咨询与建议

限定检索结果

文献类型

  • 2,625 篇 期刊文献
  • 1,513 篇 会议
  • 3 册 图书

馆藏范围

  • 4,141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,537 篇 工学
    • 1,665 篇 计算机科学与技术...
    • 1,364 篇 软件工程
    • 584 篇 信息与通信工程
    • 377 篇 生物工程
    • 336 篇 电气工程
    • 294 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 272 篇 控制科学与工程
    • 242 篇 光学工程
    • 184 篇 化学工程与技术
    • 135 篇 机械工程
    • 98 篇 仪器科学与技术
    • 88 篇 动力工程及工程热...
    • 79 篇 核科学与技术
    • 73 篇 建筑学
    • 72 篇 材料科学与工程(可...
  • 1,786 篇 理学
    • 729 篇 数学
    • 689 篇 物理学
    • 472 篇 生物学
    • 286 篇 统计学(可授理学、...
    • 222 篇 化学
    • 118 篇 系统科学
  • 589 篇 管理学
    • 330 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 152 篇 工商管理
  • 304 篇 医学
    • 248 篇 临床医学
    • 179 篇 基础医学(可授医学...
    • 121 篇 药学(可授医学、理...
    • 91 篇 公共卫生与预防医...
  • 105 篇 法学
    • 84 篇 社会学
  • 80 篇 农学
  • 58 篇 经济学
  • 33 篇 教育学
  • 11 篇 艺术学
  • 9 篇 文学
  • 9 篇 军事学
  • 1 篇 历史学

主题

  • 106 篇 deep learning
  • 104 篇 semantics
  • 96 篇 feature extracti...
  • 94 篇 training
  • 74 篇 hadrons
  • 73 篇 computational mo...
  • 71 篇 machine learning
  • 70 篇 data models
  • 62 篇 accuracy
  • 53 篇 federated learni...
  • 50 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 data mining
  • 42 篇 graph neural net...
  • 41 篇 optimization
  • 39 篇 image segmentati...
  • 38 篇 bottom mesons
  • 37 篇 convolution
  • 35 篇 task analysis

机构

  • 426 篇 department of ph...
  • 412 篇 horia hulubei na...
  • 406 篇 van swinderen in...
  • 400 篇 iccub universita...
  • 399 篇 h.h. wills physi...
  • 393 篇 school of physic...
  • 390 篇 cavendish labora...
  • 379 篇 yandex school of...
  • 379 篇 university of ch...
  • 366 篇 department of ph...
  • 356 篇 imperial college...
  • 345 篇 stfc rutherford ...
  • 342 篇 center for high ...
  • 337 篇 institute of par...
  • 314 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 292 篇 physik-institut ...
  • 291 篇 school of physic...
  • 291 篇 oliver lodge lab...
  • 287 篇 school of physic...

作者

  • 251 篇 barter w.
  • 248 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 223 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 217 篇 bediaga i.
  • 216 篇 amato s.
  • 214 篇 boettcher t.
  • 212 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 209 篇 braun s.
  • 206 篇 borisyak m.
  • 200 篇 bizzeti a.
  • 191 篇 bencivenni g.
  • 185 篇 back j.j.
  • 182 篇 bay a.
  • 174 篇 bjørn m.

