咨询与建议

限定检索结果

文献类型

  • 13,340 篇 期刊文献
  • 7,464 篇 会议
  • 64 册 图书

馆藏范围

  • 20,868 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,478 篇 工学
    • 7,730 篇 计算机科学与技术...
    • 6,487 篇 软件工程
    • 2,370 篇 信息与通信工程
    • 1,684 篇 生物工程
    • 1,479 篇 电气工程
    • 1,420 篇 控制科学与工程
    • 1,360 篇 生物医学工程(可授...
    • 1,268 篇 光学工程
    • 1,254 篇 电子科学与技术(可...
    • 908 篇 化学工程与技术
    • 687 篇 仪器科学与技术
    • 632 篇 机械工程
    • 488 篇 材料科学与工程(可...
    • 464 篇 动力工程及工程热...
    • 422 篇 安全科学与工程
  • 9,167 篇 理学
    • 4,036 篇 数学
    • 3,001 篇 物理学
    • 2,179 篇 生物学
    • 1,733 篇 统计学(可授理学、...
    • 1,041 篇 地球物理学
    • 968 篇 化学
    • 724 篇 系统科学
  • 3,139 篇 管理学
    • 1,794 篇 管理科学与工程(可...
    • 1,358 篇 图书情报与档案管...
    • 942 篇 工商管理
  • 2,203 篇 医学
    • 1,780 篇 临床医学
    • 1,227 篇 基础医学(可授医学...
    • 744 篇 公共卫生与预防医...
    • 599 篇 药学(可授医学、理...
  • 586 篇 法学
    • 516 篇 社会学
  • 407 篇 经济学
  • 376 篇 农学
  • 241 篇 教育学
  • 56 篇 文学
  • 33 篇 军事学
  • 18 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 493 篇 deep learning
  • 383 篇 machine learning
  • 351 篇 accuracy
  • 303 篇 feature extracti...
  • 260 篇 computational mo...
  • 232 篇 training
  • 227 篇 predictive model...
  • 209 篇 semantics
  • 207 篇 real-time system...
  • 198 篇 optimization
  • 190 篇 reinforcement le...
  • 170 篇 image segmentati...
  • 165 篇 neural networks
  • 162 篇 internet of thin...
  • 155 篇 support vector m...
  • 147 篇 deep neural netw...
  • 145 篇 convolution
  • 137 篇 generative adver...
  • 132 篇 graph neural net...
  • 131 篇 object detection

机构

  • 618 篇 university of ch...
  • 429 篇 department of ph...
  • 394 篇 iccub universita...
  • 306 篇 imperial college...
  • 300 篇 physik-institut ...
  • 298 篇 stfc rutherford ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 289 篇 department of ph...
  • 288 篇 cavendish labora...
  • 286 篇 physikalisches i...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 284 篇 h.h. wills physi...
  • 284 篇 yandex school of...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...

作者

  • 233 篇 beiter a.
  • 223 篇 barter w.
  • 207 篇 bellee v.
  • 194 篇 bowcock t.j.v.
  • 191 篇 casse g.
  • 175 篇 brundu d.
  • 168 篇 niyato dusit
  • 160 篇 blake t.
  • 154 篇 betancourt c.
  • 150 篇 bencivenni g.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 145 篇 borsato m.
  • 145 篇 boettcher t.
  • 144 篇 borisyak m.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 albrecht j.
  • 140 篇 bediaga i.
  • 140 篇 braun s.

