咨询与建议

限定检索结果

文献类型

  • 10,253 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,673 篇 工学
    • 8,341 篇 计算机科学与技术...
    • 6,834 篇 软件工程
    • 2,207 篇 信息与通信工程
    • 1,368 篇 控制科学与工程
    • 1,127 篇 生物工程
    • 877 篇 电气工程
    • 736 篇 机械工程
    • 659 篇 电子科学与技术(可...
    • 606 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 276 篇 建筑学
  • 4,828 篇 理学
    • 2,816 篇 数学
    • 1,236 篇 生物学
    • 956 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,067 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,332 篇 图书情报与档案管...
    • 750 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 443 篇 法学
    • 330 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 624 篇 computer science
  • 481 篇 software enginee...
  • 337 篇 semantics
  • 318 篇 computational mo...
  • 315 篇 feature extracti...
  • 306 篇 deep learning
  • 272 篇 training
  • 224 篇 data mining
  • 218 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 157 篇 computer archite...
  • 156 篇 machine learning
  • 155 篇 internet of thin...
  • 142 篇 authentication
  • 137 篇 servers
  • 136 篇 convolution

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 264 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 187 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 106 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,189 篇 英文
  • 978 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16424 条 记 录,以下是4691-4700 订阅
排序:
Attribute-Specific Manipulation Based on Layer-Wise Channels
arXiv
收藏 引用
arXiv 2023年
作者: Yan, Yuanjie Zhao, Jian Shen, Furao State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Electronic Science and Engineering Nanjing University Nanjing China School of Artificial Intelligence Nanjing University Nanjing China
Image manipulation on the latent space of the pre-trained StyleGAN can control the semantic attributes of the generated images. Recently, some studies have focused on detecting channels with specific properties to dir... 详细信息
来源: 评论
PVBF: A Framework for Mitigating Parameter Variation Imbalance in Online Continual Learning
arXiv
收藏 引用
arXiv 2025年
作者: Tao, Zelin Deng, Hao Liu, Mingqing Zhang, Lijun Zhao, Shengjie School of Computer Science and Technology Tongji University Shanghai201804 China College of Electronic and Information Engineering Tongji University Shanghai201804 China National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of Education Shanghai201804 China
Online continual learning (OCL), which enables AI systems to adaptively learn from non-stationary data streams, is commonly achieved using experience replay (ER)-based methods that retain knowledge by replaying stored... 详细信息
来源: 评论
Web3 Challenges and Opportunities for the Market
arXiv
收藏 引用
arXiv 2022年
作者: Sheridan, Dan Harris, James Wear, Frank Cowell, Jerry Wong, Easton Yazdinejad, Abbas College of Computing and Software Engineering Kennesaw State University GA United States Cyber Science Lab School of Computer Science University of Guelph ON Canada
The inability of a computer to think has been a limiter in its usefulness and a point of reassurance for humanity since the first computers were created. The semantic web is the first step toward removing that barrier... 详细信息
来源: 评论
A Novel Structural Multiple Birth Support Vector Machine for Pattern Recognition  20
A Novel Structural Multiple Birth Support Vector Machine for...
收藏 引用
4th International Conference on computer science and Application engineering, CSAE 2020
作者: Ai, Qing Kang, Yude Zhang, Wenyu Zhao, Ji School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan Liaoning China
Multiple Birth Support Vector Machine (MBSVM) is widely used in various engineering fields due to its fast learning efficiency. However, MBSVM does not consider the prior structure information of samples when construc... 详细信息
来源: 评论
Three-Dimensional Packing Algorithm of Single Container Based on Genetic Algorithm  14th
Three-Dimensional Packing Algorithm of Single Container Base...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Jia, Shuting Wang, Li School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
In this paper, a mathematical model is established for the three-dimensional packing problem. This model is a multi-objective optimization problem which considers two factors: volume utilization ratio and load utiliza... 详细信息
来源: 评论
Characterization of overfitting in robust multiclass classification  23
Characterization of overfitting in robust multiclass classif...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Jingyuan Xu Weiwei Liu School of Computer Science Wuhan University and National Engineering Research Center for Multimedia Software Wuhan University and Institute of Artificial Intelligence Wuhan University and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
This paper considers the following question: Given the number of classes m, the number of robust accuracy queries k, and the number of test examples in the dataset n, how much can adaptive algorithms robustly overfit ...
来源: 评论
A theory of transfer-based black-box attacks: explanation and implications  23
A theory of transfer-based black-box attacks: explanation an...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Yanbo Chen Weiwei Liu School of Computer Science Wuhan University and National Engineering Research Center for Multimedia Software Wuhan University and Institute of Artificial Intelligence Wuhan University and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Transfer-based attacks [1] are a practical method of black-box adversarial attacks in which the attacker aims to craft adversarial examples from a source model that is transferable to the target model. Many empirical ...
来源: 评论
A Light Gradient Residual Encoder-Decoder Network for Multimodal Image Fusion
A Light Gradient Residual Encoder-Decoder Network for Multim...
收藏 引用
Intelligent Computing, Communication, Networking and Services (ICCNS), International Conference on
作者: Muhammad Ishfaq Hussain Zubia Naz Linh Van Ma Jeonghwan Gwak Moongu Jeon School of Electrical Engineering and Computer Sciene Gwangju Institute of Science and Technology (GIST) South Korea Large-scale AI Research Group Korea Institute of Science and Technology Information (KISTI) South Korea Department of Software Korea National University of Transportation South Korea
Image fusion combines the complementary traits of source images into a single output, enhancing both human visual observation and machine vision perception. The existing fusion algorithms typically prioritize visual e... 详细信息
来源: 评论
Heterogeneous Kernel Based Convolutional Neural Network for Face Liveness Detection  14th
Heterogeneous Kernel Based Convolutional Neural Network for ...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Lu, Xin Tian, Ying School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Liveness detection is a part of living biometric identification. While the face recognition system is promoted, it is also vulnerable to deceived and attacked from fake faces. Face liveness detection in traditional me... 详细信息
来源: 评论
A Two-stage Anomaly Detection System for Fog Computing Services  5
A Two-stage Anomaly Detection System for Fog Computing Servi...
收藏 引用
5th IEEE International Conference on Electro-Computing Technologies for Humanity, NIGERCON 2024
作者: Ogundoyin, Sunday Oyinlola Adeniyi Kamil, Ismaila Ojedokun, Isaac Adewale Babalola, John Oluwaseun Nyangaresi, Vincent Omollo Bowen University Electrical and Electronic Engineering Programme Iwo Nigeria University of Ibadan Department of Electrical and Electronic Engineering Ibadan Nigeria Jaramogi Oginga Odinga University of Science and Technology Department of Computer Science and Software Engineering Bando40601 Kenya Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Applied Electronics Chennai602105 India
Fog computing enhances traditional cloud computing by bringing resources closer to edge devices, enabling faster response times and supporting mission-critical applications. However, its distributed nature makes it vu... 详细信息
来源: 评论