咨询与建议

限定检索结果

文献类型

  • 8,975 篇 期刊文献
  • 8,159 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,061 篇 工学
    • 8,413 篇 计算机科学与技术...
    • 6,993 篇 软件工程
    • 2,534 篇 信息与通信工程
    • 1,678 篇 生物工程
    • 1,464 篇 控制科学与工程
    • 1,166 篇 电气工程
    • 1,059 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 760 篇 电子科学与技术(可...
    • 593 篇 机械工程
    • 541 篇 化学工程与技术
    • 380 篇 动力工程及工程热...
    • 371 篇 交通运输工程
    • 369 篇 安全科学与工程
    • 361 篇 网络空间安全
    • 325 篇 仪器科学与技术
  • 6,374 篇 理学
    • 3,292 篇 数学
    • 1,891 篇 生物学
    • 1,610 篇 物理学
    • 1,238 篇 统计学(可授理学、...
    • 636 篇 化学
    • 582 篇 系统科学
  • 3,170 篇 管理学
    • 1,692 篇 管理科学与工程(可...
    • 1,605 篇 图书情报与档案管...
    • 813 篇 工商管理
  • 1,041 篇 医学
    • 860 篇 临床医学
    • 752 篇 基础医学(可授医学...
    • 441 篇 药学(可授医学、理...
    • 420 篇 公共卫生与预防医...
  • 539 篇 法学
    • 453 篇 社会学
  • 307 篇 经济学
  • 213 篇 农学
  • 178 篇 教育学
  • 55 篇 文学
  • 25 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学

