咨询与建议

限定检索结果

文献类型

  • 2,607 篇 期刊文献
  • 1,513 篇 会议
  • 3 册 图书

馆藏范围

  • 4,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,538 篇 工学
    • 1,667 篇 计算机科学与技术...
    • 1,364 篇 软件工程
    • 584 篇 信息与通信工程
    • 377 篇 生物工程
    • 336 篇 电气工程
    • 294 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 271 篇 控制科学与工程
    • 242 篇 光学工程
    • 185 篇 化学工程与技术
    • 136 篇 机械工程
    • 97 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 79 篇 核科学与技术
    • 75 篇 建筑学
    • 74 篇 材料科学与工程(可...
  • 1,786 篇 理学
    • 731 篇 数学
    • 690 篇 物理学
    • 471 篇 生物学
    • 288 篇 统计学(可授理学、...
    • 223 篇 化学
    • 118 篇 系统科学
  • 587 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 152 篇 工商管理
  • 300 篇 医学
    • 245 篇 临床医学
    • 177 篇 基础医学(可授医学...
    • 121 篇 药学(可授医学、理...
    • 91 篇 公共卫生与预防医...
  • 107 篇 法学
    • 86 篇 社会学
  • 80 篇 农学
  • 57 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 9 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 106 篇 deep learning
  • 104 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 training
  • 74 篇 hadrons
  • 73 篇 computational mo...
  • 70 篇 machine learning
  • 70 篇 data models
  • 62 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 49 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 data mining
  • 42 篇 graph neural net...
  • 41 篇 optimization
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 406 篇 van swinderen in...
  • 399 篇 iccub universita...
  • 399 篇 h.h. wills physi...
  • 395 篇 cavendish labora...
  • 395 篇 school of physic...
  • 383 篇 university of ch...
  • 379 篇 yandex school of...
  • 368 篇 department of ph...
  • 360 篇 imperial college...
  • 349 篇 stfc rutherford ...
  • 345 篇 center for high ...
  • 340 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 295 篇 physik-institut ...
  • 293 篇 school of physic...
  • 292 篇 oliver lodge lab...
  • 288 篇 school of physic...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 217 篇 bediaga i.
  • 216 篇 amato s.
  • 214 篇 boettcher t.
  • 212 篇 baryshnikov f.
  • 212 篇 braun s.
  • 209 篇 brundu d.
  • 207 篇 borisyak m.
  • 201 篇 bizzeti a.
  • 194 篇 bencivenni g.
  • 188 篇 back j.j.
  • 184 篇 bay a.
  • 174 篇 bjørn m.

