咨询与建议

限定检索结果

文献类型

  • 6,029 篇 期刊文献
  • 5,211 篇 会议
  • 49 册 图书

馆藏范围

  • 11,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,229 篇 工学
    • 5,376 篇 计算机科学与技术...
    • 4,519 篇 软件工程
    • 1,773 篇 信息与通信工程
    • 1,136 篇 生物工程
    • 914 篇 电气工程
    • 903 篇 控制科学与工程
    • 721 篇 生物医学工程(可授...
    • 651 篇 光学工程
    • 618 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 362 篇 化学工程与技术
    • 283 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 253 篇 仪器科学与技术
    • 247 篇 网络空间安全
    • 238 篇 安全科学与工程
  • 4,278 篇 理学
    • 2,132 篇 数学
    • 1,301 篇 生物学
    • 1,176 篇 物理学
    • 799 篇 统计学(可授理学、...
    • 442 篇 化学
    • 385 篇 系统科学
  • 2,085 篇 管理学
    • 1,214 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 587 篇 工商管理
  • 698 篇 医学
    • 577 篇 临床医学
    • 502 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 286 篇 公共卫生与预防医...
  • 356 篇 法学
    • 301 篇 社会学
  • 231 篇 经济学
  • 165 篇 农学
  • 115 篇 教育学
  • 44 篇 文学
  • 21 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 372 篇 deep learning
  • 300 篇 feature extracti...
  • 270 篇 accuracy
  • 246 篇 semantics
  • 238 篇 machine learning
  • 238 篇 training
  • 213 篇 computational mo...
  • 179 篇 predictive model...
  • 155 篇 internet of thin...
  • 146 篇 real-time system...
  • 138 篇 optimization
  • 136 篇 data models
  • 132 篇 data mining
  • 123 篇 reinforcement le...
  • 120 篇 convolutional ne...
  • 115 篇 neural networks
  • 106 篇 image segmentati...
  • 105 篇 convolution
  • 103 篇 object detection
  • 102 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 360 篇 van swinderen in...
  • 334 篇 yandex school of...
  • 309 篇 school of physic...
  • 308 篇 cavendish labora...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 289 篇 center for high ...
  • 288 篇 imperial college...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 201 篇 bediaga i.
  • 195 篇 amato s.
  • 185 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 160 篇 braun s.
  • 158 篇 baker s.
  • 158 篇 borisyak m.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,445 篇 英文
  • 767 篇 其他
  • 83 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11289 条 记 录,以下是4831-4840 订阅
排序:
RankFIRST: Visual Analysis for Factor Investment By Ranking Stock Timeseries
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2022年 PP卷 1-10页
作者: Guo, Huijie Liu, Meijun Yang, Bowen Sun, Ye Qu, Huamin Shi, Lei SKLSDE and Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University China Hong Kong University of Science and Technology Hong Kong
In the era of quantitative investment, factor-based investing models are widely adopted in the construction of stock portfolios. These models explain the performance of individual stocks by a set of financial factors,... 详细信息
来源: 评论
Controllable Wireless Sensing via Target-Mounted Intelligent Reflecting Surface
Controllable Wireless Sensing via Target-Mounted Intelligent...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Xiaodan Shao Rui Zhang Institute for Digital Communications Friedrich-Alexander University of Erlangen-Nürnberg Germany School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China Department of Electrical and Computer Engineering National University of Singapore Singapore
Intelligent reflecting surface (IRS) is regarded as a promising technique to control wireless channels for improving the communication and/or sensing performance of wireless systems. In this paper, we propose a new ta...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Joint Location and Power Optimization for Secure Communications in Multi-UAVs Enabled Cellular Networks
Joint Location and Power Optimization for Secure Communicati...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Fei Deng Kaiguo Qian Shikai Shen Sunyan Hong Bin Yang Xuanxuan Li Jun He College of Information Engineering Kunming University Kunming China Key Laboratory of Data Governance and Intelligent Decision in Universities of Yunnan Kunming China School of Computer and Information Engineering Chuzhou University Chuzhou China Office of Science and Technology Kunming University Kunming China
This paper investigates joint location and power optimization for secure communication in a multi-unmanned acrial vehicles (U A V s) enabled cellular network consisting of interference link, eavesdropping link, cellul...
来源: 评论
KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation
arXiv
收藏 引用
arXiv 2024年
