咨询与建议

限定检索结果

文献类型

  • 2,558 篇 会议
  • 2,201 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 4,782 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,831 篇 工学
    • 2,196 篇 计算机科学与技术...
    • 1,890 篇 软件工程
    • 607 篇 信息与通信工程
    • 475 篇 生物工程
    • 446 篇 控制科学与工程
    • 332 篇 生物医学工程(可授...
    • 322 篇 电气工程
    • 291 篇 光学工程
    • 234 篇 电子科学与技术(可...
    • 150 篇 化学工程与技术
    • 146 篇 机械工程
    • 136 篇 网络空间安全
    • 131 篇 安全科学与工程
    • 114 篇 动力工程及工程热...
    • 98 篇 交通运输工程
    • 85 篇 仪器科学与技术
  • 1,630 篇 理学
    • 735 篇 数学
    • 548 篇 生物学
    • 489 篇 物理学
    • 297 篇 统计学(可授理学、...
    • 189 篇 化学
    • 133 篇 系统科学
  • 791 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 375 篇 图书情报与档案管...
    • 224 篇 工商管理
  • 331 篇 医学
    • 294 篇 临床医学
    • 263 篇 基础医学(可授医学...
    • 150 篇 公共卫生与预防医...
    • 144 篇 药学(可授医学、理...
  • 153 篇 法学
    • 139 篇 社会学
  • 70 篇 经济学
  • 49 篇 农学
  • 44 篇 教育学
  • 20 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 304 篇 accuracy
  • 238 篇 deep learning
  • 184 篇 machine learning
  • 183 篇 training
  • 167 篇 feature extracti...
  • 155 篇 convolutional ne...
  • 152 篇 real-time system...
  • 141 篇 computational mo...
  • 126 篇 predictive model...
  • 110 篇 data models
  • 95 篇 internet of thin...
  • 95 篇 artificial intel...
  • 86 篇 reinforcement le...
  • 85 篇 semantics
  • 83 篇 optimization
  • 79 篇 support vector m...
  • 71 篇 security
  • 71 篇 measurement
  • 69 篇 machine learning...
  • 67 篇 adaptation model...

机构

  • 179 篇 department of co...
  • 142 篇 moe key lab of a...
  • 81 篇 tencent ai lab
  • 68 篇 department of co...
  • 58 篇 lovely professio...
  • 51 篇 moe key lab of a...
  • 44 篇 key laboratory o...
  • 38 篇 shanghai ai labo...
  • 37 篇 the islamic univ...
  • 36 篇 department of co...
  • 34 篇 the islamic univ...
  • 32 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 university of ch...
  • 30 篇 school of comput...
  • 29 篇 school of comput...
  • 28 篇 department of el...
  • 25 篇 department of cs...
  • 24 篇 department of co...
  • 24 篇 department of co...

作者

  • 106 篇 yu kai
  • 98 篇 zhao hai
  • 58 篇 qian yanmin
  • 56 篇 yan junchi
  • 41 篇 zhang zhuosheng
  • 39 篇 chen lu
  • 36 篇 chen xie
  • 33 篇 li zuchao
  • 32 篇 yanmin qian
  • 30 篇 al-turjman fadi
  • 27 篇 lyu michael r.
  • 25 篇 fadi al-turjman
  • 23 篇 zhu su
  • 21 篇 guo yiwei
  • 21 篇 junchi yan
  • 21 篇 liu tongliang
  • 20 篇 ramiz salama
  • 19 篇 han bo
  • 19 篇 wu mengyue
  • 17 篇 xu hongshen

