咨询与建议

限定检索结果

文献类型

  • 5,992 篇 期刊文献
  • 5,211 篇 会议
  • 51 册 图书

馆藏范围

  • 11,254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,198 篇 工学
    • 5,358 篇 计算机科学与技术...
    • 4,504 篇 软件工程
    • 1,768 篇 信息与通信工程
    • 1,135 篇 生物工程
    • 898 篇 电气工程
    • 898 篇 控制科学与工程
    • 719 篇 生物医学工程(可授...
    • 648 篇 光学工程
    • 617 篇 电子科学与技术(可...
    • 402 篇 机械工程
    • 361 篇 化学工程与技术
    • 283 篇 动力工程及工程热...
    • 278 篇 交通运输工程
    • 252 篇 仪器科学与技术
    • 247 篇 网络空间安全
    • 237 篇 安全科学与工程
  • 4,265 篇 理学
    • 2,126 篇 数学
    • 1,296 篇 生物学
    • 1,173 篇 物理学
    • 795 篇 统计学(可授理学、...
    • 440 篇 化学
    • 384 篇 系统科学
  • 2,080 篇 管理学
    • 1,209 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 584 篇 工商管理
  • 692 篇 医学
    • 573 篇 临床医学
    • 499 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 284 篇 公共卫生与预防医...
  • 353 篇 法学
    • 299 篇 社会学
  • 229 篇 经济学
  • 163 篇 农学
  • 112 篇 教育学
  • 43 篇 文学
  • 21 篇 军事学
  • 15 篇 艺术学

