咨询与建议

限定检索结果

文献类型

  • 3,445 篇 会议
  • 3,336 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 6,844 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,793 篇 工学
    • 3,312 篇 计算机科学与技术...
    • 2,794 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 668 篇 控制科学与工程
    • 524 篇 电气工程
    • 512 篇 生物医学工程(可授...
    • 498 篇 电子科学与技术(可...
    • 460 篇 光学工程
    • 337 篇 机械工程
    • 276 篇 化学工程与技术
    • 248 篇 仪器科学与技术
    • 203 篇 动力工程及工程热...
    • 154 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 109 篇 建筑学
  • 2,745 篇 理学
    • 1,314 篇 数学
    • 799 篇 物理学
    • 785 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 304 篇 化学
    • 281 篇 系统科学
  • 1,261 篇 管理学
    • 724 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 471 篇 医学
    • 403 篇 临床医学
    • 344 篇 基础医学(可授医学...
    • 241 篇 药学(可授医学、理...
    • 130 篇 公共卫生与预防医...
  • 206 篇 法学
    • 182 篇 社会学
  • 104 篇 经济学
  • 71 篇 教育学
  • 66 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 135 篇 machine learning
  • 127 篇 semantics
  • 118 篇 deep learning
  • 95 篇 feature extracti...
  • 88 篇 training
  • 85 篇 computational mo...
  • 82 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 64 篇 data mining
  • 63 篇 accuracy
  • 62 篇 visualization
  • 60 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 53 篇 forecasting
  • 52 篇 computer archite...
  • 52 篇 computer vision
  • 51 篇 internet of thin...
  • 50 篇 optimization

机构

  • 208 篇 department of co...
  • 77 篇 department of co...
  • 60 篇 tencent ai lab
  • 49 篇 department of co...
  • 43 篇 college of compu...
  • 42 篇 department of co...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 38 篇 peng cheng labor...
  • 37 篇 department of co...
  • 37 篇 department of co...
  • 34 篇 pazhou lab
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 31 篇 department of co...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 53 篇 liu zhiyuan
  • 42 篇 sun fuchun
  • 39 篇 bhowmik biswajit
  • 38 篇 zhu jun
  • 33 篇 huang minlie
  • 30 篇 biswajit bhowmik
  • 30 篇 huang wenbing
  • 26 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 22 篇 chen hao
  • 21 篇 zhang lei
  • 21 篇 fuchun sun
  • 17 篇 zhao hai
  • 17 篇 zheng qinghua
  • 16 篇 guan jihong
  • 16 篇 liu xin

