咨询与建议

限定检索结果

文献类型

  • 2,576 篇 期刊文献
  • 1,735 篇 会议
  • 28 册 图书

馆藏范围

  • 4,339 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,792 篇 工学
    • 2,080 篇 计算机科学与技术...
    • 1,729 篇 软件工程
    • 595 篇 信息与通信工程
    • 434 篇 生物工程
    • 400 篇 电气工程
    • 353 篇 控制科学与工程
    • 350 篇 生物医学工程(可授...
    • 284 篇 光学工程
    • 251 篇 电子科学与技术(可...
    • 138 篇 机械工程
    • 135 篇 化学工程与技术
    • 116 篇 仪器科学与技术
    • 112 篇 安全科学与工程
    • 109 篇 动力工程及工程热...
    • 101 篇 交通运输工程
  • 1,812 篇 理学
    • 884 篇 数学
    • 565 篇 物理学
    • 505 篇 生物学
    • 351 篇 统计学(可授理学、...
    • 167 篇 化学
    • 156 篇 系统科学
    • 115 篇 地球物理学
  • 754 篇 管理学
    • 473 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 274 篇 工商管理
  • 370 篇 医学
    • 320 篇 临床医学
    • 272 篇 基础医学(可授医学...
    • 163 篇 公共卫生与预防医...
    • 150 篇 药学(可授医学、理...
  • 135 篇 法学
    • 120 篇 社会学
  • 93 篇 经济学
  • 82 篇 农学
  • 51 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 156 篇 deep learning
  • 155 篇 accuracy
  • 134 篇 machine learning
  • 93 篇 training
  • 86 篇 computational mo...
  • 84 篇 feature extracti...
  • 77 篇 convolutional ne...
  • 74 篇 real-time system...
  • 72 篇 predictive model...
  • 63 篇 internet of thin...
  • 63 篇 artificial intel...
  • 60 篇 data models
  • 58 篇 reinforcement le...
  • 52 篇 federated learni...
  • 49 篇 optimization
  • 46 篇 image segmentati...
  • 46 篇 graph neural net...
  • 46 篇 semantics
  • 42 篇 generative adver...
  • 42 篇 adversarial mach...

机构

  • 169 篇 college of compu...
  • 63 篇 department of co...
  • 61 篇 nanyang technolo...
  • 51 篇 department of co...
  • 48 篇 beijing advanced...
  • 42 篇 college of compu...
  • 40 篇 data science ins...
  • 38 篇 national enginee...
  • 34 篇 department of co...
  • 34 篇 university of ch...
  • 31 篇 school of data a...
  • 30 篇 the college of c...
  • 27 篇 dipartimento di ...
  • 26 篇 the oskar klein ...
  • 25 篇 college of intel...
  • 24 篇 department of br...
  • 23 篇 center for scien...
  • 23 篇 college of infor...
  • 23 篇 department of co...
  • 22 篇 department of ph...

作者

  • 161 篇 niyato dusit
  • 35 篇 sun geng
  • 35 篇 chen mingzhe
  • 31 篇 du hongyang
  • 30 篇 peng hao
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 26 篇 wang jiacheng
  • 25 篇 j. b. thayer
  • 25 篇 p. spinelli
  • 25 篇 m. kuss
  • 25 篇 guo yike
  • 24 篇 s. guiriec
  • 23 篇 p. a. caraveo
  • 23 篇 p. f. michelson
  • 23 篇 s. ciprini
  • 23 篇 r. rando
  • 23 篇 kang jiawen
  • 22 篇 m. ackermann
  • 22 篇 a. reimer

