咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是581-590 订阅
排序:
Segment anything model for subgrade distress detection with GPR
Segment anything model for subgrade distress detection with ...
收藏 引用
Data science and computer Application (ICDSCA), IEEE International Conference on
作者: Kangjie Ning Chunpeng Zhou Zhi Yu School of Software Technology Zhejiang University Zhejiang Provincial Key Laboratory of Service Robot College of Computer Science Zhejiang University Hangzhou China School of Computer Science Zhejiang University Zhejiang Provincial Key Laboratory of Service Robot College of Computer Science Zhejiang University Hangzhou China
The detection of distresses with ground-penetrating radar (GPR) images is a highly challenging task due to their complex structure, blurred boundaries, and varying scales. The Segment Anything Model (SAM) has demonstr...
来源: 评论
Right Frontal Gamma Transcranial Alternating Current Stimulation Modulates Optimism Biases
收藏 引用
Neuroscience Bulletin 2025年 第1期41卷 172-176页
作者: Ziqing Yao Jinwen Wei Gan Huang Linling Li Zhen Liang Li Zhang Haiyan Wu Tifei Yuan Zhiguo Zhang Xiaoqing Hu Department of Psychology The State Key Laboratory of Brain and Cognitive SciencesThe University of Hong KongHong KongSARChina School of Biomedical Engineering Medical SchoolShenzhen UniversityShenzhen518060China Guangdong Provincial Key Laboratory of Biomedical Measurements and Ultrasound Imaging Shenzhen UniversityShenzhen518060China Centre for Cognitive and Brain Sciences and Department of Psychology University of MacaoMacao SARChina Shanghai Key Laboratory of Psychotic Disorders Brain Health InstituteNational Center for Mental DisordersShanghai Mental Health CenterShanghai Jiaotong University School of MedicineShanghai210109China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China Peng Cheng Laboratory Shenzhen518055China HKU-Shenzhen Institute of Research and Innovation Shenzhen518063China
Dear Editor,People are often optimistic when forecasting the future,such that they believe they are less likely to encounter adverse life *** phenomenon,known as optimism bias,emerges due to preferential encoding and ... 详细信息
来源: 评论
Identification of Microservices through Processed Dynamic Traces and Static Calls  3
Identification of Microservices through Processed Dynamic Tr...
收藏 引用
3rd International Conference on computer science and Management technology, ICCSMT 2022
作者: Wu, Sijie Zhang, Cheng Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University China Anhui University School of Computer Science and Technology China Nanjing University State Key Lab for Novel Software Technology Hefei China
As the complexity of software systems continues to increase, traditional monolithic software architectures will become difficult to scale and maintain. Microservices as an emerging software architecture it advocates d... 详细信息
来源: 评论
Improvement in the Transferability of Target Adversarial Examples Based on Data Augmentation
Improvement in the Transferability of Target Adversarial Exa...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Kun Wang Xing Jin Fuqiang Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Despite the high performance of deep neural networks in image classification, they are very sensitive to those adversarial examples with small perturbations, which is likely to cause classification errors. Currently, ... 详细信息
来源: 评论
DTBNet: medical image segmentation model based on dual transformer bridge
DTBNet: medical image segmentation model based on dual trans...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Kequan Chen Yuli Wang Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Accurate medical image segmentation [1] techniques help doctors make better diagnoses. The traditional U-Net [2] model usually uses skip connections to directly connect the corresponding layers of the encoder and deco... 详细信息
来源: 评论
Dual-neighbourhood information aggregation and feature fusion for prediction of miRNA–disease association
收藏 引用
computers in Biology and Medicine 2024年 181卷 109068-109068页
作者: Liu, Wei Lan, Zixin Li, Zejun Sun, Xingen Lu, Xu School of Computer Science Xiangtan University Xiangtan411105 China School of Computer Science and Engineering Hunan Institute of Technology Hengyang421002 China School of Mathematics and Computational Science Xiangtan University Xiangtan411105 China School of Computer Science Guangdong Polytechnic Normal University Guangdong Provincial Key Laboratory of Intellectual Property Big Data Guangzhou510665 China
Studying the intricate relationship between miRNAs and diseases is crucial to prevent and treat miRNA-related disorders. Existing computational methods often overlook the importance of features of different nodes and ... 详细信息
来源: 评论
Landslide Susceptibility Mapping based on Swarm Optimization Gradient Boosting Decision Tree in Sanshui District(China)
Landslide Susceptibility Mapping based on Swarm Optimization...
收藏 引用
Software Engineering and Artificial Intelligence (SEAI), IEEE International Conference on
作者: Zhuang Liu Gonghao Duan School of Computer Science & Engineering Artificial Intelligence China Hubei Provincial Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan China
This paper takes Sanshui District of Foshan City as the research object and proposes two GBDT(Gradient Boosted Decision Tree) models based on swarm optimization algorithm. Firstly, seven landslide influencing factors ... 详细信息
来源: 评论
From Data Integrity to Global ModeI Integrity for Decentralized Federated Learning: A Blockchain-based Approach
From Data Integrity to Global ModeI Integrity for Decentrali...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Na Wang Yao Zhao Youyang Qu Lei Cui Bai Li Longxiang Gao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia Zhejiang Tianheng Information Technology Company China
Decentralized Federated Learning (DFL) is extensively applied in various areas, e.g., healthcare, finance, and Internet of Things (loT), offering practical solutions for distributed intelligent applications and data c... 详细信息
来源: 评论
Multi-objective software test case selection based on density analysis  22
Multi-objective software test case selection based on densit...
收藏 引用
5th International Conference on computer science and Software Engineering, CSSE 2022
作者: Jia, Huihui Zhang, Cheng Wu, Sijie Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University China School of Computer Science and Technology Anhui University China State Key Lab for Novel Software Technology Nanjing University Hefei China
Software test case selection is committed to select the fewest test cases from test suites to perform a complete test at the least cost. Machine learning and multi-objective optimization techniques have developed rapi... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Yuecheng Wen Xiaotong Li Haiqing Lv Menglu Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论