咨询与建议

限定检索结果

文献类型

  • 2,849 篇 会议
  • 2,257 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 5,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,945 篇 工学
    • 2,290 篇 计算机科学与技术...
    • 1,972 篇 软件工程
    • 640 篇 信息与通信工程
    • 491 篇 生物工程
    • 466 篇 控制科学与工程
    • 340 篇 生物医学工程(可授...
    • 338 篇 电气工程
    • 298 篇 光学工程
    • 242 篇 电子科学与技术(可...
    • 156 篇 化学工程与技术
    • 153 篇 机械工程
    • 151 篇 网络空间安全
    • 139 篇 安全科学与工程
    • 123 篇 动力工程及工程热...
    • 102 篇 交通运输工程
    • 92 篇 仪器科学与技术
  • 1,688 篇 理学
    • 763 篇 数学
    • 563 篇 生物学
    • 503 篇 物理学
    • 310 篇 统计学(可授理学、...
    • 197 篇 化学
    • 142 篇 系统科学
  • 831 篇 管理学
    • 486 篇 管理科学与工程(可...
    • 387 篇 图书情报与档案管...
    • 235 篇 工商管理
  • 340 篇 医学
    • 299 篇 临床医学
    • 268 篇 基础医学(可授医学...
    • 154 篇 公共卫生与预防医...
    • 148 篇 药学(可授医学、理...
  • 156 篇 法学
    • 142 篇 社会学
  • 72 篇 经济学
  • 53 篇 农学
  • 48 篇 教育学
  • 20 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 361 篇 accuracy
  • 269 篇 deep learning
  • 206 篇 training
  • 202 篇 machine learning
  • 186 篇 real-time system...
  • 185 篇 convolutional ne...
  • 182 篇 feature extracti...
  • 166 篇 computational mo...
  • 156 篇 predictive model...
  • 129 篇 data models
  • 104 篇 internet of thin...
  • 103 篇 artificial intel...
  • 98 篇 reinforcement le...
  • 96 篇 optimization
  • 94 篇 support vector m...
  • 90 篇 security
  • 84 篇 semantics
  • 83 篇 machine learning...
  • 76 篇 measurement
  • 74 篇 adaptation model...

机构

  • 181 篇 department of co...
  • 143 篇 moe key lab of a...
  • 82 篇 tencent ai lab
  • 82 篇 department of co...
  • 66 篇 lovely professio...
  • 51 篇 moe key lab of a...
  • 44 篇 key laboratory o...
  • 40 篇 the islamic univ...
  • 39 篇 department of co...
  • 38 篇 shanghai ai labo...
  • 38 篇 the islamic univ...
  • 37 篇 department of co...
  • 32 篇 department of co...
  • 31 篇 university of ch...
  • 30 篇 school of comput...
  • 29 篇 department of cs...
  • 29 篇 school of comput...
  • 27 篇 peng cheng labor...
  • 26 篇 department of el...
  • 25 篇 department of co...

作者

  • 106 篇 yu kai
  • 98 篇 zhao hai
  • 57 篇 yan junchi
  • 57 篇 qian yanmin
  • 41 篇 zhang zhuosheng
  • 36 篇 chen xie
  • 36 篇 chen lu
  • 33 篇 li zuchao
  • 31 篇 yanmin qian
  • 30 篇 al-turjman fadi
  • 27 篇 lyu michael r.
  • 25 篇 fadi al-turjman
  • 24 篇 zhu jun
  • 23 篇 zhu su
  • 21 篇 guo yiwei
  • 21 篇 liu tongliang
  • 20 篇 ramiz salama
  • 20 篇 junchi yan
  • 19 篇 han bo
  • 18 篇 pareek piyush ku...

