咨询与建议

限定检索结果

文献类型

  • 1,474 篇 期刊文献
  • 1,152 篇 会议
  • 11 册 图书

馆藏范围

  • 2,637 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,671 篇 工学
    • 1,212 篇 计算机科学与技术...
    • 1,015 篇 软件工程
    • 398 篇 信息与通信工程
    • 269 篇 生物工程
    • 225 篇 电气工程
    • 215 篇 生物医学工程(可授...
    • 214 篇 控制科学与工程
    • 195 篇 光学工程
    • 165 篇 电子科学与技术(可...
    • 88 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 75 篇 机械工程
    • 70 篇 安全科学与工程
    • 67 篇 交通运输工程
    • 66 篇 仪器科学与技术
  • 1,069 篇 理学
    • 491 篇 数学
    • 328 篇 物理学
    • 315 篇 生物学
    • 183 篇 统计学(可授理学、...
    • 108 篇 化学
    • 80 篇 系统科学
    • 68 篇 地球物理学
  • 450 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 205 篇 图书情报与档案管...
    • 135 篇 工商管理
  • 226 篇 医学
    • 194 篇 临床医学
    • 165 篇 基础医学(可授医学...
    • 102 篇 公共卫生与预防医...
    • 95 篇 药学(可授医学、理...
  • 76 篇 法学
    • 67 篇 社会学
  • 49 篇 农学
  • 44 篇 经济学
  • 38 篇 教育学
  • 4 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 91 篇 deep learning
  • 88 篇 accuracy
  • 75 篇 machine learning
  • 67 篇 training
  • 59 篇 real-time system...
  • 58 篇 feature extracti...
  • 49 篇 predictive model...
  • 47 篇 convolutional ne...
  • 44 篇 computational mo...
  • 44 篇 data models
  • 38 篇 internet of thin...
  • 34 篇 semantics
  • 34 篇 adaptation model...
  • 30 篇 deep neural netw...
  • 28 篇 reinforcement le...
  • 27 篇 security
  • 27 篇 artificial intel...
  • 25 篇 support vector m...
  • 25 篇 generative adver...
  • 25 篇 prediction algor...

机构

  • 88 篇 college of compu...
  • 67 篇 school of comput...
  • 49 篇 institute of dat...
  • 44 篇 school of comput...
  • 43 篇 university of ch...
  • 35 篇 national enginee...
  • 28 篇 nanyang technolo...
  • 27 篇 department of co...
  • 26 篇 beijing advanced...
  • 24 篇 institute of com...
  • 23 篇 national institu...
  • 23 篇 shenzhen researc...
  • 22 篇 peng cheng labor...
  • 21 篇 school of data a...
  • 19 篇 school of cyber ...
  • 18 篇 college of compu...
  • 18 篇 school of comput...
  • 17 篇 dipartimento di ...
  • 17 篇 cas key laborato...
  • 16 篇 the oskar klein ...

作者

  • 48 篇 niyato dusit
  • 41 篇 cheng xueqi
  • 34 篇 guo jiafeng
  • 26 篇 jin xiaolong
  • 23 篇 rajeswari d.
  • 23 篇 shen linlin
  • 20 篇 huang qingming
  • 19 篇 tao dacheng
  • 17 篇 e. j. siskind
  • 17 篇 r. bellazzini
  • 17 篇 wu baoyuan
  • 17 篇 chen mingzhe
  • 16 篇 xu qianqian
  • 15 篇 j. b. thayer
  • 15 篇 p. spinelli
  • 15 篇 m. kuss
  • 15 篇 yang yang
  • 15 篇 s. guiriec
  • 14 篇 p. f. michelson
  • 14 篇 m. ackermann

