咨询与建议

限定检索结果

文献类型

  • 1,767 篇 期刊文献
  • 1,316 篇 会议
  • 20 册 图书

馆藏范围

  • 3,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,123 篇 工学
    • 1,530 篇 计算机科学与技术...
    • 1,200 篇 软件工程
    • 461 篇 信息与通信工程
    • 295 篇 生物工程
    • 280 篇 电气工程
    • 262 篇 控制科学与工程
    • 240 篇 光学工程
    • 220 篇 电子科学与技术(可...
    • 214 篇 生物医学工程(可授...
    • 111 篇 机械工程
    • 104 篇 化学工程与技术
    • 100 篇 仪器科学与技术
    • 70 篇 材料科学与工程(可...
    • 66 篇 网络空间安全
    • 58 篇 动力工程及工程热...
  • 1,239 篇 理学
    • 523 篇 数学
    • 485 篇 物理学
    • 324 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 159 篇 化学
    • 87 篇 系统科学
    • 56 篇 地球物理学
  • 499 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 202 篇 医学
    • 174 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 75 篇 公共卫生与预防医...
  • 86 篇 法学
    • 65 篇 社会学
  • 42 篇 农学
  • 39 篇 经济学
  • 31 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学
  • 3 篇 军事学

主题

  • 82 篇 deep learning
  • 77 篇 semantics
  • 77 篇 feature extracti...
  • 68 篇 machine learning
  • 67 篇 computational mo...
  • 58 篇 training
  • 42 篇 federated learni...
  • 42 篇 accuracy
  • 39 篇 data models
  • 38 篇 deep neural netw...
  • 36 篇 graph neural net...
  • 35 篇 artificial intel...
  • 33 篇 computer science
  • 32 篇 image segmentati...
  • 31 篇 data mining
  • 30 篇 convolution
  • 30 篇 servers
  • 30 篇 predictive model...
  • 29 篇 optimization
  • 28 篇 cloud computing

机构

  • 103 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 44 篇 infn sezione di ...
  • 44 篇 north-west unive...
  • 44 篇 université de st...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 42 篇 university of ch...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 national centre ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 39 篇 dipartimento di ...

作者

  • 81 篇 hai jin
  • 77 篇 jin hai
  • 44 篇 chen a.
  • 44 篇 benoit d.m.
  • 44 篇 ferrara g.
  • 44 篇 ardid m.
  • 44 篇 calvo d.
  • 44 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,750 篇 英文
  • 317 篇 其他
  • 41 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3103 条 记 录,以下是181-190 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Deep Learning Approaches for Road Damage Detection Using YOLOv8 and Custom Convolutional Neural Network  6
Deep Learning Approaches for Road Damage Detection Using YOL...
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Khan, Muhammad Waseem Mahmood, Khalid Hussain, Israr Talha Qureshi, Muhammad Muhammad Sanaullah Badar, Hafiz Gao, Wu School of Computer Science Northwestern Poly technical University Center for Bio-inspired System-on-Chip Xi'an China Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Taiwan Institute of Computing Mns University of Agriculture Multan Pakistan Henan University Kaifeng450046 China
The identification of road damage is deemed very important to the preservation of infrastructure. Since recent development in deep learning provide great potential approaches, in this paper, three deep learning models... 详细信息
来源: 评论
Perception-Enhanced Generative Transformer for Key Information Extraction from Documents  27th
Perception-Enhanced Generative Transformer for Key Informat...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhao, Runbo Ou Yang, Jun Jie Gao, Chen Qin, Xugong Zeng, Gangyan Hu, Xiaoxu Zhang, Peng School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China Viterbi School of Engineering University of Southern California Los Angeles United States National Computer Network Response Technical Team/Coordination Center Technology Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Key information extraction (KIE) from scanned documents has attracted significant attention due to practical real-world applications. Despite impressive results achieved by incorporating multimodal information within ... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
A Hybrid Model Combined with SVM and CNN for Community Content Classification  23
A Hybrid Model Combined with SVM and CNN for Community Conte...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Ye, Yukui Xie, Xia Jin, Hai Wang, Duoqiang National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Hainan University Haikou China
Community websites bring many conveniences to people, and the classification of community content is playing an important role in website management and information searching. As the carrier of community content, post... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Secure Federated Learning with Blockchain and Homomorphic Encryption for Healthcare Data Sharing  23
Secure Federated Learning with Blockchain and Homomorphic En...
收藏 引用
23rd International Conference on Cyberworlds, CW 2024
作者: Firdaus, Muhammad Rhee, Kyung-Hyune Pukyong National University Industrial Science Technology Research Center Korea Republic of Telkom University School of Computing Indonesia Pukyong National University Division of Computer Engineering and AI Korea Republic of
Healthcare data is often fragmented across various institutions due to its highly sensitive and private nature. In this sense, hospitals and clinics maintain electronic health records (EHRs) independently;hence, valua... 详细信息
来源: 评论
Cooperative Relationship Prediction between Scholars in Heterogeneous Academic Network  23
Cooperative Relationship Prediction between Scholars in Hete...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Shi, Jia Jin, Hai Xie, Xia National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Hainan University Haikou China
The real academic network belongs to a heterogeneous network, therefore, for the link prediction tasks, some information on the network may be lost if only using homogeneous network methods. In order to make good use ... 详细信息
来源: 评论
What Factors Affect Multi-Modal In-Context Learning? An In-Depth Exploration  38
What Factors Affect Multi-Modal In-Context Learning? An In-D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qin, Libo Chen, Qiguang Fei, Hao Chen, Zhi Li, Min Che, Wanxiang School of Computer Science and Engineering Central South University China Research Center for Social Computing and Information Retrieval China Harbin Institute of Technology China Tsinghua University China ByteDance China
Recently, rapid advancements in Multi-Modal In-Context Learning (MM-ICL) have achieved notable success, which is capable of achieving superior performance across various tasks without requiring additional parameter tu...
来源: 评论
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks  10
A Heuristic-based Dynamic Scheduling and Routing Method for ...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Chen, Honglong Liu, Mindong Huang, Jing Zheng, Zhiling Huang, Weihong Xiao, Yufeng Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China Hunan Industry Polytechnic Information Center Changsha410125 China
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve suc... 详细信息
来源: 评论