咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 4,191 篇 期刊文献
  • 182 册 图书

馆藏范围

  • 8,859 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 5,715 篇 工学
    • 4,145 篇 计算机科学与技术...
    • 3,394 篇 软件工程
    • 1,016 篇 控制科学与工程
    • 1,007 篇 信息与通信工程
    • 716 篇 生物工程
    • 609 篇 电气工程
    • 560 篇 光学工程
    • 497 篇 生物医学工程(可授...
    • 428 篇 机械工程
    • 388 篇 电子科学与技术(可...
    • 279 篇 化学工程与技术
    • 237 篇 仪器科学与技术
    • 171 篇 土木工程
    • 156 篇 建筑学
    • 149 篇 材料科学与工程(可...
    • 134 篇 交通运输工程
    • 112 篇 动力工程及工程热...
  • 3,077 篇 理学
    • 1,608 篇 数学
    • 902 篇 物理学
    • 835 篇 生物学
    • 568 篇 统计学(可授理学、...
    • 335 篇 化学
    • 257 篇 系统科学
  • 1,448 篇 管理学
    • 754 篇 管理科学与工程(可...
    • 743 篇 图书情报与档案管...
    • 323 篇 工商管理
  • 388 篇 医学
    • 321 篇 临床医学
    • 248 篇 基础医学(可授医学...
    • 168 篇 药学(可授医学、理...
  • 175 篇 法学
    • 159 篇 社会学
  • 95 篇 教育学
  • 92 篇 农学
  • 84 篇 经济学
  • 22 篇 文学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 407 篇 artificial intel...
  • 306 篇 computer science
  • 247 篇 semantics
  • 230 篇 laboratories
  • 160 篇 deep learning
  • 144 篇 training
  • 141 篇 feature extracti...
  • 129 篇 computational mo...
  • 127 篇 machine learning
  • 102 篇 computer vision
  • 101 篇 image segmentati...
  • 101 篇 robot sensing sy...
  • 99 篇 visualization
  • 98 篇 contrastive lear...
  • 90 篇 reinforcement le...
  • 86 篇 robustness
  • 84 篇 robots
  • 84 篇 speech recogniti...
  • 83 篇 object detection
  • 82 篇 cameras

机构

  • 279 篇 computer science...
  • 227 篇 shanghai artific...
  • 162 篇 computer science...
  • 152 篇 computer science...
  • 139 篇 mit computer sci...
  • 118 篇 peng cheng labor...
  • 113 篇 computer science...
  • 101 篇 computer science...
  • 100 篇 school of comput...
  • 92 篇 college of compu...
  • 87 篇 school of artifi...
  • 87 篇 mit computer sci...
  • 81 篇 institute of art...
  • 75 篇 moe key lab of a...
  • 72 篇 gaoling school o...
  • 71 篇 mit computer sci...
  • 70 篇 school of comput...
  • 68 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of artifi...

作者

  • 125 篇 daniela rus
  • 124 篇 glass james
  • 65 篇 tao dacheng
  • 64 篇 zhao hai
  • 63 篇 demaine erik d.
  • 62 篇 liu yang
  • 58 篇 barzilay regina
  • 47 篇 rus daniela
  • 44 篇 li chenglong
  • 42 篇 kaelbling leslie...
  • 42 篇 james glass
  • 37 篇 belinkov yonatan
  • 35 篇 zhang zhuosheng
  • 35 篇 demaine martin l...
  • 34 篇 golland polina
  • 32 篇 paulo leitão
  • 32 篇 lozano-pérez tom...
  • 31 篇 williams brian c...
  • 30 篇 shen linlin
  • 29 篇 lynch jayson

