咨询与建议

限定检索结果

文献类型

  • 2,123 篇 期刊文献
  • 1,804 篇 会议
  • 17 册 图书

馆藏范围

  • 3,944 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,597 篇 工学
    • 1,908 篇 计算机科学与技术...
    • 1,598 篇 软件工程
    • 621 篇 信息与通信工程
    • 380 篇 电气工程
    • 380 篇 生物工程
    • 331 篇 控制科学与工程
    • 241 篇 电子科学与技术(可...
    • 241 篇 生物医学工程(可授...
    • 237 篇 光学工程
    • 145 篇 机械工程
    • 121 篇 化学工程与技术
    • 115 篇 交通运输工程
    • 104 篇 网络空间安全
    • 101 篇 动力工程及工程热...
    • 96 篇 仪器科学与技术
    • 90 篇 安全科学与工程
  • 1,406 篇 理学
    • 728 篇 数学
    • 431 篇 生物学
    • 349 篇 物理学
    • 256 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 132 篇 化学
  • 742 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 323 篇 图书情报与档案管...
    • 223 篇 工商管理
  • 252 篇 医学
    • 217 篇 临床医学
    • 189 篇 基础医学(可授医学...
    • 123 篇 公共卫生与预防医...
    • 106 篇 药学(可授医学、理...
  • 122 篇 法学
    • 100 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 40 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 132 篇 accuracy
  • 131 篇 deep learning
  • 105 篇 feature extracti...
  • 105 篇 machine learning
  • 96 篇 training
  • 95 篇 semantics
  • 90 篇 computational mo...
  • 79 篇 data models
  • 76 篇 real-time system...
  • 72 篇 internet of thin...
  • 69 篇 predictive model...
  • 61 篇 convolutional ne...
  • 58 篇 federated learni...
  • 52 篇 reinforcement le...
  • 47 篇 graph neural net...
  • 46 篇 deep neural netw...
  • 45 篇 data mining
  • 45 篇 artificial intel...
  • 43 篇 optimization
  • 41 篇 convolution

机构

  • 184 篇 college of compu...
  • 102 篇 beijing advanced...
  • 101 篇 national enginee...
  • 75 篇 nanyang technolo...
  • 69 篇 school of comput...
  • 60 篇 national enginee...
  • 50 篇 school of big da...
  • 50 篇 school of comput...
  • 45 篇 school of comput...
  • 43 篇 school of cyber ...
  • 39 篇 national enginee...
  • 36 篇 university of ch...
  • 35 篇 school of comput...
  • 33 篇 college of intel...
  • 32 篇 services computi...
  • 32 篇 hubei engineerin...
  • 31 篇 college of compu...
  • 29 篇 school of comput...
  • 29 篇 school of data a...
  • 28 篇 hubei key labora...

作者

  • 159 篇 niyato dusit
  • 104 篇 hai jin
  • 98 篇 jin hai
  • 34 篇 kang jiawen
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 tao dacheng
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 li tianrui
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 sun geng
  • 21 篇 dusit niyato
  • 20 篇 wang jiacheng
  • 20 篇 du hongyang
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 19 篇 chen mingzhe

