咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 373 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 751 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 441 篇 工学
    • 289 篇 计算机科学与技术...
    • 238 篇 软件工程
    • 70 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 68 篇 生物工程
    • 62 篇 生物医学工程(可授...
    • 40 篇 光学工程
    • 32 篇 化学工程与技术
    • 31 篇 电气工程
    • 27 篇 机械工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 建筑学
    • 15 篇 交通运输工程
    • 13 篇 土木工程
    • 11 篇 材料科学与工程(可...
  • 260 篇 理学
    • 97 篇 数学
    • 91 篇 生物学
    • 74 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 化学
    • 26 篇 系统科学
  • 114 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 70 篇 医学
    • 61 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 16 篇 公共卫生与预防医...
  • 24 篇 法学
    • 21 篇 社会学
  • 20 篇 教育学
    • 19 篇 教育学
  • 14 篇 农学
  • 10 篇 经济学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 20 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 14 篇 neurons
  • 14 篇 deep learning
  • 14 篇 electroencephalo...
  • 14 篇 neural networks
  • 12 篇 reinforcement le...
  • 12 篇 computational mo...
  • 12 篇 intelligent syst...
  • 11 篇 gravitational wa...
  • 11 篇 accuracy
  • 10 篇 image segmentati...
  • 10 篇 cloud computing
  • 9 篇 predictive model...
  • 8 篇 trajectory
  • 8 篇 shape
  • 7 篇 three-dimensiona...
  • 7 篇 visualization
  • 7 篇 semantics

机构

  • 49 篇 school of artifi...
  • 25 篇 guangdong engine...
  • 20 篇 beijing engineer...
  • 14 篇 institute for pl...
  • 14 篇 university of so...
  • 14 篇 school of intell...
  • 13 篇 school of comput...
  • 12 篇 department of as...
  • 12 篇 department of ph...
  • 12 篇 school of comput...
  • 12 篇 state key labora...
  • 11 篇 infn sezione di ...
  • 11 篇 national tsing h...
  • 11 篇 department of ph...
  • 11 篇 department of ph...
  • 11 篇 department of ph...
  • 11 篇 institute for nu...
  • 11 篇 scuola di ingegn...
  • 11 篇 advanced technol...
  • 11 篇 physik-institut ...

作者

  • 41 篇 gang xiong
  • 23 篇 xiong gang
  • 23 篇 zhen shen
  • 17 篇 girijesh prasad
  • 15 篇 shen zhen
  • 14 篇 xisong dong
  • 11 篇 r. takahashi
  • 11 篇 j. c. bayley
  • 11 篇 t. m. evans
  • 11 篇 k. komori
  • 11 篇 t. kajita
  • 11 篇 f. hellman
  • 11 篇 s. eguchi
  • 11 篇 k. ioka
  • 11 篇 m. kinley-hanlon
  • 11 篇 c. frederick
  • 11 篇 e. j. son
  • 11 篇 l. m. daneshgara...
  • 11 篇 t. tsuzuki
  • 11 篇 t. mcrae

