咨询与建议

限定检索结果

文献类型

  • 509 篇 期刊文献
  • 453 篇 会议
  • 12 册 图书

馆藏范围

  • 974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 515 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 156 篇 信息与通信工程
    • 108 篇 生物工程
    • 77 篇 控制科学与工程
    • 76 篇 电气工程
    • 66 篇 生物医学工程(可授...
    • 65 篇 化学工程与技术
    • 49 篇 机械工程
    • 48 篇 光学工程
    • 37 篇 电子科学与技术(可...
    • 28 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 19 篇 网络空间安全
  • 350 篇 理学
    • 187 篇 数学
    • 118 篇 生物学
    • 74 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 31 篇 化学
    • 31 篇 系统科学
  • 202 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 69 篇 医学
    • 59 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 36 篇 公共卫生与预防医...
    • 28 篇 药学(可授医学、理...
  • 36 篇 法学
    • 27 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 13 篇 农学
  • 10 篇 教育学
  • 7 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 39 篇 deep learning
  • 35 篇 accuracy
  • 29 篇 machine learning
  • 28 篇 training
  • 27 篇 feature extracti...
  • 23 篇 data models
  • 23 篇 convolutional ne...
  • 21 篇 computational mo...
  • 21 篇 predictive model...
  • 21 篇 federated learni...
  • 19 篇 internet of thin...
  • 18 篇 artificial intel...
  • 15 篇 machine learning...
  • 14 篇 image segmentati...
  • 14 篇 optimization
  • 14 篇 decision making
  • 13 篇 measurement
  • 12 篇 convolution
  • 12 篇 real-time system...
  • 12 篇 semantics

机构

  • 49 篇 college of compu...
  • 34 篇 school of big da...
  • 32 篇 national enginee...
  • 18 篇 school of big da...
  • 17 篇 state key labora...
  • 15 篇 college of compu...
  • 14 篇 school of inform...
  • 13 篇 school of comput...
  • 11 篇 peng cheng labor...
  • 10 篇 department of co...
  • 10 篇 shenzhen univers...
  • 10 篇 school of softwa...
  • 10 篇 college of compu...
  • 9 篇 contribution: da...
  • 9 篇 department of co...
  • 9 篇 university of ch...
  • 9 篇 artificial intel...
  • 9 篇 department of el...
  • 9 篇 department of au...
  • 9 篇 guangdong provin...

作者

  • 16 篇 mahmood khalid
  • 13 篇 shen linlin
  • 12 篇 niyato dusit
  • 12 篇 shamshad salman
  • 11 篇 victor c. m. leu...
  • 11 篇 leung victor c.m...
  • 10 篇 das ashok kumar
  • 9 篇 xiuhua li
  • 9 篇 gao yang
  • 9 篇 leung victor c. ...
  • 9 篇 xiaofei wang
  • 8 篇 sun geng
  • 8 篇 seifedine kadry
  • 8 篇 li xiuhua
  • 8 篇 jungeun kim
  • 8 篇 tian chunwei
  • 8 篇 li jianqiang
  • 7 篇 shi qingjiang
  • 7 篇 qilin fan
  • 7 篇 gao can