语言

  • 16,569 篇 英文
  • 4,094 篇 其他
  • 227 篇 中文
  • 5 篇 德文
  • 5 篇 法文
  • 5 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Data Science & Institute of Data Science"
20868 条 记 录,以下是4431-4440 订阅
排序:
Semantic Pre-Extraction for Energy-Efficient AoI Minimization in UAV-Assisted Wireless Networks
Semantic Pre-Extraction for Energy-Efficient AoI Minimizatio...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Long, Yusi Lee, Gary C.F. Li, Lanhua Gong, Shimin Sun, Sumei Niyato, Dusit School of Intelligent Systems Engineering Sun Yat-sen University Shenzhen Campus China Guangdong Provincial Key Laboratory of Fire Science and Intelligent Emergency Technology China A∗star Singapore College of Computing and Data Science Nanyang Technological University Singapore
This paper investigates an unmanned aerial vehicle (UAV)-assisted semantic communication network. The energy-limited ground users (GUs) provide semantic services to periodically generated raw data and a UAV relays the... 详细信息
来源: 评论
Sequential Indifferentiability of 7-Round Misty Structures
Sequential Indifferentiability of 7-Round Misty Structures
收藏 引用
Cryptographers’ Track at the RSA Conference, CT-RSA 2025
作者: Ai, Jiayi Guo, Chun School of Cyber Science and Technology Shandong University Qingdao China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education Shandong University Shandong Qingdao266237 China Shandong Research Institute of Industrial Technology Shandong Jinan250102 China
We investigate the Misty structure with respect to the security notion of sequential indifferentiability of Mandal et al. (TCC 2012). As our main result, we prove sequential indifferentiability for 7-round Misty struc...
来源: 评论
Safe and Reliable Diffusion Models via Subspace Projection
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Huiqiang Zhu, Tianqing Wang, Linlin Yu, Xin Gao, Longxiang Zhou, Wanlei Faculty of Data Science City University of Macau China School of Computer Science University of Queensland QLD Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Large-scale text-to-image (T2I) diffusion models have revolutionized image generation, enabling the synthesis of highly detailed visuals from textual descriptions. However, these models may inadvertently generate inap... 详细信息
来源: 评论
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity  22
Dynamic Searchable Scheme with Forward Privacy for Encrypted...
收藏 引用
22nd IEEE International Conference on Trust, Security and Privacy in computing and Communications, TrustCom 2023
作者: Al Sibahee, Mustafa A. Luo, Chengwen Zhang, Jin Huang, Yijing Abduljabbar, Zaid Ameen Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Iraq University College Computer Technology Engineering Department Basrah61004 Iraq University of Basrah College of Education for Pure Sciences Department of Computer Science Basrah61004 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518000 China
Document retrieval plays an essential role in many real-world applications especially when the data storage is outsourced. Due to the great advantages offered by cloud computing, clients tend to outsource their person... 详细信息
来源: 评论
Inverse Quadratic Transform for Minimizing A Sum of Ratios
Inverse Quadratic Transform for Minimizing A Sum of Ratios
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yannan Chen Licheng Zhao Yaowen Zhang Kaiming Shen School of Science and Engineering The Chinese University of Hong Kong (Shenzhen) China Shenzhen Research Institute of Big Data China
A major challenge with the multi-ratio Fractional Program (FP) is that the existing methods for the maximization problem typically do not work for the minimization case. We propose a novel technique called inverse qua... 详细信息
来源: 评论
Uncovering meanings of embeddings via partial orthogonality  23
Uncovering meanings of embeddings via partial orthogonality
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Yibo Jiang Bryon Aragam Victor Veitch Department of Computer Science University of Chicago Booth School of Business University of Chicago Department of Statistics University of Chicago and Data Science Institute University of Chicago
Machine learning tools often rely on embedding text as vectors of real numbers. In this paper, we study how the semantic structure of language is encoded in the algebraic structure of such embeddings. Specifically, we...
来源: 评论
Detection of Plant Disease Using Machine Learning and Deep Learning Algorithms
Detection of Plant Disease Using Machine Learning and Deep L...
收藏 引用
International Conference on science Technology Engineering and Management (ICONSTEM)
作者: Kalyani Gollapudi Preethi Varigonda S. Jancy S. PushpaLatha Viji Amutha Mary.A Suji Helen Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Data Analytics Saveetha School of Engineering SIMATS Chennai
Agriculture performs an critical position in India's economic system. Early detection of plant illnesses is critical to save you crop damage and similarly spread of diseases. Most plants, along with apple, tomato,...
来源: 评论
Multivariate Time Series Imputation Based on Masked Autoencoding with Transformer  24
Multivariate Time Series Imputation Based on Masked Autoenco...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Wang, Yongsheng Xu, Hao Xu, Zhiwei Gao, Jing Wu, Yuhao Zhang, Zhe Inner Mongolia University of Technology College of Data Science and Application Hohhot China Chinese Academy of Sciences Institute of Computing Technology Beijing China Inner Mongolia Agricultural University College of Computer and Information Engineering Hohhot China
In this work, we propose a self-supervised learning model based on the transformer framework, using it to impute missing data in multivariate time series. Unlike selfsupervised learning models in NLP and CV fields, it... 详细信息
来源: 评论
Empowering Wireless Networks with Artificial Intelligence Generated Graph
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Jiacheng Liu, Yinqiu Du, Hongyang Niyato, Dusit Kang, Jiawen Zhou, Haibo Kim, Dong In The College of Computing and Data Science Nanyang Technological University Singapore The School of Automation Guangdong University of Technology China The School of Electronic Science and Engineering Nanjing University Nanjing China The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of
In wireless communications, transforming network into graphs and processing them using deep learning models, such as Graph Neural Networks (GNNs), is one of the mainstream network optimization approaches. While effect... 详细信息
来源: 评论
Automatic Identification Fingerprint Based on Machine Learning Method
收藏 引用
Journal of the Operations Research Society of China 2022年 第4期10卷 849-860页
作者: Long The Nguyen Huong Thu Nguyen Alexander Diomidovich Afanasiev Tao Van Nguyen Laboratory of Artificial Intelligence and Machine Learning Institute of Information Technology and Data ScienceIrkutsk National Research Technical UniversityIrkutskRussia Baikal School of BRICS Irkutsk National Research Technical UniversityIrkutskRussia University of Information and Communication Technology Thai Nguyen UniversityThai NguyenViet Nam
The fingerprint identification technology has been developed and applied effectively to security systems in financial transactions,personal information security,national security,and other *** this paper,we proposed t... 详细信息
来源: 评论