咨询与建议

限定检索结果

文献类型

  • 13,237 篇 会议
  • 9,317 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 22,703 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,280 篇 工学
    • 10,943 篇 计算机科学与技术...
    • 9,079 篇 软件工程
    • 3,264 篇 信息与通信工程
    • 2,492 篇 控制科学与工程
    • 2,131 篇 生物工程
    • 1,820 篇 电气工程
    • 1,550 篇 生物医学工程(可授...
    • 1,477 篇 光学工程
    • 1,114 篇 电子科学与技术(可...
    • 988 篇 机械工程
    • 713 篇 化学工程与技术
    • 701 篇 网络空间安全
    • 625 篇 仪器科学与技术
    • 600 篇 交通运输工程
    • 559 篇 安全科学与工程
    • 480 篇 动力工程及工程热...
  • 7,594 篇 理学
    • 3,785 篇 数学
    • 2,439 篇 生物学
    • 1,890 篇 物理学
    • 1,424 篇 统计学(可授理学、...
    • 909 篇 化学
    • 584 篇 系统科学
  • 4,221 篇 管理学
    • 2,489 篇 管理科学与工程(可...
    • 1,977 篇 图书情报与档案管...
    • 998 篇 工商管理
  • 1,514 篇 医学
    • 1,244 篇 临床医学
    • 1,061 篇 基础医学(可授医学...
    • 676 篇 公共卫生与预防医...
    • 627 篇 药学(可授医学、理...
  • 690 篇 法学
    • 604 篇 社会学
  • 398 篇 经济学
  • 344 篇 农学
  • 303 篇 教育学
  • 97 篇 文学
  • 34 篇 军事学
  • 26 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 1,029 篇 accuracy
  • 1,023 篇 deep learning
  • 729 篇 feature extracti...
  • 707 篇 training
  • 532 篇 machine learning
  • 493 篇 computational mo...
  • 466 篇 convolutional ne...
  • 396 篇 semantics
  • 395 篇 data models
  • 386 篇 predictive model...
  • 347 篇 real-time system...
  • 321 篇 internet of thin...
  • 310 篇 artificial intel...
  • 300 篇 optimization
  • 290 篇 neural networks
  • 275 篇 reinforcement le...
  • 269 篇 image segmentati...
  • 265 篇 support vector m...
  • 264 篇 object detection
  • 219 篇 contrastive lear...

机构

  • 264 篇 school of artifi...
  • 261 篇 chitkara univers...
  • 258 篇 school of comput...
  • 237 篇 school of comput...
  • 235 篇 school of artifi...
  • 233 篇 school of artifi...
  • 205 篇 school of comput...
  • 196 篇 institute of art...
  • 179 篇 school of comput...
  • 154 篇 school of comput...
  • 138 篇 school of artifi...
  • 114 篇 university of sc...
  • 107 篇 school of comput...
  • 103 篇 gaoling school o...
  • 101 篇 school of comput...
  • 96 篇 school of artifi...
  • 95 篇 shanghai artific...
  • 94 篇 school of comput...
  • 86 篇 the islamic univ...
  • 85 篇 college of compu...

作者

  • 70 篇 niyato dusit
  • 67 篇 liu yang
  • 67 篇 sunil g.
  • 55 篇 li chenglong
  • 54 篇 zhang min
  • 53 篇 deepak banerjee
  • 46 篇 zheng wei-shi
  • 46 篇 wang xiao
  • 44 篇 banerjee deepak
  • 40 篇 liu jun
  • 40 篇 yang yang
  • 39 篇 zhou jie
  • 39 篇 li yang
  • 36 篇 li xin
  • 32 篇 golland polina
  • 32 篇 wen ji-rong
  • 31 篇 sharma neha
  • 30 篇 chang yi
  • 30 篇 li zhenghua
  • 30 篇 liu xin

