咨询与建议

限定检索结果

文献类型

  • 13,430 篇 期刊文献
  • 7,464 篇 会议
  • 64 册 图书

馆藏范围

  • 20,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,444 篇 工学
    • 7,726 篇 计算机科学与技术...
    • 6,487 篇 软件工程
    • 2,370 篇 信息与通信工程
    • 1,684 篇 生物工程
    • 1,475 篇 电气工程
    • 1,420 篇 控制科学与工程
    • 1,360 篇 生物医学工程(可授...
    • 1,270 篇 光学工程
    • 1,250 篇 电子科学与技术(可...
    • 905 篇 化学工程与技术
    • 688 篇 仪器科学与技术
    • 629 篇 机械工程
    • 478 篇 材料科学与工程(可...
    • 464 篇 动力工程及工程热...
    • 422 篇 安全科学与工程
  • 9,170 篇 理学
    • 4,029 篇 数学
    • 2,998 篇 物理学
    • 2,180 篇 生物学
    • 1,726 篇 统计学(可授理学、...
    • 1,042 篇 地球物理学
    • 965 篇 化学
    • 724 篇 系统科学
  • 3,143 篇 管理学
    • 1,798 篇 管理科学与工程(可...
    • 1,358 篇 图书情报与档案管...
    • 942 篇 工商管理
  • 2,212 篇 医学
    • 1,789 篇 临床医学
    • 1,230 篇 基础医学(可授医学...
    • 747 篇 公共卫生与预防医...
    • 599 篇 药学(可授医学、理...
  • 583 篇 法学
    • 513 篇 社会学
  • 408 篇 经济学
  • 377 篇 农学
  • 242 篇 教育学
  • 56 篇 文学
  • 33 篇 军事学
  • 18 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 497 篇 deep learning
  • 391 篇 machine learning
  • 351 篇 accuracy
  • 305 篇 feature extracti...
  • 256 篇 computational mo...
  • 233 篇 training
  • 222 篇 predictive model...
  • 214 篇 semantics
  • 203 篇 real-time system...
  • 198 篇 optimization
  • 190 篇 reinforcement le...
  • 170 篇 image segmentati...
  • 165 篇 neural networks
  • 163 篇 internet of thin...
  • 155 篇 support vector m...
  • 147 篇 deep neural netw...
  • 142 篇 convolution
  • 137 篇 generative adver...
  • 131 篇 object detection
  • 130 篇 data mining

机构

  • 614 篇 university of ch...
  • 429 篇 department of ph...
  • 391 篇 iccub universita...
  • 306 篇 imperial college...
  • 300 篇 physik-institut ...
  • 298 篇 stfc rutherford ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 289 篇 department of ph...
  • 288 篇 cavendish labora...
  • 286 篇 physikalisches i...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 284 篇 yandex school of...
  • 284 篇 institute of par...
  • 283 篇 h.h. wills physi...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...
  • 279 篇 van swinderen in...

作者

  • 233 篇 beiter a.
  • 223 篇 barter w.
  • 206 篇 bellee v.
  • 194 篇 bowcock t.j.v.
  • 190 篇 casse g.
  • 174 篇 brundu d.
  • 168 篇 niyato dusit
  • 159 篇 blake t.
  • 157 篇 betancourt c.
  • 150 篇 bencivenni g.
  • 148 篇 borsato m.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 145 篇 boettcher t.
  • 144 篇 borisyak m.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 albrecht j.
  • 140 篇 bediaga i.
  • 140 篇 braun s.

