咨询与建议

限定检索结果

文献类型

  • 2,143 篇 期刊文献
  • 1,804 篇 会议
  • 17 册 图书

馆藏范围

  • 3,964 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,595 篇 工学
    • 1,908 篇 计算机科学与技术...
    • 1,598 篇 软件工程
    • 621 篇 信息与通信工程
    • 381 篇 电气工程
    • 380 篇 生物工程
    • 331 篇 控制科学与工程
    • 241 篇 电子科学与技术(可...
    • 241 篇 生物医学工程(可授...
    • 237 篇 光学工程
    • 145 篇 机械工程
    • 121 篇 化学工程与技术
    • 115 篇 交通运输工程
    • 104 篇 网络空间安全
    • 101 篇 动力工程及工程热...
    • 96 篇 仪器科学与技术
    • 90 篇 安全科学与工程
  • 1,407 篇 理学
    • 726 篇 数学
    • 432 篇 生物学
    • 349 篇 物理学
    • 254 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 132 篇 化学
  • 742 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 323 篇 图书情报与档案管...
    • 223 篇 工商管理
  • 256 篇 医学
    • 220 篇 临床医学
    • 191 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
    • 106 篇 药学(可授医学、理...
  • 122 篇 法学
    • 100 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 41 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 132 篇 deep learning
  • 132 篇 accuracy
  • 106 篇 machine learning
  • 105 篇 feature extracti...
  • 96 篇 training
  • 95 篇 semantics
  • 90 篇 computational mo...
  • 79 篇 data models
  • 76 篇 real-time system...
  • 73 篇 internet of thin...
  • 69 篇 predictive model...
  • 61 篇 convolutional ne...
  • 59 篇 federated learni...
  • 52 篇 reinforcement le...
  • 47 篇 graph neural net...
  • 46 篇 deep neural netw...
  • 45 篇 data mining
  • 45 篇 artificial intel...
  • 43 篇 optimization
  • 41 篇 convolution

机构

  • 184 篇 college of compu...
  • 102 篇 national enginee...
  • 101 篇 beijing advanced...
  • 75 篇 nanyang technolo...
  • 69 篇 school of comput...
  • 61 篇 national enginee...
  • 50 篇 school of big da...
  • 50 篇 school of comput...
  • 46 篇 school of comput...
  • 44 篇 school of cyber ...
  • 39 篇 national enginee...
  • 36 篇 university of ch...
  • 34 篇 school of comput...
  • 33 篇 college of intel...
  • 32 篇 services computi...
  • 32 篇 hubei engineerin...
  • 31 篇 college of compu...
  • 30 篇 school of data a...
  • 29 篇 school of comput...
  • 28 篇 hubei key labora...

作者

  • 159 篇 niyato dusit
  • 104 篇 hai jin
  • 95 篇 jin hai
  • 32 篇 kang jiawen
  • 31 篇 xiaofei liao
  • 28 篇 tao dacheng
  • 28 篇 shen linlin
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 li tianrui
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 sun geng
  • 21 篇 dusit niyato
  • 20 篇 wang jiacheng
  • 20 篇 du hongyang
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 17 篇 xiuhua li

