咨询与建议

限定检索结果

文献类型

  • 1,744 篇 期刊文献
  • 1,314 篇 会议
  • 20 册 图书

馆藏范围

  • 3,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,095 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,192 篇 软件工程
    • 444 篇 信息与通信工程
    • 292 篇 生物工程
    • 266 篇 电气工程
    • 240 篇 光学工程
    • 233 篇 控制科学与工程
    • 215 篇 电子科学与技术(可...
    • 215 篇 生物医学工程(可授...
    • 109 篇 机械工程
    • 101 篇 仪器科学与技术
    • 100 篇 化学工程与技术
    • 70 篇 材料科学与工程(可...
    • 64 篇 网络空间安全
    • 56 篇 动力工程及工程热...
  • 1,221 篇 理学
    • 516 篇 数学
    • 482 篇 物理学
    • 321 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 154 篇 化学
    • 85 篇 系统科学
    • 54 篇 地球物理学
  • 494 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 214 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 201 篇 医学
    • 175 篇 临床医学
    • 147 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 84 篇 法学
    • 63 篇 社会学
  • 43 篇 农学
  • 40 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 81 篇 deep learning
  • 76 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 machine learning
  • 65 篇 computational mo...
  • 57 篇 training
  • 47 篇 accuracy
  • 46 篇 federated learni...
  • 38 篇 deep neural netw...
  • 38 篇 data models
  • 36 篇 artificial intel...
  • 32 篇 computer science
  • 32 篇 servers
  • 32 篇 graph neural net...
  • 31 篇 optimization
  • 31 篇 data mining
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 43 篇 infn sezione di ...
  • 43 篇 north-west unive...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 43 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 national centre ...
  • 40 篇 institute of phy...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 university of ch...
  • 38 篇 department of ph...

