咨询与建议

限定检索结果

文献类型

  • 13,659 篇 期刊文献
  • 11,737 篇 会议
  • 97 册 图书

馆藏范围

  • 25,493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,158 篇 工学
    • 9,825 篇 计算机科学与技术...
    • 8,234 篇 软件工程
    • 3,164 篇 信息与通信工程
    • 2,202 篇 生物工程
    • 1,983 篇 控制科学与工程
    • 1,854 篇 电气工程
    • 1,660 篇 生物医学工程(可授...
    • 1,462 篇 电子科学与技术(可...
    • 1,366 篇 光学工程
    • 1,145 篇 化学工程与技术
    • 859 篇 机械工程
    • 845 篇 仪器科学与技术
    • 710 篇 动力工程及工程热...
    • 681 篇 材料科学与工程(可...
    • 613 篇 安全科学与工程
  • 10,742 篇 理学
    • 4,839 篇 数学
    • 3,520 篇 物理学
    • 2,646 篇 生物学
    • 2,043 篇 统计学(可授理学、...
    • 1,233 篇 化学
    • 1,041 篇 地球物理学
    • 867 篇 系统科学
  • 3,964 篇 管理学
    • 2,352 篇 管理科学与工程(可...
    • 1,719 篇 图书情报与档案管...
    • 1,228 篇 工商管理
  • 2,087 篇 医学
    • 1,684 篇 临床医学
    • 1,276 篇 基础医学(可授医学...
    • 777 篇 公共卫生与预防医...
    • 737 篇 药学(可授医学、理...
  • 769 篇 法学
    • 669 篇 社会学
  • 586 篇 经济学
  • 488 篇 农学
  • 262 篇 教育学
  • 71 篇 文学
  • 45 篇 军事学
  • 25 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 856 篇 deep learning
  • 801 篇 accuracy
  • 521 篇 machine learning
  • 478 篇 feature extracti...
  • 440 篇 training
  • 364 篇 predictive model...
  • 358 篇 computational mo...
  • 338 篇 real-time system...
  • 307 篇 convolutional ne...
  • 291 篇 internet of thin...
  • 273 篇 support vector m...
  • 260 篇 data models
  • 248 篇 semantics
  • 243 篇 optimization
  • 233 篇 neural networks
  • 197 篇 big data
  • 197 篇 image segmentati...
  • 196 篇 reinforcement le...
  • 188 篇 reliability
  • 188 篇 data mining

机构

  • 443 篇 university of ch...
  • 430 篇 department of ph...
  • 392 篇 iccub universita...
  • 304 篇 imperial college...
  • 299 篇 physik-institut ...
  • 297 篇 stfc rutherford ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 cavendish labora...
  • 287 篇 department of ph...
  • 287 篇 institute of par...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 285 篇 physikalisches i...
  • 280 篇 henryk niewodnic...
  • 279 篇 massachusetts in...
  • 279 篇 van swinderen in...
  • 279 篇 departamento de ...

作者

  • 232 篇 beiter a.
  • 221 篇 barter w.
  • 205 篇 bellee v.
  • 193 篇 bowcock t.j.v.
  • 192 篇 casse g.
  • 173 篇 brundu d.
  • 161 篇 blake t.
  • 153 篇 betancourt c.
  • 148 篇 bencivenni g.
  • 147 篇 borsato m.
  • 146 篇 back j.j.
  • 146 篇 bay a.
  • 144 篇 boettcher t.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 albrecht j.
  • 140 篇 bediaga i.
  • 140 篇 braun s.
  • 140 篇 borisyak m.
  • 140 篇 bizzeti a.