语言

  • 7,887 篇 英文
  • 876 篇 其他
  • 106 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
检索条件"机构=LIACC—Artificial Intelligence and Computer Science Laboratory"
8859 条 记 录,以下是241-250 订阅
排序:
Blockchain-Based Hierarchical Access Control with Efficient Revocation in mHealth System  3rd
Blockchain-Based Hierarchical Access Control with Efficient...
收藏 引用
3rd EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2023
作者: Liang, Ting He, Yaorui Huang, Pei Xia, Zhe School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan China Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology Wuhan430071 China
With the development of information technology, people can share their health records (PHRs) through the Internet and obtain rapid medical services, which makes mobile health become a promising field. PHRs are collect... 详细信息
来源: 评论
Chasing Convex Functions with Long-term Constraints  41
Chasing Convex Functions with Long-term Constraints
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Lechowicz, Adam Christianson, Nicolas Sun, Bo Bashir, Noman Hajiesmaili, Mohammad Wierman, Adam Shenoy, Prashant Manning College of Information and Computer Sciences University of Massachusetts Amherst United States California Institute of Technology United States Cheriton School of Computer Science University of Waterloo ON Canada Computer Science & Artificial Intelligence Laboratory Massachusetts Institute of Technology United States
We introduce and study a family of online metric problems with long-term constraints. In these problems, an online player makes decisions xt in a metric space (X, d) to simultaneously minimize their hitting cost ft(xt... 详细信息
来源: 评论
Towards Combating Frequency Simplicity-biased Learning for Domain Generalization  38
Towards Combating Frequency Simplicity-biased Learning for D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: He, Xilin Hu, Jingyu Lin, Qinliang Luo, Cheng Xie, Weicheng Song, Siyang Khan, Muhammad Haris Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China Guangdong Provincial Key Laboratory of Intelligent Information Processing China University of Exeter United Kingdom Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates
Domain generalization methods aim to learn transferable knowledge from source domains that can generalize well to unseen target domains. Recent studies show that neural networks frequently suffer from a simplicity-bia...
来源: 评论
Camouflage pattern adversarial generation model using color and semantic constraints  3
Camouflage pattern adversarial generation model using color ...
收藏 引用
3rd International Symposium on computer Applications and Information Systems, ISCAIS 2024
作者: Zhang, Hao Xie, Zhenping School of Artificial Intelligence and Computer Science Jiangnan University Jiangsu Wuxi214122 China Jiangsu Key Laboratory of Media Design and Software Technology Jiangsu Wuxi214122 China
In response to the challenge that traditional camouflage design methods struggle to evade detection by modern unmanned aerial reconnaissance, we propose a camouflage pattern generation adversarial network model using ... 详细信息
来源: 评论
Analysis and Prediction of Factors Affecting Student Grades in Online Collaborative Learning Using Genetic Programming-based Approach  4
Analysis and Prediction of Factors Affecting Student Grades ...
收藏 引用
4th International Conference on Educational Technology, ICET 2024
作者: Si, Kaiyan Ye, Junmin Yu, Shuang Yin, Xinghan Ren, Wen Luo, Sheng Zhao, Gang Central China Normal University School of Computer Science Wuhan China Central China Normal University Faculty of Artificial Intelligence In Education Wuhan China Central China Normal University Hubei Key Laboratory of Digital Education Faculty of Artificial Intelligence In Education Wuhan China
computer-supported collaborative learning (CSCL) has been widely adopted as an instructional method that utilizes computer technology to support and facilitate cooperation and collaboration in the learning process. In... 详细信息
来源: 评论
Smart Education Case: A detection method of the driver's smoking behavior  2
Smart Education Case: A detection method of the driver's smo...
收藏 引用
2nd International Conference on Informatics, Networking, and Computing, ICINC 2023
作者: Xu, Yujia Shi, Rui Pan, Deyu Yang, Li He, Tingting Ding, Ling School of Computer Science Hubei University of Education Wuhan China Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan China
This article presents a case study of our process in Smart Education. This is a case of detecting driver smoking behavior, in which intelligent image processing technology was used. Let students know how to conduct ac... 详细信息
来源: 评论
Date-Driven Approach for Identifying State of Hemodialysis Fistulas: Entropy-Complexity and Formal Concept Analysis  11th
Date-Driven Approach for Identifying State of Hemodialysis...
收藏 引用
11th International Conference on Analysis of Images, Social Networks and Texts , AIST 2023
作者: Gromov, Vasilii A. Zvorykina, Ekaterina I. Beschastnov, Yurii N. Sohrabi, Majid School of Data Analysis and Artificial Intelligence Faculty of Computer Science HSE University Moscow109028 Russia Laboratory for Models and Methods of Computational Pragmatics HSE University Moscow Russia
The paper explores mathematical methods that differentiate regular and chaotic time series, specifically for identifying pathological fistulas. It proposes a noise-resistant method for classifying responding rows of n... 详细信息
来源: 评论
STRNet: Semantic Segmentation Based on Small Target Refinement at Large Scale  24
STRNet: Semantic Segmentation Based on Small Target Refineme...
收藏 引用
3rd International Conference on computer, artificial intelligence and Control Engineering, CAICE 2024
作者: Wang, Futian Shi, Tao Luo, Bin Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China
In the past few years, most high-performance semantic segmentation models have focused on learning semantic information in high-level semantic features, and in order to obtain more features, they will use high-resolut... 详细信息
来源: 评论
Legal Risks and Governance Paths for Generative AI - A Case Study of ChatGPT  13
Legal Risks and Governance Paths for Generative AI - A Case ...
收藏 引用
13th International Conference on Information Technology in Medicine and Education, ITME 2023
作者: Zhenfeng, Wang Quanwang, Lin Huihui, Gao Xiehua, Yu University of Fujian Province Key Laboratory of Big Data and Artificial Intelligence China MinNan Science and Technology University Fujian China School of Computer and Information MinNan Science and Technology University Quanzhou China University of Fujian Key Laboratory of Big Data and Artificial Intelligence Quanzhou China
The release of OpenAI's ChatGPT chatbot has sparked widespread concern around the world about the threats and legal issues of generative AI. Although this technological innovation has opened a new chapter in the f... 详细信息
来源: 评论
Security within Security: Attack Detection Model with Defenses Against Attacks Capability for Zero-trust Networks
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2312-2327页
作者: Wang, Tingting Fang, Kai Cai, Jijing Wang, Lina Tian, Jinyu Feng, Hailin Li, Jianqing Guizani, Mohsen Wang, Wei Macau University of Science and Technology Faculty of Innovation Engineering School of Computer Science and Engineering Macau999078 China Zhejiang A&F University College of Mathematics and Computer Science Hangzhou311300 China Machine Learning Department United Arab Emirates Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China
Traditional traffic anomaly-based attack detection methods in Zero-trust Networks (ZTN) suffer from inherent security vulnerabilities, as they neglect considerations regarding their security defenses. Compromising the... 详细信息
来源: 评论