语言

  • 3,655 篇 英文
  • 672 篇 其他
  • 16 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Computing and Data Science"
4339 条 记 录,以下是631-640 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Synthetic is all you need: removing the auxiliary data assumption for membership inference attacks against synthetic data
arXiv
收藏 引用
arXiv 2023年
作者: Guépin, Florent Meeus, Matthieu Creţu, Ana-Maria de Montjoye, Yves-Alexandre Department of Computing and Data Science Institute Imperial College London London United Kingdom
Synthetic data is emerging as one of the most promising solutions to share individual-level data while safeguarding privacy. While membership inference attacks (MIAs), based on shadow modeling, have become the standar... 详细信息
来源: 评论
Riemannian Complex Hermit Positive Definite Convolution Network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Li, Yuke Jin, Haiyan Lin, Weisi Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep learning can learn high-level semantic features in Euclidean space effectively for PolSAR images, while they need to covert the complex covariance matrix into a feature vector or complex-valued vector as the netw... 详细信息
来源: 评论
Transformer Learns Optimal Variable Selection in Group-Sparse Classification
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Chenyang Meng, Xuran Cao, Yuan Department of Statistics & Actuarial Science School of Computing & Data Science The University of Hong Kong Hong Kong Department of Biostatistics University of Michigan Ann Arbor United States
Transformers have demonstrated remarkable success across various applications. However, the success of transformers have not been understood in theory. In this work, we give a case study of how transformers can be tra... 详细信息
来源: 评论
Deep Learning and Quantum-Enabled Cloud Platform Approach on Optimized Crop Health Predictions  5th
Deep Learning and Quantum-Enabled Cloud Platform Approach on...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Singh, Jagendra Thakur, Hardeo Kumar Sharma, Neetu Alsahlanee, Abbas Thajeel Rhaif Sahunthala, S. Shaik, Nazeer Alliance School of Advanced Computing Alliance University Bangalore India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science and Engineering Galgotias University Greater Noida India Department of Computer Science and Information Technology University of Salahaddin-Erbil Erbil Iraq Department of Artificial Intelligence and Data Science Rajalakshmi Institute of Technology Tamil Nadu Chembarambakkam India Department of Computer Science and Engineering Srinivasa Ramanujan Institute of Technology—Autonomous Anantapur India
This study is an innovative investigation into the field of plant disease detection and plant health prediction using state-of-the-art machine learning models and Quantum Support Vector Machines (QSVM) for feature ext... 详细信息
来源: 评论
An Improved Finite-time Analysis of Temporal Difference Learning with Deep Neural Networks  41
An Improved Finite-time Analysis of Temporal Difference Lear...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Ke, Zhifa Wen, Zaiwen Zhang, Junyu Center for Data Science Peking University China Beijing International Center for Mathematical Research Center for Machine Learning Research Changsha Institute for Computing and Digital Economy Beijing China Department of Industrial Systems Engineering and Management National University of Singapore Singapore
Temporal difference (TD) learning algorithms with neural network function parameterization have well-established empirical success in many practical large-scale reinforcement learning tasks. However, theoretical under... 详细信息
来源: 评论
Leveraging Deep Learning for Precise Chronic Bronchitis Identification in X-Ray Modalities
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 381-405页
作者: Fahad Ahmad Saad Awadh Alanazi Kashaf Junaid Maryam Shabbir Asim Ali School of Computing Faculty of TechnologyUniversity of PortsmouthWinston Churchill Ave SouthseaPortsmouthPO12UPUK Portsmouth Artificial Intelligence and Data Science Center University of PortsmouthWinston Churchill AveSouthseaPortsmouthPO12UPUK Department of Computer Science College of Computer and Information SciencesJouf UniversitySakakaAljouf72341Saudi Arabia School of Biological and Behavioural Sciences Queen Mary University of LondonLondonE14NSUK Department of Computer Sciences Bahria UniversityLahorePunjab54700Pakistan
Image processing plays a vital role in various fields such as autonomous systems,healthcare,and cataloging,especially when integrated with deep learning(DL).It is crucial in medical diagnostics,including the early det... 详细信息
来源: 评论
A Joint Gradient and Loss Based Clustered Federated Learning Design
A Joint Gradient and Loss Based Clustered Federated Learning...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Lin, Licheng Yang, Zhaohui Wu, Yusen Liu, Yuchen Chen, Mingzhe Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China North Carolina State University Department of Computer Science RaleighNC27695 United States University of Miami Department of Electrical and Computer Engineering Coral GablesFL33146 United States University of Miami Frost Institute for Data Science and Computing Coral GablesFL33146 United States
In this paper, a novel clustered FL framework that enables distributed edge devices with non-IID data to independently form several clusters in a distributed manner and implement FL training within each cluster is pro... 详细信息
来源: 评论
Black-box backdoor defense via zero-shot image purification  23
Black-box backdoor defense via zero-shot image purification
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Yucheng Shi Mengnan Du Xuansheng Wu Zihan Guan Jin Sun Ninghao Liu School of Computing University of Georgia Department of Data Science New Jersey Institute of Technology
Backdoor attacks inject poisoned samples into the training data, resulting in the misclassification of the poisoned input during a model's deployment. Defending against such attacks is challenging, especially for ...
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things  4
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
作者: Riaz, Syed Waleed Khan, Fazlullah Ullah, Insaf Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Mardan Computer Science Department KPK Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang Ningbo315104 China Institute for Analytics and Data Science University of Essex ColchesterCO4 3SQ United Kingdom College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论