咨询与建议

限定检索结果

文献类型

  • 1,744 篇 期刊文献
  • 1,314 篇 会议
  • 20 册 图书

馆藏范围

  • 3,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,095 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,192 篇 软件工程
    • 444 篇 信息与通信工程
    • 292 篇 生物工程
    • 266 篇 电气工程
    • 240 篇 光学工程
    • 233 篇 控制科学与工程
    • 215 篇 电子科学与技术(可...
    • 215 篇 生物医学工程(可授...
    • 109 篇 机械工程
    • 101 篇 仪器科学与技术
    • 100 篇 化学工程与技术
    • 70 篇 材料科学与工程(可...
    • 64 篇 网络空间安全
    • 56 篇 动力工程及工程热...
  • 1,221 篇 理学
    • 516 篇 数学
    • 482 篇 物理学
    • 321 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 154 篇 化学
    • 85 篇 系统科学
    • 54 篇 地球物理学
  • 494 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 214 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 201 篇 医学
    • 175 篇 临床医学
    • 147 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 84 篇 法学
    • 63 篇 社会学
  • 43 篇 农学
  • 40 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 81 篇 deep learning
  • 76 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 machine learning
  • 65 篇 computational mo...
  • 57 篇 training
  • 47 篇 accuracy
  • 46 篇 federated learni...
  • 38 篇 deep neural netw...
  • 38 篇 data models
  • 36 篇 artificial intel...
  • 32 篇 computer science
  • 32 篇 servers
  • 32 篇 graph neural net...
  • 31 篇 optimization
  • 31 篇 data mining
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 43 篇 infn sezione di ...
  • 43 篇 north-west unive...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 43 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 national centre ...
  • 40 篇 institute of phy...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 university of ch...
  • 38 篇 department of ph...

