咨询与建议

限定检索结果

文献类型

  • 12,942 篇 会议
  • 9,091 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 22,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,818 篇 工学
    • 10,579 篇 计算机科学与技术...
    • 8,891 篇 软件工程
    • 3,082 篇 信息与通信工程
    • 2,273 篇 控制科学与工程
    • 2,119 篇 生物工程
    • 1,665 篇 电气工程
    • 1,523 篇 生物医学工程(可授...
    • 1,448 篇 光学工程
    • 1,043 篇 电子科学与技术(可...
    • 953 篇 机械工程
    • 702 篇 化学工程与技术
    • 611 篇 网络空间安全
    • 592 篇 仪器科学与技术
    • 551 篇 交通运输工程
    • 509 篇 安全科学与工程
    • 456 篇 动力工程及工程热...
  • 7,397 篇 理学
    • 3,712 篇 数学
    • 2,418 篇 生物学
    • 1,819 篇 物理学
    • 1,397 篇 统计学(可授理学、...
    • 853 篇 化学
    • 581 篇 系统科学
  • 4,040 篇 管理学
    • 2,341 篇 管理科学与工程(可...
    • 1,909 篇 图书情报与档案管...
    • 976 篇 工商管理
  • 1,398 篇 医学
    • 1,187 篇 临床医学
    • 1,037 篇 基础医学(可授医学...
    • 624 篇 药学(可授医学、理...
    • 600 篇 公共卫生与预防医...
  • 646 篇 法学
    • 562 篇 社会学
  • 390 篇 经济学
  • 335 篇 农学
  • 286 篇 教育学
  • 65 篇 文学
  • 33 篇 军事学
  • 26 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 999 篇 accuracy
  • 964 篇 deep learning
  • 714 篇 feature extracti...
  • 685 篇 training
  • 502 篇 machine learning
  • 487 篇 computational mo...
  • 452 篇 convolutional ne...
  • 397 篇 semantics
  • 387 篇 predictive model...
  • 377 篇 data models
  • 347 篇 real-time system...
  • 314 篇 internet of thin...
  • 296 篇 artificial intel...
  • 293 篇 neural networks
  • 280 篇 optimization
  • 268 篇 reinforcement le...
  • 261 篇 image segmentati...
  • 260 篇 support vector m...
  • 258 篇 object detection
  • 219 篇 contrastive lear...

机构

  • 261 篇 school of artifi...
  • 242 篇 school of comput...
  • 240 篇 school of comput...
  • 237 篇 school of artifi...
  • 231 篇 school of artifi...
  • 212 篇 chitkara univers...
  • 196 篇 school of comput...
  • 193 篇 institute of art...
  • 179 篇 school of comput...
  • 152 篇 school of comput...
  • 137 篇 school of artifi...
  • 112 篇 university of sc...
  • 108 篇 gaoling school o...
  • 106 篇 school of comput...
  • 100 篇 school of comput...
  • 95 篇 school of artifi...
  • 93 篇 school of comput...
  • 89 篇 shanghai artific...
  • 85 篇 the islamic univ...
  • 84 篇 college of compu...

作者

  • 70 篇 niyato dusit
  • 66 篇 liu yang
  • 64 篇 sunil g.
  • 55 篇 li chenglong
  • 53 篇 zhang min
  • 50 篇 deepak banerjee
  • 46 篇 zheng wei-shi
  • 46 篇 wang xiao
  • 41 篇 liu jun
  • 41 篇 yang yang
  • 39 篇 li yang
  • 38 篇 zhou jie
  • 35 篇 li xin
  • 33 篇 banerjee deepak
  • 32 篇 golland polina
  • 32 篇 wen ji-rong
  • 30 篇 chang yi
  • 30 篇 li zhenghua
  • 29 篇 gill kanwarparta...
  • 28 篇 sharma neha