语言

  • 3,467 篇 英文
  • 605 篇 其他
  • 64 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4123 条 记 录,以下是581-590 订阅
排序:
Interference Characterization and Mitigation for Multi-Beam ISAC Systems in Vehicular Networks
收藏 引用
IEEE Transactions on Wireless Communications 2024年 第10期23卷 14729-14742页
作者: Wang, Yi Zhang, Qixun Zhang, J. Andrew Wei, Zhiqing Feng, Zhiyong Peng, Jinlin The School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China University of Electronic Science and Technology of China Quzhou324003 China The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China The Global Big Data Technologies Centre University of Technology Sydney SydneyNSW2007 Australia The Artificial Intelligence Research Center National Innovation Institute of Defense Technology Beijing100071 China
— Millimeter-wave Integrated Sensing and Communications (ISAC) with multi-beam design holds significant promise for vehicular networks, offering multi-target omnidirectional sensing and high-capacity communication se... 详细信息
来源: 评论
An Iterative Thresholding Method for the Minimum Compliance Problem
收藏 引用
Communications in Computational Physics 2023年 第4期33卷 1189-1216页
作者: Luyu Cen Wei Hu Dong Wang Xiaoping Wang Department of Mathematics Hong Kong University of Science and TechnologyClear Water BayKowloonHong KongChina The Program in Applied and Computational Mathematics Princeton UniversityPrincetonNew JerseyUSA School of Science and Engineering The Chinese University of Hong KongShenzhenGuangdong 518172China Shenzhen International Center for Industrial and Applied Mathematics Shenzhen Research Institute of Big DataGuangdong 518172China
In this paper,we propose a simple energy decaying iterative thresholding algorithm to solve the two-phase minimum compliance *** material domain is implicitly represented by its characteristic function,and the problem... 详细信息
来源: 评论
A Clustering-Based Color Reordering Method for Reversible data Hiding in Palette Images
收藏 引用
IET Image Processing 2025年 第1期19卷
作者: Deng, Jianxuan Chen, Yi Wang, Hongxia Guo, Chun Cui, Yunhe Shen, Guowei State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Guizhou University Guiyang China School of Cyber Science and Engineering Sichuan University Chengdu China
A recent research work pointed out that the reversible data hiding algorithms proposed for gray-scale images can be implemented on the reconstructed palette images to improve embedding capacity and visual quality by r... 详细信息
来源: 评论
Multiscale and Auto-Tuned Semi-Supervised Deep Subspace Clustering and Its Application in Brain Tumor Clustering
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4741-4762页
作者: Zhenyu Qian Yizhang Jiang Zhou Hong Lijun Huang Fengda Li Khin Wee Lai Kaijian Xia School of Artificial Intelligence and Computer Science Jiangnan UniversityWuxi214122China Department of Medical Imaging The Changshu Affiliated Hospital of Soochow UniversitySuzhou215500China Department of Neurosurgery The Changshu Affiliated Hospital of Soochow UniversityChangshu215500China Department of Scientific Research The Changshu Affiliated Hospital of Soochow UniversitySuzhou215500China Changshu Key Laboratory of Medical Artificial Intelligence and Big Data Suzhou215500China Department of Biomedical Engineering Faculty of EngineeringUniversity of MalayaKuala Lumpur50603Malaysia
In this paper,we introduce a novel Multi-scale and Auto-tuned Semi-supervised Deep Subspace Clustering(MAS-DSC)algorithm,aimed at addressing the challenges of deep subspace clustering in high-dimensional real-world da... 详细信息
来源: 评论
Hierarchical Multiview Top-k Pooling with Deep-Q-Networks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2985-2996页
作者: Li, Zhi-Peng Su, Hai-Long Wu, Yong- Zhang, Qin-Hu Yuan, Chang-An Gribova, Valeriya Filaretov, Vladimir Fedorovich Huang, De-Shuang Eastern Institute of Technology Zhejiang Ningbo315201 China University of Science and Technology of China School of Life Sciences Anhui Hefei230026 China Tongji University Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Shanghai201804 China Guangxi Academy of Sciences Institute of Big Data and Intelligent Computing Research Center Nanning530007 China Far Eastern Branch of the Russian Academy of Sciences Institute of Automation and Control Processes Vladivostok690041 Russia
Graph neural networks (GNNs) are extensions of deep neural networks to graph-structured data. It has already attracted widespread attention for various tasks such as node classification and link prediction. Existing r... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Hyperbolic Geometric Latent Diffusion Model for Graph Generation  41
Hyperbolic Geometric Latent Diffusion Model for Graph Genera...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Privacy-aware data Fusion and Prediction for Smart City Services in Edge Computing Environment  15
Privacy-aware Data Fusion and Prediction for Smart City Serv...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Qi, Lianyong Chi, Xiaoxiao Zhou, Xiaokang Liu, Qi Dai, Fei Xu, Xiaolong Zhang, Xuyun School of Computer Science Qufu Normal University China Faculty of Data Science Shiga University Japan Riken Center for Advanced Intelligence Project Japan School of Computer and Software Nanjing University of Information Science and Technology China School of Big Data and Intelligence Engineering Southwest Forestry University China Department of Computing Macquarie University Australia
With fast development of Cyber Physical System, the variety and volume of data generated from different edge servers are fairly considerable. Mining and exploiting the data would definitely bring huge advantages. Howe... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论