咨询与建议

限定检索结果

文献类型

  • 5,987 篇 期刊文献
  • 5,170 篇 会议
  • 49 册 图书

馆藏范围

  • 11,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,206 篇 工学
    • 5,360 篇 计算机科学与技术...
    • 4,518 篇 软件工程
    • 1,773 篇 信息与通信工程
    • 1,136 篇 生物工程
    • 908 篇 电气工程
    • 903 篇 控制科学与工程
    • 720 篇 生物医学工程(可授...
    • 651 篇 光学工程
    • 619 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 362 篇 化学工程与技术
    • 281 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 253 篇 仪器科学与技术
    • 249 篇 网络空间安全
    • 238 篇 安全科学与工程
  • 4,274 篇 理学
    • 2,131 篇 数学
    • 1,299 篇 生物学
    • 1,176 篇 物理学
    • 799 篇 统计学(可授理学、...
    • 442 篇 化学
    • 384 篇 系统科学
  • 2,082 篇 管理学
    • 1,211 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 587 篇 工商管理
  • 694 篇 医学
    • 575 篇 临床医学
    • 501 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 286 篇 公共卫生与预防医...
  • 356 篇 法学
    • 301 篇 社会学
  • 231 篇 经济学
  • 162 篇 农学
  • 115 篇 教育学
  • 44 篇 文学
  • 21 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 366 篇 deep learning
  • 295 篇 feature extracti...
  • 266 篇 accuracy
  • 241 篇 semantics
  • 238 篇 machine learning
  • 232 篇 training
  • 210 篇 computational mo...
  • 176 篇 predictive model...
  • 155 篇 internet of thin...
  • 143 篇 real-time system...
  • 135 篇 optimization
  • 135 篇 data models
  • 130 篇 data mining
  • 122 篇 reinforcement le...
  • 120 篇 convolutional ne...
  • 114 篇 neural networks
  • 104 篇 image segmentati...
  • 104 篇 convolution
  • 102 篇 object detection
  • 102 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 336 篇 yandex school of...
  • 309 篇 cavendish labora...
  • 309 篇 school of physic...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 201 篇 bediaga i.
  • 195 篇 amato s.
  • 187 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 baker s.
  • 159 篇 borisyak m.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,360 篇 英文
  • 767 篇 其他
  • 85 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11206 条 记 录,以下是4811-4820 订阅
排序:
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy Games  25
Systemization of Knowledge (SoK): Goals, Coverage, and Evalu...
收藏 引用
Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems
作者: Yue Huang Marthie Grobler Lauren S. Ferro Georgia Psaroulis Sanchari Das Jing Wei Helge Janicke CSIRO's Data61 Melbourne Victoria Australia Centre for Securing Digital Futures Edith Cowan University Perth Western Australia Australia Ritchie School of Computer Science and Engineering University of Denver Denver Colorado USA CSIRO's Data61 Melbourne VIC Australia Cyber Security Cooperative Research Centre Edith Cowan University Perth Australia
来源: 评论
PKAT: Pre-training in Collaborative Knowledge Graph Attention Network for Recommendation
PKAT: Pre-training in Collaborative Knowledge Graph Attentio...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yi-Hong Lu Chang-Dong Wang Pei-Yuan Lai Jian-Huang Lai School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangzhou China South China Technology Commercialization Center Guangzhou China
With the rapid growth of online platforms and the abundance of available information, personalized recommender systems have become essential for assisting users in discovering relevant and interesting content. Among t...
来源: 评论
A new method for predicting plant proteins function based on multi label classification algorithm
A new method for predicting plant proteins function based on...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Shuai Chen Juan Wang Maozu Guo School of Computer Science Inner Mongolia University Hohhot China School of Electrical and Information Engineering Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture Beijing China
Protein function annotation is an important content of bioinformatics. It is unrealistic to experimentally annotate a large number of protein functions, so automated prediction of the functions of proteins is required... 详细信息
来源: 评论
Backdoor Attack with Sparse and Invisible Trigger
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Yinghua Li, Yiming Gong, Xueluan Li, Zhifeng Xia, Shu-Tao Wang, Qian The Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou311200 China College of Computing and Data Science Nanyang Technological University 639798 Singapore The School of Computer Science Wuhan University China Tencent Data Platform Shenzhen518057 China The Research Center of Artificial Intelligence Peng Cheng Laboratory Shenzhen518000 China The School of Cyber Science and Engineering Wuhan University China
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where the adversary manipulates a small portion of training data such that the victim model predicts normally on the benign samples but classifies the tr... 详细信息
来源: 评论
Momentum Recursive Darts
SSRN
收藏 引用
SSRN 2023年
作者: Ma, Benteng Xia, Yong Zhang, Yanning National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an710072 China Research and Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen518057 China
DARTS has emerged as a popular method for neural architecture search (NAS) owing to its efficiency and simplicity. It employs gradient-based bi-level optimization to iteratively optimize the upper-level architecture p... 详细信息
来源: 评论
Kernel contextual fuzzy rule model based on conditional input space partitioning driven by data reconstruction in autoencoder and randomization-based neural networks
收藏 引用
Knowledge-Based Systems 2025年 320卷
作者: Zhang, Congcong Oh, Sung-Kwun Fu, Zunwei Pedrycz, Witold School of Mathematics and Statistics Linyi University Shandong Linyi276005 China Shandong Data Open Innovative Application Laboratory Linyi276005 China School of Automation and Electrical Engineering Linyi University Shandong Linyi276005 China School of Electrical & Electronic Engineering The University of Suwon Gyeonggi-do Hwaseong-si18323 Korea Republic of Department of Electronic Engineering Seokyeong University Seoul 02713 Korea Republic of Department of Computer Science The University of Suwon Gyeonggi-do Hwaseong-si18323 Korea Republic of Department of Electrical and Computer Engineering University of Alberta EdmontonAB T6G 2R3 Canada Systems Research Institute Polish Academy of Sciences Warsaw 00-901 Poland Istinye University Faculty of Engineering and Natural Sciences Department of Computer Engineering Sariyer/Istanbul Turkey
Fuzzy Rule-based Models (FRMs) have attracted significant interest in the field of machine learning owing to their modular architecture, robust design methodologies, and sound interpretability. This study introduces a... 详细信息
来源: 评论
Thematic Event Extraction Based on Event-Related Sentence Detection
Thematic Event Extraction Based on Event-Related Sentence De...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Xing Zhang Yucan Guo Xiaolong Jin Haozhe Liang Saiping Guan School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Institute of Systems Engineering Academy of Military Science
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event...
来源: 评论
Diabetes Mellitus Type 2 data Sharing System Based on Blockchain and Attribute-Encryption
Diabetes Mellitus Type 2 Data Sharing System Based on Blockc...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weiqi Dai Zhenhui Lu Xia Xie Duoqiang Wang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
Medical data sharing can improve the quality of medical care and promote progress in the field of public health. However, medical data has high confidentiality and complexity. Taking the clinical diagnosis and treatme... 详细信息
来源: 评论
High-Quality Noise Detection for Knowledge Graph Embedding with Rule-Based Triple Confidence  18th
High-Quality Noise Detection for Knowledge Graph Embedding w...
收藏 引用
18th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2021
作者: Hong, Yan Bu, Chenyang Wu, Xindong Ministry of Education Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China Mininglamp Academy of Sciences Mininglamp Technology Beijing China
Knowledge representation learning is usually used in knowledge reasoning and other related fields. Its goal is to use low-dimensional vectors to represent the entities and relations in a knowledge graph. In the proces... 详细信息
来源: 评论