语言

  • 16,961 篇 英文
  • 5,086 篇 其他
  • 202 篇 中文
  • 5 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
检索条件"机构=School of Artificial Intelligence and Data Science and School of Computer Science and Technology"
22182 条 记 录,以下是481-490 订阅
排序:
A Population Initialization Method Based on Similarity and Mutual Information in Evolutionary Algorithm for Bi-Objective Feature Selection
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-21页
作者: Cai, Xu Xue, Yu Artificial Intelligence Research Institute School of Information and Control Engineering China University of Mining and Technology Xuzhou China School of Software Nanjing University of Information Science and Technology Nanjing China
Feature selection (FS) is an important data pre-processing technique in classification. It aims to remove redundant and irrelevant features from the data, which reduces the dimensionality of data and improves the perf... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Disentangling Prosody Representations With Unsupervised Speech Reconstruction
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language Processing 2024年 32卷 39-54页
作者: Qu, Leyuan Li, Taihao Weber, Cornelius Pekarek-Rosin, Theresa Ren, Fuji Wermter, Stefan Institute of Artificial Intelligence Zhejiang Lab Hangzhou311121 China Department of Informatics University of Hamburg Hamburg20148 Germany School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
Human speech can be characterized by different components, including semantic content, speaker identity and prosodic information. Significant progress has been made in disentangling representations for semantic conten... 详细信息
来源: 评论
Automated Detection of Hate Speech in Hindi using Supervised Learning Models
Automated Detection of Hate Speech in Hindi using Supervised...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Rajak, Nikhil Phulre, Ajay Kumar Chandra Patel, Subhash Patel, Narottam Das Khekare, Ganesh Vit Bhopal University School of Computing Science Engineering and Artificial Intelligence Sehore India Vellore Institute of Technology School of Computer Science and Engineering Vellore India
This study addresses the pressing issue of hate speech on online platforms. Traditional text-based analysis is no longer adequate for identifying hate speech due to the growth of internet platform data. The project ai... 详细信息
来源: 评论
Unsupervised Domain Adaptation on Point Clouds via High-Order Geometric Structure Modeling
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on artificial intelligence 2024年 第12期5卷 6121-6133页
作者: Cheng, Jiang-Xing Lin, Huibin Zhang, Chun-Yang Chen, C. L. Philip Fuzhou University College of Computer and Data Science Fuzhou350108 China South China University of Technology School of Computer Science and Engineering Guangdong Guangzhou510006 China
Point clouds can capture the precise geometric information of objects and scenes, which are an important source of 3-D data and one of the most popular 3-D geometric data structures for cognitions in many real-world a... 详细信息
来源: 评论
PromptCD: Coupled and Decoupled Prompt Learning for Vision-Language Models  27
PromptCD: Coupled and Decoupled Prompt Learning for Vision-L...
收藏 引用
27th European Conference on artificial intelligence, ECAI 2024
作者: Wu, Junjie Sun, Mingjie Gong, Chen Yu, Nan Fu, Guohong School of Computer Science and Technology Soochow University Suzhou China Institute of Artificial Intelligence Soochow University China
Large-scale pre-trained vision-language models (VLMs), like CLIP, have presented striking generalizability for adapting to image classification in a few shot setting. Most existing methods explore a set of learnable t... 详细信息
来源: 评论
Two-Stream Reverse Distillation for Anomaly Detection  10
Two-Stream Reverse Distillation for Anomaly Detection
收藏 引用
10th International Conference on Systems and Informatics, ICSAI 2024
作者: Ding, Yunkang Tang, Hao Huang, Guoheng Cheng, Lianglun Pun, Chi-Man Li, Yan School of Computer Science and Technology Guangdong University of Technology Guangzhou China University of Macau Faculty of Science and Technology China School of Artificial Intelligence Shenzhen Polytechnic University Shenzhen China
Traditional industrial anomaly detection methods based on reverse distillation have been extensively studied due to their simplicity and efficiency. However, the intermediate embedding features generated by pre-traine... 详细信息
来源: 评论
Role-Specific Reward Design with Large Language Model for StarCraft II
Role-Specific Reward Design with Large Language Model for St...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Sijia Luo, Haonan Zhang, Xu Zeng, Xin Shen, Zhixuan Li, Tianrui School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu China Nanjing University of Science and Technology School of Computer Science and Engineering China
Reward acts as a signal to guide the agent's learning process in Reinforcement Learning (RL), evaluating and assigning rewards to the agent's actions based on their alignment with goals. Designing reward is ch... 详细信息
来源: 评论
Computing Challenges of UAV Networks: A Comprehensive Survey
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 1999-2051页
作者: Altaf Hussain Shuaiyong Li Tariq Hussain Xianxuan Lin Farman Ali Ahmad Ali AlZubi School of Computer Science&Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of EducationChongqing University of Posts and TelecommunicationsChongqing400065China School of Computer Science and Technology Zhejiang Gongshang UniversityHangzhou310018China School of Artificial Intelligence Nanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering School of ConvergenceCollege of Computing and InformaticsSungkyunkwan UniversitySeoul03063Republic of Korea Department of Computer Science Community CollegeKing Saud UniversityRiyadh11495Saudi Arabia
Devices and networks constantly upgrade,leading to rapid technological ***-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information *** network types,includ... 详细信息
来源: 评论
Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography
收藏 引用
Mathematical Biosciences and Engineering 2024年 第3期21卷 4762-4778页
作者: Liu, Tao Vairagar, Shubhangi Adagale, Sushadevi Karthick, T. Karunya, Catherine Esther Blesswin, A. John Mary, G. Selva Tianjin Sino-German University of Applied Sciences Tianjin300350 China Department of Artificial Intelligence and Data Science Dr. D. Y. Patil Institute of Technology Pimpri Pune411018 India Department of Computer Engineering KJEI's Trinity Academy of Engineering Pune411048 India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur603203 India Computer Science and Engineering School of Computing SRM Institute of Science and Technology Kattankulathur603203 India Directorate of Learning and Development SRM Institute of Science and Technology Kattankulathur603203 India
The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and f... 详细信息
来源: 评论