作者: Tao, Wei Zhou, Yucheng Wang, Yanlin Zhang, Hongyu Wang, Haofen Zhang, Wenqiang Shanghai Engineering Research Center of AI and Robotics Academy for Engineering and Technology Fudan University Shanghai China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Software Engineering Sun Yat-sen University Guangdong Zhuhai519082 China School of Big Data and Software Engineering Chongqing University Chongqing China College of Design and Innovation Tongji University Shanghai China Engineering Research Center of AI and Robotics Ministry of Education Academy for Engineering and Technology Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University 220 Handan Road Shanghai200433 China
Commit messages are natural language descriptions of code changes, which are important for software evolution such as code understanding and maintenance. However, previous methods are trained on the entire dataset wit... 详细信息
来源: 评论
KA$^{2}$2SE: Key-Aggregation Authorized Searchable Encryption Scheme for data Sharing in Wireless Sensor Networks
收藏 引用
IEEE Transactions on Services Computing 2024年 第1期18卷 226-238页
作者: Haijiang Wang Jianting Ning Wei Wu Chao Lin Kai Zhang School of Information and Electronic Engineering Zhejiang University of Science and Technology Zhejiang China School of Cyber Science and Engineering Wuhan University Wuhan China Faculty of Data Science City University of Macau Macau China College of Education Sciences Hong Kong University of Science and Technology Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou China College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m... 详细信息
来源: 评论
Proximal bundle methods for hybrid weakly convex composite optimization problems
arXiv
收藏 引用
arXiv 2023年
作者: Liang, Jiaming Monteiro, Renato D.C. Zhang, Honghao Goergen Institute for Data Science Department of Computer Science University of Rochester RochesterNY14620 United States School of Industrial and Systems Engineering Georgia Institute of Technology AtlantaGA30332-0205 United States
This paper establishes the iteration-complexity of proximal bundle methods for solving hybrid (i.e., a blend of smooth and nonsmooth) weakly convex composite optimization (HWC-CO) problems. This is done in a unified m... 详细信息
来源: 评论
A Hybrid Method for Photonic Crystal Fiber Polarization Filter Based on Artificial Neural Network and Genetic Algorithms
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Dan Qin, Huobin Li, Yijin Tang, Chang Xu, Bin Cheng, Tonglei College of Information Science & Engineering Northeastern University Shenyang110819 China Key Laboratory of Data Analytics and Optimization for Smart Industry Ministry of Education Northeastern University Shenyang110819 China School of Computer Science and Engineering Northeastern University Shenyang110169 China
In this paper, we proposed a design method for photonic crystal fiber polarization filters incorporating artificial neural network (ANN) and genetic algorithm (GA) to achieve high-performance polarization filters. The... 详细信息
来源: 评论
Group Multi-View Transformer for 3D Shape Analysis with Spatial Encoding
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Lixiang Cui, Qingzhe Hong, Richang Xu, Wei Chen, Enhong Yuan, Xin Li, Chenglong Tang, Yuanyan The College of Artificial Intelligence and Big Data Hefei University Hefei230027 China The School of Computer Science and Information Engineering Hefei University of Technology Hefei230009 China The Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China Anhui Hefei230000 China The School of Electrical and Mechanical Engineering The University of Adelaide AdelaideSA5005 Australia The School of Artificial Intelligence Anhui University Hefei230601 China The Zhuhai UM Science and Technology Research Institute FST University of Macau China
In recent years, the results of view-based 3D shape recognition methods have saturated, and models with excellent performance cannot be deployed on memory-limited devices due to their huge size of parameters. To addre... 详细信息
来源: 评论
MQENet: A Mesh Quality Evaluation Neural Network Based on Dynamic Graph Attention
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Haoxuan Li, Haisheng Li, Nan Wang, Xiaochuan School of Computer Science and Engineering Beijing Technology and Business University Beijing100048 China Beijing Key Laboratory of Big Data Technology for Food Safety Beijing100048 China National Engineering Laboratory for Agri-product Quality Traceability Beijing100048 China
With the development of computational fluid dynamics, the requirements for the fluid simulation accuracy in industrial applications have also increased. The quality of the generated mesh directly affects the simulatio... 详细信息
来源: 评论