语言

  • 16,655 篇 英文
  • 4,096 篇 其他
  • 229 篇 中文
  • 5 篇 德文
  • 5 篇 法文
  • 5 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Data Science & Institute of Data Science"
20958 条 记 录,以下是4521-4530 订阅
排序:
Target Threat Assessment Method based on RCS Feature Classifier and TOPSIS
Target Threat Assessment Method based on RCS Feature Classif...
收藏 引用
International Conference on Microwave and Millimeter Wave Technology Proceedings
作者: Yujie Shan Jinhuan Zhang Jian Dong Jun Long School of Computer Science and Engineering Central South University Big Data Institute Central South University Changsha China
Target threat assessment involves many uncertainties and is a tactical decision assessment problem with incomplete and uncertain information. In traditional target threat assessment, only the influence of the target&#...
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Examining the impact of mobile money on financial inclusion in Sub-Saharan Africa: the role of institutions and governance
SAM Advanced Management Journal
收藏 引用
SAM Advanced Management Journal 2024年 第4期89卷 315-339页
作者: Kwaku Kyei Gyamerah Francis Kamewor Tetteh Department of Accounting and Finance Data Link Institute of Business and Technology Tema Ghana Department of Supply Chain and Information Systems KNUST School of Business Kwame Nkrumah University of Science and Technology Kumasi Ghana
Purpose This paper aims to investigate the role of institutional quality in the relationship between mobile money and financial inclusion among Sub-Saharan Africa (SSA) from 2002 to 2022. Design/methodology/appro... 详细信息
来源: 评论
MT-PCR: Leveraging Modality Transformation for Large-Scale Point Cloud Registration with Limited Overlap
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Yilong Duan, Yifan Chen, Yuxi Zhang, Xinran Shen, Yedong Ji, Jianmin Zhang, Yanyong Zhang, Lu School of Computer Science and Technology University of Science and Technology of China Hefei230026 China Department of Statistics and Finance School of Management University of Science and Technology of China Hefei230026 China School of Artificial Intelligence and Data Science University of Science and Technology of China Hefei230026 China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei230088 China
Large-scale scene point cloud registration with limited overlap is a challenging task due to computational load and constrained data acquisition. To tackle these issues, we propose a point cloud registration method, M... 详细信息
来源: 评论
PSP-GEN: Stochastic Inversion of the Process-Structure-Property Chain in Materials Design Through Deep, Generative Probabilistic Modeling
SSRN
收藏 引用
SSRN 2024年
作者: Zang, Yaohua Koutsourelakis, Phaedon-Stelios Technical University of Munich School of Engineering and Design Boltzmannstr. 15 Garching85748 Germany Munich Data Science Institute-MDSI Garching Germany
Inverse material design is a cornerstone challenge in materials science, withsignificant applications across many industries. Traditional approaches thatinvert the structure-property (SP) linkage to identify microstru... 详细信息
来源: 评论
Control Design of Nonlinear ODE/Transport PDE Cascaded Systems with Varying Propagation Speed  42
Control Design of Nonlinear ODE/Transport PDE Cascaded Syste...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Cai, Xiushan Lin, Yuhang Wang, Ping Ke, Changwu School of Data Science and Intelligent Engineering Xiamen Institute of Technology Xiamen361021 China College of Engineering North Carolina State University RaleighNC27695 United States College of Electrical Engineering and Automation Hubei Normal University Huangshi435002 China
We consider control design for a nonlinear ordinary differential equation (ODE) and transport partial differential equation (PDE) cascaded system whose propagation speed is spatially-varying. The ODE state is driven b... 详细信息
来源: 评论
MSR: A Multifaceted Self-Retrieval Framework for Microscopic Cascade Prediction  39
MSR: A Multifaceted Self-Retrieval Framework for Microscopic...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Hong, Dongsheng Chen, Chao Li, Xujia Wang, Shuhui Lin, Wen Liao, Xiangwen College of Computer and Data Science Fuzhou University China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Hong Kong University of Science and Technology Hong Kong College of Computer and Control Engineering Minjiang University China
The microscopic cascade prediction task has wide applications in downstream areas like "rumor detection". Its goal is to forecast the diffusion routines of information cascade within networks. Existing works... 详细信息
来源: 评论
Keeping Pace with Ever-Increasing data: Towards Continual Learning of Code Intelligence Models
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Shuzheng Zhang, Hongyu Gao, Cuiyun Wang, Chaozheng School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Big Data and Software Engineering Chongqing University China
—Previous research on code intelligence usually trains a deep learning model on a fixed dataset in an offline manner. However, in real-world scenarios, new code repositories emerge incessantly, and the carried new kn... 详细信息
来源: 评论
Stacking-Based Attention Temporal Convolutional Network for Action Segmentation  48
Stacking-Based Attention Temporal Convolutional Network for ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Yang, Liu Jiang, Yu Hong, Junkun Wu, Zhenjie Yang, Zhan Long, Jun Central South University School of Computer Science and Engineering China Central South University Big Data Institute Central South University China Central South University Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
Action segmentation plays an important role in video understanding, which is implemented by frame-wise action classification. Recent works on action segmentation capture long-term dependencies by increasing temporal c... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论