语言

  • 3,910 篇 英文
  • 1,212 篇 其他
  • 10 篇 中文
  • 2 篇 德文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
检索条件"机构=Department of Computer Science and Engineering in AI and ML"
5130 条 记 录,以下是601-610 订阅
排序:
Unsupervised Fuzzy Clustering-Based Vehicle Detection and Segmentation in Infrared Thermography  5th
Unsupervised Fuzzy Clustering-Based Vehicle Detection and Se...
收藏 引用
5th International Conference on Advances in Distributed Computing and Machine Learning, ICADCml 2024
作者: Ganesan, P. Leo Joseph, L.M.I. Sivakumar, V.G. Thulasi Prasad, S. Sathish, B.S. Sajiv, G. Department of Electronics and Communication Engineering Vidya Jyothi Institute of Technology Hyderabad India Department of Electronics and Communication Engineering SR University Telangana Warangal India Department of Computer Science Engineering AI Sri Venkateshwara College of Engineering Bengaluru India Saveetha School of Engineering SIMATS Chennai India
The identification of vehicles is indispensable task in this fast moving world where attentiveness is most important than ever before. The suggested methodology explains the effectiveness of fuzzy clustering algorithm... 详细信息
来源: 评论
Biometric-Based Access Control Systems with Robust Facial Recognition in IoT Environments  3
Biometric-Based Access Control Systems with Robust Facial Re...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Satish Babu, B.V. Manoranjini, J. Changala, Ravindra Aarif, Mohd Mary, S. Suma Christal Raj, I Infant Prasad v Potluri Siddhartha Institute of Technology Department of It Vijayawada India Chaitanya Bharathi Institute of Technology Department of Ai & Ml Hyderabad India Guru Nanak Institutions Technical Campus Department of Information Technology Hyderabad India Associate Editor-Publishing Global Research Network Noida India Panimalar Engineering College Department of Information Technology Poonamalle Chennai India K. Ramakrishnan College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India
The integration of biometric-based access control systems with robust facial recognition technology within Internet of Things (IoT) environments holds paramount significance in addressing contemporary security challen... 详细信息
来源: 评论
Improving Gloss-free Sign Language Translation by Reducing Representation Density  38
Improving Gloss-free Sign Language Translation by Reducing R...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Ye, Jinhui Wang, Xing Jiao, Wenxiang Liang, Junwei Xiong, Hui Guangzhou China Department of Computer Science and Engineering HKUST Hong Kong Guangzhou HKUST Fok Ying Tung Research Institute Hong Kong Tencent AI Lab China
Gloss-free sign language translation (SLT) aims to develop well-performing SLT systems with no requirement for the costly gloss annotations, but currently still lags behind gloss-based approaches significantly. In thi...
来源: 评论
Machine learning tool for exploring sentiment analysis on twitter data
收藏 引用
Materials Today: Proceedings 2022年 56卷 1927-1934页
作者: Biradar, Shanta H. Gorabal, J.V. Gupta, Gaurav Department of Information Science & Engineering Sir M Visvesvaraya Institute of Technology Bengaluru562157 India Department of Computer Science & Engineering ATME College of Engineering Mysore570028 India Yogananda School of AI Computing and Data Science Shoolini University Himachal Pradesh Solan India
In social media, micro-blogging is a common routine of most people around the world. Social media analytics gathering structure and unstructured Big-Data from various social sites and analyzing to make business decisi... 详细信息
来源: 评论
Mobile edge fog, Blockchain Networking and Computing-A survey  1
Mobile edge fog, Blockchain Networking and Computing-A surve...
收藏 引用
1st International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Salama, Ramiz Al-Turjman, Fadi Bhatla, Shruti Mishra, Divya Ai and Robotics Institute Research Center for Ai and IoT Near East University Nicosia Department of Computer Engineering Mersin10 Turkey Ai and Robotics Institute Near East University Artificial Intelligence Engineering Dept. Mersin Nicosia10 Turkey University of Kyrenia Research Center for Ai and IoT Faculty of Engineering Kyrenia Mersin10 Turkey Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Abes Engineering College Ghaziabad India
