咨询与建议

限定检索结果

文献类型

  • 10,211 篇 会议
  • 5,995 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,620 篇 工学
    • 8,292 篇 计算机科学与技术...
    • 6,862 篇 软件工程
    • 2,190 篇 信息与通信工程
    • 1,299 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 870 篇 电气工程
    • 732 篇 机械工程
    • 651 篇 电子科学与技术(可...
    • 610 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 390 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 353 篇 安全科学与工程
    • 320 篇 动力工程及工程热...
    • 319 篇 交通运输工程
    • 301 篇 网络空间安全
    • 280 篇 建筑学
  • 4,824 篇 理学
    • 2,815 篇 数学
    • 1,233 篇 生物学
    • 957 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,075 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,338 篇 图书情报与档案管...
    • 755 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 443 篇 法学
    • 331 篇 社会学
  • 279 篇 经济学
    • 278 篇 应用经济学
  • 240 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 341 篇 semantics
  • 320 篇 computational mo...
  • 319 篇 feature extracti...
  • 302 篇 deep learning
  • 265 篇 training
  • 225 篇 data mining
  • 215 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 153 篇 internet of thin...
  • 143 篇 authentication
  • 135 篇 convolution
  • 135 篇 quality of servi...

机构

  • 427 篇 college of compu...
  • 358 篇 school of comput...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 189 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 110 篇 school of comput...
  • 107 篇 school of softwa...
  • 101 篇 school of softwa...
  • 101 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of comput...
  • 93 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 liu yang
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 29 篇 bo du
  • 28 篇 niyato dusit
  • 28 篇 shen furao
  • 28 篇 wang wei

语言

  • 15,204 篇 英文
  • 888 篇 其他
  • 272 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16347 条 记 录,以下是4681-4690 订阅
排序:
A Novel Structural Multiple Birth Support Vector Machine for Pattern Recognition  20
A Novel Structural Multiple Birth Support Vector Machine for...
收藏 引用
4th International Conference on computer science and Application engineering, CSAE 2020
作者: Ai, Qing Kang, Yude Zhang, Wenyu Zhao, Ji School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan Liaoning China
Multiple Birth Support Vector Machine (MBSVM) is widely used in various engineering fields due to its fast learning efficiency. However, MBSVM does not consider the prior structure information of samples when construc... 详细信息
来源: 评论
Characterization of overfitting in robust multiclass classification  23
Characterization of overfitting in robust multiclass classif...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Jingyuan Xu Weiwei Liu School of Computer Science Wuhan University and National Engineering Research Center for Multimedia Software Wuhan University and Institute of Artificial Intelligence Wuhan University and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
This paper considers the following question: Given the number of classes m, the number of robust accuracy queries k, and the number of test examples in the dataset n, how much can adaptive algorithms robustly overfit ...
来源: 评论
A theory of transfer-based black-box attacks: explanation and implications  23
A theory of transfer-based black-box attacks: explanation an...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Yanbo Chen Weiwei Liu School of Computer Science Wuhan University and National Engineering Research Center for Multimedia Software Wuhan University and Institute of Artificial Intelligence Wuhan University and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Transfer-based attacks [1] are a practical method of black-box adversarial attacks in which the attacker aims to craft adversarial examples from a source model that is transferable to the target model. Many empirical ...
来源: 评论
Three-Dimensional Packing Algorithm of Single Container Based on Genetic Algorithm  14th
Three-Dimensional Packing Algorithm of Single Container Base...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Jia, Shuting Wang, Li School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
In this paper, a mathematical model is established for the three-dimensional packing problem. This model is a multi-objective optimization problem which considers two factors: volume utilization ratio and load utiliza... 详细信息
来源: 评论
Heterogeneous Kernel Based Convolutional Neural Network for Face Liveness Detection  14th
Heterogeneous Kernel Based Convolutional Neural Network for ...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Lu, Xin Tian, Ying School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Liveness detection is a part of living biometric identification. While the face recognition system is promoted, it is also vulnerable to deceived and attacked from fake faces. Face liveness detection in traditional me... 详细信息
来源: 评论
A Light Gradient Residual Encoder-Decoder Network for Multimodal Image Fusion
A Light Gradient Residual Encoder-Decoder Network for Multim...
收藏 引用
Intelligent Computing, Communication, Networking and Services (ICCNS), International Conference on
作者: Muhammad Ishfaq Hussain Zubia Naz Linh Van Ma Jeonghwan Gwak Moongu Jeon School of Electrical Engineering and Computer Sciene Gwangju Institute of Science and Technology (GIST) South Korea Large-scale AI Research Group Korea Institute of Science and Technology Information (KISTI) South Korea Department of Software Korea National University of Transportation South Korea
Image fusion combines the complementary traits of source images into a single output, enhancing both human visual observation and machine vision perception. The existing fusion algorithms typically prioritize visual e... 详细信息
来源: 评论
Taxonomy of Aging-related Bugs in Deep Learning Libraries
Taxonomy of Aging-related Bugs in Deep Learning Libraries
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: Zhihao Liu Yang Zheng Xiaoting Du Zheng Hu Wenjie Ding Yanming Miao Zheng Zheng School of Automation Science and Electrical Engineering Beihang University Beijing China School of Computer Science (National Pilot Software Engineering School)Beijing University of Posts and Telecommunications Beijing China TTE lab Huawei Shenzhen China Central Software Institute Huawei Shenzhen China
Deep learning libraries are the cornerstone of deep learning systems, and millions of deep learning applications are built on top of deep learning libraries. Due to long-term continuous running, many numerical operati... 详细信息
来源: 评论
Adversarial self-training improves robustness and generalization for gradual domain adaptation  23
Adversarial self-training improves robustness and generaliza...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Lianghe Shi Weiwei Liu School of Computer Science Wuhan University and National Engineering Research Center for Multimedia Software Wuhan University and Institute of Artificial Intelligence Wuhan University and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Gradual Domain Adaptation (GDA), in which the learner is provided with additional intermediate domains, has been theoretically and empirically studied in many contexts. Despite its vital role in security-critical scen...
来源: 评论
Ear Recognition Based on Gabor-SIFT  6th
Ear Recognition Based on Gabor-SIFT
收藏 引用
6th International Conference on Artificial Intelligence and Security, ICAIS 2020
作者: Tian, Ying Dong, Huiwen Wang, Libing School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Scale invariant feature transform is a local point features extraction method. It can find those feature vectors in different scale space which are invariant for scale changes and rotations, and are flexible for illum... 详细信息
来源: 评论
Unsupervised Domain Adaptation with Implicit Pseudo Supervision for Semantic Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Wanyu Wang, Zengmao Bian, Wei The School of Computer Science Wuhan University Institute of Artificial Intelligence Wuhan University National Engineering Research Center for Multimedia Software Wuhan University Wuhan430072 China The School of Computer Science UTS Australia
Pseudo-labelling is a popular technique in unsupervised domain adaptation for semantic segmentation. However, pseudo labels are noisy and inevitably have confirmation bias due to the discrepancy between source and tar... 详细信息
来源: 评论