咨询与建议

限定检索结果

文献类型

  • 667 篇 期刊文献
  • 473 篇 会议
  • 9 册 图书

馆藏范围

  • 1,149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 739 篇 工学
    • 536 篇 计算机科学与技术...
    • 441 篇 软件工程
    • 188 篇 信息与通信工程
    • 127 篇 电气工程
    • 113 篇 生物工程
    • 86 篇 控制科学与工程
    • 80 篇 生物医学工程(可授...
    • 76 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 41 篇 化学工程与技术
    • 30 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 29 篇 网络空间安全
    • 28 篇 交通运输工程
    • 23 篇 安全科学与工程
  • 448 篇 理学
    • 228 篇 数学
    • 133 篇 生物学
    • 124 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 39 篇 化学
    • 26 篇 系统科学
  • 208 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 54 篇 工商管理
  • 78 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 34 篇 公共卫生与预防医...
    • 34 篇 药学(可授医学、理...
  • 29 篇 法学
    • 25 篇 社会学
  • 19 篇 农学
  • 12 篇 经济学
  • 8 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 38 篇 feature extracti...
  • 35 篇 training
  • 34 篇 machine learning
  • 32 篇 accuracy
  • 30 篇 deep learning
  • 30 篇 computational mo...
  • 27 篇 predictive model...
  • 26 篇 semantics
  • 23 篇 data models
  • 19 篇 real-time system...
  • 18 篇 artificial intel...
  • 18 篇 convolutional ne...
  • 16 篇 reinforcement le...
  • 16 篇 simulation
  • 16 篇 optimization
  • 14 篇 federated learni...
  • 14 篇 adaptation model...
  • 13 篇 internet of thin...
  • 13 篇 data mining
  • 12 篇 support vector m...

机构

  • 36 篇 college of compu...
  • 34 篇 university of ch...
  • 31 篇 national enginee...
  • 23 篇 college of infor...
  • 22 篇 nanyang technolo...
  • 20 篇 school of cyber ...
  • 18 篇 institute of inf...
  • 17 篇 shandong provinc...
  • 17 篇 school of comput...
  • 16 篇 institute of com...
  • 15 篇 the department o...
  • 15 篇 guangdong provin...
  • 15 篇 key laboratory o...
  • 14 篇 beijing laborato...
  • 13 篇 peng cheng labor...
  • 12 篇 key laboratory o...
  • 12 篇 shenzhen institu...
  • 12 篇 chongqing key la...
  • 12 篇 department of el...
  • 11 篇 key lab. of inte...

作者

  • 46 篇 niyato dusit
  • 42 篇 chen mingzhe
  • 24 篇 yang zhaohui
  • 24 篇 mingzhe chen
  • 22 篇 huang qingming
  • 22 篇 shen linlin
  • 20 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 13 篇 liu yuchen
  • 13 篇 yang yang
  • 13 篇 guo jiafeng
  • 13 篇 hongo kenta
  • 13 篇 cao xiaochun
  • 12 篇 maezono ryo
  • 11 篇 zhaohui yang
  • 10 篇 dusit niyato
  • 10 篇 xiong zehui
  • 9 篇 mahmood khalid
  • 9 篇 bao shilong
  • 9 篇 kang jiawen