语言

  • 3,120 篇 英文
  • 797 篇 其他
  • 35 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3944 条 记 录,以下是1541-1550 订阅
排序:
DNGNN: Efficient Deep Noisy Graph Neural Network for Spatio-Temporal Series Forecasting
DNGNN: Efficient Deep Noisy Graph Neural Network for Spatio-...
收藏 引用
2025 2nd International Conference on Algorithms, Software engineering and Network Security (ASENS)
作者: Songbo Wang Yifan Chen Haizhi Xu Jianqiao Hu Peiyu Zeng Ziming Hu School of Computing and Data Science The University of Hong Kong Hong Kong China School of Microelectronics Science and Technology Sun Yat-sen University Zhuhai China School of Software Engineering South China University of Technology Guangzhou China School of Materials Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
Spatio-temporal series forecasting plays a vital role in the domain of multivariate time series prediction. By leveraging accurate and comprehensive spatio-temporal sequence prediction models, it becomes possible to e... 详细信息
来源: 评论
Contamination-resilient anomaly detection via adversarial learning on partially-observed normal and anomalous data  24
Contamination-resilient anomaly detection via adversarial le...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Wenxi Lv Qinliang Su Hai Wan Hongteng Xu Wenchao Xu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China and Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Gaoling School of Artifical Intelligence Renmin University of China Beijing China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR
Many existing anomaly detection methods assume the availability of a large-scale normal dataset. But for many applications, limited by resources, removing all anomalous samples from a large unlabeled dataset is unreal...
来源: 评论
Towards Context-aware Support for Color Vision Deficiency: An Approach Integrating LLM and AR
arXiv
收藏 引用
arXiv 2024年
作者: Morita, Shogo Zhang, Yan Yamauchi, Takuto Chen, Sinan Li, Jialong Tei, Kenji School of Computing Tokyo Institute of Technology Tokyo Japan International Research Center for Neurointelligence the University of Tokyo Tokyo Japan Department of Computer Science and Engineering Waseda University Tokyo Japan Center of Mathematical and Data Sciences Kobe University Kobe Japan
People with color vision deficiency often face challenges in distinguishing colors such as red and green, which can complicate daily tasks and require the use of assistive tools or environmental adjustments. Current s... 详细信息
来源: 评论
Efficient Meta Neural Heuristic for Multi-Objective Combinatorial Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Jinbiao Wang, Jiahai Zhang, Zizhen Cao, Zhiguang Ye, Te Chen, Siyuan School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Sun Yat-sen University China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China School of Computing and Information Systems Singapore Management University Singapore
Recently, neural heuristics based on deep reinforcement learning have exhibited promise in solving multi-objective combinatorial optimization problems (MOCOPs). However, they are still struggling to achieve high learn... 详细信息
来源: 评论
Multi-scale Dynamic and Hierarchical Relationship Modeling for Facial Action Units Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Zihan Song, Siyang Luo, Cheng Deng, Songhe Xie, Weicheng Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China University of Leicester United Kingdom Monash University Australia
Human facial action units (AUs) are mutually related in a hierarchical manner, as not only they are associated with each other in both spatial and temporal domains but also AUs located in the same/close facial regions... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
Monge-Ampere Regularization for Learning Arbitrary Shapes from Point Clouds
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年
作者: Yang, Chuanxiang Zhou, Yuanfeng Wei, Guangshun Ma, Long Hou, Junhui Liu, Yuan Wang, Wenping The School of Software Shandong University Jinan250100 China The Department of Computer Science City University of Hong Kong Hong Kong The College of Computing and Data Science Nanyang Technological University Singapore The Department of Computer Science and Engineering Texas A&M University College StationTX77843 United States
As commonly used implicit geometry representations, the signed distance function (SDF) is limited to modeling watertight shapes, while the unsigned distance function (UDF) is capable of representing various surfaces. ... 详细信息
来源: 评论
Curvature Graph Generative Adversarial Networks
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jianxin Fu, Xingcheng Sun, Qingyun Ji, Cheng Tan, Jiajun Wu, Jia Peng, Hao Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China School of Computing Macquarie University Sydney Australia
Generative adversarial network (GAN) is widely used for generalized and robust learning on graph data. However, for non-Euclidean graph data, the existing GAN-based graph representation methods generate negative sampl... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
PsFuture: A Pseudo-Future-based Zero-Shot Adaptive Policy for Simultaneous Machine Translation
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Libo Li, Jing Zeng, Ziqian Shien-Ming Wu School of Intelligent Engineering South China University of Technology China Department of Computing Hong Kong Polytechnic University Hong Kong Research Centre for Data Science & Artificial Intelligence Hong Kong Polytechnic University Hong Kong
Simultaneous Machine Translation (SiMT) requires target tokens to be generated in real-time as streaming source tokens are consumed. Traditional approaches to SiMT typically require sophisticated architectures and ext... 详细信息
来源: 评论