咨询与建议

限定检索结果

文献类型

  • 12,729 篇 期刊文献
  • 10,665 篇 会议
  • 101 册 图书

馆藏范围

  • 23,494 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,827 篇 工学
    • 8,527 篇 计算机科学与技术...
    • 6,901 篇 软件工程
    • 3,047 篇 信息与通信工程
    • 2,330 篇 电子科学与技术(可...
    • 2,262 篇 电气工程
    • 1,966 篇 生物工程
    • 1,862 篇 光学工程
    • 1,780 篇 控制科学与工程
    • 1,690 篇 生物医学工程(可授...
    • 1,189 篇 化学工程与技术
    • 996 篇 机械工程
    • 898 篇 材料科学与工程(可...
    • 890 篇 仪器科学与技术
    • 687 篇 动力工程及工程热...
    • 431 篇 力学(可授工学、理...
    • 398 篇 土木工程
  • 10,274 篇 理学
    • 4,791 篇 物理学
    • 3,703 篇 数学
    • 2,360 篇 生物学
    • 1,399 篇 化学
    • 1,324 篇 统计学(可授理学、...
    • 681 篇 系统科学
  • 3,279 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,348 篇 图书情报与档案管...
    • 828 篇 工商管理
  • 1,744 篇 医学
    • 1,444 篇 临床医学
    • 1,189 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 517 篇 公共卫生与预防医...
  • 536 篇 法学
    • 420 篇 社会学
  • 353 篇 农学
  • 312 篇 经济学
  • 248 篇 教育学
  • 97 篇 文学
  • 56 篇 军事学
  • 35 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 475 篇 deep learning
  • 303 篇 machine learning
  • 292 篇 computer science
  • 281 篇 feature extracti...
  • 255 篇 training
  • 217 篇 image segmentati...
  • 209 篇 computational mo...
  • 196 篇 accuracy
  • 193 篇 semantics
  • 183 篇 optimization
  • 160 篇 data mining
  • 159 篇 neural networks
  • 151 篇 internet of thin...
  • 149 篇 reinforcement le...
  • 128 篇 support vector m...
  • 128 篇 magnetic resonan...
  • 127 篇 deep neural netw...
  • 124 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 218 篇 r. ströhmer
  • 216 篇 m. rijssenbeek
  • 212 篇 s. jin

