咨询与建议

限定检索结果

文献类型

  • 10,788 篇 会议
  • 7,113 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 17,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,593 篇 工学
    • 8,985 篇 计算机科学与技术...
    • 7,453 篇 软件工程
    • 2,747 篇 信息与通信工程
    • 1,600 篇 控制科学与工程
    • 1,512 篇 生物工程
    • 1,268 篇 电气工程
    • 1,014 篇 生物医学工程(可授...
    • 909 篇 电子科学与技术(可...
    • 894 篇 光学工程
    • 703 篇 机械工程
    • 545 篇 网络空间安全
    • 502 篇 化学工程与技术
    • 486 篇 仪器科学与技术
    • 481 篇 动力工程及工程热...
    • 426 篇 安全科学与工程
    • 410 篇 交通运输工程
  • 5,957 篇 理学
    • 3,131 篇 数学
    • 1,655 篇 生物学
    • 1,516 篇 物理学
    • 990 篇 统计学(可授理学、...
    • 608 篇 系统科学
    • 569 篇 化学
  • 3,450 篇 管理学
    • 2,058 篇 管理科学与工程(可...
    • 1,553 篇 图书情报与档案管...
    • 887 篇 工商管理
  • 995 篇 医学
    • 847 篇 临床医学
    • 756 篇 基础医学(可授医学...
    • 459 篇 公共卫生与预防医...
    • 442 篇 药学(可授医学、理...
  • 611 篇 法学
    • 484 篇 社会学
  • 296 篇 经济学
  • 279 篇 农学
  • 213 篇 教育学
  • 60 篇 文学
  • 50 篇 艺术学
  • 30 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 544 篇 deep learning
  • 414 篇 feature extracti...
  • 408 篇 computer science
  • 396 篇 accuracy
  • 385 篇 computational mo...
  • 315 篇 machine learning
  • 296 篇 training
  • 266 篇 internet of thin...
  • 259 篇 predictive model...
  • 254 篇 semantics
  • 227 篇 optimization
  • 208 篇 data mining
  • 203 篇 support vector m...
  • 187 篇 real-time system...
  • 174 篇 image segmentati...
  • 167 篇 neural networks
  • 158 篇 data models
  • 151 篇 scalability
  • 149 篇 educational inst...
  • 138 篇 computer archite...

机构

  • 207 篇 institute of com...
  • 170 篇 school of comput...
  • 169 篇 school of comput...
  • 130 篇 school of comput...
  • 119 篇 department of co...
  • 113 篇 department of co...
  • 109 篇 school of comput...
  • 106 篇 school of comput...
  • 99 篇 national enginee...
  • 99 篇 school of comput...
  • 98 篇 key laboratory o...
  • 86 篇 north-west unive...
  • 85 篇 institut univers...
  • 83 篇 national centre ...
  • 82 篇 school of comput...
  • 82 篇 university of ch...
  • 80 篇 infn sezione di ...
  • 79 篇 infn sezione di ...
  • 79 篇 chitkara univers...
  • 75 篇 tno technical sc...

作者

  • 132 篇 jin hai
  • 128 篇 hai jin
  • 99 篇 niyato dusit
  • 89 篇 ferrara g.
  • 89 篇 ardid m.
  • 88 篇 calvo d.
  • 85 篇 chen a.
  • 80 篇 gal t.
  • 80 篇 bozza c.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 79 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 74 篇 kalekin o.
  • 70 篇 anguita m.
  • 66 篇 boettcher m.
  • 65 篇 enzenhöfer a.
  • 62 篇 huang f.
  • 60 篇 aly z.