语言

  • 3,484 篇 英文
  • 605 篇 其他
  • 65 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Engineering and Big Data Research Center"
4141 条 记 录,以下是691-700 订阅
排序:
Robust Federated Learning in Unreliable Wireless Networks: A Client Selection Approach
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yanmeng Ji, Wenkai Zhou, Jian Xiao, Fu Chang, Tsung-Hui School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Science and Engineering The Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China
Federated learning (FL) has emerged as a promising distributed learning paradigm for training deep neural networks (DNNs) at the wireless edge, but its performance can be severely hindered by unreliable wireless trans... 详细信息
来源: 评论
Hard-Label Black-Box Attacks on 3D Point Clouds
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Daizong Tao, Yunbo Zhou, Pan Hu, Wei Wangxuan Institute of Computer Technology Peking University No. 128 Zhongguancun North Street Beijing China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
With the maturity of depth sensors in various 3D safety-critical applications, 3D point cloud models have been shown to be vulnerable to adversarial attacks. Almost all existing 3D attackers simply follow the white-bo... 详细信息
来源: 评论
Lightweight Transformer Network and Self-supervised Task for Kinship Verification  8
Lightweight Transformer Network and Self-supervised Task for...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Zhu, Xiaoke Li, Yunwei Li, Danyang Dong, Lingyun Chen, Xiaopan School of Computer and Information Engineering Henan University Kaifeng China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University China
Kinship verification is one of the interesting and critical problems in computer vision research, with significant progress in the past decades. Meanwhile, Vision Transformer (VIT) has recently achieved impressive suc... 详细信息
来源: 评论
Semi-supervised Segmentation and Quantization Algorithm for Infarct Size Measurement of Rat Heart Sections  8
Semi-supervised Segmentation and Quantization Algorithm for ...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Zhu, Xiaoke Cai, Yulong Chen, Xiaopan Hu, Qi Dong, Lingyun Yuan, Caihong School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University China
Segmentation of rat heart section images and infarct area quantization are essential components of infarct size measurement in processing data from animal experiments on ischemic heart disease. Previously, the task of... 详细信息
来源: 评论
How graph neural networks learn: lessons from training dynamics  24
How graph neural networks learn: lessons from training dynam...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Chenxiao Yang Qitian Wu David Wipf Ruoyu Sun Junchi Yan School of Artificial Intelligence & Department of Computer Science and Engineering & MoE Lab of AI Shanghai Jiao Tong University Amazon Web Services School of Data Science The Chinese University of Hong Kong Shenzhen and Shenzhen International Center for Industrial and Applied Mathematics Shenzhen Research Institute of Big Data
A long-standing goal in deep learning has been to characterize the learning behavior of black-box models in a more interpretable manner. For graph neural networks (GNNs), considerable advances have been made in formal...
来源: 评论
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device Identification
ENSIOT: A Stacking Ensemble Learning Approach for IoT Device...
收藏 引用
International Workshop on Quality of Service
作者: Kangli Niu Shenghao Liu Lingzhi Yi Xianjun Deng Suning Chen Laurence T. Yang Minmin Cheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Safety Engineering Zhongnan University of Economics and Law
In order to resist network attacks on IoT devices, identifying IoT devices is the first step for ensuring device security. The traditional passive method identifies IoT devices by mining the potential relationship bet... 详细信息
来源: 评论
Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
收藏 引用
Frontiers of Information Technology & Electronic engineering 2024年 第10期25卷 1353-1369页
作者: Yongning GUO Guodong SU Zhiqiang YAO Wang ZHOU School of Big Data and Artificial Intlligence Fujian Polytechnic Normal UniversityFuzhou 350300China College of Mathematics and Informatics Fujian Normal UniversityFuzhou 350117China Engineering Research Center for ICH Digitalization and Multi-Source Information Fusion(Fujian Polytechnic Normal University) FujianProvinceUniversityFuzhou350300China School of Computer and Sofiware Engineering Xihua UniversityChengdu 610039China
Joint Photographic Experts Group(JPEG)format is extensively used for images in many practical applications due to its excellent compression ratio and satisfactory image *** compelling concerns about the invasion of pr... 详细信息
来源: 评论
Task Separation and Knowledge Sharing for Class Incremental Learning
Task Separation and Knowledge Sharing for Class Incremental ...
收藏 引用
Intelligent Computing and Human-computer Interaction (ICHCI), International Conference on
作者: Jiali Zhang Xiaoyan Qiao Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Immersion Technology and Evaluation Shandong Engineering Research Center School of Computer Science and Technology Shandong Technology and Business University Yantai Shandong China Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Immersion Technology and Evaluation Shandong Engineering Research Center School of Mathematics and Information Science Shandong Technology and Business University Yantai Shandong China
Methods based on dynamically expanding architectures can effectively mitigate catastrophic forgetting in class incremental learning (CIL), but they often overlook information sharing and integration between subnetwork... 详细信息
来源: 评论
ExPO: Explainable Phonetic Trait-Oriented Network for Speaker Verification
arXiv
收藏 引用
arXiv 2025年
作者: Ma, Yi Wang, Shuai Liu, Tianchi Li, Haizhou The Department of Electrical and Computer Engineering National University of Singapore 119077 Singapore The Institute for Infocomm Research A*STAR 138632 Singapore Shenzhen Research Institute of Big data School of Data Science The Chinese University of Hong Kong Shenzhen518172 China
In speaker verification, we use computational method to verify if an utterance matches the identity of an enrolled speaker. This task is similar to the manual task of forensic voice comparison, where linguistic analys... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论