咨询与建议

限定检索结果

文献类型

  • 8,975 篇 期刊文献
  • 8,159 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,061 篇 工学
    • 8,413 篇 计算机科学与技术...
    • 6,993 篇 软件工程
    • 2,534 篇 信息与通信工程
    • 1,678 篇 生物工程
    • 1,464 篇 控制科学与工程
    • 1,166 篇 电气工程
    • 1,059 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 760 篇 电子科学与技术(可...
    • 593 篇 机械工程
    • 541 篇 化学工程与技术
    • 380 篇 动力工程及工程热...
    • 371 篇 交通运输工程
    • 369 篇 安全科学与工程
    • 361 篇 网络空间安全
    • 325 篇 仪器科学与技术
  • 6,374 篇 理学
    • 3,292 篇 数学
    • 1,891 篇 生物学
    • 1,610 篇 物理学
    • 1,238 篇 统计学(可授理学、...
    • 636 篇 化学
    • 582 篇 系统科学
  • 3,170 篇 管理学
    • 1,692 篇 管理科学与工程(可...
    • 1,605 篇 图书情报与档案管...
    • 813 篇 工商管理
  • 1,041 篇 医学
    • 860 篇 临床医学
    • 752 篇 基础医学(可授医学...
    • 441 篇 药学(可授医学、理...
    • 420 篇 公共卫生与预防医...
  • 539 篇 法学
    • 453 篇 社会学
  • 307 篇 经济学
  • 213 篇 农学
  • 178 篇 教育学
  • 55 篇 文学
  • 25 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学

主题

  • 541 篇 deep learning
  • 422 篇 feature extracti...
  • 404 篇 semantics
  • 334 篇 machine learning
  • 321 篇 computational mo...
  • 320 篇 training
  • 305 篇 accuracy
  • 256 篇 predictive model...
  • 203 篇 reinforcement le...
  • 201 篇 data mining
  • 192 篇 optimization
  • 185 篇 task analysis
  • 182 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 169 篇 image segmentati...
  • 168 篇 graph neural net...
  • 162 篇 data models
  • 158 篇 convolution
  • 145 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 371 篇 horia hulubei na...
  • 361 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 303 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 201 篇 borsato m.
  • 199 篇 betancourt c.
  • 163 篇 bediaga i.
  • 157 篇 baker s.
  • 153 篇 amato s.
  • 148 篇 baryshnikov f.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,311 篇 英文
  • 1,783 篇 其他
  • 127 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Data Science"
17199 条 记 录,以下是501-510 订阅
排序:
Multi-level Knowledge Integration with Graph Convolutional Network for Cancer Molecular Subtype Classification
Multi-level Knowledge Integration with Graph Convolutional N...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Huang, Sujia Xiao, Shunxin Liu, Wenzhe Lu, Jielong Wu, Zhihao Wang, Shiping Rajapakse, Jagath C. Fuzhou University College of Computer and Data Science Fuzhou China Huzhou University School of Information Engineering Huzhou China Nanyang Technological University School of Computer Science and Engineering Singapore
Multi-omics data provides a wealth of information concerning disease mechanisms, which benefits the exploration of the intricate molecular phenomena underlying diseases. In recent years, considerable endeavors have be... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论
Improved Particle Swarm Algorithm Using Multiple Strategies  1
收藏 引用
14th International Symposium on Intelligence Computation and Applications, ISICA 2023
作者: Yi, Yunfei Wang, Zhiyong Shi, Yunying School of Big Data and Computer Hechi University Guangxi Yizhou546300 China College of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541001 China
In order to address the issues of premature convergence and low search efficiency in the basic particle swarm algorithm, this paper analyzes the improved particle swarm optimization algorithms proposed by previous res... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Insider Trading with a Random Deadline under Partial Observations:Maximal Principle Method
收藏 引用
Acta Mathematicae Applicatae Sinica 2022年 第4期38卷 753-762页
作者: Kai XIAO Yong-hui ZHOU School of Mathematical Sciences Guizhou Normal UniversityGuiyang 550001China School of Big Data and Computer Science Guizhou Normal UniversityGuiyang 550001China
For a revised model of Caldentey and Stacchetti(Econometrica,2010)in continuous-time insider trading with a random deadline which allows market makers to observe some information on a risky asset,a closed form of its ... 详细信息
来源: 评论
Cross-modal image text retrieval based on Cross-optimization and Joint strategy
Cross-modal image text retrieval based on Cross-optimization...
收藏 引用
2024 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2024
作者: Zheng, Wei Han, Na Hu, Yan Kang, Peipei Zhang, Yue Yang, Aqing Zhang, Lei School of Computer Science Guangdong Polytechnic Normal University China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data China School of Computer Science and Technology Guangdong University of Technology China School of Information Engineering East University of Heilongjiang China
In the fields of computer vision and natural language processing, cross-modal retrieval is of great importance that cannot be ignored. In existing multi-granularity alignment methods, significant progress has been mad... 详细信息
来源: 评论
Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 695-712页
作者: Fangjun Luan Xuewen Mu Shuai Yuan Department of Computer Technology School of Computer Science and EngineeringShenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Jianzhu UniversityShenyang110168China Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang Jianzhu UniversityShenyang110168China
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd... 详细信息
来源: 评论
DBFIA: Diffusion-Based Face Image Anonymization  24th
DBFIA: Diffusion-Based Face Image Anonymization
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xue, Hanyu Yuan, Xin Liu, Bo Ding, Ming Australian Artificial Intelligence Institute School of Computer Science University of Technology Sydney Ultimo Australia Data61 CSIRO Eveleigh Australia
This paper presents a novel approach to address the issue of identity protection in facial image datasets. Our goal is to prevent any violation of privacy for the individuals depicted in the dataset while ensuring tha... 详细信息
来源: 评论
AMHF-TP:Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
收藏 引用
Quantitative Biology 2025年 第1期13卷 127-141页
作者: Shouheng Tuo YanLing Zhu Jiangkun Lin Jiewei Jiang School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’anChina Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’anChina Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anChina School of Electronic Engineering Xi’an University of Posts and TelecommunicationsXi’anChina
Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as e... 详细信息
来源: 评论
An Analysis of data Sparsity Resolution Algorithms Used in Recommender Systems  1
收藏 引用
4th International Conference on Advances in Information Communication Technology and Computing, AICTC 2022
作者: Bhardwaj, Shivani Kanwar, Kushal Gupta, Gaurav Yogananda School of AI Computer and Data Science Shoolini University H.P. Solan India
In previous years, a substantial rise has been observed in the use of YouTube, Netflix, Amazon, and other similar web services that have enabled the utilization of recommender systems. Ranging from e-commerce to onlin... 详细信息
来源: 评论