语言

  • 991 篇 英文
  • 148 篇 其他
  • 11 篇 中文
检索条件"机构=Institute of Data Science and Information Computing"
1149 条 记 录,以下是751-760 订阅
排序:
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Atta...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Siyuan Liang Baoyuan Wu Yanbo Fan Xingxing Wei Xiaochun Cao Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China Tencent Shenzhen China Institute of Artificial Intelligence Hangzhou Innovation Institute Beihang University Beijing China
Object detection has been widely used in many safety- critical tasks, such as autonomous driving. However, its vulnerability to adversarial examples has not been sufficiently studied, especially under the practical sc... 详细信息
来源: 评论
When Evolutionary Computation Meets Privacy
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Bowen Chen, Wei-Neng Li, Xiaoguo Liu, Ximeng Pei, Qingqi Zhang, Jun Guangzhou Institute of Technology Xidian University Guangzhou China The School of Computer Science and Technology South China University of Technology Guangzhou China The School of Computing and Information Systems Singapore Management University Singapore Singapore The College of Computer and Data Science Fuzhou University Fujian China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China School of Telecommunications Engineering Xidian University Xian China Zhejiang Normal University Jinhua China Hanyang University Ansan Korea Republic of
Recently, evolutionary computation (EC) has been promoted by machine learning, distributed computing, and big data technologies, resulting in new research directions of EC like distributed EC and surrogate-assisted EC... 详细信息
来源: 评论
Context-Aware Refinement Network Incorporating Structural Connectivity Prior for Brain Midline Delineation  23rd
Context-Aware Refinement Network Incorporating Structural Co...
收藏 引用
23rd International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2020
作者: Wang, Shen Liang, Kongming Li, Yiming Yu, Yizhou Wang, Yizhou Center for Data Science Peking University Beijing China Advanced Institute of Information Technology Peking University Hangzhou China Department of Computer Science Peking University Beijing China Deepwise AI Lab Beijing China Center on Frontiers of Computing Studies Peking University Beijing China
Brain midline delineation can facilitate the clinical evaluation of brain midline shift, which plays an important role in the diagnosis and prognosis of various brain pathology. Nevertheless, there are still great cha... 详细信息
来源: 评论
Fire-Image-DenseNet (FIDN) for predicting wildfire burnt area using remote sensing data
arXiv
收藏 引用
arXiv 2024年
作者: Pang, Bo Cheng, Sibo Huang, Yuhan Jin, Yufang Guo, Yike Prentice, I. Colin Harrison, Sandy P. Arcucci, Rossella Department of Earth Science and Engineering Imperial College London London United Kingdom Data Science Institute Department of Computing Imperial College London London United Kingdom CEREA École des Ponts and EDF R&D Institut Polytechnique de Paris Île-de-France France Department of Land Air and Water Resources University of California DavisCA United States Georgina Mace Centre for the Living Planet Department of Life Sciences Imperial College London London United Kingdom Geography & Environmental Science University of Reading Reading United Kingdom Department of Computer Science and Engineering Hong Kong university of science and technology Hong Kong Computer Network Information Center Chinese Academy of Sciences Beijing China
Predicting the extent of massive wildfires once ignited is essential to reduce the subsequent socioeconomic losses and environmental damage, but challenging because of the complexity of fire behaviour. Existing physic... 详细信息
来源: 评论
Ensuring DNN Solution Feasibility for Optimization Problems with Convex Constraints and Its Application to DC Optimal Power Flow Problems
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Tianyu Pan, Xiang Chen, Minghua Low, Steven H. Information Engineering The Chinese University of Hong Kong Hong Kong School of Data Science City University of Hong Kong Steven Hong Kong Department of Computing and Mathematical Sciences California Institute of Technology United States
Ensuring solution feasibility is a key challenge in developing Deep Neural Network (DNN) schemes for solving constrained optimization problems, due to inherent DNN prediction errors. In this paper, we propose a "... 详细信息
来源: 评论
BR-GAN: Bilateral Residual Generating Adversarial Network for Mammogram Classification  23rd
BR-GAN: Bilateral Residual Generating Adversarial Network fo...
收藏 引用
23rd International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2020
作者: Wang, Chu-ran Zhang, Fandong Yu, Yizhou Wang, Yizhou Center for Data Science Peking University Beijing China Advanced Institute of Information Technology Peking University Hangzhou China Center on Frontiers of Computing Studies Peking University Beijing China Department of Computer Science Peking University Beijing China Deepwise AI Lab Beijing China
Mammogram malignancy classification with only image-level annotations is challenging due to a lack of lesion annotations. If we can generate the healthy version of the diseased data, we can easily explore the lesion f... 详细信息
来源: 评论
Driving Behavior Safety Assessment in Edge computing Using Multitask Discriminative TS Fuzzy Model
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Gu, Yi Chen, Zhiyu Wang, Lu Shen, Jinsong Bashir, Ali Kashif Wang, Wei Jiangnan University School of Artificial Intelligence and Computer Science Wuxi214122 China Jiangnan University Engineering Research Center of Intelligent Technology for Healthcare Ministry of Education Wuxi214122 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China Jiangsu Keli Internet Information Technology Co. Ltd Jingjiang214500 China Manchester Metropolitan University Department of Computing and Mathematics United Kingdom Woxsen University Woxsen School of Business Hyderabad502 345 India Lebanese American University Department of Computer Science and Mathematics Beirut Lebanon Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China
Driving behavior safety analysis in edge computing involves the real-time collection and processing of vehicle driving data. Fuzzy models have advantages in analyzing driving behavior due to their excellent ability to... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Weipeng Cao Xuyang Yao Zhiwu Xu Yinghui Pan Yixuan Sun Dachuan Li Bohua Qiu Muheng Wei Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis
收藏 引用
Informatics in Medicine Unlocked 2024年 50卷
作者: Gharaibeh, Hasan Alawad, Noor Aldeen Nasayreh, Ahmad Al Mamlook, Rabia Emhamed Makhadmeh, Sharif Naser Bashkami, Ayah Abualigah, Laith Ezugwu, Absalom E. Computer Science Department Faculty of Information Technology and Computer Sciences Yarmouk University Irbid 21163 Jordan Department of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya Department of Information Technology King Abdullah II School of Information Technology The University of Jordan Amman 11942 Jordan Department Medical Laboratory Sciences – Faculty of Science Al Balqa Applied University Salt 19117 Jordan Department of Cyber Security and Cloud Computing Faculty of Information Technology Applied Science Private University Amman 11937 Jordan Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk Tabuk 71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq 25113 Jordan MEU Research Unit Middle East University Amman 11831 Jordan Applied science research center Applied science private university Amman 11931 Jordan Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura 140401 India Unit for Data Science and Computing North-West University 11 Hofman Street Potchefstroom 2520 South Africa Artificial Intelligence Research Center (AIRC) College of Engineering and Information Technology Ajman University Ajman P.O. Box 346 United Arab Emirates
Bladder cancer (BC) remains a significant global health challenge, requiring the development of accurate predictive models for diagnosis. In this study, a new Binary Modified White Whale Optimization (B-MBWO) algorith... 详细信息
来源: 评论
Review Spam Detection Based on Multi-dimensional Features  9th
Review Spam Detection Based on Multi-dimensional Features
收藏 引用
9th International Conference on Artificial Intelligence and Mobile Services, AIMS 2020, held as part of the Services Conference Federation, SCF 2020
作者: Deng, Liming Wei, Jingjing Liang, Shaobin Wen, Yuhan Liao, Xiangwen College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Digital Fujian Institute of Financial Big Data Fuzhou350116 China College of Electronics and Information Science Fujian Jiangxia University Fuzhou350108 China
Review spam detection aims to detect the reviews with false information posted by the spammers on social media. The existing methods of review spam detection ignore the importance of the information hidden in the user... 详细信息
来源: 评论