咨询与建议

限定检索结果

文献类型

  • 673 篇 期刊文献
  • 474 篇 会议
  • 9 册 图书

馆藏范围

  • 1,156 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 743 篇 工学
    • 541 篇 计算机科学与技术...
    • 438 篇 软件工程
    • 189 篇 信息与通信工程
    • 131 篇 电气工程
    • 113 篇 生物工程
    • 90 篇 控制科学与工程
    • 80 篇 生物医学工程(可授...
    • 76 篇 光学工程
    • 69 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 41 篇 化学工程与技术
    • 31 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 28 篇 交通运输工程
    • 28 篇 网络空间安全
    • 23 篇 安全科学与工程
  • 451 篇 理学
    • 230 篇 数学
    • 133 篇 生物学
    • 123 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 40 篇 化学
    • 26 篇 系统科学
  • 207 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 90 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 79 篇 医学
    • 70 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 34 篇 公共卫生与预防医...
    • 34 篇 药学(可授医学、理...
  • 30 篇 法学
    • 26 篇 社会学
  • 19 篇 农学
  • 12 篇 经济学
  • 8 篇 教育学
  • 4 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 feature extracti...
  • 35 篇 training
  • 34 篇 machine learning
  • 32 篇 deep learning
  • 32 篇 accuracy
  • 30 篇 computational mo...
  • 27 篇 predictive model...
  • 26 篇 semantics
  • 23 篇 data models
  • 19 篇 real-time system...
  • 19 篇 artificial intel...
  • 18 篇 convolutional ne...
  • 16 篇 reinforcement le...
  • 16 篇 simulation
  • 16 篇 optimization
  • 14 篇 internet of thin...
  • 14 篇 federated learni...
  • 14 篇 adaptation model...
  • 13 篇 data mining
  • 12 篇 support vector m...

机构

  • 35 篇 college of compu...
  • 34 篇 university of ch...
  • 31 篇 national enginee...
  • 23 篇 nanyang technolo...
  • 23 篇 college of infor...
  • 20 篇 school of cyber ...
  • 18 篇 institute of inf...
  • 17 篇 shandong provinc...
  • 17 篇 school of comput...
  • 16 篇 institute of com...
  • 16 篇 key laboratory o...
  • 15 篇 the department o...
  • 15 篇 guangdong provin...
  • 14 篇 beijing laborato...
  • 13 篇 peng cheng labor...
  • 12 篇 key laboratory o...
  • 12 篇 shenzhen institu...
  • 12 篇 chongqing key la...
  • 12 篇 department of el...
  • 11 篇 key lab. of inte...

作者

  • 46 篇 niyato dusit
  • 42 篇 chen mingzhe
  • 24 篇 yang zhaohui
  • 24 篇 mingzhe chen
  • 22 篇 huang qingming
  • 22 篇 shen linlin
  • 20 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 13 篇 liu yuchen
  • 13 篇 yang yang
  • 13 篇 hongo kenta
  • 13 篇 cao xiaochun
  • 12 篇 guo jiafeng
  • 12 篇 maezono ryo
  • 11 篇 zhaohui yang
  • 10 篇 dusit niyato
  • 10 篇 xiong zehui
  • 9 篇 mahmood khalid
  • 9 篇 bao shilong
  • 9 篇 kang jiawen

