咨询与建议

限定检索结果

文献类型

  • 2,235 篇 期刊文献
  • 1,890 篇 会议
  • 73 册 图书

馆藏范围

  • 4,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,436 篇 工学
    • 1,695 篇 计算机科学与技术...
    • 1,428 篇 软件工程
    • 509 篇 信息与通信工程
    • 339 篇 生物工程
    • 301 篇 电气工程
    • 291 篇 控制科学与工程
    • 277 篇 生物医学工程(可授...
    • 218 篇 光学工程
    • 188 篇 电子科学与技术(可...
    • 155 篇 机械工程
    • 144 篇 核科学与技术
    • 125 篇 化学工程与技术
    • 114 篇 仪器科学与技术
    • 87 篇 动力工程及工程热...
    • 78 篇 安全科学与工程
    • 73 篇 交通运输工程
  • 1,732 篇 理学
    • 787 篇 物理学
    • 634 篇 数学
    • 399 篇 生物学
    • 211 篇 统计学(可授理学、...
    • 139 篇 化学
    • 122 篇 系统科学
  • 594 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 265 篇 图书情报与档案管...
    • 161 篇 工商管理
  • 308 篇 医学
    • 252 篇 临床医学
    • 233 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
    • 110 篇 公共卫生与预防医...
  • 134 篇 法学
    • 97 篇 社会学
  • 61 篇 经济学
  • 47 篇 农学
  • 45 篇 教育学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 6 篇 文学
  • 2 篇 哲学

主题

  • 95 篇 machine learning
  • 89 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 deep learning
  • 69 篇 hadron colliders
  • 69 篇 accuracy
  • 68 篇 training
  • 61 篇 higgs bosons
  • 54 篇 computational mo...
  • 53 篇 security
  • 51 篇 data models
  • 49 篇 internet of thin...
  • 48 篇 predictive model...
  • 47 篇 proton-proton in...
  • 46 篇 computer science
  • 44 篇 semantics
  • 41 篇 real-time system...
  • 40 篇 optimization
  • 39 篇 blockchain
  • 37 篇 informatics

机构

  • 414 篇 department for p...
  • 409 篇 faculty of scien...
  • 405 篇 kirchhoff-instit...
  • 398 篇 department of ph...
  • 388 篇 department of ph...
  • 386 篇 institute of phy...
  • 385 篇 department of ph...
  • 373 篇 institute of phy...
  • 369 篇 fakultät für phy...
  • 340 篇 instituto de fís...
  • 306 篇 department of ph...
  • 289 篇 graduate school ...
  • 285 篇 department of ph...
  • 279 篇 dipartimento di ...
  • 277 篇 department of ph...
  • 275 篇 universidade fed...
  • 272 篇 nikhef national ...
  • 270 篇 ictp trieste
  • 262 篇 department of ph...
  • 255 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 336 篇 g. bella
  • 336 篇 d. calvet
  • 336 篇 c. amelung
  • 334 篇 j. m. izen
  • 334 篇 j. strandberg
  • 334 篇 g. spigo
  • 333 篇 f. siegert
  • 321 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 319 篇 s. mohapatra
  • 311 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 306 篇 y. tayalati
  • 304 篇 j. schaarschmidt
  • 298 篇 a. d. pilkington
  • 290 篇 m. klein
  • 288 篇 l. chevalier

