咨询与建议

限定检索结果

文献类型

  • 5,670 篇 期刊文献
  • 4,828 篇 会议
  • 46 册 图书

馆藏范围

  • 10,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,745 篇 工学
    • 5,031 篇 计算机科学与技术...
    • 4,210 篇 软件工程
    • 1,631 篇 信息与通信工程
    • 1,057 篇 生物工程
    • 867 篇 控制科学与工程
    • 812 篇 电气工程
    • 685 篇 生物医学工程(可授...
    • 610 篇 光学工程
    • 541 篇 电子科学与技术(可...
    • 364 篇 机械工程
    • 327 篇 化学工程与技术
    • 255 篇 交通运输工程
    • 250 篇 动力工程及工程热...
    • 236 篇 网络空间安全
    • 221 篇 安全科学与工程
    • 219 篇 仪器科学与技术
  • 3,951 篇 理学
    • 1,959 篇 数学
    • 1,204 篇 生物学
    • 1,101 篇 物理学
    • 743 篇 统计学(可授理学、...
    • 397 篇 化学
    • 348 篇 系统科学
  • 1,920 篇 管理学
    • 1,107 篇 管理科学与工程(可...
    • 895 篇 图书情报与档案管...
    • 539 篇 工商管理
  • 645 篇 医学
    • 534 篇 临床医学
    • 466 篇 基础医学(可授医学...
    • 284 篇 药学(可授医学、理...
    • 267 篇 公共卫生与预防医...
  • 329 篇 法学
    • 277 篇 社会学
  • 210 篇 经济学
  • 150 篇 农学
  • 108 篇 教育学
  • 38 篇 文学
  • 18 篇 军事学
  • 16 篇 艺术学

主题

  • 361 篇 deep learning
  • 288 篇 feature extracti...
  • 279 篇 accuracy
  • 237 篇 semantics
  • 234 篇 machine learning
  • 233 篇 training
  • 199 篇 computational mo...
  • 170 篇 predictive model...
  • 152 篇 internet of thin...
  • 150 篇 real-time system...
  • 137 篇 data models
  • 131 篇 optimization
  • 122 篇 reinforcement le...
  • 120 篇 data mining
  • 119 篇 convolutional ne...
  • 106 篇 image segmentati...
  • 103 篇 artificial intel...
  • 102 篇 neural networks
  • 100 篇 security
  • 94 篇 support vector m...

