咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 810 篇 期刊文献

馆藏范围

  • 1,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 705 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 238 篇 信息与通信工程
    • 148 篇 控制科学与工程
    • 135 篇 生物工程
    • 122 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 90 篇 核科学与技术
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
    • 35 篇 网络空间安全
    • 34 篇 动力工程及工程热...
    • 31 篇 交通运输工程
  • 709 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 148 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 127 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 66 篇 医学
    • 50 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 40 篇 法学
    • 34 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 50 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 graph neural net...
  • 22 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,552 篇 英文
  • 88 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Application Technology"
1672 条 记 录,以下是471-480 订阅
排序:
Short-Term Load Forecasting Based on Graph Convolution and Dendritic Deep Learning
收藏 引用
IEEE Transactions on Network Science and Engineering 2025年
作者: Zhang, Chunyang Yu, Yang Zhang, Tengfei Song, keyu Wang, Yirui Gao, Shangce Nanjing University of Posts and Telecommunications College of Automation & College of Artificial Intelligence Nanjing210023 China Ningbo University Faculty of Electrical Engineering and Computer Science Zhejiang Key Laboratory of Mobile Network Application Technology Zhejiang315211 China University of Toyama Faculty of Engineering Toyama-shi930-8555 Japan
Short-term load forecasting (STLF) is a significant task to the planning, operation and control of future power systems. The increasing number of devices connected to the system has led to more complex characteristics... 详细信息
来源: 评论
t-PSI: Efficient Multi-party Private Set Intersection with Threshold  19
t-PSI: Efficient Multi-party Private Set Intersection with T...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Meng, Dan Fu, Zhihui Kong, Chao Qi, Yue Cao, Guitao Oppo Research Institute Shenzhen China Anhui Polytechnic University School of Computer and Information Wuhu China East China Normal University Shanghai Key Laboratory of Trustworthy Computing Shanghai China MoE Engineering Research Center of SH/HW Co-design Technology and Application Ecnu Shanghai China
Multi-party privacy set intersection (MPSI) enables multiple parties to compute the intersection of their datasets without leaking data privacy. Among existing MPSI protocols, e.g., KMPRT-based protocols, oblivious ev... 详细信息
来源: 评论
Full-atom protein pocket design via iterative refinement  23
Full-atom protein pocket design via iterative refinement
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zaixi Zhang Zepu Lu Zhongkai Hao Marinka Zitnik Qi Liu Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China and State Key Laboratory of Cognitive Intelligence Hefei Anhui China and Harvard University Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China and State Key Laboratory of Cognitive Intelligence Hefei Anhui China Dept. of Comp. Sci. and Tech. Institute for AI THBI Lab BNRist Center Tsinghua-Bosch Joint ML Center Tsinghua Harvard University
The design and optimization of functional proteins that bind specific ligand molecules is paramount in therapeutics and bio-engineering. A critical yet formidable task in this endeavor is the design of the protein poc...
来源: 评论
A Study on application of Artificial Intelligence in College English Teaching Management and Evaluation  3
A Study on Application of Artificial Intelligence in College...
收藏 引用
3rd International Conference on Electronic Informationtechnology and Smart Agriculture, ICEITSA 2023
作者: Feng, Tao Deng, Jianjie Liu, Yiwen Gao, Yanxia Peng, Ling Fu, Jinrong School of Foreign Languages Huaihua University Hunan Huaihua418000 China School of Computer and Artificial Intelligence Huaihua University Hunan Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Hunan Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Hunan Huaihua418000 China School of Computing Science University of Glasgow GlasgowG12 8QQ United Kingdom
With the rapid development of artificial intelligence, AI technology has been widely applied in various industries, including education. In English teaching, AI technology provides teachers with objective and instruct... 详细信息
来源: 评论
A New Adaptive Image Sharpening Scheme
A New Adaptive Image Sharpening Scheme
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Tzong–Jer Chen Rong–Hui Lu School of Mathematics & Computer Science Wuyi University Wuyishan Fujian China Fujian Key Laboratory of Big Data Application and Intellectualization for Tea Industry Wuyi University Information Technology and Laboratory Management Center Wuyi University Wuyishan Fujian China
The sharpening is a scheme applied to highlight the intensity transitions in an image. This enhancement increases edge acutance and significantly improves the overall sharpness of processed images. Image sharpening is...
