咨询与建议

限定检索结果

文献类型

  • 1,744 篇 期刊文献
  • 1,314 篇 会议
  • 20 册 图书

馆藏范围

  • 3,078 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,095 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,192 篇 软件工程
    • 444 篇 信息与通信工程
    • 292 篇 生物工程
    • 266 篇 电气工程
    • 240 篇 光学工程
    • 233 篇 控制科学与工程
    • 215 篇 电子科学与技术(可...
    • 215 篇 生物医学工程(可授...
    • 109 篇 机械工程
    • 101 篇 仪器科学与技术
    • 100 篇 化学工程与技术
    • 70 篇 材料科学与工程(可...
    • 64 篇 网络空间安全
    • 56 篇 动力工程及工程热...
  • 1,221 篇 理学
    • 516 篇 数学
    • 482 篇 物理学
    • 321 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 154 篇 化学
    • 85 篇 系统科学
    • 54 篇 地球物理学
  • 494 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 214 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 201 篇 医学
    • 175 篇 临床医学
    • 147 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 84 篇 法学
    • 63 篇 社会学
  • 43 篇 农学
  • 40 篇 经济学
  • 33 篇 教育学
  • 10 篇 艺术学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 81 篇 deep learning
  • 76 篇 semantics
  • 76 篇 feature extracti...
  • 66 篇 machine learning
  • 65 篇 computational mo...
  • 57 篇 training
  • 47 篇 accuracy
  • 46 篇 federated learni...
  • 38 篇 deep neural netw...
  • 38 篇 data models
  • 36 篇 artificial intel...
  • 32 篇 computer science
  • 32 篇 servers
  • 32 篇 graph neural net...
  • 31 篇 optimization
  • 31 篇 data mining
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 predictive model...
  • 29 篇 cloud computing

机构

  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 43 篇 infn sezione di ...
  • 43 篇 north-west unive...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 43 篇 université de st...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 national centre ...
  • 40 篇 institute of phy...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 university of ch...
  • 38 篇 department of ph...