语言

  • 4,005 篇 英文
  • 162 篇 其他
  • 32 篇 中文
  • 5 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=School of Computer Science and Informatics Cyber Technology Institute"
4198 条 记 录,以下是81-90 订阅
排序:
Hybrid Emotion Recognition: Enhancing Customer Interactions Through Acoustic and Textual Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Wewelwala, Sahan Hewage Sumanathilaka, T.G.D.K. School of Computing Informatics Institute of Technology 06 Colombo Sri Lanka Department of Computer Science Swansea University Wales Swansea United Kingdom
This research presents a hybrid emotion recognition system integrating advanced Deep Learning, Natural Language Processing (NLP), and Large Language Models (LLMs) to analyze audio and textual data for enhancing custom... 详细信息
来源: 评论
Computational imaging based on single-photon detection: a survey
收藏 引用
Artificial Intelligence Review 2025年 第8期58卷 1-54页
作者: Pu, Yanyun Zhu, Chengyuan Yao, Gongxin Li, Chao Pan, Yu Yang, Kaixiang Yang, Qinmin State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Institute of Cyber-Systems and Control College of Control Science and Engineering Zhejiang University Hangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China
The rapid advancements in single-photon detectors with picosecond timing resolution over the past decade have significantly driven the development of time-correlated single-photon counting (TCSPC) for computational im...
来源: 评论
FedVC: Virtual Clients for Federated Learning with Imbalanced Label Distribution  24
FedVC: Virtual Clients for Federated Learning with Imbalance...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and Information technology, ADMIT 2024
作者: Chen, Zhouguo Chen, Hongda Liu, Shuai Liu, Yongdong Schoolof Computer Science and Engineering Southeast University Jiangsu Nanjing China The 30th Research Institute of China Electronics Technology Group Corporation Sichuan Chengdu China School of Software Engineering Xian Jiaotong University Shaanxi Xian China China Industrial Control Systems Cyber Emergency Response Team Beijing China
Federated Learning (FL) has gained considerable attention for collaborative training in big data analysis, particularly in terms of privacy and communication constraints. Despite its promising advantages, FL faces the... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: Akash K V Esther Daniel S. Seetha S. Durga Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Department of Information Science & Engineering CMR Institute of Technology India TIFAC CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Preview Helps Selection: Previewable Image Watermarking with Client-Side Embedding
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xiao, Xiangli Zhang, Yushu Hua, Zhongyun Xia, Zhihua Weng, Jian School of Computing and Artificial Intelligence Jiangxi University of Finance and Economics Nanchang330032 China School of Computer Science and Technology Shenzhen Campus of Harbin Institute of Technology Shenzhen518055 China College of Cyber Security Jinan University Guangzhou510632 China
The increasing sharing of images on social networks is prompting the involvement of digital watermarking to protect copyright and combat illegal redistribution. Owner-side embedding and client-side embedding are two m... 详细信息
来源: 评论
Joint System Latency and Data Freshness Optimization for Cache-enabled Mobile Crowdsensing Networks
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Kexin Fu, Yaru Guo, Yongna Wang, Fu Lee Zhang, Yan School of Science and Technology Hong Kong Metropolitan University Hong Kong Department of Electrical Engineering and Computer Science KTH Royal Institute of Technology Sweden Department of Informatics University of Oslo Norway
Mobile crowdsensing (MCS) networks enable large-scale data collection by leveraging the ubiquity of mobile devices. However, frequent sensing and data transmission can lead to significant resource consumption. To miti... 详细信息
来源: 评论
Correcting Noisy Multilabel Predictions: Modeling Label Noise through Latent Space Shifts
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Weipeng Li, Qin Xiao, Yang Qiao, Cheng Cai, Tie Liang, Junwei Hurley, Neil J. Piao, Guangyuan School of Computer Science and Software Engineering Shenzhen Institute of Information Technology Guangdong China State Key Lab of Integrated Service Networks School of Cyber Engineering Xidian University Shaanxi China Cyberspace Institute of Advanced Technology Guangzhou University Guangdong China School of Computer Science University College Dublin Dublin Ireland
Noise in data appears to be inevitable in most realworld machine learning applications and would cause severe overfitting problems. Not only can data features contain noise, but labels are also prone to be noisy due t... 详细信息
来源: 评论
HFE-RWKV: High-Frequency Enhanced RWKV Model for Efficient Left Ventricle Segmentation in Pediatric Echocardiograms
HFE-RWKV: High-Frequency Enhanced RWKV Model for Efficient L...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zi Ye Tianxiang Chen Ziyang Wang Hanwei Zhang Lijun Zhang Institute of Intelligent Software Guangzhou China School of Cyber Science and Technology University of Science and Technology of China Hefei China Department of Computer Science University of Oxford Oxford UK Department of Computer Science Saarland University Saarland Germany SKLCS Institute of Software University of Chinese Academy of Sciences Beijing China
Automated ventricular function analysis can improve healthcare in resource-scarce areas, but current segmentation methods struggle with accurately delineating the irregular shape of the left ventricle due to a lack of... 详细信息
来源: 评论
Imperceptible Transfer Attack on Large Vision-Language Models
Imperceptible Transfer Attack on Large Vision-Language Model...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaowen Cai Daizong Liu Runwei Guan Pan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Wangxuan Institute of Computer Technology Peking University Beijing China Department of Electrical Engineering and Electronics University of Liverpool Liverpool United Kingdom
In spite of achieving significant progress in recent years, Large Vision-Language Models (LVLMs) are proven to be vulnerable to adversarial examples. Therefore, there is an urgent need for an effective adversarial att... 详细信息
来源: 评论