语言

  • 16,749 篇 英文
  • 994 篇 其他
  • 180 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 荷兰文
检索条件"机构=School of Computer Science and Technology Computing"
17906 条 记 录,以下是4901-4910 订阅
排序:
A First-Order Multi-Gradient Algorithm for Multi-Objective Bi-Level Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Ye, Feiyang Lin, Baijiong Cao, Xiaofeng Zhang, Yu Tsang, Ivor W. Department of Computer Science and Engineering Southern University of Science and Technology China Australian Artificial Intelligence Institute University of Technology Sydney Australia China School of Artificial Intelligence Jilin University China Shanghai Artificial Intelligence Laboratory China Centre for Frontier AI Research Agency for Science Technology and Research Singapore Institute of High Performance Computing Agency for Science Technology and Research School of Computer Science and Engineering Nanyang Technological University Singapore
In this paper, we study the Multi-Objective Bi-Level Optimization (MOBLO) problem, where the upper-level subproblem is a multi-objective optimization problem and the lower-level subproblem is for scalar optimization. ... 详细信息
来源: 评论
Deepfake Detection System Using a Hybrid Model
Deepfake Detection System Using a Hybrid Model
收藏 引用
International Conference on computing and Networking technology (ICCNT)
作者: Sudharson S Priyanka Kokil Sasikala D Penta Aravinda Swamy Computer Science and Engineering Vellore Institute of Technology Chennai India Electronics and Communication Engineering Indian Institute of Information Technology Design and Manufacturing Chennai India Amrita School of Computing Computer Science and Engineering (AIE) Chennai India
There has been a rapid advancement in deep fake technology in recent years, which makes it increasingly difficult to detect fake images, especially those involving human faces, which have become difficult to detect. T...
来源: 评论
Class Imbalance Pill Image Classification via Ensemble Learning
Class Imbalance Pill Image Classification via Ensemble Learn...
收藏 引用
IEEE Conference on Systems, Process & Control (ICSPC)
作者: Hui-Zong Chee Jit-Yan Lim Yong-Xuan Tan Kian-Ming Lim Chin-Poo Lee Pa-Pa-Min Faculty of Information Science & Technology (FIST) Multimedia University Melaka Malaysia School of Computer Science University of Nottingham Ningbo China Ningbo China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University Jiangsu Province China
Accurate identification of pill shapes is crucial for medication management and safety, acting as a safeguard against medication errors, especially with the increasing variety of pills that pose risks to patients. To ... 详细信息
来源: 评论
Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks
Shield-U: Safeguarding Traffic Sign Recognition Against Pert...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shengmin Xu Jianfei Sun Hangcheng Cao Yulan Gao Ziyang He Cong Wu College of Computer and Cyber Security Fujian Normal University China School of Computing and Information Systems Singapore Management University Singapore Department of Computer Science City University of Hong Kong China Division of Information Science and Engineering KTH Royal Institute of Technology Sweden School of Cyber Science and Engineering Zhengzhou University China School of Computer Science and Engineering Nanyang Technological University Singapore
Traffic sign recognition systems are crucial for the navigation and situation awareness of autonomous vehicles. They leverage deep learning technologies to swiftly and accurately identify traffic signs, even in the mo... 详细信息
来源: 评论
Deep CNN based droplet deposition segmentation for spray distribution assessment  27
Deep CNN based droplet deposition segmentation for spray dis...
收藏 引用
27th International Conference on Automation and computing, ICAC 2022
作者: Chen, Tao Meng, Yanhua Su, Jinya Liu, Cunjia University of Essex School of Computer Science and Electronic Engineering Colchester United Kingdom Anyang Institute of Technology School of Mechanical Engineering Anyang China University of Aberdeen Department of Computing Science Aberdeen United Kingdom Loughborough University Department of Aeronautical and Automotive Engineering Loughborough United Kingdom
Pesticides have been widely used in the cultivation of crops to enhance their production, however, incorrect application of pesticides will result in yield loss, product waste, environmental pollution among many other... 详细信息
来源: 评论
PGD-Imp: Rethinking and Unleashing Potential of Classic PGD with Dual Strategies for Imperceptible Adversarial Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jin Yu, Zitong He, Ziqiang Wang, Z. Jane Kang, Xiangui Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University China School of Computing and Information Technology Great Bay University China Electrical and Computer Engineering Dept University of British Columbia Canada
Imperceptible adversarial attacks have recently attracted increasing research interests. Existing methods typically incorporate external modules or loss terms other than a simple lp-norm into the attack process to ach... 详细信息
来源: 评论
Learning Adversarial Semantic Embeddings for Zero-Shot Recognition in Open Worlds
arXiv
收藏 引用
arXiv 2023年
作者: Li, Tianqi Pang, Guansong Bai, Xiao Zheng, Jin Zhou, Lei Ning, Xin School of Computer Science and Engineering Beihang University China School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Artificial Intelligence Wuhan University of Technology China Institute of Semiconductors Chinese Academy of Sciences China
Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes with only their side semantic information presented during training. It cannot handle real-life, open-world scenarios where there are test samp... 详细信息
来源: 评论
Advancements in cheating detection algorithms in FPS games
Advancements in cheating detection algorithms in FPS games
收藏 引用
2024 International Conference on computer Application and Information Security, ICCAIS 2024
作者: Xu, Ziwen Yu, Ruotong Liang, Yan Chen, Zihan Wan, Ye School of Computer Science and Technology Tongji University Shanghai201804 China Faculty of Science and Technology Beijing Normal University-Hong Kong Baptist University United International College Guangdong Zhuhai519087 China Luddy School of Informatics Computing and Engineering Indiana University of Bloomington Indiana BloomingtonIN47405 United States Guangdong Guangya High School Guangdong Guangzhou510000 China School of Computer Science and Technology Northeastern University Hebei Qinhuangdao066000 China
Over the past two decades, the increasing variety of cheating techniques in FPS games has led to the development of cheating detection algorithms. This literature review provides a chronological review of advancements... 详细信息
来源: 评论
HUWSOD: Holistic Self-training for Unified Weakly Supervised Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Cao, Liujuan Lin, Jianghang Hong, Zebo Shen, Yunhang Lin, Shaohui Chen, Chao Ji, Rongrong Media Analytics and Computing Lab School of Informatics Xiamen University 361102 China Youtu Lab Tencent200233 China School of Computer Science and Technology East China Normal University 200062 China
As an emerging problem in computer vision, weakly supervised object detection (WSOD) aims to use only image-level annotations to train object detectors. Most WSOD methods rely on traditional object proposals to genera... 详细信息
来源: 评论
G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haoxin Xu, Xuemiao Xu, Cheng Zhang, Huaidong Qin, Jing Wang, Yi Heng, Pheng-Ann He, Shengfeng The School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The School of Future Technology South China University of Technology Guangzhou China The School of Computer Science and Network Security Dongguan University of Technology Dongguan China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong The School of Computing and Information Systems Singapore Management University Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论