语言

  • 4,163 篇 英文
  • 612 篇 其他
  • 8 篇 中文
  • 2 篇 德文
  • 2 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-AI"
4782 条 记 录,以下是1-10 订阅
排序:
Power synchronization: taming massive diversified serverless functions under power constraints
收藏 引用
science China(Information sciences) 2025年 第3期68卷 47-65页
作者: Du LIU Lu ZHANG Yechen XU Xinkai WANG Lingyu SUN Yifei PU Xiaofeng HOU Chao LI Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong University AI Chip Center for Emerging Smart Systems The Hong Kong University of Science and Technology
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted ser... 详细信息
来源: 评论
An Anomaly Detection Enhancement Method Using Interpretable Unsupervised Machine Learning in Industrial Information Systems at Multivariate Time Series Environment
收藏 引用
Journal of Institute of Control, Robotics and Systems 2024年 第3期30卷 245-252页
作者: Jeon, Janggun Kim, Namgi Department of Computer Science Kyonggi University Korea Republic of Department of AI Computer Engineering Kyonggi University Korea Republic of
Time series anomaly detection is a technology that finds outliers in observed data over time, and is a significant research field associated with many applications or platforms. In this paper, we propose a method call... 详细信息
来源: 评论
Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud
收藏 引用
Soft Computing 2024年 第23期28卷 13701-13713页
作者: Hombal, Uma Rangapura Basavaraju, Dayananda Shinde, Ashwini S. Department of Computer Science and Engineering KSIT Bengaluru India Department of Computer Science and Engineering MSRIT Bengaluru India Department of CSE-AI Nutan College of Engineering and Research Pune India
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extens... 详细信息
来源: 评论
A survey on cross-user federated recommendation
收藏 引用
science China(Information sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
MMInstruct: a high-quality multi-modal instruction tuning dataset with extensive diversity
收藏 引用
science China(Information sciences) 2024年 第12期67卷 36-51页
作者: Yangzhou LIU Yue CAO Zhangwei GAO Weiyun WANG Zhe CHEN Wenhai WANG Hao TIAN Lewei LU Xizhou ZHU Tong LU Yu QIAO Jifeng Dai School of Computer Science Nanjing University School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai AI Laboratory School of Computer Science Fudan University Department of Information Engineering The Chinese University of Hong Kong SenseTime Research Department of Electronic Engineering Tsinghua University
Despite the effectiveness of vision-language supervised fine-tuning in enhancing the performance of vision large language models(VLLMs), existing visual instruction tuning datasets include the following limitations.(1... 详细信息
来源: 评论
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 评论
Drone Detection and Tracking using Deep Convolutional Neural Networks from Real-time CCTV Footage
收藏 引用
IEIE Transactions on Smart Processing and Computing 2024年 第4期13卷 313-321页
作者: Allmamun, Md Akter, Fahima Talukdar, Muhammad Borhan Uddin Chakraborty, Sovon Uddin, Jia Department of Computer Science and Engineering European University of Bangladesh Dhaka Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Computer Science and Engineering University of Liberal Arts Bangladesh Dhaka Bangladesh AI and Big Data Department Woosong University Daejeon Korea Republic of
Drones are flying objects that may be controlled remotely or programmed to do a wide range of tasks, including aerial photography, videography, surveys, crop and animal monitoring, search and rescue missions, package ... 详细信息
来源: 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 评论
Steel Surface Defect Detection Using Learnable Memory Vision Transformer
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 499-520页
作者: Syed Tasnimul Karim Ayon Farhan Md.Siraj Jia Uddin Department of Computer Science and Engineering BRAC UniversityDhaka1212Bangladesh Department of AI and Big Data Endicott CollegeWoosong UniversityDaejeon34606Republic of Korea
This study investigates the application of Learnable Memory Vision Transformers(LMViT)for detecting metal surface flaws,comparing their performance with traditional CNNs,specifically ResNet18 and ResNet50,as well as o... 详细信息
来源: 评论
Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android
收藏 引用
Cyber-Physical Systems 2025年 第1期11卷 1-46页
作者: Khaliq, Zubair Khan, Dawood Ashraf Baba, Asif Iqbal Ali, Shahbaz Farooq, Sheikh Umar Department of Computer Science University of Kashmir Jammu and Kashmir Srinagar India AI Thndr Dubai United Arab Emirates Department of Computer Science Tuskegee University TuskegeeAL United States Data Engineering hyke.ai Dubai United Arab Emirates
Botnets have become a severe security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic, and the ever-larger number of cybercrim... 详细信息
来源: 评论