语言

  • 2,279 篇 英文
  • 344 篇 其他
  • 21 篇 中文
检索条件"机构=School of Computing and Institute of Data Science"
2637 条 记 录,以下是341-350 订阅
排序:
Patch is enough: naturalistic adversarial patch against vision-language pre-training models
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-10页
作者: Kong, Dehong Liang, Siyuan Zhu, Xiaopeng Zhong, Yuansheng Ren, Wenqi School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen 518107 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou 310058 China School of Computing National University of Singapore Singapore 119077 Singapore Guangdong Testing Institute of Product Quality Supervision Guangzhou 510670 China
Visual language pre-training (VLP) models have demonstrated significant success in various domains, but they remain vulnerable to adversarial attacks. Addressing these adversarial vulnerabilities is crucial for enhanc... 详细信息
来源: 评论
MetaSLRCL: A Self-Adaptive Learning Rate and Curriculum Learning Based Framework for Few-Shot Text Classification  29
MetaSLRCL: A Self-Adaptive Learning Rate and Curriculum Lear...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Zhao, Kailin Jin, Xiaolong Guan, Saiping Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of SciencesSchool of Computer Science and Technology University of Chinese Academy of Sciences
Due to the lack of labeled data in many realistic scenarios, a number of few-shot learning methods for text classification have been proposed, among which the meta learning based ones have recently attracted much atte... 详细信息
来源: 评论
Dynamic Key Generationfor Secure File Sharing System Using Time Stamp
Dynamic Key Generationfor Secure File Sharing System Using T...
收藏 引用
2024 International Conference on Innovative computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Annie Silviya, S.H. Hilda Jerlin, C.M. Mohana Suganthi, N. Helen Sathiya, V. Jayashree, R. Oviya, N. Rajalakshmi Institute of Technology Chennai India Artificial Intelligence and Data Science Panimalar Engineering College Chennai India School of Computing Computer Science and Engineering Vel Tech Rangarajan Dr Sagunthala R&d Institute of Science and Technology Chennai India Vel Tech Multi Tech Dr Rangarajan Dr Sakunthala Engineering College Chennai India
Dynamic key generation for secure file sharing system using timestamp is a novel approach to military-based secure file sharing, which adds an additional layer of security to AES-2S6 which is prominently considered as... 详细信息
来源: 评论
data-faithful feature attribution: mitigating unobservable confounders via instrumental variables  24
Data-faithful feature attribution: mitigating unobservable c...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Qiheng Sun Haocheng Xia Jinfei Liu Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Siebel School of Computing and Data Science University of Illinois Urbana-Champaign
The state-of-the-art feature attribution methods often neglect the influence of unobservable confounders, posing a risk of misinterpretation, especially when it is crucial for the interpretation to remain faithful to ...
来源: 评论
IoT -Weather Integration for Enhanced Cricket Tactics with Gradient Boosting Algorithm  8
IoT -Weather Integration for Enhanced Cricket Tactics with G...
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Ranganathan, Chitra Sabapathy Ramesh, S. Preetha, J. Rakesh, Nitin Mohankumar, N. Sujatha, S. Mphasis Corporation Tamil Nadu Chennai India School of Computing College of Engineering and Technology Srm Institute of Science and Technology Department of Computing Technologies Tamil Nadu Chennai India Kongunadu College of Engineering and Technology Department of Artificial Intelligence & Data Science Tamil Nadu Trichy India Nagpur Campus Maharashtra Pune India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Biomedical Engineering Tamil Nadu Chennai India
From a strategic perspective, the pitch's state and the wind's direction are the most important factors in cricket. In this paper, an innovative method that uses the IoT to report the state of the pitch and th... 详细信息
来源: 评论
RVISA: Reasoning and Verification for Implicit Sentiment Analysis
收藏 引用
IEEE Transactions on Affective computing 2025年
作者: Lai, Wenna Xie, Haoran Xu, Guandong Li, Qing Hong Kong Polytechnic University Department of Computing Hong Kong Lingnan University School of Data Science Hong Kong University of Technology Sydney School of Computer Science Data Science Institute SydneyNSW2007 Australia Education University of Hong Kong Hong Kong
Under the context of the increasing social demand for fine-grained sentiment analysis (SA), implicit sentiment analysis (ISA) poses a significant challenge owing to the absence of salient cue words in expressions. Thu... 详细信息
来源: 评论
Dual-Functional Waveform Design for STAR-RIS Aided ISAC via Deep Reinforcement Learning  35
Dual-Functional Waveform Design for STAR-RIS Aided ISAC via ...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Zhang, Jifa Gong, Shiqi Lu, Weidang Xing, Chengwen Zhao, Nan Ng, Derrick Wing Kwan Niyato, Dusit Dalian University of Technology School of Information and Communication Engineering Dalian China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Zhejiang University of Technology College of Information Engineering Hangzhou China Beijing Institute of Technology School of Information and Electronics Beijing China University of New South Wales School of Electrical Engineering and Telecommunications Sydney Australia Nanyang Technological University College of Computing and Data Science Singapore
Integrated sensing and communication (ISAC) technology effectively enables spectrum and hardware sharing between radar and communication. This paper investigates the dual-functional (DF) constant modulus waveform desi... 详细信息
来源: 评论
HOFD: An Outdated Fact Detector for Knowledge Bases
收藏 引用
IEEE Transactions on Knowledge and data Engineering 2023年 第10期35卷 10775-10789页
作者: Hao, Shuang Chai, Chengliang Li, Guoliang Tang, Nan Wang, Ning Yu, Xiang Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing100044 China Beijing Institute of Technology School of Computer Science and Technology Beijing100811 China Beijing100190 China Qatar Computing Research Institute Hbku Doha34110 Qatar Huawei Company Gauss Department Beijing100031 China
Knowledge bases (KBs), which store high-quality information, are crucial for many applications, such as enhancing search results and serving as external sources for data cleaning. Not surprisingly, there exist outdate... 详细信息
来源: 评论
STAR: Stepwise Task Augmentation and Relation Learning for Aspect Sentiment Quad Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Lai, Wenna Xie, Haoran Xu, Guandong Li, Qing Department of Computing Hong Kong Polytechnic University Hong Kong School of Data Science Lingnan University Hong Kong School of Computer Science Data Science Institute University of Technology Sydney SydneyNSW Australia Department of Computing The Hong Kong Polytechnic University Hong Kong
Aspect-based sentiment analysis (ABSA) aims to identify four sentiment elements, including aspect term, aspect category, opinion term, and sentiment polarity. These elements construct the complete picture of sentiment... 详细信息
来源: 评论
Black-box backdoor defense via zero-shot image purification  23
Black-box backdoor defense via zero-shot image purification
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Yucheng Shi Mengnan Du Xuansheng Wu Zihan Guan Jin Sun Ninghao Liu School of Computing University of Georgia Department of Data Science New Jersey Institute of Technology
Backdoor attacks inject poisoned samples into the training data, resulting in the misclassification of the poisoned input during a model's deployment. Defending against such attacks is challenging, especially for ...
来源: 评论