咨询与建议

限定检索结果

文献类型

  • 1,209 篇 会议
  • 790 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,007 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,249 篇 工学
    • 887 篇 计算机科学与技术...
    • 725 篇 软件工程
    • 349 篇 信息与通信工程
    • 203 篇 控制科学与工程
    • 188 篇 生物工程
    • 160 篇 电气工程
    • 139 篇 生物医学工程(可授...
    • 124 篇 电子科学与技术(可...
    • 120 篇 光学工程
    • 95 篇 网络空间安全
    • 86 篇 机械工程
    • 76 篇 化学工程与技术
    • 62 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 50 篇 动力工程及工程热...
  • 710 篇 理学
    • 325 篇 数学
    • 234 篇 物理学
    • 205 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 87 篇 化学
    • 52 篇 系统科学
  • 365 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 71 篇 工商管理
  • 120 篇 医学
    • 83 篇 基础医学(可授医学...
    • 80 篇 临床医学
    • 60 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 73 篇 法学
    • 61 篇 社会学
  • 36 篇 经济学
  • 28 篇 农学
  • 23 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 85 篇 accuracy
  • 75 篇 deep learning
  • 56 篇 feature extracti...
  • 53 篇 training
  • 49 篇 convolutional ne...
  • 45 篇 real-time system...
  • 44 篇 machine learning
  • 40 篇 computational mo...
  • 39 篇 predictive model...
  • 32 篇 optimization
  • 29 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 28 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 22 篇 cloud computing
  • 22 篇 adaptation model...
  • 20 篇 scalability

