咨询与建议

限定检索结果

文献类型

  • 14,317 篇 期刊文献
  • 11,794 篇 会议
  • 71 册 图书

馆藏范围

  • 26,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,152 篇 工学
    • 10,460 篇 计算机科学与技术...
    • 8,755 篇 软件工程
    • 3,402 篇 信息与通信工程
    • 2,166 篇 生物工程
    • 2,115 篇 控制科学与工程
    • 1,922 篇 电气工程
    • 1,493 篇 电子科学与技术(可...
    • 1,450 篇 生物医学工程(可授...
    • 1,369 篇 光学工程
    • 1,167 篇 化学工程与技术
    • 953 篇 机械工程
    • 796 篇 仪器科学与技术
    • 694 篇 动力工程及工程热...
    • 598 篇 材料科学与工程(可...
    • 597 篇 交通运输工程
  • 10,839 篇 理学
    • 5,285 篇 数学
    • 3,230 篇 物理学
    • 2,598 篇 生物学
    • 2,112 篇 统计学(可授理学、...
    • 1,179 篇 化学
    • 966 篇 系统科学
    • 810 篇 地球物理学
  • 4,180 篇 管理学
    • 2,425 篇 管理科学与工程(可...
    • 1,882 篇 图书情报与档案管...
    • 1,168 篇 工商管理
  • 1,780 篇 医学
    • 1,431 篇 临床医学
    • 1,062 篇 基础医学(可授医学...
    • 636 篇 药学(可授医学、理...
    • 618 篇 公共卫生与预防医...
  • 783 篇 法学
    • 667 篇 社会学
  • 570 篇 经济学
  • 438 篇 农学
  • 293 篇 教育学
  • 63 篇 文学
  • 44 篇 军事学
  • 33 篇 艺术学
  • 5 篇 历史学
  • 1 篇 哲学

主题

  • 640 篇 deep learning
  • 524 篇 accuracy
  • 508 篇 feature extracti...
  • 484 篇 training
  • 368 篇 semantics
  • 351 篇 machine learning
  • 330 篇 computational mo...
  • 284 篇 predictive model...
  • 261 篇 optimization
  • 252 篇 data models
  • 249 篇 neural networks
  • 239 篇 internet of thin...
  • 234 篇 reinforcement le...
  • 216 篇 image segmentati...
  • 215 篇 big data
  • 215 篇 convolution
  • 189 篇 object detection
  • 186 篇 task analysis
  • 185 篇 data mining
  • 178 篇 real-time system...

机构

  • 500 篇 university of ch...
  • 430 篇 department of ph...
  • 394 篇 iccub universita...
  • 304 篇 imperial college...
  • 300 篇 physik-institut ...
  • 298 篇 stfc rutherford ...
  • 294 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 cavendish labora...
  • 287 篇 department of ph...
  • 287 篇 institute of par...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 285 篇 physikalisches i...
  • 283 篇 yandex school of...
  • 282 篇 h.h. wills physi...
  • 280 篇 henryk niewodnic...
  • 279 篇 horia hulubei na...

作者

  • 234 篇 beiter a.
  • 222 篇 barter w.
  • 207 篇 bellee v.
  • 195 篇 bowcock t.j.v.
  • 195 篇 casse g.
  • 174 篇 brundu d.
  • 160 篇 blake t.
  • 154 篇 betancourt c.
  • 150 篇 bencivenni g.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 144 篇 niyato dusit
  • 144 篇 borsato m.
  • 144 篇 boettcher t.
  • 144 篇 borisyak m.
  • 144 篇 albrecht j.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 amhis y.
  • 142 篇 akar s.

