咨询与建议

限定检索结果

文献类型

  • 12,942 篇 会议
  • 9,091 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 22,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,818 篇 工学
    • 10,579 篇 计算机科学与技术...
    • 8,891 篇 软件工程
    • 3,082 篇 信息与通信工程
    • 2,273 篇 控制科学与工程
    • 2,119 篇 生物工程
    • 1,665 篇 电气工程
    • 1,523 篇 生物医学工程(可授...
    • 1,448 篇 光学工程
    • 1,043 篇 电子科学与技术(可...
    • 953 篇 机械工程
    • 702 篇 化学工程与技术
    • 611 篇 网络空间安全
    • 592 篇 仪器科学与技术
    • 551 篇 交通运输工程
    • 509 篇 安全科学与工程
    • 456 篇 动力工程及工程热...
  • 7,397 篇 理学
    • 3,712 篇 数学
    • 2,418 篇 生物学
    • 1,819 篇 物理学
    • 1,397 篇 统计学(可授理学、...
    • 853 篇 化学
    • 581 篇 系统科学
  • 4,040 篇 管理学
    • 2,341 篇 管理科学与工程(可...
    • 1,909 篇 图书情报与档案管...
    • 976 篇 工商管理
  • 1,398 篇 医学
    • 1,187 篇 临床医学
    • 1,037 篇 基础医学(可授医学...
    • 624 篇 药学(可授医学、理...
    • 600 篇 公共卫生与预防医...
  • 646 篇 法学
    • 562 篇 社会学
  • 390 篇 经济学
  • 335 篇 农学
  • 286 篇 教育学
  • 65 篇 文学
  • 33 篇 军事学
  • 26 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 999 篇 accuracy
  • 964 篇 deep learning
  • 714 篇 feature extracti...
  • 685 篇 training
  • 502 篇 machine learning
  • 487 篇 computational mo...
  • 452 篇 convolutional ne...
  • 397 篇 semantics
  • 387 篇 predictive model...
  • 377 篇 data models
  • 347 篇 real-time system...
  • 314 篇 internet of thin...
  • 296 篇 artificial intel...
  • 293 篇 neural networks
  • 280 篇 optimization
  • 268 篇 reinforcement le...
  • 261 篇 image segmentati...
  • 260 篇 support vector m...
  • 258 篇 object detection
  • 219 篇 contrastive lear...

机构

  • 261 篇 school of artifi...
  • 242 篇 school of comput...
  • 240 篇 school of comput...
  • 237 篇 school of artifi...
  • 231 篇 school of artifi...
  • 212 篇 chitkara univers...
  • 196 篇 school of comput...
  • 193 篇 institute of art...
  • 179 篇 school of comput...
  • 152 篇 school of comput...
  • 137 篇 school of artifi...
  • 112 篇 university of sc...
  • 108 篇 gaoling school o...
  • 106 篇 school of comput...
  • 100 篇 school of comput...
  • 95 篇 school of artifi...
  • 93 篇 school of comput...
  • 89 篇 shanghai artific...
  • 85 篇 the islamic univ...
  • 84 篇 college of compu...

作者

  • 70 篇 niyato dusit
  • 66 篇 liu yang
  • 64 篇 sunil g.
  • 55 篇 li chenglong
  • 53 篇 zhang min
  • 50 篇 deepak banerjee
  • 46 篇 zheng wei-shi
  • 46 篇 wang xiao
  • 41 篇 liu jun
  • 41 篇 yang yang
  • 39 篇 li yang
  • 38 篇 zhou jie
  • 35 篇 li xin
  • 33 篇 banerjee deepak
  • 32 篇 golland polina
  • 32 篇 wen ji-rong
  • 30 篇 chang yi
  • 30 篇 li zhenghua
  • 29 篇 gill kanwarparta...
  • 28 篇 sharma neha

