咨询与建议

限定检索结果

文献类型

  • 1,812 篇 期刊文献
  • 1,319 篇 会议
  • 20 册 图书

馆藏范围

  • 3,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,143 篇 工学
    • 1,538 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 452 篇 信息与通信工程
    • 293 篇 生物工程
    • 288 篇 电气工程
    • 251 篇 光学工程
    • 241 篇 控制科学与工程
    • 225 篇 生物医学工程(可授...
    • 221 篇 电子科学与技术(可...
    • 116 篇 机械工程
    • 105 篇 化学工程与技术
    • 104 篇 仪器科学与技术
    • 72 篇 材料科学与工程(可...
    • 71 篇 网络空间安全
    • 59 篇 动力工程及工程热...
  • 1,245 篇 理学
    • 519 篇 数学
    • 489 篇 物理学
    • 328 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 158 篇 化学
    • 84 篇 系统科学
    • 58 篇 地球物理学
  • 507 篇 管理学
    • 293 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 208 篇 医学
    • 179 篇 临床医学
    • 150 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
    • 80 篇 公共卫生与预防医...
  • 87 篇 法学
    • 64 篇 社会学
  • 45 篇 农学
  • 41 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 88 篇 deep learning
  • 82 篇 feature extracti...
  • 78 篇 semantics
  • 70 篇 computational mo...
  • 67 篇 machine learning
  • 63 篇 training
  • 50 篇 accuracy
  • 48 篇 federated learni...
  • 44 篇 data models
  • 37 篇 deep neural netw...
  • 37 篇 artificial intel...
  • 35 篇 computer science
  • 33 篇 optimization
  • 33 篇 data mining
  • 33 篇 servers
  • 31 篇 image segmentati...
  • 31 篇 graph neural net...
  • 29 篇 convolution
  • 29 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 101 篇 national enginee...
  • 80 篇 school of comput...
  • 48 篇 school of comput...
  • 46 篇 infn sezione di ...
  • 46 篇 north-west unive...
  • 46 篇 tno technical sc...
  • 46 篇 université de st...
  • 45 篇 institut univers...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 national centre ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 nikhef national ...
  • 39 篇 dipartimento di ...

作者

  • 82 篇 hai jin
  • 76 篇 jin hai
  • 46 篇 chen a.
  • 46 篇 benoit d.m.
  • 46 篇 ferrara g.
  • 46 篇 ardid m.
  • 46 篇 calvo d.
  • 46 篇 eddymaoui a.
  • 42 篇 gagliardini s.
  • 42 篇 gal t.
  • 42 篇 bozza c.
  • 42 篇 díaz a.f.
  • 42 篇 boumaaza j.
  • 41 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 benhassi m.
  • 40 篇 boettcher m.
  • 39 篇 enzenhöfer a.
  • 39 篇 celli s.