语言

  • 21,656 篇 英文
  • 1,438 篇 其他
  • 384 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23495 条 记 录,以下是421-430 订阅
排序:
Distortion and Uncertainty Aware Loss for Panoramic Depth Completion  40
Distortion and Uncertainty Aware Loss for Panoramic Depth Co...
收藏 引用
40th International Conference on Machine Learning, ICML 2023
作者: Yan, Zhiqiang Li, Xiang Wang, Kun Chen, Shuo Li, Jun Yang, Jian PCALab School of Computer Science and Engineering Nanjing University of Science and Technology China RIKEN Center for Advanced Intelligence Project Japan
Standard MSE or MAE loss function is commonly used in limited field-of-vision depth completion, treating each pixel equally under a basic assumption that all pixels have same contribution during optimization. Recently... 详细信息
来源: 评论
SfPUEL: Shape from Polarization under Unknown Environment Light  38
SfPUEL: Shape from Polarization under Unknown Environment Li...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Lyu, Youwei Guo, Heng Zhang, Kailong Li, Si Shi, Boxin School of Artificial Intelligence Beijing University of Posts and Telecommunications China State Key Laboratory for Multimedia Information Processing School of Computer Science Peking University China National Engineering Research Center of Visual Technology School of Computer Science Peking University China
Shape from polarization (SfP) benefits from advancements like polarization cameras for single-shot normal estimation, but its performance heavily relies on light conditions. This paper proposes SfPUEL, an end-to-end S...
来源: 评论
VIPNet: Combining Viewpoint Information and Shape Priors for Instant Multi-view 3D Reconstruction  17th
VIPNet: Combining Viewpoint Information and Shape Priors fo...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: Ye, Weining Li, Zhixuan Jiang, Tingting School of Computer Science Peking University Beijing100871 China College of Computing and Data Science Nanyang Technological University Singapore Singapore National Engineering Research Center of Visual Technology National Key Laboratory for Multimedia Information Processing School of Computer Science National Biomedical Imaging Center Peking University Beijing100871 China
While the multi-view 3D reconstruction task has made significant progress, existing methods simply fuse multi-view image features without effectively leveraging available auxiliary information, especially the viewpoin... 详细信息
来源: 评论
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3515-3537页
作者: Iman Almomani Walid El-Shafai Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School of Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Applied CollegeImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Science Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a... 详细信息
来源: 评论
Visual-Language Collaborative Representation Network for Broad-Domain Few-Shot Image Classification  24
Visual-Language Collaborative Representation Network for Bro...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Guo, Qianyu Ren, Jieji Wang, Haofen Wu, Tianxing Ge, Weifeng Zhang, Wenqiang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University Shanghai China School of Mechanical Engineering Shanghai Jiao Tong University Shanghai China College of Design and Innovation Tongji University Shanghai China School of Computer Science and Engineering Southeast University Nanjing China School of Computer Science Fudan University Shanghai China Engineering Research Center of AI & Robotics Ministry of Education Academy for Engineering & Technology Fudan University Shanghai China
Visual-language models based on CLIP have shown remarkable abilities in general few-shot image classification. However, their performance drops in specialized fields such as healthcare or agriculture, because CLIP'... 详细信息
来源: 评论
A Deployment of Ensemble-Based IDS on Raspberry Pi  13
A Deployment of Ensemble-Based IDS on Raspberry Pi
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Musthafa, Muhammad Bisri Huda, Samsul Shamim, S.M. Kodera, Yuta Mwaura, Jedidah Araki, Shunsuke Nogami, Yasuyuki Okayama University Graduate School of Environmental Life Natural Science and Technology Japan Okayama University Green Innovation Center Japan Kyushu Institute of Technology Graduate School of Computer Science and Systems Engineering Fukuoka Japan Kyushu Institute of Technology Faculty of Computer Science and Systems Engineering Fukuoka Japan
Intrusion Detection Systems (IDS) are essential for safeguarding IoT networks against various attacks. Our previously developed ensemble-based IDS model, which combines stacked Long Short-Term Memory (LSTM) networks w... 详细信息
来源: 评论
Research on the Transient Potential Rise Characteristics of High - speed Railway Rail Lightning Strike and Its Impact on Trackside Signal Equipment  37
Research on the Transient Potential Rise Characteristics of ...
收藏 引用
37th International Conference on Lightning Protection, ICLP 2024
作者: Wang, Shulai Xiang, Nianwen Wang, Chaoqun Lyu, Zengwei Chen, Zhiwei School of Electrical Engineering and Automation Hefei University of Technology Hefei China Institute of Energy Hefei Comprehensive National Science Center Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Lightning strikes on the catenary will cause a sharp rise in rail potential, which directly threatens the safety of the signal equipment connected to the rail along the trackside. It is urgent to carry out research on... 详细信息
来源: 评论
Enhanced Experts with Uncertainty-Aware Routing for Multimodal Sentiment Analysis  24
Enhanced Experts with Uncertainty-Aware Routing for Multimod...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Gao, Zixian Hu, Disen Jiang, Xun Lu, Huimin Shen, Heng Tao Xu, Xing Center for Future Media School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Automation Southeast University Nanjing China College of Electronic and Information Engineering Tongji University Shanghai China
Multimodal sentiment analysis, which has garnered widespread attention in recent years, aims to predict human emotional states using multimodal data. Previous studies have primarily focused on enhancing multimodal fus... 详细信息
来源: 评论
Enhancing Banking Security: An Integrated Approach to IoT Threat Mitigation with Artificial Intelligence  5th
Enhancing Banking Security: An Integrated Approach to IoT Th...
收藏 引用
5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, ICMISC 2024
作者: Rhaif Alsahlanee, Abbas Thajeel Singh, Jagendra Garg, Neha Rajpoot, Abha Kiran Tiwari, Mohit Elangovan, Muniyandy Development and Continuous Education Center University of Thi-Qar Thi-Qar Iraq School of Computer Science Engineering and Technology Bennett University Greater Noida India School of Computer Science Engineering & Technology Bennett University Greater Noida India School of Computing Science and Engineering Galgotias University Greater Noida India Department of Computer Science and Engineering Bharati Vidyapeeth’s College of Engineering Delhi India Department of Biosciences Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India
This research presents a composite approach to bank security issues by integrating the Internet of Things (IoT) threat reduction and artificial intelligence (AI) into systems. In this research, machine learning (ML) t... 详细信息
来源: 评论
Identification of Ischemic Stroke Origin Using Machine Learning Techniques
Identification of Ischemic Stroke Origin Using Machine Learn...
收藏 引用
International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2022
作者: Prasad, Rajan Shukla, Praveen Kumar Artificial Intelligence Research Center Department of Computer Science and Engineering School of Engineering Babu Banarasi Das University Lucknow India
An ischemic stroke arises as a result of atherosclerosis. It promotes tissue and cholesterol accumulation in the vascular system. When a large amount of plaque collects in one region, it has the potential to reduce bl... 详细信息
来源: 评论