主题

  • 373 篇 deep learning
  • 299 篇 feature extracti...
  • 267 篇 accuracy
  • 245 篇 semantics
  • 237 篇 machine learning
  • 237 篇 training
  • 213 篇 computational mo...
  • 179 篇 predictive model...
  • 155 篇 internet of thin...
  • 146 篇 real-time system...
  • 138 篇 optimization
  • 135 篇 data models
  • 132 篇 data mining
  • 123 篇 reinforcement le...
  • 122 篇 convolutional ne...
  • 114 篇 neural networks
  • 106 篇 image segmentati...
  • 105 篇 convolution
  • 103 篇 object detection
  • 99 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 335 篇 yandex school of...
  • 309 篇 university of ch...
  • 308 篇 cavendish labora...
  • 308 篇 school of physic...
  • 293 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 200 篇 bediaga i.
  • 194 篇 amato s.
  • 184 篇 baryshnikov f.
  • 180 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 borisyak m.
  • 158 篇 baker s.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,421 篇 英文
  • 757 篇 其他
  • 83 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11254 条 记 录,以下是4531-4540 订阅
排序:
Weakly-Supervised Action Localization by Hierarchically-structured Latent Attention Modeling
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Guiqin Zhao, Peng Zhao, Cong Yang, Shusen Cheng, Jie Leng, Luziwei Liao, Jianxing Guo, Qinghai School of Computer Science and Technology Xi’an Jiaotong University China ACS Lab Huawei Technologies China School of Mathematics and Statistics Xi’an Jiaotong University China National Engineering Laboratory for Big Data Analytics Xi’an Jiaotong University China
Weakly-supervised action localization aims to recognize and localize action instancese in untrimmed videos with only video-level labels. Most existing models rely on multiple instance learning(MIL), where the predicti... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
How Graph Neural Networks Learn: Lessons from Training Dynamics
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Chenxiao Wu, Qitian Wipf, David Sun, Ruoyu Yan, Junchi School of Artificial Intelligence Department of Computer Science and Engineering MoE Lab of AI Shanghai Jiao Tong University China Amazon Web Services United States School of Data Science The Chinese University of Hong Kong Shenzhen China Shenzhen International Center for Industrial and Applied Mathematics Shenzhen Research Institute of Big Data China
A long-standing goal in deep learning has been to characterize the learning behavior of black-box models in a more interpretable manner. For graph neural networks (GNNs), considerable advances have been made in formal... 详细信息
来源: 评论
Enhancing Efficiency of Declarative Aggregation for Video Analytics Based on Neural Networks
Enhancing Efficiency of Declarative Aggregation for Video An...
收藏 引用
Intelligent & Innovative Practices in engineering & Management (IIPEM), International Conference on
作者: Kamalesh Thoppaen Suresh Babu Tarun Dhar Diwan G. Prasanna Lakshmi Vijayshri Khedkar Pravin B Khatkale Bhagyashree Ashok Tingare Globallogic Inc Santa Clara CA USA Atal Bihari Vajpayee University Bilaspur India School of Computer Science and Engineering Sandip University Nashik Maharashtra Department of Computer Science & Engineering Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune India Sanjivani University Kopargaon Maharashtra India Department of Artificial Intelligence and Data Science D Y Patil College of Engineering Akurdi Pune
The rapid expansion of video data necessitates advanced techniques for efficient processing and analysis. This paper addresses the challenges associated with declarative aggregation and limit queries in video analytic... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing
收藏 引用
IEEE Network 2024年
作者: Wang, Meng Huang, Jinyang Zhang, Xiang Liu, Zhi Li, Meng Zhao, Peng Yan, Huan Sun, Xiao Dong, Mianxiong Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligence Machine School of Computer and Information Hefei230601 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China Muroran Institute of Technology Department of Sciences and Informatics 0508585 Japan
Driven by the vision of integrated sensing and communication (ISAC) toward 6G technology, the WiFi-based respiration sensing approach has emerged as a highly competitive candidate for advanced healthcare services. Nev... 详细信息
来源: 评论
Hybrid Movie Recommendation System using Neural Collaborative Filtering with Gradient Decent and Association Rule Mining
Hybrid Movie Recommendation System using Neural Collaborativ...
收藏 引用
Software, Systems and Information Technology (SSITCON), International Conference on
作者: J Cindhamani Rajkumar Pogaku M. P Sahana Myasar M. Adnan M. Suganya Department of Artificial Intelligence and Data Science Vel Tech Multi Tech Dr. Rangrajan Dr. Sakunthala Engineering College Avadi Chennai India School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous) Maisammaguda Hyderabad India Department of Computer Science and Engineering Dayananda Sagar College of Engineering Bengaluru India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Electronics and Communication Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai India
In recent days, most of the people are entertained by watching movies and shows, so developing a recommendation system help people across the world in saving the time to search for high rated movies. Usually, movies a... 详细信息
来源: 评论
Covert Communications with Enhanced Physical Layer Security in RIS-Assisted Cooperative Networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Li, Xingwang Liu, Musen Dang, Shuping Luong, Nguyen Cong Yuen, Chau Nallanathan, Arumugam Niyato, Dusit Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Jiaozuo Key Laboratory of Crow-Sensing Network Jiaozuo454003 China University of Bristol School of Electrical Electronic and Mechanical Engineering BristolBS8 1UB United Kingdom Phenikaa University Faculty of Computer Science Hanoi12116 Viet Nam Nanyang Technological University Singapore School of Electrical and Electronics Engineering 639798 Singapore Queen Mary University of London School of Electronic Engineering and Computer Science London United Kingdom Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of Nanyang Technological University Singapore College of Computing and Data Science 639798 Singapore
Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) technologies are recognized for their programmability and high energy efficiency respectively, which will be the key parts of the f... 详细信息
来源: 评论
PDEGAN: A Panoramic Style Transfer Based on Generative Adversarial Networks
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2112-2121页
作者: Wang, Qinghua Long, Xinling Huang, Jingwei Chen, Yang Yang, Lirong Zhang, Fuquan College of Computer and Big Data Minjiang University Fuzhou350108 China Fuzhou Technology Innovation Center of intelligent Manufacturing information System Minjiang University Fuzhou350108 China Fujian Province University Fuzhou350300 China College of Computer and Control Engineering Minjiang University Fuzhou350108 China College of Computer and Big Data Fuzhou University Fuzhou China School of Mechanical and Automotive Engineering Fujian University of Technology Fuzhou China College of foreign languages Dalian Jiaotong University Dalian116028 China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu610021 China
Panoramic image plays an extremely important role in the application of 3D, but in some special scenarios, the depth information is also needed as an auxiliary, but to obtain the panoramic depth information needs a hi... 详细信息
来源: 评论
SoAy: A Solution-based LLM API-using Methodology for Academic Information Seeking  25
SoAy: A Solution-based LLM API-using Methodology for Academi...
收藏 引用
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and data Mining V.1
作者: Yuanchun Wang Jifan Yu Zijun Yao Jing Zhang Yuyang Xie Shangqing Tu Yiyang Fu Youhe Feng Jinkai Zhang Jingyao Zhang Bowen Huang Yuanyao Li Huihui Yuan Lei Hou Juanzi Li Jie Tang School of Information Renmin University of China Beijing China & Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing China Institute of Education Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China School of Information Renmin University of China Beijing China & Engineering Research Center of Database and Business Intelligence MOE Beijing China School of Information Renmin University of China Beijing China Zhipu AI Beijing China
Applying large language models (LLMs) to academic API usage shows promise in reducing researchers' efforts to seek academic information. However, current LLM methods for using APIs struggle with the complex API co... 详细信息
来源: 评论