Siames...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Chen, Weijie Guo, Ran Wang, Guopeng Zhang, Lejun Qiu, Jing Su, Shen Liu, Yuan Xu, Guangxia Chen, Huiling College of Information Engineering Yangzhou University Yangzhou225127 China Cyberspace Institute Advanced Technology Guangzhou University Guangzhou510006 China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of Education Beijing100039 China Department of Computer Science and Artificial Intelligence Wenzhou University Wenzhou325035 China
Blockchain is experiencing the transition from the first generation to the second generation, and smart contract is the symbol of the second generation blockchain. Under the background of the explosive growth of the s... 详细信息
来源: 评论
Identification of soybean in Argentina using Sentinel-2 composite images
收藏 引用
International Journal of Agricultural and Biological engineering 2024年 第5期17卷 266-274页
作者: Linsheng Huang Yue Chen Yuhao Pan Zihang Lou Shijun Zheng Xiaoyang Zhang Le Yu Shengwei Liu Dailiang Peng National Engineering Research Center for Agro-Ecological Big Data Analysis&Application Anhui UniversityHefei 230601China Key Laboratory of Digital Earth Science Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100094China Research Area of Ecology and Biodiversity School of Biological SciencesThe University of Hong KongPokfulamHong KongChina College of Environmental and Resource Sciences Zhejiang UniversityHangzhou 310058China Department of Earth System Science Ministry of Education Key Laboratory for Earth System ModelingInstitute for Global Change StudiesTsinghua UniversityBeijing 100084China Geospatial Sciences Center of Excellence Department of Geography&Geospatial SciencesSouth Dakota State UniversityBrookingsSD 57007USA Ministry of Education Ecological Field Station for East Asian Migratory Birds Beijing 100084China Tsinghua University(Department of Earth System Science)-Xi’an Institute of Surveying and Mapping Joint Research Center for Next-Generation Smart Mapping Beijing 100084China School of Surveying and Land Information Engineering Henan Polytechnic UniversityJiaozuo 454000HenanChina
Soybean is one of the most important oil crops, and Argentina is the third-largest soybean producer in the world, accounting for 17% of the global soybean yield. Timely and accurate information on soybean spatial dist... 详细信息
来源: 评论
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities  7th
An Efficient Detection Model for Smart Contract Reentrancy V...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Yuan Guo, Ran Wang, Guopeng Zhang, Lejun Qiu, Jing Su, Shen Liu, Yuan Xu, Guangxia Chen, Huiling College of Information Engineering Yangzhou University Yangzhou225127 China Cyberspace Institute Advanced Technology Guangzhou University Guangzhou510006 China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of Education Beijing100039 China Department of Computer Science and Artificial Intelligence Wenzhou University Wenzhou325035 China
We propose a novel smart contract re-entry vulnerability detection model based on BiGAS. The model combines a BiGRU neural network that introduces an attention mechanism with an SVM. We start from the data features of... 详细信息
来源: 评论
Exploring the Influence of Dimensionality Reduction on Anomaly Detection Performance in Multivariate Time Series
arXiv
收藏 引用
arXiv 2024年
作者: Altin, Mahsun Cakir, Altan Department of Computer Engineering Istanbul Technical University Sariyer Istanbul34467 Turkey Department of Physics Engineering Istanbul Technical University Sariyer Istanbul34467 Turkey Artificial Intelligence Data Science Research and Application Center Istanbul Technical University Sariyer Istanbul34467 Turkey Parton Big Data Analytics and Consulting ITU Ariteknokent Sariyer Istanbul34467 Turkey Adin.Ai WilmingtonDE19806 United States
This paper presents an extensive empirical study on the integration of dimensionality reduction techniques with advanced unsupervised time series anomaly detection models, focusing on the MUTANT and Anomaly-Transforme... 详细信息
来源: 评论
Fault Diagnosis and Region Detection of CCD Image in Double Delay Three-Step Autocorrelator
Fault Diagnosis and Region Detection of CCD Image in Double ...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International Conference on
作者: Suicheng Li Zizhou He Wenwen Shen Yanwen Xia Zhigao Ni Xiaowei Zhou Department of Computer Engineering and Science Institute of Computer Application CAEP Sichuan Province China Department of Optical instrument Research Center of Laser Fusion CAEP Sichuan Province China
With the development of national optical experimental facilities, countries worldwide have invested significant amounts of funding into constructing various facilities. Among them, the double delay three-step autocorr...
来源: 评论
SBA: A Swift and Stealthy Backdoor Attack Framework for Federated Learning
SBA: A Swift and Stealthy Backdoor Attack Framework for Fede...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Junhan Wang Zhangming Wu Zhuoyue Wang Lu Dong School of Cyber Science and Engineering Southeast University Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Southeast University Ministry of Education Department of Electrical Engineering and Computer Sciences University of California Berkeley USA
Federated Learning (FL) enables collaborative model training while protecting the privacy of individual participants. However, this decentralized framework is vulnerable to certain risks, particularly backdoor attacks... 详细信息
来源: 评论