语言

  • 20,430 篇 英文
  • 4,841 篇 其他
  • 279 篇 中文
  • 10 篇 法文
  • 9 篇 德文
  • 5 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 日文
  • 1 篇 荷兰文
检索条件"机构=Department of Data Science and Big Data Technology"
25493 条 记 录,以下是171-180 订阅
排序:
Graph Augmentation Empowered Contrastive Learning for Recommendation
收藏 引用
ACM Transactions on Information Systems 2025年 第2期43卷 1-27页
作者: Xu, Lixiang Liu, Yusheng Xu, Tong Chen, Enhong Tang, Yuanyan School of Artificial Intelligence and Big Data Hefei University Hefei China State Key Laboratory of Cognitive Intelligence School of Computer Science and Technology University of Science and Technology of China Hefei China Zhuhai UM Science and Technology Research Institute FST University of Macau China
The application of contrastive learning (CL) to collaborative filtering (CF) in recommender systems has achieved remarkable success. CL-based recommendation models mainly focus on creating multiple augmented views by ... 详细信息
来源: 评论
Classification of Sailboat Tell Tail Based on Deep Learning
收藏 引用
Journal of Ocean University of China 2024年 第3期23卷 710-720页
作者: CHANG Xiaofeng YU Jintao GAO Ying DING Hongchen LIU Yulong YU Huaming Department of Physical Education Ocean University of ChinaQingdao 266100China College of Big Data Qingdao University of Science and TechnologyQingdao 266061China College of Oceanic and Atmospheric Sciences Ocean University of ChinaQingdao 266100China
The tell tail is usually placed on the triangular sail to display the running state of the air flow on the sail *** is of great significance to make accurate judgement on the drift of the tell tail of the sailboat dur... 详细信息
来源: 评论
Peer-to-Peer International Trade Model Based on Blockchain and Smart Contracts: Theory and Practice of BTLC  2
Peer-to-Peer International Trade Model Based on Blockchain a...
收藏 引用
2nd International Conference on big data and Privacy Computing, BDPC 2024
作者: Yan, Junjie Wang, Wennan Feng, Duanyang Song, Shiyang Li, Chengyifan Application College Zhuhai College of Science and Technology Alibaba Cloud Big Data Zhuhai China Academy of Management Guangdong University of Science and Technology Dongguan China City University of Macau Faculty of Data Science China
This study focuses on BTLC, a peer-to-peer international trade model based on blockchain and smart contracts, which aims to reform the traditional let- ter of credit process, improve international trade efficiency, re... 详细信息
来源: 评论
An Improved Apriori Algorithm Based on Goal Orientation and Double Pruning
An Improved Apriori Algorithm Based on Goal Orientation and ...
收藏 引用
2023 International Conference on Networks, Communications and Intelligent Computing, NCIC 2023
作者: Deng, Shiyu Li, Li Xiong, Yichen Zhang, Jian School of Computer Science Beijing International Science and Technology Cooperation Base of Intelligent Decision and Big Data Application Beijing Information Science and Technology University Laboratory of Big Data Decision Making for Green Development Beijing China School of Economics and Management Beijing International Science and Technology Cooperation Base of Intelligent Decision and Big Data Application Beijing Information Science and Technology University Laboratory of Big Data Decision Making for Green Development Beijing China
Aiming at solving the problem of high time complexity of association rule mining among item-sets in Apriori algorithm and obtaining the set of goal-association relations of single-to-single point type, this paper impr... 详细信息
来源: 评论
An enhanced dung beetle optimizer for cloud task schedule  4
An enhanced dung beetle optimizer for cloud task schedule
收藏 引用
4rth International Conference on Applied Mathematics, Modelling, and Intelligent Computing, CAMMIC 2024
作者: Xie, Rongxiang Li, Shaobo Wu, Fengbin Wu, Libang Xiong, Xuan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China State Key Laboratory of Public Big Data Guizhou University Guiyang550025 China
Aiming to address the shortcomings of Dung Beetle Optimizer (DBO) in the areas of accuracy and convergence speed in dealing with cloud computing task scheduling issues, this paper suggests an advanced Dung Beetle Opti... 详细信息
来源: 评论
data Aggregation Point Placement and Subnetwork Optimization for Smart Grids
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 407-434页
作者: Tien-Wen Sung Wei Li Chao-Yang Lee Yuzhen Chen Qingjun Fang Fujian Provincial Key Laboratory of Big Data Mining and Applications College of Computer Science and MathematicsFujian University of TechnologyFuzhou350118China Department of Computer Science and Information Engineering National Yunlin University of Science and TechnologyYunlin640301TaiwanChina
To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the *** number of DAPs installed and the installatio... 详细信息
来源: 评论
Integrated Sensing-Communication-Computation for Edge Artificial Intelligence
收藏 引用
IEEE Internet of Things Magazine 2024年 第4期7卷 14-20页
作者: Wen, Dingzhu Li, Xiaoyang Zhou, Yong Shi, Yuanming Wu, Sheng Jiang, Chunxiao School of Information Science and Technology ShanghaiTech University China Shenzhen Research Institute of Big Data China Beijing University of Posts and Telecommunications China Tsinghua University Beijing National Research Center for Information Science and Technology China
Edge artificial intelligence (AI) has been a promising solution towards 6G to empower a series of advanced techniques such as digital twins, holographic projection, semantic communications, and auto-driving, for achie... 详细信息
来源: 评论
Targeted Universal Adversarial Attack Based on Fourier Transform  2nd
Targeted Universal Adversarial Attack Based on Fourier Tran...
收藏 引用
2nd International Conference on data Security and Privacy Protection, DSPP 2024
作者: Sun, Yancheng Chen, Yuling Liu, Ziyang Dou, Hui Tan, Chaoyue The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ... 详细信息
来源: 评论
Continuous and generalized visual odometry based on FLANN_PSC-RANSAC_LSTM
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第1-2期47卷 15-28页
作者: Li, Dengao Feng, Ran Wu, Fanming Zhao, Jinhua Zhao, Jumin College of Computer Science and Technology College of Data Science Taiyuan University of Technology Shanxi Taiyuan China College of Electronic Information and Optical Engineering Taiyuan University of Technology Shanxi Taiyuan China Key Laboratory of Big Data Fusion Analysis and Application of Shanxi Province Taiyuan University of Technology Shanxi Taiyuan China Intelligent Perception Engineering Technology Center of Shanxi Taiyuan China
In the field of simultaneous localization and mapping (SLAM), visual odometry (VO) always has great application prospects. In recent years, with the progress in the field of machine learning, methods based on neural n... 详细信息
来源: 评论
CBPF: A Novel Method For Filtering Poisoned data Based on Composite Backdoor Attacks
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25136-25147页
作者: Xia, Hanfeng Hong, Haibo Wang, Ruili Sun, Yiru Ding, Hao Zhejiang Gongshang University Zhejiang Key Laboratory of Big Data and Future E-Commerce Technology School of Computer Science and Technology Hangzhou China Massey University School of Mathematical and Computational Sciences Auckland New Zealand
Backdoor attacks involve the injection of a limited quantity of poisoned samples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for norm... 详细信息
来源: 评论