语言

  • 21,396 篇 英文
  • 4,503 篇 其他
  • 345 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 7 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Data Science and Big Data Technology"
26182 条 记 录,以下是4841-4850 订阅
排序:
Event-triggered Disturbance Observer-based Control for Trajectory Tracking of Ships with Actuator Saturation
Event-triggered Disturbance Observer-based Control for Traje...
收藏 引用
第42届中国控制会议
作者: Shuwen Feng Xin Hu Xinjiang Wei Huifeng Zhang Shaoyan Cui School of Mathematics and Statistics Science Ludong University Shandong Provincial Big Data Development and Innovation Laboratory of Public Resources
This paper presents an event-triggered anti-disturbance control scheme for the trajectory tracking of ships with timevarying ocean disturbances and actuator *** combining the disturbance observer with the auxiliary dy...
来源: 评论
Chat2Brain: A Method for Mapping Open-Ended Semantic Queries to Brain Activation Maps
Chat2Brain: A Method for Mapping Open-Ended Semantic Queries...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wei, Yaonai Zhong, Tianyang Zhang, Songyao Li, Xiao Zhang, Tuo Zhao, Lin Liu, Zhengliang Shang, Muheng Liu, Tianming Zhang, Han Ma, Chong Du, Lei Han, Junwei Northwestern Polytechnical University School of Automation Xi'an China Northwest University School of Information Science&Technology Xi'an China University of Georgia School of Computing GA United States Northwest University Network and Data Center Xi'an China
Over decades, neuroscience has accumulated a wealth of research results in the text modality that can be used to explore cognitive processes. Meta-analysis is a typical method that successfully establishes a link from... 详细信息
来源: 评论
Applications of Explainable Artificial Intelligent Algorithms to Medicine: A Bibliographic Study  2nd
Applications of Explainable Artificial Intelligent Algorithm...
收藏 引用
2nd World Conference on Intelligent and 3D Technologies, WCI3DT 2023
作者: Wang, Mini Han Xing, Lumin Yu, Xiangrong Yan, Chenyu Zhou, Ruoyu Chong, Kelvin K. L. Wang, Fengling Zhou, Xiaoshu Chen, Guoqiang Wu, Qing Lin, Zhiyuan Zeng, Peijin Xiao, Qide The Faculty of Data Science City University of Macau Macau China The Faculty of Medicine The Chinese University of Hong Kong Hong Kong Guanghui Hou Zhuhai China The Department of AI and Big Data Application Zhuhai Institute of Advanced Zhuhai China The First Affiliated Hospital of Shandong First Medical University & Shandong Provincial Qianfoshan Hospital Jina China Suzhou Institute of Biomedical Engineering and Technology Chinese Academy of Sciences Suzhou China Hezhou University Hezhou China Gree Polytechnic Zhuhai China Beijing Institute of Technology Zhuhai China Zhuhai Science and Technology Development Promotion Association Zhuhai China
In recent years, Explainable Artificial Intelligent (XAI) algorithms have been widely applied and deeply studied in the field of medicine. Based on the bibliometric method, this paper summarizes and analyses 315 non-r... 详细信息
来源: 评论
Domain Generalized Solar Cell Defect Segmentation Based on Shape-Aware and Multi-View Meta-Learning  42
Domain Generalized Solar Cell Defect Segmentation Based on S...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Liu, Kun Yang, Ying Mao, Jingkun Liu, Weipeng School of Artificial Intelligence and Data Science Hebei University of Technology Tianjin300130 China Tianjin University of Technology Department of Automation Tianjin300384 China Control Engineering Technology Innovation Center of Hebei Province Hebei University of Technology Tianjin300401 China
Various defects are inevitably generated in the manufacturing process of solar cells. Deep learning-based methods for defect segmentation under closed situation have achieved remarkable progress. Due to the difference... 详细信息
来源: 评论
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Li, Ziqiang Zeng, Yueqi Xia, Pengfei Liu, Lei Fu, Zhangjie Li, Bin Nanjing University of Information Science and Technology China Big Data and Decision Lab University of Science and Technology of China China CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System China
With the burgeoning advancements in the field of natural language processing (NLP), the demand for training data has increased significantly. To save costs, it has become common for users and businesses to outsource t... 详细信息
来源: 评论
Enhancing face recognition performance: a comprehensive evaluation of deep learning models and a novel ensemble approach with hyperparameter tuning
收藏 引用
Soft Computing 2024年 第20期28卷 12399-12424页
作者: Selvaganesan, Jana Sudharani, B. Shekhar, S. N. Chandra Vaishnavi, K. Priyadarsini, K. Raju, K. Srujan Rao, T. Srinivasa Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Avadi Tamil Nadu Chennai600062 India Guntur Dist. Andhra Pradesh Vadlamudi India Department of Electronics and Communication Engineering Sreenidhi Institute of Science and Technology Telangana Hyderabad501301 India Department of Computer Science and Engineering Sona College of Technology Tamil Nadu Salem636005 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Computer Science and Engineering CMR Technical Campus Medchal Telangana Hyderabad501401 India Department of Electronics and Communication Engineering Aditya Engineering College Surampalem533437 India
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained ... 详细信息
来源: 评论
Privacy Protection for Image Sharing Using Reversible Adversarial Examples
Privacy Protection for Image Sharing Using Reversible Advers...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ping Yin Wei Chen Jiaxi Zheng Yiting Zhang Lifa Wu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
Online image sharing on social media platforms faces information leakage due to deep learning-aided privacy attacks. To avoid these attacks, this paper proposes a privacy protection mechanism for image sharing without... 详细信息
来源: 评论
A Novel Design of Fatigue Driving Detector with mmWave Sensor AWR1642boost  23
A Novel Design of Fatigue Driving Detector with mmWave Senso...
收藏 引用
2023 International Conference on Intelligent Computing and Its Emerging Applications, ICEA 2023
作者: Tseng, Shih-Pang Hsiao, I-Hui Wang, Jhing-Fa School of Software and Big Data Changzhou College of Information Technology Changzhou China Department of Electrical Engineering National Cheng Kung University Tainan Taiwan
According to statistics from the Ministry of Transportation, distracted driving is one of the main causes of traffic accidents. In Taiwan, approximately 20% of total accidents each year are attributed to distracted or... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
An Image Super Resolution Algorithm Using Reparameterization  18th
An Image Super Resolution Algorithm Using Reparameterization
收藏 引用
18th Chinese Intelligent Systems Conference, CISC 2022
作者: Cai, Qiang Chang, Haodong Li, Haisheng Wan, Ruyi Chen, Xiaoming School of Computer Science and Engineering Beijing Technology and Business University Beijing100048 China Beijing Key Laboratory of Big Data Technology for Food Safety Beijing100048 China National Engineering Laboratory for Agri-Product Quality Traceability Beijing100048 China
At present, the residual-based deep network model mainly adopts a multi-branch structure, but this structure increases the memory access cost, and the reasoning time is not as good as that of a single-branch network. ... 详细信息
来源: 评论