语言

  • 6,525 篇 英文
  • 247 篇 其他
  • 75 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6844 条 记 录,以下是71-80 订阅
排序:
I Can’t Share Code, but I need Translation - An Empirical Study on Code Translation through Federated LLM
arXiv
收藏 引用
arXiv 2025年
作者: Kumar, Jahnavi Janapati, Venkata Lakshmana Sasaank Tanguturi, Mokshith Reddy Chimalakonda, Sridhar Research in Intelligent Software & Human Analytics Lab Department of Computer Science and Engineering Indian Institute of Technology Tirupati India
Owing to the rapid evolution of technologies and project requirements, organizations need to upgrade the code base in their software projects to a new version of the programming language or even translating to an enti... 详细信息
来源: 评论
Special issue on advances in techniques for assessment performance portability of HPC applications
收藏 引用
Future Generation computer Systems 2025年 171卷
作者: Marowka, Ami Stpiczyński, Przemyslaw Wyrzykowski, Roman Parallel Research Lab Petach Tikva49729 Israel Institute of Computer Science Maria Curie-Sklodowska University Lublin20-033 Poland Department of Computer Science Czestochowa University of Technology Czestochowa42-201 Poland
This special issue aims to present new developments and advances in techniques for assessment performance portability of high performance computing applications. It contains revised and extended versions of selected p... 详细信息
来源: 评论
Analyzing Digital Image Anti-Forensics Techniques and Countermeasures  27
Analyzing Digital Image Anti-Forensics Techniques and Counte...
收藏 引用
27th International Conference on Advanced Communications technology, ICACT 2025
作者: Agarwal, Saurabh Kumar, Rajeev Devi, Abha Jung, Ki-Hyun Department of Information and Communication Engineering Yeungnam University Gyeongsan38541 Korea Republic of Blockchain Technology Research Lab Department of Computer Science and Engineering Delhi Technological University New Delhi110042 India Department of Software Convergence Andong National University Gyeongbuk36729 Korea Republic of College Uttar Pradesh Sikandrabad India
With the increasing use of digital media, digital forensics has become a crucial method for ascertaining authenticity and detecting manipulations in images. However, intentional anti-forensic manipulations to hide for... 详细信息
来源: 评论
Non-Uniform Illumination Attack for Fooling Convolutional Neural Networks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Jain, Akshay Dubey, Shiv Ram Singh, Satish Kumar Santosh, K.C. Chaudhuri, Bidyut Baran Indian Institute of Information Technology Allahabad Computer Vision and Biometrics Lab Department of Information Technology Uttar Pradesh Prayagraj211015 India University of South Dakota AI Research Lab Department of Computer Science VermillionSD57069 United States Indian Statistical Institute Computer Vision and Pattern Recognition Unit Kolkata700108 India
Convolutional Neural Networks (CNNs) have made remarkable strides;however, they remain susceptible to vulnerabilities, particularly to image perturbations that humans can easily recognize. This weakness, often termed ... 详细信息
来源: 评论
Enhancing LLM Reliability via Explicit Knowledge Boundary Modeling
arXiv
收藏 引用
arXiv 2025年
作者: Zheng, Hang Xu, Hongshen Liu, Yuncong Chen, Lu Fung, Pascale Yu, Kai X-LANCE Lab Department of Computer Science and Engineering Shanghai Jiao Tong University China Hong Kong University of Science and Technology Hong Kong
Large language models (LLMs) frequently hallucinate due to misaligned self-awareness, generating erroneous outputs when addressing queries beyond their knowledge boundaries. While existing approaches mitigate hallucin... 详细信息
来源: 评论
Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4140-4155页
作者: Vo, Van Nhan Long, Nguyen Quoc Dang, Viet-Hung Ho, Tu Dac Tran, Hung Chatzinotas, Symeon Tran, Dinh-Hieu Sanguanpong, Surasak So-In, Chakchai Faculty of Information Technology Duy Tan University Da Nang550000 Viet Nam Institute of Research and Development Duy Tan University Da Nang550000 Viet Nam Department of Information Security and Communication Technology Faculty of Information Technology and Electrical Engineering Norwegian University of Science and Technology - NTNU Norway DATCOM Lab Faculty of Data Science and Artificial Intelligence College of Technology National Economics University Hanoi12116 Viet Nam University of Luxembourg Luxembourg Department of Computer Engineering Faculty of Engineering Kasetsart University Bangkok10900 Thailand College of Computing Khon Kaen University Khon Kaen40002 Thailand
This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and fri... 详细信息
来源: 评论
Beyond Vision: How Large Language Models Interpret Facial Expressions from Valence-Arousal Values
arXiv
收藏 引用
arXiv 2025年
作者: Mehra, Vaibhav laban, Guy Gunes, Hatice HEI-Lab Universidade Lusófona Lisbon Portugal Department of Computer Science and Technology University of Cambridge Cambridge United Kingdom
Large Language Models primarily operate through text-based inputs and outputs, yet human emotion is communicated through both verbal and non-verbal cues, including facial expressions. While Vision-Language Models anal... 详细信息
来源: 评论
GBSVR: Granular Ball Support Vector Regression
arXiv
收藏 引用
arXiv 2025年
作者: Rastogi, Reshma Bisht, Ankush Kumar, Sanjay Chandra, Suresh MLSI Lab Department of Computer Science South Asian University New Delhi India Department of Computer Science Deshbandhu College University of Delhi New Delhi India Department of Mathematics Indian Institute of Technology Delhi New Delhi India
Support Vector Regression (SVR) and its variants are widely used to handle regression tasks, however, since their solution involves solving an expensive quadratic programming problem, it limits its application, especi... 详细信息
来源: 评论
EEG VMAC Toolbox: A User-Friendly Open-Source Toolbox for EEG Signals Visualization Manipulation Analysis and Classification
收藏 引用
Procedia computer science 2025年 258卷 1062-1080页
作者: Gopal Chandra Jana Abhishek Karmakar Anupam Agrawal Interactive Technologies & Multimedia Research (ITMR) Lab Department of Information Technology Indian Institute of Information Technology Allahabad Prayagraj – 211015 Uttar Pradesh India Indian Institute of Information Technology Kalyani Department of Computer Science and Engineering Kalyani – 741235 West Bengal India
Electroencephalography (EEG) is a well-known, non-invasive method for monitoring and recording electrical activities of the human brain. Problem: EEG signal visualization, manipulation, analysis, and classification ar... 详细信息
来源: 评论
Generative Adversarial Networks for Dynamic Malware Behavior: A Comprehensive Review, Categorization, and Analysis
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Gebrehans, Ghebrebrhan Ilyas, Naveed Eledlebi, Khouloud Lunardi, Willian T. Andreoni, Martin Yeun, Chan Yeob Damiani, Ernesto Lab Khalifa University of Science and Technology Abu Dhabi United Arab Emirates University of California Riverside United States Khalifa University of Science and Technology Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates Abu Dhabi United Arab Emirates Khalifa University Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates Khalifa University of Science and Technology Center for Secure Cyber-physical Systems Abu Dhabi United Arab Emirates University of Milan Dept. of Computer Science Italy
This paper highlights the critical role of Machine Learning (ML) in combating the dynamic nature of cybersecurity threats. Unlike previous studies focusing mainly on static analysis, this work surveys the literature o... 详细信息
来源: 评论