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 42 篇 zhang yanning
  • 40 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,527 篇 英文
  • 457 篇 其他
  • 26 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
2007 条 记 录,以下是1101-1110 订阅
排序:
Class-Imbalanced Semi-Supervised Learning for Large-Scale Point Cloud Semantic Segmentation Via Decoupling Optimization
SSRN
收藏 引用
SSRN 2023年
作者: Li, Mengtian Lin, Shaohui Wang, Zihan Shen, Yunhang Zhang, Baochang Ma, Lizhuang Visual Media Intelligent Processing Research Group Department of Film and Television Engineering Shanghai University Shanghai200072 China School of Computer Science and Technology East China Normal University Shanghai200062 China Key Laboratory of Advanced Theory and Application in Statistics and Data Science Ministry of Education China School of Automation Science and Electrical Engineering Beihang University Beijing100191 China Youtu Lab Tencent China
Semi-supervised learning (SSL), thanks to the significant reduction of data annotation costs, has been an active research topic for large-scale 3D scene understanding. However, the existing SSL-based methods suffer fr... 详细信息
来源: 评论
CONIC10K: A Challenging Math Problem Understanding and Reasoning Dataset
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Haoyi Hui, Wenyang Chen, Yezeng Wu, Weiqi Tu, Kewei Zhou, Yi School of Information Science and Technology ShanghaiTech University China Shanghai Engineering Research Center of Intelligent Vision and Imaging China School of Information Science and Technology University of Science and Technology of China China National Engineering Laboratory for Brain-inspired Intelligence Technology and Application China Key Laboratory of Brain Cognition and Education Sciences Ministry of Education China Shanghai Innovation Center for Processor Technologies China Department of Computer Science and Engineering Shanghai Jiao Tong University China
Mathematical understanding and reasoning are crucial tasks for assessing the capabilities of artificial intelligence (AI). However, existing benchmarks either require just a few steps of reasoning, or only contain a s...
来源: 评论
Pushing the Performance Limit of Scene Text Recognizer without Human Annotation
arXiv
收藏 引用
arXiv 2022年
作者: Zheng, Caiyuan Li, Hui Rhee, Seon-Min Han, Seungju Han, Jae-Joon Wang, Peng School of Computer Science Ningbo Institute Northwestern Polytechnical University China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology China China Korea Republic of
Scene text recognition (STR) attracts much attention over the years because of its wide application. Most methods train STR model in a fully supervised manner which requires large amounts of labeled data. Although syn... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Real-time Glass Recycling Quality Assurance and Contamination Reduction with IoT and Random Forest algorithm
Real-time Glass Recycling Quality Assurance and Contaminatio...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: K. Balasubadra B. Shadaksharappa Senthil Kumar Seeni V. Sridevi Thamizhamuthu R C. Srinivasan Department of Information Technology R.M.D. Engineering College Kavaraipettai Chennai Tamil Nadu India Department of Computer Science and Engineering Sri Sairam College of Engineering Anekal Bengaluru Karnataka India Department of Mobile Application Development Cognizant Technology Solutions Buffalo Grove Illinois United States of America Electrical and Electronics Engineering Academy of Maritime Education and Training Deemed to be University Chennai Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Campus-Chengalpattu Chennai Tamil Nadu India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu India
The recycling industry is crucial to environmental protection and resource conservation. Glass recycling has great sustainability potential, but quality assurance and contaminant reduction are major challenges. Integr... 详细信息
来源: 评论
Dilemma in All-optical Characterization of Single-layer NiI2 Multiferroics
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Yucheng Wu, Yangliu Zhang, Jinlei Wei, Jingxuan Peng, Bo Qiu, Cheng-Wei Department of Electrical and Computer Engineering National University of Singapore 4 Engineering Drive 3 Singapore117583 Singapore Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application School of Physical Science and Technology Suzhou University of Science and Technology Suzhou215009 China 8 Somapah Road Singapore487372 Singapore National Engineering Research Center of Electromagnetic Radiation Control Materials School of Electronic Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The search for two-dimensional multiferroic materials is an exciting yet challenging endeavor. Recently, Song et al. reported the exciting discovery of type-II multiferroic order in an antiferromagnetic (AFM) NiI2 sin... 详细信息
来源: 评论
Securing the Private Key in Your Blockchain Wallet: A Continuous Authentication Approach Based on Behavioral Biometric  2
Securing the Private Key in Your Blockchain Wallet: A Contin...
收藏 引用
2nd International Conference on Artificial Intelligence and computer science, AICS 2020
作者: Hu, Teng Liu, Xiaolei Niu, Weina Ding, Kangyi Wang, Yanping Zhang, Xiaosong Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China China Institute of Computer Application China Academy of Engineering Physics China Peng Cheng Laboratory Cyberspace Security Research Center China
As blockchain is increasingly valued, the application of blockchain and its security has become a research hotspot. Not only that, more and more ordinary users are paying attention to the blockchain and beginning to t... 详细信息
来源: 评论
Model-enhanced vector index  23
Model-enhanced vector index
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Hailin Zhang Yujing Wang Qi Chen Ruiheng Chang Ting Zhang Ziming Miao Yingyan Hou Yang Ding Xupeng Miao Haonan Wang Bochen Pang Yuefeng Zhan Hao Sun Weiwei Deng Qi Zhang Fan Yang Xing Xie Mao Yang Bin Cui School of Computer Science & Key Lab of High Confidence Software Technologies Peking University and Microsoft Microsoft Microsoft and Aerospace Information Research Institute & Key Laboratory of Target Cognition and Application Technology Chinese Academy of Sciences Microsoft and Institute of Information Engineering Chinese Academy of Sciences Carnegie Mellon University National University of Singapore School of Computer Science & Key Lab of High Confidence Software Technologies Peking University and National Engineering Laboratory for Big Data Analysis and Applications Peking University
Embedding-based retrieval methods construct vector indices to search for document representations that are most similar to the query representations. They are widely used in document retrieval due to low latency and d...
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking
Blockchain-Based Identity Authentication Oriented to Multi-C...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Zesong Dong Wei Tong Zhiwei Zhang Jian Li Weidong Yang Yulong Shen Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xi’an China Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China School of Computer Science and Technology Xidian University Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut...
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Zesong Tong, Wei Zhang, Zhiwei Li, Jian Yang, Weidong Shen, Yulong The Hangzhou Institute of Technology Xidian University Hangzhou China The School of Computer Science and Technology Xidian University Xi’an China The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China Shaanxi Key Laboratory of Network and System Security Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut... 详细信息
来源: 评论