作者

  • 81 篇 hai jin
  • 76 篇 jin hai
  • 43 篇 chen a.
  • 43 篇 benoit d.m.
  • 43 篇 ferrara g.
  • 43 篇 ardid m.
  • 43 篇 calvo d.
  • 43 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,531 篇 英文
  • 515 篇 其他
  • 38 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3078 条 记 录,以下是891-900 订阅
排序:
MindLLM: Lightweight Large Language Model Pre-Training, Evaluation and Domain Application
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Yizhe Sun, Huashan Li, Jiawei Liu, Runheng Li, Yinghao Liu, Yuhang Gao, Yang Huang, Heyan School of Computer Science Beijing Institute of Technology Beijing China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing China Beijing Institute of Technology Southeast Academy of Information Technology Fujian Putian China
​Large Language Models (LLMs) have demonstrated remarkable performance across various natural language tasks, marking significant strides towards general artificial intelligence. While general artificial intelligence ... 详细信息
来源: 评论
Incorporating Option and Out-of-domain Knowledge for Multi-choice Machine Reading Comprehension  7
Incorporating Option and Out-of-domain Knowledge for Multi-c...
收藏 引用
7th IEEE International Conference on Cloud computing and Intelligence Systems, CCIS 2021
作者: Xu, Yuan Shi, Shumin Huang, Heyan Beijing Institute of Technology School of Computer Science and Technology Beijing China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing China
Multi-choice Machine Reading Comprehension (MRC) requires the model to select the correct answer from a set of answer candidates given the corresponding passage and question. Previous studies mainly focus on complex m... 详细信息
来源: 评论
Fake Twitter Followers Detection using Machine Learning Approach
Fake Twitter Followers Detection using Machine Learning Appr...
收藏 引用
Business Analytics for technology and Security (ICBATS), International Conference on
作者: Muhammad Zeshan Shabbir Iftikhar Naseer Shamim Akhter Muhammad Abubakar Ghassan F. Issa Muhammad Hassaan Mehmood Faculty of Information and Technology Comsats University Islamabad Pakistan Faculty of Computer Science & Information Technology The Superior University Lahore Pakistan School of Library & Information Sciences Minhaj University Lahore Pakistan Fast School of Computing National University of Computer and Emerging Sciences Lahore Pakistan School of Information Technology Skyline University College University City Sharjah Sharjah UAE School of Computer Science NCBA&E Lahore Pakistan Applied Science Research Center Applied Science Private Universit Amman Jordan
Fake user accounts on social media are a serious threat. Artificial intelligence can play an important role in getting rid of fake user accounts. Twitter has a problem with fake accounts that are run by automated bots... 详细信息
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Qinyuan Wang Bruce Gu He Zhang Yunfeng Li School of Music University of Sydney NSW Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China CNPIEC KEXIN Ltd Beijing China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论
Distributed Pairwise Protection for Security-Aware Mission Chains in UAV Networks
Distributed Pairwise Protection for Security-Aware Mission C...
收藏 引用
World Congress on computing and Communication Technologies (WCCCT)
作者: Yuhang Zhao Guangming Duan Danyang Zheng Xiaojun Cao Chengzong Peng School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology China SUGON Industrial Control and Security Center China School of Computing and Artificial Intelligence Southwest Jiaotong University China Department of Computer Science Georgia State University USA
The unmanned aerial vehicles (UAVs) communication network exhibits significant potential in natural disaster management, with applications in flood relief and wildfire control. In these scenarios, UAVs can dynamically... 详细信息
来源: 评论
RETRACTED ARTICLE: Obstacles Uncovering System for Slender Pathways Using Unmanned Aerial Vehicles with Automatic Image Localization Technique
收藏 引用
International Journal of Computational Intelligence Systems 2023年 第1期16卷 1-14页
作者: Selvarajan, Shitharth Manoharan, Hariprasath Khadidos, Alaa O. Shankar, Achyut Khadidos, Adil O. Onyema, Edeh Michael Department of Computer Science Kebri Dehar University Kebri Dehar Ethiopia School of Built Environment Engineering and Computing Leeds Beckett University Leeds UK Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Center of Research Excellence in Artificial Intelligence and Data Science King Abdulaziz University Jeddah Saudi Arabia Secure Cyber Systems Research Group (SCSRG) WMG University of Warwick Coventry UK School of Computer Science Engineering Lovely Professional University Phagwara India Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Mathematics and Computer Science Coal City University Enugu Nigeria
In this study, unidentified flying machines are built with real-time monitoring in mid-course settings for obstacle avoidance in mind. The majority of the currently available methods are implemented as comprehensive m...
来源: 评论
A GAN-Based Data Poisoning Attack Against Federated Learning Systems and Its Countermeasure
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Wei Gao, Bo Xiong, Ke Wang, Yuwei The Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer Science and Technology The Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing100044 China The Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
As a distributed machine learning paradigm, federated learning (FL) is collaboratively carried out on privately owned datasets but without direct data access. Although the original intention is to allay data privacy c... 详细信息
来源: 评论
Environment-Aware Dynamic Graph Learning for Out-of-Distribution Generalization
arXiv
收藏 引用
arXiv 2023年
作者: Yuan, Haonan Sun, Qingyun Fu, Xingcheng Zhang, Ziwei Ji, Cheng Peng, Hao Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University China School of Computer Science and Engineering Beihang University China Key Lab of Education Blockchain and Intelligent Technology Guangxi Normal University China Department of Computer Science and Technology Tsinghua University China
Dynamic graph neural networks (DGNNs) are increasingly pervasive in exploiting spatio-temporal patterns on dynamic graphs. However, existing works fail to generalize under distribution shifts, which are common in real... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
arXiv
收藏 引用
arXiv 2024年
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
Text-Driven Video Style Transfer with State-Space Models: Extending StyleMamba for Temporal Coherence
arXiv
收藏 引用
arXiv 2025年
作者: Li, Chao Park, Minsu Rossi, Cristina Li, Zhuang Dept. of Computer Science Eastern Asia Institute of Technology Beijing China AI Research Center Seoul National Technical Labs Seoul Korea Republic of School of Computing University of South Europe Rome Italy Department of Data Science Western Frontier University CA United States
StyleMamba has recently demonstrated efficient text-driven image style transfer by leveraging state-space models (SSMs) and masked directional losses. In this paper, we extend the StyleMamba framework to handle video ... 详细信息
来源: 评论