咨询与建议

限定检索结果

文献类型

  • 2,188 篇 期刊文献
  • 1,829 篇 会议
  • 17 册 图书

馆藏范围

  • 4,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,656 篇 工学
    • 1,959 篇 计算机科学与技术...
    • 1,623 篇 软件工程
    • 644 篇 信息与通信工程
    • 405 篇 电气工程
    • 380 篇 生物工程
    • 357 篇 控制科学与工程
    • 249 篇 电子科学与技术(可...
    • 241 篇 生物医学工程(可授...
    • 239 篇 光学工程
    • 152 篇 机械工程
    • 124 篇 化学工程与技术
    • 121 篇 交通运输工程
    • 111 篇 网络空间安全
    • 104 篇 动力工程及工程热...
    • 102 篇 仪器科学与技术
    • 94 篇 安全科学与工程
  • 1,435 篇 理学
    • 734 篇 数学
    • 435 篇 生物学
    • 362 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 138 篇 化学
    • 135 篇 系统科学
  • 758 篇 管理学
    • 476 篇 管理科学与工程(可...
    • 327 篇 图书情报与档案管...
    • 227 篇 工商管理
  • 262 篇 医学
    • 223 篇 临床医学
    • 191 篇 基础医学(可授医学...
    • 130 篇 公共卫生与预防医...
    • 106 篇 药学(可授医学、理...
  • 124 篇 法学
    • 102 篇 社会学
  • 77 篇 经济学
  • 54 篇 农学
  • 45 篇 教育学
  • 7 篇 文学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 139 篇 deep learning
  • 134 篇 accuracy
  • 110 篇 machine learning
  • 107 篇 feature extracti...
  • 100 篇 training
  • 96 篇 semantics
  • 91 篇 computational mo...
  • 80 篇 data models
  • 78 篇 real-time system...
  • 75 篇 internet of thin...
  • 69 篇 predictive model...
  • 62 篇 federated learni...
  • 61 篇 convolutional ne...
  • 54 篇 reinforcement le...
  • 47 篇 graph neural net...
  • 46 篇 deep neural netw...
  • 46 篇 optimization
  • 46 篇 data mining
  • 45 篇 artificial intel...
  • 42 篇 security

机构

  • 195 篇 college of compu...
  • 102 篇 national enginee...
  • 101 篇 beijing advanced...
  • 74 篇 nanyang technolo...
  • 70 篇 school of comput...
  • 63 篇 national enginee...
  • 53 篇 school of big da...
  • 50 篇 school of comput...
  • 46 篇 school of comput...
  • 44 篇 school of cyber ...
  • 39 篇 national enginee...
  • 37 篇 university of ch...
  • 34 篇 school of comput...
  • 33 篇 college of intel...
  • 32 篇 college of compu...
  • 32 篇 services computi...
  • 32 篇 hubei engineerin...
  • 31 篇 school of comput...
  • 30 篇 school of data a...
  • 28 篇 hubei key labora...

作者

  • 166 篇 niyato dusit
  • 105 篇 hai jin
  • 97 篇 jin hai
  • 31 篇 xiaofei liao
  • 31 篇 kang jiawen
  • 29 篇 tao dacheng
  • 28 篇 shen linlin
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 25 篇 rajeswari d.
  • 24 篇 li tianrui
  • 23 篇 sun geng
  • 22 篇 peng hao
  • 21 篇 dusit niyato
  • 21 篇 xiong zehui
  • 21 篇 wang jiacheng
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 18 篇 du hongyang
  • 17 篇 xiuhua li