主题

  • 541 篇 deep learning
  • 422 篇 feature extracti...
  • 404 篇 semantics
  • 334 篇 machine learning
  • 321 篇 computational mo...
  • 320 篇 training
  • 305 篇 accuracy
  • 256 篇 predictive model...
  • 203 篇 reinforcement le...
  • 201 篇 data mining
  • 192 篇 optimization
  • 185 篇 task analysis
  • 182 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 169 篇 image segmentati...
  • 168 篇 graph neural net...
  • 162 篇 data models
  • 158 篇 convolution
  • 145 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 371 篇 horia hulubei na...
  • 361 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 303 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 201 篇 borsato m.
  • 199 篇 betancourt c.
  • 163 篇 bediaga i.
  • 157 篇 baker s.
  • 153 篇 amato s.
  • 148 篇 baryshnikov f.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,311 篇 英文
  • 1,783 篇 其他
  • 127 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Data Science"
17199 条 记 录,以下是441-450 订阅
排序:
Generalization Error Bounds for Two-stage Recommender Systems with Tree Structure  38
Generalization Error Bounds for Two-stage Recommender System...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Jin Liu, Ze Lian, Defu Chen, Enhong School of Artificial Intelligence and Data Science University of Science and Technology of China China School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence Anhui Hefei China
Two-stage recommender systems play a crucial role in efficiently identifying relevant items and personalizing recommendations from a vast array of options. This paper, based on an error decomposition framework, analyz...
来源: 评论
Few-shot Temporal Pruning Accelerates Diffusion Models for Text Generation  30
Few-shot Temporal Pruning Accelerates Diffusion Models for T...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Li, Bocheng Gao, Zhujin Zhu, Yongxin Yin, Kun Cao, Haoyu Jiang, Deqiang Xu, Linli School of Computer Science and Technology University of Science and Technology of China China School of Data Science University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence China Tencent YouTu Lab China
Diffusion models have achieved significant success in computer vision and shown immense potential in natural language processing applications, particularly for text generation tasks. However, generating high-quality t... 详细信息
来源: 评论
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems  17
SMAKAP: Secure Mutual Authentication and Key Agreement Proto...
收藏 引用
17th International Conference on Security of Information and Networks, SIN 2024
作者: Naziri, Shayesta Wang, Xu Yu, Guangsheng Xu, Jian Shrestha, Sudhir Liang, Christy Jie School of Electrical and Data Engineering University of Technology SydneyNSW2007 Australia School of Computer Science University of Technology SydneyNSW2007 Australia
Radio Frequency Identification (RFID) is a crucial technology in the Internet of Things (IoT), enabling seamless wireless communication and data exchange. However, these technologies can pose significant security chal... 详细信息
来源: 评论
A survey on graph neural network-based next POI recommendation for smart cities
收藏 引用
Journal of Reliable Intelligent Environments 2024年 第3期10卷 299-318页
作者: Yu, Jian Guo, Lucas Zhang, Jiayu Wang, Guiling Department of Computer Science and Soft Engineering Auckland University of Technology Auckland New Zealand School of Information Science and Technology Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data North China University of Technology Beijing China
Amid the rise of mobile technologies and Location-Based Social Networks (LBSNs), there’s an escalating demand for personalized Point-of-Interest (POI) recommendations. Especially pivotal in smart cities, these system... 详细信息
来源: 评论
PRESS: Defending Privacy in Retrieval-Augmented Generation via Embedding Space Shifting
PRESS: Defending Privacy in Retrieval-Augmented Generation v...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: He, Jiaming Liu, Cheng Hou, Guanyu Jiang, Wenbo Li, Jiachen School of Computer Science and Engineering University of Electronic Science and Technology of China China College of Computer Science and Cyber Security Oxford Brookes College Chengdu University of Technology China School of Data Science The Chinese University of Hong Kong Shenzhen China School of Computer Science and Artificial Intelligence Wuhan University of Technology China
Retrieval-augmented generation (RAG) expands the capabilities of large language models (LLMs) in various applications by integrating relevant information retrieved from external data sources. However, the RAG systems ...
来源: 评论
ILRM: Imitation Learning-Based Resource Management for Integrated CPU–GPU Edge Systems With Renewable Energy Sources
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2392-2397页
作者: Hou, Xiangpeng Zhou, Junlong Li, Liying Zhao, Mingzhou Cong, Peijin Wu, Zebin Hu, Shiyan Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Southeast University National Mobile Communications Research Laboratory Nanjing211111 China University of Hong Kong Department of Data and Systems Engineering Hong Kong Hong Kong
This letter focuses on integrated CPU-GPU edge systems with renewable energy sources and studies the resource management problem to minimize the energy consumption of real-time tasks while ensuring temperature and rel... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Efficient Dual-Confounding Eliminating for Weakly-supervised Temporal Action Localization  24
Efficient Dual-Confounding Eliminating for Weakly-supervised...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Li, Ao Liu, Huijun Sheng, Jinrong Chen, Zhongming Ge, Yongxin School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China
Weakly-supervised Temporal Action Localization (WTAL) following a localization-by-classification paradigm has achieved significant results, yet still grapples with confounding arising from ambiguous snippets. Previous... 详细信息
来源: 评论
ScanTrimmer: an Online Dynamic Objects Removal Framework in Laser Scan for Robust Localization
ScanTrimmer: an Online Dynamic Objects Removal Framework in ...
收藏 引用
2023 IEEE International Conference on Robotics and Biomimetics, ROBIO 2023
作者: Wang, Jing Duan, Yifan Ji, Jianmin University of Science and Technology of China School of Data Science Hefei230026 China University of Science and Technology of China School of Computer Science and Technology Hefei230026 China
The Simultaneous Localization and Mapping (SLAM) technique is often employed in robotic localization tasks. For lidar-based SLAM, point cloud registration (PCR) is one of the crucial factors for overall localization p...
来源: 评论
Attribute-based Message Recovery Designated Verifier Proxy Signature Scheme in Telemedicine System
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第1期7卷 101-113页
作者: Hu, Yu Zhang, Yi-Fan Huang, Hui Zhou, Yu-Ping School of Computer Science Minnan Normal University Zhangzhou363000 China School of Computer Science Minnan Normal University Key Laboratory of Data Science and Intelligence Application Fujian Province University Zhangzhou363000 China
With the promotion of cloud medical diagnostic applications, the telemedicine system has become increasingly mature, which brings about much convenience to the people’s lives. Meanwhile, the diagnostic time was great... 详细信息
来源: 评论