来源: 评论
3-D Near-Field Localization by Jointly Exploiting Spatial and Temporal Information Based on a Nonuniform Cross Array
3-D Near-Field Localization by Jointly Exploiting Spatial an...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zelong Yi Hua Chen Zhiwei Jiang Wei Liu Qing Wang Gang Wang Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Zhejiang Key Laboratory of Mobile Network Application Technology Ningbo China School of Electronic Engineering and Computer Science Queen Mary University of London London UK School of Electronic Informatin Engineering Tianjin University Tianjin China
In this paper, an underdetermined three-dimensional (3-D) near-field source localization method is proposed, based on a two-dimensional (2-D) symmetric nonuniform cross array. Firstly, the fourth-order cumulant of the...
来源: 评论
Residual and Attention Mechanism-Based Network for Aluminum-Silicon Alloy Microstructure Image Classification
Residual and Attention Mechanism-Based Network for Aluminum-...
收藏 引用
Information Systems and Computing technology (ISCTech), International Conference on
作者: Xiao Yang Tao Shen Jiancheng Yin Yingli Liu Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China Yunnan Key Laboratory of Computer Technologies Application Kunming University of Science and Technology Kunming China Faculty of Materials Science and Engineering Kunming University of Science and Technology Kunming China
To enhance the accuracy of aluminum-silicon alloy microstructure image classification, we propose an aluminum-silicon alloy microstructure image classification model based on an improved residual network, incorporatin...
来源: 评论
When Adversarial Example Attacks Meet Vertical Federated Learning  19
When Adversarial Example Attacks Meet Vertical Federated Lea...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Meng, Dan Fu, Zhihui Kong, Chao Qi, Yue Cao, Guitao Oppo Research Institute Shenzhen China Anhui Polytechnic University School of Computer and Information Wuhu China East China Normal University Shanghai Key Laboratory of Trustworthy Computing Shanghai China MoE Engineering Research Center of SH/HW Co-design Technology and Application Ecnu Shanghai China
Federated learning (FL) is proposed to enable efficient machine learning while protecting the privacy of user data. In non-federated scenarios, machine learning models are vulnerable to adversarial attacks. The attack... 详细信息
来源: 评论
Expensive Multi-Objective Bayesian Optimization Based on Diffusion Models  39
Expensive Multi-Objective Bayesian Optimization Based on Dif...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Bingdong Di, Zixiang Lu, Yongfan Qian, Hong Wang, Feng Yang, Peng Tang, Ke Zhou, Aimin Shanghai Frontiers Science Center of Molecule Intelligent Syntheses Shanghai Institute of AI for Education School of Computer Science and Technology East China Normal University Shanghai 200062 China Key Laboratory of Advanced Theory and Application in Statistics and Data Science Ministry of Education China School of Computer Science Wuhan University Wuhan 430072 China Department of Statistics and Data Science Southern University of Science and Technology Shenzhen 518055 China Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen 518055 China
Multi-objective Bayesian optimization (MOBO) has shown promising performance on various expensive multi-objective optimization problems (EMOPs). However, effectively modeling complex distributions of the Pareto optima... 详细信息
来源: 评论
A Novel Image Encryption Scheme Based on Poker Cross-Shuffling and Fractional Order Hyperchaotic System  10th
A Novel Image Encryption Scheme Based on Poker Cross-Shuffli...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Chen, Zhong Zhao, Huihuang Chen, Junyao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China Department of Computer Engineering AjouUniversity Suwon16499 Korea Republic of
A novel digital image encryption scheme based on Poker shuffling and fractional order hyperchaotic system is proposed. Poker intercrossing operation has nonlinearity and periodicity, and can form permutation group. Fi... 详细信息
来源: 评论