语言

  • 989 篇 英文
  • 157 篇 其他
  • 11 篇 中文
检索条件"机构=Institute of Data Science and Information Computing"
1156 条 记 录,以下是551-560 订阅
排序:
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Low-Light Enhancement Effect on Classification and Detection: An Empirical Study
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xu Lai, Zhihui Jie, Zhou Gao, Can Hou, Xianxu Zhang, Ya-Nan Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China
Low-light images are commonly encountered in real-world scenarios, and numerous low-light image enhancement (LLIE) methods have been proposed to improve the visibility of these images. The primary goal of LLIE is to g... 详细信息
来源: 评论
ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks
ZETA: ZEro-Trust Attack Framework with Split Learning for Au...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Sunder Ali Khowaja Parus Khuwaja Kapal Dev Keshav Singh Lewis Nkenyereye Dan Kilper Faculty of Computing Digital and Data Technological University Dublin Ireland Institute of Business Administration University of Sindh Pakistan Department of Computer Science CONNECT Centre Munster Technological University Ireland Institute of Communications Engineering (ICE) National Sun Yat-sen University Taiwan Department of Computer and Information Security Sejong University South Korea CONNECT Centre School of Engineering Trinity College Dublin Ireland
In past, due to data and model security concerns, modern communication systems mainly focus on the use of edge computing devices for enabling immersive applications and services. Federated learning is one of the prefe... 详细信息
来源: 评论
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Liang, Siyuan Wu, Baoyuan Fan, Yanbo Wei, Xingxing Cao, Xiaochun Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China Tencent Shenzhen China Institute of Artificial Intelligence Hangzhou Innovation Institute Beihang University Beijing China
Object detection has been widely used in many safety-critical tasks, such as autonomous driving. However, its vulnerability to adversarial examples has not been sufficiently studied, especially under the practical sce... 详细信息
来源: 评论
Evaluating the Use of Large Language Model to Identify Top Research Priorities in Hematology
Evaluating the Use of Large Language Model to Identify Top R...
收藏 引用
2023 IEEE International Conference on E-Health Networking, Application and Services, Healthcom 2023
作者: Chen, Huiqin Huang, Fangwan Liu, Xuanyun Tan, Yinli Zhang, Dihua Li, Dongqi Borchert, Glen M. Tan, Ming Huang, Jingshan Sun Yatsen University Department of Pediatrics the Third Affiliated Hospital Guangzhou China College of Computer and Data Science Fuzhou University Fuzhou China Sun Yat-sen University Department of Nephrology the First Affiliated Hospital Guangzhou China University of California Irvine Department of Economics and School of Information and Computer Sciences Irvine United States College of Medicine University of South Alabama Department of Pharmacology Mobile United States Institute of Biochemistry and Molecular Biology Institute of Biomedical Sciences China Medical University Taichung Taiwan School of Computing College of Medicine University of South Alabama Mobile United States
The field of hematology is highly progressive and dynamic requiring researchers to commit significant amounts of time and effort towards staying abreast of the most crucial research areas. As such, in this work we ass... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-Sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
Implementing Multi-factor Authentication in Cloud Services for Enhanced Security
Implementing Multi-factor Authentication in Cloud Services f...
收藏 引用
Recent Advances in science and Engineering Technology (ICRASET), International Conference on
作者: K. Sashi Rekha V.M. Sivagami R. Usharani T Amutha S. Pushparani Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamil Nadu India Department of Information Technology Sri Venkateswara College of Engineering Chennai Tamil Nadu India Department of Computational Intelligence School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Department of Artificial Intelligence & Data Science CARE College of Engineering Trichy Tamil Nadu India Department of Computer Science and Engineering Meenakshi College of Engineering Chennai Tamil Nadu India
The cloud services which are now the most common data transmission and endanger organizations’ confidential information, it’s more and more visible that security of any data should be a main priority for companies. ... 详细信息
来源: 评论
Simulate the Machine Learning Algorithm to Organize the CRAHN Network System
Simulate the Machine Learning Algorithm to Organize the CRAH...
收藏 引用
Advancement in Electronics & Communication Engineering (AECE), International Conference on
作者: P Prabakaran L. Chandra Sekhar Reddy LVD Ravikumar Manish Kumar Verma Department Of Computer Applications School of computing sciences Vels Institute of Science Technology and Advanced Studies Chennai India Department of CSE(Data Science) CMR College of Engineering & Technology Medchal Hyderabad India Department of Information Technology Shri Vishnu Engineering College For Women Bhimavaram India Department of Psychology Lovely Professional University Phagwara India
Using available channels in a wireless spectrum, cognitive radio (CR) may automatically adjust transmission settings to optimize radio operational behaviour. To function properly, a CR ad hoc network (CRAHN) has to be...
来源: 评论
Innovative Deep Learning Techniques for Solving Complex Computer Vision Challenges and Enhancing Pattern Recognition Accuracy
Innovative Deep Learning Techniques for Solving Complex Comp...
收藏 引用
Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC), International Conference on
作者: T. Jayachitra S. Sathya Ramesh P S Jothikumar R Gouri M. S Mohammed Waheeduddin Hussain Department of Electrical Electronics and Communication Engineering Sharda University Greater Noida India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tiruttani India Department of Smart Computing Vellore Institute of Technology Vellore India Department of Computer Science and Engineering Shadan College of Engineering and Technology Hyderabad India Department of Computer Science and Engineering Baselios Mathews - II College of Engineering Sasthamcotta Kollam India Department of Information Technology Shadan College of Engineering and Technology Peerancheru Hyderabad India
The proposed work provides an in-depth analysis of DL techniques to enhance pattern recognition accuracy in difficult computer vision applications. This background explains the present status of the problems in the ar... 详细信息
来源: 评论
A Joint Gradient and Loss Based Clustered Federated Learning Design
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Licheng Chen, Mingzhe Yang, Zhaohui Wu, Yusen Liu, Yuchen Department of Electrical and Computer Engineering University of Miami Coral GablesFL33146 United States Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Department of Computer Science North Carolina State University RaleighNC27695 United States
In this paper, a novel clustered FL framework that enables distributed edge devices with non-IID data to independently form several clusters in a distributed manner and implement FL training within each cluster is pro... 详细信息
来源: 评论