语言

  • 3,140 篇 英文
  • 797 篇 其他
  • 35 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3964 条 记 录,以下是1551-1560 订阅
排序:
Evolutionary Competitive Multiobjective Multitasking: One-Pass Optimization of Heterogeneous Pareto Solutions
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Li, Yanchi Wu, Xinyi Gong, Wenyin Xu, Meng Wang, Yubo Gu, Qiong China University of Geosciences School of Computer Wuhan430074 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Hubei University of Arts and Science School of Computer Engineering Xiangyang441053 China Hubei University of Arts and Science Hubei Key Laboratory of Power System Design and Test for Electrical Vehicle Xiangyang441053 China
Competitive multiobjective multitask optimization (CMO-MTO) problems involve multiple tasks with comparable objectives but heterogeneous decision variables. The final Pareto front in CMO-MTO consists of multiple subse... 详细信息
来源: 评论
Towards Context-aware Support for Color Vision Deficiency: An Approach Integrating LLM and AR
Towards Context-aware Support for Color Vision Deficiency: A...
收藏 引用
IEEE Global Conference on Consumer Electronics (GCCE)
作者: Shogo Morita Yan Zhang Takuto Yamauchi Sinan Chen Jialong Li Kenji Tei School of Computing Tokyo Institute of Technology Tokyo Japan International Research Center for Neurointelligence University of Tokyo Tokyo Japan Department of Computer Science and Engineering Waseda University Tokyo Japan Center of Mathematical and Data Sciences Kobe University Kobe Japan
People with color vision deficiency often face challenges in distinguishing colors such as red and green, which can complicate daily tasks and require the use of assistive tools or environmental adjustments. Current s... 详细信息
来源: 评论
Efficient Meta Neural Heuristic for Multi-Objective Combinatorial Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Jinbiao Wang, Jiahai Zhang, Zizhen Cao, Zhiguang Ye, Te Chen, Siyuan School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Sun Yat-sen University China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China School of Computing and Information Systems Singapore Management University Singapore
Recently, neural heuristics based on deep reinforcement learning have exhibited promise in solving multi-objective combinatorial optimization problems (MOCOPs). However, they are still struggling to achieve high learn... 详细信息
来源: 评论
Graph Neural Networks for Wireless Networks: Graph Representation, Architecture and Evaluation
arXiv
收藏 引用
arXiv 2024年
作者: Lu, Yang Li, Yuhang Zhang, Ruichen Chen, Wei Ai, Bo Niyato, Dusit School of Computer and Technology China Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China
Graph neural networks (GNNs) have been regarded as the basic model to facilitate deep learning (DL) to revolutionize resource allocation in wireless networks. GNN-based models are shown to be able to learn the structu... 详细信息
来源: 评论
Enhancing Cloud Image Retrieval Efficiency through Secure Optimization
Enhancing Cloud Image Retrieval Efficiency through Secure Op...
收藏 引用
Knowledge engineering and Communication Systems (ICKECS), International Conference on
作者: N. BalaKrishna M. Sakthivel G.Sai Ushasri J.Naga Thanmai K.Bharath Kumar G.Venkaiah Swamy Department of AI/ML School of Computing Mohan Babu University Data science Tirupati AndhraPradesh India Department of Artificial Intelligence Sri Shanmugha College of Engineering and Technology Sankari Salem Tamilnadu India Department of CSE Sree Sree Vidyanikethan Engineering college Tirupati Andhra pradesh India
There is a growing trend of using public clouds for image search outsourcing. However, privacy issues arise when image datasets are directly outsourced to untrusted clouds. Recently, a number of secure image retrieval... 详细信息
来源: 评论
Monge-Ampere Regularization for Learning Arbitrary Shapes from Point Clouds
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年
作者: Yang, Chuanxiang Zhou, Yuanfeng Wei, Guangshun Ma, Long Hou, Junhui Liu, Yuan Wang, Wenping The School of Software Shandong University Jinan250100 China The Department of Computer Science City University of Hong Kong Hong Kong The College of Computing and Data Science Nanyang Technological University Singapore The Department of Computer Science and Engineering Texas A&M University College StationTX77843 United States
As commonly used implicit geometry representations, the signed distance function (SDF) is limited to modeling watertight shapes, while the unsigned distance function (UDF) is capable of representing various surfaces. ... 详细信息
来源: 评论
Toward Democratized Generative AI in Next-Generation Mobile Edge Networks
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Ruichen He, Jiayi Luo, Xiaofeng Niyato, Dusit Kang, Jiawen Xiong, Zehui Li, Yonghui Sikdar, Biplab The College of Computing and Data Science Nanyang Technological University Singapore The School of Automation Guangdong University of Technology Guangzhou510006 China The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore The School of Electrical and Information Engineering University of Sydney SydneyNSW2006 Australia The Department of Electrical and Computer Engineering College of Design and Engineering National University of Singapore Singapore
The rapid development of generative AI technologies, including large language models (LLMs), has brought transformative changes to various fields. However, deploying such advanced models on mobile and edge devices rem... 详细信息
来源: 评论
Curvature Graph Generative Adversarial Networks
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jianxin Fu, Xingcheng Sun, Qingyun Ji, Cheng Tan, Jiajun Wu, Jia Peng, Hao Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China School of Computing Macquarie University Sydney Australia
Generative adversarial network (GAN) is widely used for generalized and robust learning on graph data. However, for non-Euclidean graph data, the existing GAN-based graph representation methods generate negative sampl... 详细信息
来源: 评论
Contamination-resilient anomaly detection via adversarial learning on partially-observed normal and anomalous data  24
Contamination-resilient anomaly detection via adversarial le...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Wenxi Lv Qinliang Su Hai Wan Hongteng Xu Wenchao Xu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China and Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Gaoling School of Artifical Intelligence Renmin University of China Beijing China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR
Many existing anomaly detection methods assume the availability of a large-scale normal dataset. But for many applications, limited by resources, removing all anomalous samples from a large unlabeled dataset is unreal...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论