语言

  • 2,708 篇 英文
  • 411 篇 其他
  • 39 篇 中文
  • 1 篇 日文
  • 1 篇 罗马尼亚文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3151 条 记 录,以下是91-100 订阅
Accuracy-Efficiency Optimization for Multi-Stage Small Object Detection in Surveillance Video with Collaborative Frame Sampling
Accuracy-Efficiency Optimization for Multi-Stage Small Objec...
收藏 引用
2024 IEEE International Conference on Cluster computing, CLUSTER 2024
作者: Du, Chunhong Tang, Shanjiang Meng, Song Gou, Jiekai Yu, Ce Li, Yusen Fu, Hao Tian, Ye Yuan, Ding College of Intelligence and Computing Tianjin University China School of Computer Science and Technology Nankai University China National Supercomputing Center of Tianjin China
In video analytics, accuracy and efficiency are two important metrics and there tend to be a tradeoff between each other. In this paper, we consider accuracy-efficiency optimization for small object detection in surve...
来源: 评论
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论
Tumor type classification and candidate cancer-specific biomarkers discovery via semi-supervised learning
收藏 引用
Biophysics Reports 2023年 第2期9卷 57-66页
作者: Peng Chen Zhenlei Li Zhaolin Hong Haoran Zheng Rong Zeng School of Computer Science and Technology University of Science and Technology of China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Department of Systems Biology University of Science and Technology of China CAS Key Laboratory of Systems Biology Shanghai Institute of Biochemistry and Cell Biology Center for Excellence in Molecular Cell Science Chinese Academy of Sciences School of Life Science and Technology ShanghaiTech University
Identifying cancer-related differentially expressed genes provides significant information for diagnosing tumors, predicting prognoses, and effective treatments. Recently, deep learning methods have been used to perfo... 详细信息
来源: 评论
Physics-based fuid simulation in computer graphics: Survey, research trends, and challenges
收藏 引用
Computational Visual Media 2024年 第5期10卷 803-858页
作者: Xiaokun Wang Yanrui Xu Sinuo Liu Bo Ren Jiri Kosinka Alexandru C.Telea Jiamin Wang Chongming Song Jian Chang Chenfeng Li Jian Jun Zhang Xiaojuan Ban Beijing Advanced Innovation Center for Materials Genome Engineering and School of Intelligence Science and Technologyand Shunde Innovation School University of Science and Technology BeijingBeijing 100083China National Center for Computer Animation Faculty of Media and CommunicationBournemouth UniversityPoole BH125BBUK. Bernoulli Institute University of GroningenGroningen 9700 AKthe Netherlands School of Computer Science Peking UniversityBeijing 100871China. TMCC College of Computer ScienceNankai UniversityTianjin 300350China Department of Information and Computing Sciences Utrecht UniversityUtrecht 3584 CCthe Netherlands. Zienkiewicz Institute for Modelling Data and AISwansea UniversitySwansea SA18ENUK. Institute of Materials Intelligent Technology Liaoning Academy of MaterialsShenyang 110004China.
Physics-based fluid simulation has played an increasingly important role in the computer graphics *** methods in this area have greatly improved the generation of complex visual effects and its computational *** techn... 详细信息
来源: 评论
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 3568-3580页
作者: Zahoor, Amina Mahmood, Khalid Saleem, Muhammad Asad Badar, Hafiz Muhammad Sanaullah Le, Tuan-Vinh Das, Ashok Kumar Department of Computer Science Sahiwal57000 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Emerson University Multan Department of Emerging Computing Technologies Multan61000 Pakistan Fu Jen Catholic University Bachelor's Program of Artificial Intelligence and Information Security New Taipei City24206 Taiwan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of Information and Communication Technologies (ICTs). Within the immersive SPG e... 详细信息
来源: 评论
Provably Efficient Exploration in Quantum Reinforcement Learning with Logarithmic Worst-Case Regret  41
Provably Efficient Exploration in Quantum Reinforcement Lear...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhong, Han Hu, Jiachen Xue, Yecheng Li, Tongyang Wang, Liwei Center for Data Science Peking University China School of Computer Science Peking University China Center on Frontiers of Computing Studies Peking University China National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University China
While quantum reinforcement learning (RL) has attracted a surge of attention recently, its theoretical understanding is *** particular, it remains elusive how to design provably efficient quantum RL algorithms that ca... 详细信息
来源: 评论
Deep Learning IoT Malware Analysis: Investigation and Understanding
收藏 引用
Neural computing and Applications 2025年 1-28页
作者: Abdullah, Muhammed Amin Yu, Yongbin Cai, Jingye Addo, Daniel Bankas, Edem K. Gu, Yeong Hyeon Alqahtani, Ali Al-antari, Mugahed A. School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Navrongo Ghana Department of Artificial Intelligence and Data Science College of AI Convergence Daeyang AI Center Sejong University Seoul05006 Korea Republic of Center for Artificial Intelligence and Computer Science Department King Khalid University Abha61421 Saudi Arabia
This empirical study explores the ability of lightweight convolutional neural networks (CNNs) for malware analysis in Internet of Things (IoT) environments, emphasizing the impact of input dimensionality and size on f... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Representation of Semantic Word Embeddings Based on SLDA and Word2vec Model
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 647-654页
作者: TANG Huanling ZHU Hui WEI Hongmin ZHENG Han MAO Xueli LU Mingyu GUO Jin School of Computer Science and Technology Shandong Technology and Business University Co-innovation Center of Shandong Colleges and Universities: Future Intelligent Computing Key Laboratory of Intelligent Information Processing in Universities of Shandong Shandong Technology and Business University School of Information and Electronic Engineering Shandong Technology and Business University Information Science and Technology College Dalian Maritime University School of Computer and Information Technology Liaoning Normal University
To solve the problem of semantic loss in text representation, this paper proposes a new embedding method of word representation in semantic space called wt2svec based on supervised latent Dirichlet allocation(SLDA) an... 详细信息
来源: 评论