语言

  • 16,961 篇 英文
  • 5,086 篇 其他
  • 202 篇 中文
  • 5 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
检索条件"机构=School of Artificial Intelligence and Data Science and School of Computer Science and Technology"
22182 条 记 录,以下是541-550 订阅
排序:
Lingual-Fusion Adapter-Based Transfer Learning for Low-Resource Code Vulnerability Detection
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1008-1023页
作者: Long, Xinyue Guo, Shikai Chai, Yu Li, Hui Jan, Sumaira Ameer Ma, Qian Ning, Qiao Dalian Maritime University School of Informafion Science and Technology Dalian China Key Laboratory of Artificial Intelligence of Dalian Dalian China Shanghai Jiao Tong University Shanghai China Dalian Maritime University School of Information and Science Technology Dalian China
Software vulnerabilities pose significant security threats to modern systems, particularly those involving complex execution sequences and intricate call relationships across multiple execution *** instance, in a scen... 详细信息
来源: 评论
Badminton Action Recognition based on Improved I3D Convolutional Neural Network  3
Badminton Action Recognition based on Improved I3D Convoluti...
收藏 引用
3rd International Conference on artificial intelligence, Automation, and High-Performance Computing, AIAHPC 2023
作者: Zheng, Huangnan Shen, Huichang Zhang, Yisong Wang, Haotian School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China
In order to solve the issue of inaccurate recognition of time series of badminton action by 2D networks and the high cost of using skeleton data for badminton action recognition, this article aims to explore the use o... 详细信息
来源: 评论
KSGTN-DDI: Key Substructure-aware Graph Transformer Network for Drug-drug Interaction Prediction
KSGTN-DDI: Key Substructure-aware Graph Transformer Network ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhang, Peiliang Liu, Yuanjie Shen, Zhishu Wuhan University of Technology School of Computer Science and Artificial Intelligence Wuhan430070 China
Drug substructure plays a crucial role in predicting drug-drug interaction (DDI) with combination drugs for disease therapies. In order to exploit the effect of drug substructure on DDI prediction, we propose a Key Su... 详细信息
来源: 评论
Visible and near-infrared image fusion based on information complementarity
收藏 引用
CAAI Transactions on intelligence technology 2025年 第1期10卷 193-206页
作者: Zhuo Li Shiliang Pu Mengqi Ji Feng Zeng Bo Li The School of Computer Science and Engineering Beihang UniversityBeijingChina Hangzhou Hikvision Digital Technology Co. Ltd.HangzhouChina The School of Artificial Intelligence Beihang UniversityBeijingChina Hangzhou International Innovation Institute Beihang UniversityHangzhouChina
Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared *** fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired ... 详细信息
来源: 评论
Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy  7
Inconsistency Detecting and Resolving for Security Policy an...
收藏 引用
7th International Conference on computer science and artificial intelligence, CSAI 2023
作者: Yin, Yi Tateiwa, Yuichiro Qian, Xiaojun Gao, Qian Shen, Lingling Zhang, Guoqiang School of Computer and Electronic Information School of Artificial Intelligence Nanjing Normal University Nanjing China Department of Computer Science and Engineering Nagoya Institute of Technology Nagoya Japan School of Information and Technology School of Computer Science and Technology School of Artificial Intelligence Hainan Normal University Hainan China
Firewall is the first defense line for network security. Packet filtering is a basic function in firewall, it filter network packets according to a series of rules, which is called firewall policy. The design of firew... 详细信息
来源: 评论
Convolutional Acceleration Algorithm Combining Loop Optimization and Automatic Scheduling  2
Convolutional Acceleration Algorithm Combining Loop Optimiza...
收藏 引用
2nd International Conference for Advancement in technology, ICONAT 2023
作者: Liu, Hongkang Deng, Feifei Wuhan University of Technology School of Computer Science and Artificial Intelligence Hubei Wuhan China
Convolutional neural networks are widely used in deep learning, and convolutional computation accounts for the largest proportion of time in convolutional neural networks, which basically determines the performance of... 详细信息
来源: 评论
Image Tampering Detection With Frequency-Aware Attention and Multiview Fusion
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on artificial intelligence 2025年 第3期6卷 614-625页
作者: Xu, Xu Chen, Junxin Lv, Wenrui Wang, Wei Zhang, Yushu Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China
Manipulated images are flooding our daily lives, which poses a threat to social security. Recently, many studies have focused on image tampering detection. However, they have poor performance on independent validation... 详细信息
来源: 评论
Repeatable adaptive keypoint detection via self-supervised learning
收藏 引用
science China(Information sciences) 2022年 第11期65卷 123-147页
作者: Pei YAN Yihua TAN Yuan TAI National Key Laboratory of Science & Technology on Multi-spectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology
Keypoint-based matching is a fundamental technology for different computer vision tasks, in which keypoint detection is a crucial step and directly affects the entire performance. Based on deep learning approaches, th... 详细信息
来源: 评论
Joint computation offloading and parallel scheduling to maximize delay-guarantee in cooperative MEC systems
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 693-705页
作者: Mian Guo Mithun Mukherjee Jaime Lloret Lei Li Quansheng Guan Fei Ji School of Electronics and Information Guangdong Polytechnic Normal UniversityGuangzhouChina School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjingChina Universitat Politecnica de Valencia 46022ValenciaSpain South China University of Technology China
The growing development of the Internet of Things(IoT)is accelerating the emergence and growth of new IoT services and applications,which will result in massive amounts of data being generated,transmitted and pro-cess... 详细信息
来源: 评论
Cyclical Training Framework with Graph Feature Optimization for Knowledge Graph Reasoning
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1951-1971页
作者: Xiaotong Han Yunqi Jiang Haitao Wang Yuan Tian School of Artificial Intelligence Jilin UniversityChangchun130012China Engineering Research Center of Knowledge-Driven Human-Machine Intelligence MOEChangchun130012China College of Computer Science and Technology Jilin UniversityChangchun130012China
Knowledge graphs(KGs),which organize real-world knowledge in triples,often suffer from issues of *** address this,multi-hop knowledge graph reasoning(KGR)methods have been proposed for interpretable knowledge graph **... 详细信息
来源: 评论