语言

  • 2,835 篇 英文
  • 1,175 篇 其他
  • 38 篇 中文
检索条件"机构=School of Computing and Data Engineering"
4034 条 记 录,以下是1641-1650 订阅
排序:
DNGNN: Efficient Deep Noisy Graph Neural Network for Spatio-Temporal Series Forecasting
DNGNN: Efficient Deep Noisy Graph Neural Network for Spatio-...
收藏 引用
2025 2nd International Conference on Algorithms, Software engineering and Network Security (ASENS)
作者: Songbo Wang Yifan Chen Haizhi Xu Jianqiao Hu Peiyu Zeng Ziming Hu School of Computing and Data Science The University of Hong Kong Hong Kong China School of Microelectronics Science and Technology Sun Yat-sen University Zhuhai China School of Software Engineering South China University of Technology Guangzhou China School of Materials Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
Spatio-temporal series forecasting plays a vital role in the domain of multivariate time series prediction. By leveraging accurate and comprehensive spatio-temporal sequence prediction models, it becomes possible to e... 详细信息
来源: 评论
Monge-Ampere Regularization for Learning Arbitrary Shapes from Point Clouds
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年
作者: Yang, Chuanxiang Zhou, Yuanfeng Wei, Guangshun Ma, Long Hou, Junhui Liu, Yuan Wang, Wenping The School of Software Shandong University Jinan250100 China The Department of Computer Science City University of Hong Kong Hong Kong The College of Computing and Data Science Nanyang Technological University Singapore The Department of Computer Science and Engineering Texas A&M University College StationTX77843 United States
As commonly used implicit geometry representations, the signed distance function (SDF) is limited to modeling watertight shapes, while the unsigned distance function (UDF) is capable of representing various surfaces. ... 详细信息
来源: 评论
Towards Context-aware Support for Color Vision Deficiency: An Approach Integrating LLM and AR
arXiv
收藏 引用
arXiv 2024年
作者: Morita, Shogo Zhang, Yan Yamauchi, Takuto Chen, Sinan Li, Jialong Tei, Kenji School of Computing Tokyo Institute of Technology Tokyo Japan International Research Center for Neurointelligence the University of Tokyo Tokyo Japan Department of Computer Science and Engineering Waseda University Tokyo Japan Center of Mathematical and Data Sciences Kobe University Kobe Japan
People with color vision deficiency often face challenges in distinguishing colors such as red and green, which can complicate daily tasks and require the use of assistive tools or environmental adjustments. Current s... 详细信息
来源: 评论
Toward Democratized Generative AI in Next-Generation Mobile Edge Networks
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Ruichen He, Jiayi Luo, Xiaofeng Niyato, Dusit Kang, Jiawen Xiong, Zehui Li, Yonghui Sikdar, Biplab The College of Computing and Data Science Nanyang Technological University Singapore The School of Automation Guangdong University of Technology Guangzhou510006 China The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore The School of Electrical and Information Engineering University of Sydney SydneyNSW2006 Australia The Department of Electrical and Computer Engineering College of Design and Engineering National University of Singapore Singapore
The rapid development of generative AI technologies, including large language models (LLMs), has brought transformative changes to various fields. However, deploying such advanced models on mobile and edge devices rem... 详细信息
来源: 评论
Contamination-resilient anomaly detection via adversarial learning on partially-observed normal and anomalous data  24
Contamination-resilient anomaly detection via adversarial le...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Wenxi Lv Qinliang Su Hai Wan Hongteng Xu Wenchao Xu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China and Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Gaoling School of Artifical Intelligence Renmin University of China Beijing China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR
Many existing anomaly detection methods assume the availability of a large-scale normal dataset. But for many applications, limited by resources, removing all anomalous samples from a large unlabeled dataset is unreal...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
PsFuture: A Pseudo-Future-based Zero-Shot Adaptive Policy for Simultaneous Machine Translation
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Libo Li, Jing Zeng, Ziqian Shien-Ming Wu School of Intelligent Engineering South China University of Technology China Department of Computing Hong Kong Polytechnic University Hong Kong Research Centre for Data Science & Artificial Intelligence Hong Kong Polytechnic University Hong Kong
Simultaneous Machine Translation (SiMT) requires target tokens to be generated in real-time as streaming source tokens are consumed. Traditional approaches to SiMT typically require sophisticated architectures and ext... 详细信息
来源: 评论
Cognitive Farming in Agriculture: Deploying CNN-RF for Maize Disease Precision Diagnostics
Cognitive Farming in Agriculture: Deploying CNN-RF for Maize...
收藏 引用
Contemporary computing and Communications (InC4), IEEE International Conference on
作者: S. Nisha Chandran Ashish Garg Dheeraj Namdev Vinay Kukreja Shiva Mehta School of Computing Graphic Era Hill University Dehradun Uttarakhand India Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Artificial Intelligence & Data Science IIMT College of Engineering Greater Noida Uttar Pradesh India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
A hybrid approach integrating both CNN and RF is investigated in this research study of the Survey regarding the classification of maize leaf diseases with the help of CNN and RF. Our research carefully contrasts five... 详细信息
来源: 评论
Curvature Graph Generative Adversarial Networks
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jianxin Fu, Xingcheng Sun, Qingyun Ji, Cheng Tan, Jiajun Wu, Jia Peng, Hao Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China School of Computing Macquarie University Sydney Australia
Generative adversarial network (GAN) is widely used for generalized and robust learning on graph data. However, for non-Euclidean graph data, the existing GAN-based graph representation methods generate negative sampl... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论