机构

  • 426 篇 department of ph...
  • 406 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 390 篇 h.h. wills physi...
  • 363 篇 van swinderen in...
  • 337 篇 yandex school of...
  • 311 篇 school of physic...
  • 310 篇 cavendish labora...
  • 303 篇 university of ch...
  • 291 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 287 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 215 篇 betancourt c.
  • 207 篇 brundu d.
  • 204 篇 bediaga i.
  • 199 篇 amato s.
  • 192 篇 baryshnikov f.
  • 186 篇 boettcher t.
  • 165 篇 braun s.
  • 163 篇 borisyak m.
  • 161 篇 baker s.
  • 153 篇 bjørn m.
  • 152 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 8,527 篇 英文
  • 1,957 篇 其他
  • 85 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Engineering"
10544 条 记 录,以下是4441-4450 订阅
排序:
SARA: Controllable Makeup Transfer with Spatial Alignment and Region-Adaptive Normalization
arXiv
收藏 引用
arXiv 2023年
作者: Zhong, Xiaojing Huang, Xinyi Wu, Zhonghua Lin, Guosheng Wu, Qingyao School of Software Engineering South China University of Technology China School of Computer Science and Engineering Nanyang Technological University Singapore Key Laboratory of Big Data and Intelligent Robot Ministry of Education China Peng Cheng Laboratory China SenseTime Research China
Makeup transfer is a process of transferring the makeup style from a reference image to the source image, while preserving the source image’s identity. In addition to achieving fine-grained control over the makeup tr... 详细信息
来源: 评论
Semantic-Constraint Matching Transformer for Weakly Supervised Object Localization
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Yiwen Su, Yukun Wang, Wenjun Liu, Yanxia Wu, Qingyao The School of Software Engineering South China University of Technology Guangzhou510640 China The Key Laboratory of Big Data and Intelligent Robot Ministry of Education Guangzhou China The School of Computer Science and Engineering Nanyang Technological University Singapore The Pazhou Lab Guangzhou China
Weakly supervised object localization (WSOL) strives to learn to localize objects with only image-level supervision. Due to the local receptive fields generated by convolution operations, previous CNN-based methods su... 详细信息
来源: 评论
Heterogeneous Software Effort Estimation via Cascaded Adversarial Auto-Encoder  1
收藏 引用
21st International Conference on Parallel and Distributed Computing, Applications, and Technologies, PDCAT 2020
作者: Qi, Fumin Jing, Xiao-Yuan Zhu, Xiaoke Jia, Xiaodong Cheng, Li Dong, Yichuan Fang, Ziseng Ma, Fei Feng, Shengzhong College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Wuhan University Wuhan China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China National Supercomputing Center in Shenzhen Guangzhou Guangdong China School of Computer Science Qufu Normal University Rizhao China
In Software Effort Estimation (SEE) practice, the data drought problem has been plaguing researchers and practitioners. Leveraging heterogeneous SEE data collected by other companies is a feasible solution to relieve ... 详细信息
来源: 评论
A Fast Matrix Completion Method Based on Matrix Bifactorization and QR Decomposition
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Liu, Qing Peng, Chen Yang, Pei Zhou, Xiancun Liu, Zhengyu School of Electronic and Information Engineering West Anhui University Anhui Lu'an237012 China School of Mathematics and Big Data Anhui University of Science and Technology Anhui Huainan232001 China Department of Computer Technology and Application Qinghai University Qinghai Xining810016 China
The problem of recovering the missing values in an incomplete matrix, i.e., matrix completion, has attracted a great deal of interests in the fields of machine learning and signal processing. A matrix bifactorization ... 详细信息
来源: 评论
Classification of Real and Deepfakes Visual Samples with Pre-trained Deep Learning Models  7th
Classification of Real and Deepfakes Visual Samples with Pre...
收藏 引用
Proceedings of the 7th International Conference on Advances in Computing and data sciences, ICACDS 2023
作者: Nawaz, Marriam Javed, Ali Nazir, Tahira Khan, Muhammad Attique Rajinikanth, Venkatesan Kadry, Seifedine Department of Software Engineering UET Taxila Taxila47050 Pakistan Department of Computing Riphah International University Islamabad Pakistan Department of Computer Science HITEC University Taxila Pakistan Department of Computer Science and Engineering Division of Research and Innovation Saveetha School of Engineering SIMATS Chennai602105 India Department of Applied Data Science Noroff University College Kristiansand4612 Norway Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Serious security and privacy problems have arisen as a result of significant advancements in the creation of deepfakes. Attackers can easily replace a person’s face with the target person’s face in an image using so... 详细信息
来源: 评论
Are Deep Point Cloud Classifiers Suffer From Out-of-distribution Overconfidence Issue?
Are Deep Point Cloud Classifiers Suffer From Out-of-distribu...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xu He Keke Tang Yawen Shi Yin Li Weilong Peng Peican Zhu Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China School of Data Science Fudan University Shanghai China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China School of Artificial Intelligence Optics and Electronics (iOPEN) Northwestern Polytechnical University Xi'an China
3D point cloud perception using deep neural networks (DNNs) has been a trend for various application scenarios. However, the black-box nature of DNNs will bring many hidden risks as in the 2D image field. In this pape...
来源: 评论
Generative adversarial networks enhanced location privacy in 5G networks
收藏 引用
science China(Information sciences) 2020年 第12期63卷 41-52页
作者: Youyang QU Jingwen ZHANG Ruidong LI Xiaoning ZHANG Xuemeng ZHAI Shui YU School of Information Technology Deakin University School of Computer Science University of Technology Sydney National Institute of Information and Communications Technology (NICT) School of Information and Communication Engineering University of Electronic Science and Technology of China Center of AI and Big Data Southeast Digital Economic Development Institute
5G networks, as the up-to-date communication platforms, are experiencing fast booming. Meanwhile, increasing volumes of sensitive data, especially location information, are being generated and shared using 5G networks... 详细信息
来源: 评论
Geometric Distortion Guided Transformer for Omnidirectional Image Super-Resolution
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Cuixin Dong, Rongkang Xiao, Jun Zhang, Cong Lam, Kin-Man Zhou, Fei Qiu, Guoping Department of Electrical and Electronic Engineering The Hong Kong Polytechnic University Hong Kong College of Electronic and Information Engineering Shenzhen University Shenzhen518060 China Guangdong-Hong Kong Joint Laboratory for Big Data Imaging and Communication Shenzhen518060 China School of Computer Science University of Nottingham NottinghamNG8 1BB United Kingdom School of Computer Science University of Nottingham Ningbo315100 China
As virtual and augmented reality applications gain popularity, omnidirectional image (ODI) super-resolution has become increasingly important. Unlike 2D plain images that are formed on a plane, ODIs are projected onto... 详细信息
来源: 评论
Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Yuan, Xin Ni, Wei Ding, Ming Wei, Kang Li, Jun Poor, H. Vincent Data61 CSIRO Sydney Australia The School of Electrical and Optical Engineering Nanjing University of Science and Technology Nanjing210094 China The Department of Electrical and Computer Engineering Princeton University PrincetonNJ08544 United States
While preserving the privacy of federated learning (FL), differential privacy (DP) inevitably degrades the utility (i.e., accuracy) of FL due to model perturbations caused by DP noise added to model updates. Existing ... 详细信息
来源: 评论
Automated Injury Detection and Alert Systems in Public Transportation Integrating IoT with Convolutional Neural Networks
Automated Injury Detection and Alert Systems in Public Trans...
收藏 引用
Self Sustainable Artificial Intelligence Systems (ICSSAS), International Conference on
作者: S P Vimal John Benito Jesudasan Peter U. Kavitha G. Bhuvaneswari G. Manikandan R Thamizhamuthu Department of Electronics and Communication Engineering Sri Ramakrishna Engineering College Coimbatore Tamil Nadu India Cyber | Data Science & Engineering Capital One Services LLC Richmond Virginia USA School of Commerce Vel Tech RangarajanDr.Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering Saveetha Engineering College Chennai Tamil Nadu India Department of Artificial Intelligence and Data Science RMK Engineering College Chennai Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Campus-Chengalpattu Chennai Tamil Nadu India
Innovative methods to improve public transportation safety and response mechanisms have emerged due to Internet of Things (IoT) and artificial intelligence (AI) technologies. IoT devices and Convolutional Neural Netwo... 详细信息
来源: 评论