作者

  • 81 篇 hai jin
  • 76 篇 jin hai
  • 43 篇 chen a.
  • 43 篇 benoit d.m.
  • 43 篇 ferrara g.
  • 43 篇 ardid m.
  • 43 篇 calvo d.
  • 43 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,531 篇 英文
  • 515 篇 其他
  • 38 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3078 条 记 录,以下是831-840 订阅
排序:
READFake: Reflection and Environment-Aware DeepFake Detection
READFake: Reflection and Environment-Aware DeepFake Detectio...
收藏 引用
IEEE Visual Communications and Image Processing (VCIP)
作者: Muhammad Mohzary Elham Basunduwah Sejun Song Baek-Young Choi Department of Computer Science Jazan University Jazan Saudi Arabia Engineering and Technology Research Center Jazan University Jazan Saudi Arabia School of Science and Engineering University of Missouri-Kansas City MO USA College of Engineering and Computing in Al-Qunfudhah Umm Al-Qura University Makkah Saudi Arabia School of Computer and Cyber Science Augusta University Augusta GA USA
This paper presents a novel Reflection and Environment-Aware DeepFake (READFake) detection technique. Using reflections on various body parts (e.g., eyes, nose, cheeks, etc.) and environmental factors, we validate the... 详细信息
来源: 评论
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer
收藏 引用
ICT Express 2025年 第3期11卷 542-546页
作者: Gupta, Brij B. Gaurav, Akshat Alhalabi, Wadee Arya, Varsha Alharbi, Eman Chui, Kwok Tai Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan Department of Medical Research China Medical University Hospital China Medical University Taichung Taiwan Symbiosis Centre for Information Technology (SCIT) Symbiosis International University Pune India School of Cybersecurity Korea University Seoul South Korea Kyung Hee University 26 Kyungheedae-ro Dongdaemun-gu Seoul South Korea Ronin Institute Montclair NJ United States International Center for AI and Cyber Security Research and Innovations (CCRI) Asia University Taichung 413 Taiwan Department of Computer Science Immersive Virtual Reality Research Group King Abdulaziz University Jeddah Saudi Arabia Hong Kong Metropolitan University Hong Kong SAR China Center for Interdisciplinary Research University of Petroleum and Energy Studies (UPES) Dehradun India Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attac... 详细信息
来源: 评论
Design and Simulation of Multi-tiered Heterogeneous Memory Architecture
Design and Simulation of Multi-tiered Heterogeneous Memory A...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication Systems (MASCOTS)
作者: Jinyuan Hu Haikun Liu Hai Jin Xiaofei Liao National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Heterogeneous memory systems have become increasingly popular in recent years. Because heterogeneous storage media often show significantly different characteristics in terms of bandwidth, latency, capacity, and energ... 详细信息
来源: 评论
CPSAA: Accelerating Sparse Attention using Crossbar-based Processing-In-Memory Architecture
arXiv
收藏 引用
arXiv 2022年
作者: Li, Huize Jin, Hai Zheng, Long Liao, Xiaofei Huang, Yu Liu, Cong Xu, Jiahong Duan, Zhuohui Chen, Dan Gui, Chuangyi National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The attention-based neural network attracts great interest due to its excellent accuracy enhancement. However, the attention mechanism requires huge computational efforts to process unnecessary calculations, significa... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
Cross-Language Binary-Source Code Matching with Intermediate Representations
arXiv
收藏 引用
arXiv 2022年
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China The University of Newcastle Australia School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China School of Computer Science University of Technology Sydney Australia
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
Exploring CLIP’s Dense Knowledge for Weakly Supervised Semantic Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Zhiwei Meng, Yucong Fu, Kexue Tang, Feilong Wang, Shuo Song, Zhijian Academy for Engineering and Technology Fudan University Shanghai200433 China Shanghai Key Laboratory of Medical Image Computing and Computer Assisted Intervention China Digital Medical Research Center School of Basic Medical Sciences Fudan University China Shandong Computer Science Center National Supercomputer Center in Jinan China
Weakly Supervised Semantic Segmentation (WSSS) with image-level labels aims to achieve pixel-level predictions using Class Activation Maps (CAMs). Recently, Contrastive Language-Image Pre-training (CLIP) has been intr... 详细信息
来源: 评论
AttenWalker: Unsupervised Long-Document Question Answering via Attention-based Graph Walking
arXiv
收藏 引用
arXiv 2023年
作者: Nie, Yuxiang Huang, Heyan Wei, Wei Mao, Xian-Ling School of Computer Science and Technology Beijing Institute of Technology China Beijing Engineering Research Center High Volume Language Information Processing and Cloud Computing Applications China Beijing Institute of Technology Southeast Academy of Information Technology China Huazhong University of Science and Technology China
Annotating long-document question answering (long-document QA) pairs is time-consuming and expensive. To alleviate the problem, it might be possible to generate long-document QA pairs via unsupervised question answeri...
来源: 评论
Characterization of Intensity Correlation via Single-photon Detection in Quantum Key Distribution
arXiv
收藏 引用
arXiv 2024年
作者: Xing, Tianyi Liu, Junxuan Zhang, Likang Wang, Min-Yan Li, Yu-Huai Liu, Ruiyin Peng, Qingquan Wang, Dongyang Wang, Yaxuan Liu, Hongwei Li, Wei Cao, Yuan Huang, Anqi Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Hefei National Research Center for Physical Sciences The Microscale and School of Physical Sciences University of Science and Technology of China Hefei230026 China Shanghai Research Center for Quantum Science CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Shanghai201315 China Hefei National Laboratory University of Science and Technology of China Hefei230088 China China Information Technology Security Evaluation Center Beijing100085 China
One of the most significant vulnerabilities in the source unit of quantum key distribution (QKD) is the correlation between quantum states after modulation, which shall be characterized and evaluated for its practical... 详细信息
来源: 评论
Label-Efficient 3D Brain Segmentation via Complementary 2D Diffusion Models with Orthogonal Views
arXiv
收藏 引用
arXiv 2024年
作者: Cho, Jihoon Ahn, Suhyun Kim, Beomju Bae, Hyungjoon Liu, Xiaofeng Xing, Fangxu Lee, Kyungeun Elfakhri, Georges Wedeen, Van Woo, Jonghye Park, Jinah School of Computing Korea Advanced Institute of Science and Technology Daejeon34141 Korea Republic of Electrical Engineering and Computer Science Daegu Gyeongbuk Institute of Science and Technology Daegu42988 Korea Republic of School of Medicine Yale University New HavenCT06510 United States Gordon Center for Medical Imaging Massachusetts General Hospital Harvard Medical School BostonMA02114 United States
Deep learning-based segmentation techniques have shown remarkable performance in brain segmentation, yet their success hinges on the availability of extensive labeled training data. Acquiring such vast datasets, howev... 详细信息
来源: 评论