语言

  • 15,311 篇 英文
  • 7,267 篇 其他
  • 226 篇 中文
  • 5 篇 德文
  • 5 篇 日文
  • 5 篇 斯洛文尼亚文
  • 4 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=School of Artificial Intelligence and Data Science and School of Computer Science and Technology"
22703 条 记 录,以下是611-620 订阅
排序:
VRMDA: Verifiable and Robust Multi-subset data Aggregation Scheme in IoT
VRMDA: Verifiable and Robust Multi-subset Data Aggregation ...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Li, Jianying Zhou, Shuo Liu, Yining School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China School of Data Science and Artificial Intelligence Wenzhou University of Technology Zhejiang Wenzhou325035 China
data aggregation masks individual entries by summing values, thus preventing the disclosure of private information. Multi-subset data aggregation divides subsets according to the range of data and collects the aggrega... 详细信息
来源: 评论
UAV-YOLOv5: A Swin-Transformer-Enabled Small Object Detection Model for Long-Range UAV Images
收藏 引用
Annals of data science 2024年 第4期11卷 1109-1138页
作者: Li, Jun Xie, Chong Wu, Sizheng Ren, Yawei Artificial Intelligence Security Innovation Team Beijing Information Science and Technology University Beijing100192 China School of Information Management Beijing Information Science and Technology University Beijing100192 China
This paper tackle the challenges associated with low recognition accuracy and the detection of occlusions when identifying long-range and diminutive targets (such as UAVs). We introduce a sophisticated detection frame... 详细信息
来源: 评论
Internet of Medical Things: A Revolution in Healthcare for Enhancing Cardiac Monitoring and Patient-Care Through Wearables  3
Internet of Medical Things: A Revolution in Healthcare for E...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Chhoton, Amit Chakraborty Sharma, Arvind K. Yogananda School of Artificial Intelligence Computers and Data Science Shoolini University Himachal Pradesh India Daffodil International University Department of Computer Science Dhaka Bangladesh
Wearables play an important role in parallel with IoT towards the era of healthcare and it has to be designed effectively providing workable solutions for all areas of other medical scopes. The fundamental objective o... 详细信息
来源: 评论
An improved method for small object detection in aerial images based on YOLOv8
An improved method for small object detection in aerial imag...
收藏 引用
2024 International Conference on computer Graphics, artificial intelligence, and data Processing, ICCAID 2024
作者: Ma, Liting Zhao, Junzhe Hsiang, Han-Cheng School of Data and Computer Science Xiamen Institute of Technology Xiamen China
In recent years, detecting objects in aerial images has emerged as a crucial area of study within the domain of computer vision. However, due to obstacles like the limited size of objects, dense distributions, and cla... 详细信息
来源: 评论
DCHM: Dynamic Collaboration of Heterogeneous Models Through Isomerism Learning in a Blockchain-Powered Federated Learning Framework  39
DCHM: Dynamic Collaboration of Heterogeneous Models Through ...
收藏 引用
39th Annual AAAI Conference on artificial intelligence, AAAI 2025
作者: Hao, Zhihao Zhang, Bob Li, Haisheng School of Computer Science and Artificial Intelligence Beijing Key Laboratory of Commercial Data Security Protection and Intelligent Governance Beijing Technology and Business University Beijing China Department of Computer and Information Science Faculty of Science and Technology University of Macau Taipa China Centre for Artificial Intelligence and Robotics Institute of Collaborative Innovation University of Macau Taipa China
Solutions to time-varying problems are crucial for research areas such as predicting changes in human body shape over time. While recurrent neural networks have made significant advancements in this field, their relia... 详细信息
来源: 评论
Lingual-Fusion Adapter-Based Transfer Learning for Low-Resource Code Vulnerability Detection
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1008-1023页
作者: Long, Xinyue Guo, Shikai Chai, Yu Li, Hui Jan, Sumaira Ameer Ma, Qian Ning, Qiao Dalian Maritime University School of Informafion Science and Technology Dalian China Key Laboratory of Artificial Intelligence of Dalian Dalian China Shanghai Jiao Tong University Shanghai China Dalian Maritime University School of Information and Science Technology Dalian China
Software vulnerabilities pose significant security threats to modern systems, particularly those involving complex execution sequences and intricate call relationships across multiple execution *** instance, in a scen... 详细信息
来源: 评论
KSGTN-DDI: Key Substructure-aware Graph Transformer Network for Drug-drug Interaction Prediction
KSGTN-DDI: Key Substructure-aware Graph Transformer Network ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhang, Peiliang Liu, Yuanjie Shen, Zhishu Wuhan University of Technology School of Computer Science and Artificial Intelligence Wuhan430070 China
Drug substructure plays a crucial role in predicting drug-drug interaction (DDI) with combination drugs for disease therapies. In order to exploit the effect of drug substructure on DDI prediction, we propose a Key Su... 详细信息
来源: 评论
Badminton Action Recognition based on Improved I3D Convolutional Neural Network  3
Badminton Action Recognition based on Improved I3D Convoluti...
收藏 引用
3rd International Conference on artificial intelligence, Automation, and High-Performance Computing, AIAHPC 2023
作者: Zheng, Huangnan Shen, Huichang Zhang, Yisong Wang, Haotian School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China
In order to solve the issue of inaccurate recognition of time series of badminton action by 2D networks and the high cost of using skeleton data for badminton action recognition, this article aims to explore the use o... 详细信息
来源: 评论
Visible and near-infrared image fusion based on information complementarity
收藏 引用
CAAI Transactions on intelligence technology 2025年 第1期10卷 193-206页
作者: Zhuo Li Shiliang Pu Mengqi Ji Feng Zeng Bo Li The School of Computer Science and Engineering Beihang UniversityBeijingChina Hangzhou Hikvision Digital Technology Co. Ltd.HangzhouChina The School of Artificial Intelligence Beihang UniversityBeijingChina Hangzhou International Innovation Institute Beihang UniversityHangzhouChina
Images with complementary spectral information can be recorded using image sensors that can identify visible and near-infrared *** fusion of visible and nearinfrared(NIR)aims to enhance the quality of images acquired ... 详细信息
来源: 评论
Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy  7
Inconsistency Detecting and Resolving for Security Policy an...
收藏 引用
7th International Conference on computer science and artificial intelligence, CSAI 2023
作者: Yin, Yi Tateiwa, Yuichiro Qian, Xiaojun Gao, Qian Shen, Lingling Zhang, Guoqiang School of Computer and Electronic Information School of Artificial Intelligence Nanjing Normal University Nanjing China Department of Computer Science and Engineering Nagoya Institute of Technology Nagoya Japan School of Information and Technology School of Computer Science and Technology School of Artificial Intelligence Hainan Normal University Hainan China
Firewall is the first defense line for network security. Packet filtering is a basic function in firewall, it filter network packets according to a series of rules, which is called firewall policy. The design of firew... 详细信息
来源: 评论