语言

  • 872 篇 英文
  • 97 篇 其他
  • 6 篇 中文
检索条件"机构=Department of Software Engineering and Data Science"
974 条 记 录,以下是281-290 订阅
排序:
A Novel AI-based Hybrid Ensemble Segmentation CAD System for Lumber Spine Stenosis pathological Regions Using MRI Axial Images
A Novel AI-based Hybrid Ensemble Segmentation CAD System for...
收藏 引用
International Artificial Intelligence and data Processing Symposium (IDAP)
作者: Saied Salem Raza Mukhlis Oguzhan Katar Bilal Ertuğrul Ozal Yildirim Mugahed A. Al-Antari Department of Artificial Intelligence and Data Science College of AI Convergence Sejong University Seoul Korea Department of Software Engineering Faculty of Technology Firat University Elazig Turkey Department of Neurosurgery Faculty of Medicine Firat University Elazığ Turkey
Lumbar Spinal Stenosis (LSS) is a condition where the spinal canal in the lower back becomes narrower, resulting in pressure on the spinal cord and nearby nerves. To predict LSS, neurologists focus on four key regions... 详细信息
来源: 评论
Simulating cyber security management: A gamified approach to executive decision making  22
Simulating cyber security management: A gamified approach to...
收藏 引用
Proceedings of the 37th IEEE/ACM International Conference on Automated software engineering
作者: Adam Tonkin William Kosasih Marthie Grobler Mehwish Nasim Fivecast Australia School of Computer Science The University of Adelaide Australia CSIRO's Data61 Australia Department of Computer Science and Software Engineering The University of Western Australia Australia and College of Science and Engineering Flinders University Australia
Executive managers are not all equipped with the cyber security expertise necessary to enable them to make business decisions that accurately represent the status and needs of the cyber security side of the business. ... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Deformation-Aware Segmentation Network Robust to Motion Artifacts for Brain Tissue Segmentation using Disentanglement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Jung, Sunyoung Choi, Yoonseok Al-Masni, Mohammed A. Jung, Minyoung Kim, Dong-Hyun Department of Electrical and Electronic Engineering College of Engineering Yonsei University Seoul Korea Republic of Department of Artificial Intelligence and Data Science College of Software and Convergence Technology Sejong University Seoul Korea Republic of Cognitive Science Research Group Korea Brain Research Institute Daegu Korea Republic of
Motion artifacts caused by prolonged acquisition time are a significant challenge in Magnetic Resonance Imaging (MRI), hindering accurate tissue segmentation. These artifacts appear as blurred images that mimic tissue... 详细信息
来源: 评论
Enhanced adaptive data rate strategies for energy-efficient Internet of Things communication in LoRaWAN
收藏 引用
International Journal of Communication Systems 2025年 第2期38卷
作者: Ali Lodhi, Muhammad Wang, Lei Mahmood, Khalid Farhad, Arshad Chen, Jenhui Kumari, Saru School of Software Technology Dalian University of Technology Dalian China Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Douliu Taiwan Department of Computer Science FAST-National University of Computer and Emerging Sciences Islamabad Pakistan Department of Computer Science and Information Engineering Chang Gung University Taoyuan Taiwan Department of Mathematics Chaudhary Charan Singh University Meerut India School of Chemical Engineering and Physical Sciences Lovely Professional University Jalandhar India
The long-range wide area network (LoRaWAN) is a standard for the Internet of Things (IoT) because it has low cost, long range, not energy-intensive, and capable of supporting massive end devices (EDs). The adaptive da... 详细信息
来源: 评论
Enabling Collaborative and Green Generative AI Inference in Edge Networks
Enabling Collaborative and Green Generative AI Inference in ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Meng Tian Zhicheng Liu Chao Qiu Xiaofei Wang Dusit Niyato Victor C. M. Leung College of Intelligence and Computing Tianjin University Tianjin China College of Computing and Data Science Nanyang Technological University Singapore College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Recent advances in the diffusion model mark a significant leap in AI-generated image technology while extending its application to the Internet of Things (IoT). However, deploying these models on resource-constrained ... 详细信息
来源: 评论
Diff-SFCT: A Diffusion Model with Spatial-Frequency Cross Transformer for Medical Image Segmentation
Diff-SFCT: A Diffusion Model with Spatial-Frequency Cross Tr...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Jiang, Yuxuan Ding, Yi Zhu, Guobin Qin, Zhen Pang, Minghui Cao, Mingsheng University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu China Yibin Great Technology Co. Ltd. Yibin644000 China Sichuan Provincial People's Hospital Department of Geriatric General Surgery Chengdu610054 China
Most existing semantic segmentation methods primarily employ supervised learning with discriminative models. Although these methods are straightforward, they overlook the modeling of underlying data distributions. In ... 详细信息
来源: 评论
Generative Semantic Communication for Joint Image Transmission and Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Yuan, Weiwen Ren, Jinke Wang, Chongjie Zhang, Ruichen Wei, Jun Kim, Dong In Cui, Shuguang FNii-Shenzhen China SSE China Shenzhen China College of Computing and Data Science Nanyang Technological University Singapore College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical and Computer Engineering Sungkyunkwan University Suwon Korea Republic of
Semantic communication has emerged as a promising technology for enhancing communication efficiency. However, most existing research emphasizes single-task reconstruction, neglecting model adaptability and generalizat... 详细信息
来源: 评论
The IDC System for Sentiment Classification and Sarcasm Detection in Arabic  6
The IDC System for Sentiment Classification and Sarcasm Dete...
收藏 引用
6th Arabic Natural Language Processing Workshop, WANLP 2021
作者: Israeli, Abraham Nahum, Yotam Fine, Shai Bar, Kfir Data Science Institute Interdisciplinary Center Herzliya Israel Department of Software and Information System Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
Sentiment classification and sarcasm detection attract a lot of attention by the NLP research community. However, solving these two problems in Arabic and on the basis of socialnetwork data (i.e., Twitter) is still of... 详细信息
来源: 评论
One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Guohong Ma, Hua Gao, Yansong Abuadbba, Alsharif Zhang, Zhi Kang, Wei Al-Sarawi, Said F. Zhang, Gongxuan Abbott, Derek School of Cyber Science and Engineering Nanjing University of Science and Technology JiangSu Nanjing China School of Electrical and Electronic Engineering The University of Adelaide Australia Department of Computer Science and Software Engineering University of Western Australia Australia Data61 CSIRO Australia
Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size o... 详细信息
来源: 评论