作者

  • 81 篇 hai jin
  • 76 篇 jin hai
  • 43 篇 chen a.
  • 43 篇 benoit d.m.
  • 43 篇 ferrara g.
  • 43 篇 ardid m.
  • 43 篇 calvo d.
  • 43 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,531 篇 英文
  • 515 篇 其他
  • 38 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3078 条 记 录,以下是1001-1010 订阅
排序:
Meta-Transfer Learning Based Cross-Domain Gesture Recognition Using WiFi Channel State Information
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Dai, Penglin Zhou, Junfei Ma, Jialong Zhang, Hao Wu, Xiao Southwest Jiaotong University School of Computing and Artificial Intelligence Chengdu611756 China Ministry of Education Engineering Research Center of Sustainable Urban Intelligent Transportation China Tangshan Institute of Southwest Jiaotong University Tangshan063000 China Chongqing University of Posts and Telecommunications College of Computer Science and Technology Key Laboratory of Data Engineering and Visual Computing Chongqing400065 China
Gesture recognition plays a crucial role in a wide range of consumer electronics applications, including human-computer interaction and virtual reality, by enabling the identification and interpretation of human gestu... 详细信息
来源: 评论
UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks
收藏 引用
IEEE Transactions on Network science and Engineering 2025年
作者: Hadi, Hassan Jalil Cao, Yue Khan, Muhammad Khurram Ahmad, Naveed Hu, Yulin Fu, Chao Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430073 China King Saud University Center of Excellence in Information Assurance Riyadh Saudi Arabia Prince Sultan University College of Computer and Information Science Riyadh Saudi Arabia Wuhan University School of Electronic Information China Information and Communication Technology Co. LtdChina China
Unmanned Aerial Vehicles (UAVs) are necessary for numerous tasks but are vulnerable to cyber threats due to their widespread use and connectivity. The lack of a comprehensive dataset necessitates the development of ef... 详细信息
来源: 评论
A Study on English Front Vowels of Tibetan College Students Based on Information technology
A Study on English Front Vowels of Tibetan College Students ...
收藏 引用
2023 International Conference on Information Education and Artificial Intelligence, ICIEAI 2023
作者: Zhang, Fu Ma, Naqin Duojie, Gezhi Dao, Jieben School of Foreign Studies of Gansu University of Political Science and Law Gansu Lanzhou730070 China Key Laboratory of Linguistic and Cultural Computing Ministry of Education Northwest Minzu University Gansu Lanzhou730030 China Tibetan Information Technology Research Center of Hainan Prefecture Qinghai Hainan813000 China The Computer College of Qinghai Minzu University Qinghai Xining810000 China
Based on the acoustic speech experiment, this study took English front vowels of Maqu Tibetan college students as the object, and took Maqu Tibetan college participants' and GB native participants' F1, F2 and ... 详细信息
来源: 评论
FedCache: A Knowledge Cache-driven Federated Learning Architecture for Personalized Edge Intelligence
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Zhiyuan Sun, Sheng Wang, Yuwei Liu, Min Xu, Ke Wang, Wen Jiang, Xuefeng Gao, Bo Lu, Jinda The Institute of Computing Technology Chinese Academy of Sciences Beijing China The University of Chinese Academy of Sciences Beijing China The Zhongguancun Laboratory Beijing China The Department of Computer Science and Technology Tsinghua University Beijing China The School of Computer and Information Technology The Engineering Research Center of Network Management Technology for High-Speed Railway Ministry of Education Beijing Jiaotong University Beijing China The School of Information Science and Technology University of Science and Technology of China Hefei China
Edge Intelligence (EI) allows Artificial Intelligence (AI) applications to run at the edge, where data analysis and decision-making can be performed in real-time and close to data sources. To protect data privacy and ... 详细信息
来源: 评论
The Power of Bias: Optimizing Client Selection in Federated Learning with Heterogeneous Differential Privacy
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Jiating Zhou, Yipeng Li, Qi Sheng, Quan Z. Cui, Laizhong Liu, Jiangchuan The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen University Shenzhen518060 China The School of Computing Faculty of Science and Engineering Macquarie University Macquarie ParkNSW2119 Australia The Institute for Network Sciences and Cyberspace Tsinghua University Beijing100190 China The Beijing National Research Center for Information Science and Technology Beijing100190 China The School of Computing Science Simon Fraser University BurnabyBCV5A 1S6 Canada
To preserve the data privacy, the federated learning (FL) paradigm emerges in which clients only expose model gradients rather than original data for conducting model training. To enhance the protection of model gradi... 详细信息
来源: 评论
Dual-View Pyramid Pooling in Deep Neural Networks for Improved Medical Image Classification and Confidence Calibration
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiaoqing Nie, Qiushi Xiao, Zunjie Zhao, Jilu Wu, Xiao Guo, Pengxin Li, Runzhi Liu, Jin Wei, Yanjie Pan, Yi Center for High Performance Computing Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen518055 China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China Department of Statistics and Actuarial Science The University of Hong Kong 999077 Hong Kong Cooperative Innovation Center of Internet Healthcare Zhengzhou University Zhengzhou450001 China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha410083 China Xinjiang Engineering Research Center of Big Data and Intelligent Software School of software Xinjiang University Wulumuqi830046 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen China
Spatial pooling (SP) and cross-channel pooling (CCP) operators have been applied to aggregate spatial features and pixel-wise features from feature maps in deep neural networks (DNNs), respectively. Their main goal is... 详细信息
来源: 评论
GDSG: Graph Diffusion-based Solution Generator for Optimization Problems in MEC Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Liang, Ruihuai Yang, Bo Chen, Pengyu Cao, Xuelin Yu, Zhiwen Debbah, Merouane Niyato, Dusit Poor, H. Vincent Yuen, Chau Northwestern Polytechnical University School of Computer Science Shaanxi Xi'an710129 China Xidian University School of Cyber Engineering Shaanxi Xi'an710071 China Harbin Engineering University Heilongjiang Harbin150001 China Khalifa University of Science and Technology Center for 6G Technology Abu Dhabi United Arab Emirates Nanyang Technological University College of Computing and Data Science Singapore Princeton University Department of Electrical and Computer Engineering PrincetonNJ08544 United States Nanyang Technological University School of Electrical and Electronics Engineering Singapore
Optimization is crucial for the efficiency and reliability of multi-access edge computing (MEC) networks. Many optimization problems in this field are NP-hard and do not have effective approximation algorithms. Conseq... 详细信息
来源: 评论
Temporal Knowledge Graph Reasoning via Time-Distributed Representation Learning
Temporal Knowledge Graph Reasoning via Time-Distributed Repr...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Kangzheng Liu Feng Zhao Guandong Xu Xianzhi Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Data Science and Machine Intelligence Lab University of Technology Sydney Sydney Australia
Temporal knowledge graph (TKG) reasoning has attracted significant attention. Recent approaches for modeling historical information have led to great advances. However, the problems of time variability and unseen enti... 详细信息
来源: 评论
The Advanced Encryption Standard with a Dynamic S-Box Using the RC4 Key Schedule
The Advanced Encryption Standard with a Dynamic S-Box Using ...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Abdelrahman Altigani Muhammad Rukunuddin Ghalib Huwaida T. Elshoush Muawia A. Elsadig Nashat Alrefai Shiraz Naserelden Computer Information Science Higher Colleges of Technology Al Ain UAE School of Engineering & Computing De Monfort University Dubai UAE Computer Science Department Faculty of Mathematical Sciences and Informatics University of Khartoum Khartoum Sudan College of Computer Science and Information Technology Imam Abdulrahman bin Faisal University Dammam KSA Department of Mathematics College of Science Imam Abdulrahman Bin Faisal University Basic and Applied Scientific Research Center Imam Abdulrahman Bin Faisal University Dammam KSA Department of Mathematical Sciences Faculty of Science Universiti Teknologi Malaysia Johor Malaysia
Since the inception of secure communication, safeguarding data confidentiality has been paramount. With the increased reliance on technology, the need for robust security mechanisms is more critical than ever. This pa... 详细信息
来源: 评论
An ADRC-Incorporated Stochastic Gradient Descent Algorithm for Latent Factor Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jinli Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Engineering Research Center of Big Data Application for Smart Cities Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The College of Computer and Information Science Southwest University Chongqing400715 China
High-dimensional and incomplete (HDI) matrix contains many complex interactions between numerous nodes. A stochastic gradient descent (SGD)-based latent factor analysis (LFA) model is remarkably effective in extractin... 详细信息
来源: 评论