语言

  • 645 篇 英文
  • 101 篇 其他
  • 5 篇 中文
检索条件"机构=Program for Research Into Intelligent Systems School of Computing"
751 条 记 录,以下是1-10 订阅
排序:
Adding Argumentation into Human Evaluation of Long Document Abstractive Summarization: A Case Study on Legal Opinions  4
Adding Argumentation into Human Evaluation of Long Document ...
收藏 引用
4th Workshop on Human Evaluation of NLP systems, HumEval 2024
作者: Elaraby, Mohamed Xu, Huihui Gray, Morgan Ashley, Kevin Litman, Diane Department of Computer Science School of Computing and Information United States Learning Research and Development Center United States Intelligent Systems Program School of Computing Information University of Pittsburgh PittsburghPA United States
Human evaluation remains the gold standard for assessing abstractive summarization. However, current practices often prioritize constructing evaluation guidelines for fluency, coherence, and factual accuracy, overlook... 详细信息
来源: 评论
A graph-based method for identity resolution to assist police force investigative process
收藏 引用
Journal of Cyber Security Technology 2025年 第2期9卷 127-150页
作者: Amirhosseini, Mohammad Hossein Kazemian, Hassan Phillips, Michael Department of Computer Science and Digital Technologies University of East London London United Kingdom Intelligent Systems Research Centre School of Computing and Digital Media London Metropolitan University London United Kingdom
The ability to prove an individual identity has become crucial in social, economic, and legal aspects of life. Identity resolution is the process of semantic reconciliation that determines whether a single identity is... 详细信息
来源: 评论
GRAMO:geometric resampling augmentation for monocular 3D object detection
收藏 引用
Frontiers of Computer Science 2024年 第5期18卷 161-169页
作者: He GUAN Chunfeng SONG Zhaoxiang ZHANG School of Artificial Intelligence University of Chinese Academy of SciencesBeijing 100049China Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence SystemsInstitute of Automation Chinese Academy of SciencesBeijing 100190China
Data augmentation is widely recognized as an effective means of bolstering model ***,when applied to monocular 3D object detection,non-geometric image augmentation neglects the critical link between the image and phys... 详细信息
来源: 评论
Process Mining Benefits Model: A Preliminary Study  11
Process Mining Benefits Model: A Preliminary Study
收藏 引用
11th International Conference on Computer, Control, Informatics and its Applications, IC3INA 2024
作者: Darmayanti, Nungki Dian S. Cervantes, Abel Armas Kurnia, Sherah Nastiti, Arti Dian The School of Computing and Information Systems The University of Melbourne Australia Research Center for Artificial Intelligent and Cybersecurity National Research and Innovation Agency Indonesia
Process mining is a family of tools and techniques that analyzes business process data, collected by information systems, through a process lens. This technology can be used by organizations to discover valuable insig... 详细信息
来源: 评论
Enhancing Security: Evaluating RFID Card Access Control systems using SHA-256
Enhancing Security: Evaluating RFID Card Access Control Syst...
收藏 引用
2024 International Conference on Innovation and Intelligence for Informatics, computing, and Technologies, 3ICT 2024
作者: Yang, You Zhi Ramly, Athirah Mohd Sharif, Mhd Saeed Department of Computing and Information Systems Sunway University Selangor Malaysia School of Architecture Computing and Engineering UEL London United Kingdom Intelligent Technologies Research Group School of Architecture Computing and Engineering UEL London United Kingdom
This paper focuses on enhancing the security of a chosen system by implementing multiple layers of protection, including concealing sensitive data on the Liquid Crystal Display (LCD), utilizing hashed Unique Identifie... 详细信息
来源: 评论
Leveraging Artificial Intelligence to Secure Wireless Network: Exploring Threats, Existing Approaches, and Proposed Mitigation Strategies
Leveraging Artificial Intelligence to Secure Wireless Networ...
收藏 引用
2024 International Conference on Innovation and Intelligence for Informatics, computing, and Technologies, 3ICT 2024
作者: Nan Xin, Alice Lee Ramly, Athirah Mohd Behjati, Mehran Sharif, Mhd Saeed Department of Computing and Information Systems Sunway University Selangor Malaysia School of Architecture Computing and Engineering UEL London United Kingdom Intelligent Technologies Research Group School of Architecture Computing and Engineering UEL London United Kingdom
The exponential growth of network has introduced new Internet-of-Things (IoT) use cases that has enabling us convenience and comfort. The surge of IoT devices due to the capabilities brought by fifth generation (5G) h... 详细信息
来源: 评论
Of Rodents and Primates: Time-Variant Gain in Drift–Diffusion Decision Models
收藏 引用
Computational Brain and Behavior 2024年 第2期7卷 195-206页
作者: Asadpour, Abdoreza Tan, Hui Lenfesty, Brendan Wong-Lin, KongFatt Intelligent Systems Research Centre School of Computing Engineering and Intelligent Systems Ulster University Magee Campus Northern Ireland Derry~Londonderry United Kingdom Département Electronique et Technologies Numériques Polytech Nantes Nantes Université Nantes France
Sequential sampling models of decision-making involve evidence accumulation over time and have been successful in capturing choice behaviour. A popular model is the drift–diffusion model (DDM). To capture the finer a... 详细信息
来源: 评论
A NEW HOPE: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation  33
A NEW HOPE: Contextual Privacy Policies for Mobile Applicati...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Pan, Shidong Tao, Zhen Hoang, Thong Zhang, Dawen Li, Tianshi Xing, Zhenchang Xu, Xiwei Staples, Mark Rakotoarivelo, Thierry Lo, David School of Computing Australian National University Australia Software and Computational Systems Research Program CSIRO's Data61 Khoury College of Computer Sciences Northeastern University United States School of Computing and Information Systems Singapore Management University Singapore
Privacy policies have emerged as the predominant approach to conveying privacy notices to mobile application users. In an effort to enhance both readability and user engagement, the concept of contextual privacy polic... 详细信息
来源: 评论
Malware Detection and Analysis in Android Applications with Mobile Security Framework (MobSF) Using a Permission-Based Approach  12th
Malware Detection and Analysis in Android Applications with ...
收藏 引用
12th International Conference on Frontiers of intelligent computing: Theory and Applications, FICTA 2024
作者: Kizito, Mark Homayounvala, Elaheh Kazemian, Hassan Araujo, Istteffanny Intelligent Systems Research Group School of Computing and Digital Media London Metropolitan University 166-220 Holloway Rd LondonN7 8DB United Kingdom
This paper examines security concerns in Android applications arising from violations to the principle of least privilege. Using mobile security framework (MobSF), static and dynamic analysis techniques were used in e... 详细信息
来源: 评论
Optimal Tracking Performance of Networked Control systems Under DoS and Its Applications
Optimal Tracking Performance of Networked Control Systems Un...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Ren, Xinyu Li, Bo Zhao, Feng Chen, Xiangyong Zhang, Xianhe Jiang, Xiaowei School of Automation China University of Geosciences Hubei Key Laboratory of Advanced Control and Intelligent Automation of Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China School of Finance Anhui University of Finance and Economics Bengbu China Key Laboratory of Complex systems and Intelligent Computing in Universities of Shandong Linyi University Linyi China School of Automation and Electrical Engineering Key Laboratory of Complex systems and Intelligent Computing in Universities of Shandong Linyi University Linyi China School of Electrical Engineering and Automation Hubei Normal University Huangshi China
This paper investigates the optimal tracking performance (OTP) of multiple-input multiple-output (MIMO) discrete networked control systems (NCSs) under the influence of Denial of Service (DoS) attack, channel noise, a... 详细信息
来源: 评论