Mobile edge computing (MEC) and blockchain technology are two rapidly evolving areas in computer science that have the potential to significantly impact the design and operation of distributed systems. MEC involves th... 详细信息
来源: 评论
Network security, trust & privacy in a wiredwireless Environments-An Overview  1
Network security, trust & privacy in a wiredwireless Environ...
收藏 引用
1st International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Salama, Ramiz Al-Turjman, Fadi Bhatla, Shruti Gautam, Devendra Ai and Robotics Institute Research Center for Ai and IoT Near East University Nicosia Department of Computer Engineering Mersin10 Turkey Ai and Robotics Institute Near East University Artificial Intelligence Engineering Dept. Mersin Nicosia10 Turkey University of Kyrenia Research Center for Ai and IoT Faculty of Engineering Kyrenia Mersin10 Turkey Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Abes Engineering College Ghaziabad India
In this report, we explore the key challenges and threats facing network security in wired and wireless environments, as well as the technologies and best practices for addressing these challenges. We provide an overv... 详细信息
来源: 评论
An Ensemble Approach of CNN and GRU Models for Network and Server Intrusion
An Ensemble Approach of CNN and GRU Models for Network and S...
收藏 引用
Emerging Technology (INCET), International Conference for
作者: Aniketh Reddy Adireddy Vishnu Kurnala Sindu Patlolla Gagandeep Arora Artificial Intelligence & Machine Learning Vardhaman College of Engineering Hyderabad India Computer Science & Engineering (AI&ML) Vardhaman College of Engineering Hyderabad India
This research paper delves into the realm of cybersecurity by proposing an innovative ensemble model that blends Gated Recurrent Units (GRU) and Convolutional Neural Networks (CNN) for network and server intrusion det... 详细信息
来源: 评论
An IoT-based Deep Belief Network in Intrusion Detection System using Butterfly Optimization  10
An IoT-based Deep Belief Network in Intrusion Detection Syst...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Cherian, Aswathy K. Vaidhehi, M. Arshey, M. Simpson, Serin V. Briskilal, J. Singh, Astitva Srm Institute of Science and Technology Department of Computing Technologies Chennai Kattankulathur India Scms School of Engineering and Technology Department of Ai & Ds Kerala Ernakulam India Madanapalle Institute of Technology & Science Department of Computer Science and Technology Chittoor Andhra Pradesh Madanapalle India
Rapid technological advancements in the communication and internet industries have led to a huge increase in network scale and data volume. Network security is having a hard time identifying attacks as new threats are... 详细信息
来源: 评论
GoT: Effective Graph-of-Thought Reasoning in Language Models
GoT: Effective Graph-of-Thought Reasoning in Language Models
收藏 引用
2024 Findings of the Association for Computational Linguistics: NAACL 2024
作者: Yao, Yao Li, Zuchao Zhao, Hai Department of Computer Science and Engineering Shanghai Jiao Tong University China MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China
With the widespread use of language models (LMs) in NLP tasks, researchers have discovered the potential of Chain-of-thought (CoT) to assist LMs in accomplishing complex reasoning tasks by generating intermediate step... 详细信息
来源: 评论
An Approach to Detect and Classify Potentially Suspicious Activity from Real-Time Log Data using Anomaly Detection Methods
An Approach to Detect and Classify Potentially Suspicious Ac...
收藏 引用
Innovation in Technology (INOCON), IEEE International Conference for
作者: Arnab Sengupta Akash Kundu aishi Mukhopadhyay Computer Science & Engineering (AI/ML) Heritage Institute of Technology Kolkata India Computer Science & Engineering Heritage Institute of Technology Kolkata India Electronics & Communication Engineering Heritage Institute of Technology Kolkata India
This paper aims to propose an intricate yet streamlined approach to incorporate Machine Learning into Cybersecurity by employing anomaly detection techniques to screen real-time log data and identify as well as classi...
来源: 评论