咨询与建议

限定检索结果

文献类型

  • 5,670 篇 期刊文献
  • 4,828 篇 会议
  • 46 册 图书

馆藏范围

  • 10,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,745 篇 工学
    • 5,031 篇 计算机科学与技术...
    • 4,210 篇 软件工程
    • 1,631 篇 信息与通信工程
    • 1,057 篇 生物工程
    • 867 篇 控制科学与工程
    • 812 篇 电气工程
    • 685 篇 生物医学工程(可授...
    • 610 篇 光学工程
    • 541 篇 电子科学与技术(可...
    • 364 篇 机械工程
    • 327 篇 化学工程与技术
    • 255 篇 交通运输工程
    • 250 篇 动力工程及工程热...
    • 236 篇 网络空间安全
    • 221 篇 安全科学与工程
    • 219 篇 仪器科学与技术
  • 3,951 篇 理学
    • 1,959 篇 数学
    • 1,204 篇 生物学
    • 1,101 篇 物理学
    • 743 篇 统计学(可授理学、...
    • 397 篇 化学
    • 348 篇 系统科学
  • 1,920 篇 管理学
    • 1,107 篇 管理科学与工程(可...
    • 895 篇 图书情报与档案管...
    • 539 篇 工商管理
  • 645 篇 医学
    • 534 篇 临床医学
    • 466 篇 基础医学(可授医学...
    • 284 篇 药学(可授医学、理...
    • 267 篇 公共卫生与预防医...
  • 329 篇 法学
    • 277 篇 社会学
  • 210 篇 经济学
  • 150 篇 农学
  • 108 篇 教育学
  • 38 篇 文学
  • 18 篇 军事学
  • 16 篇 艺术学

主题

  • 361 篇 deep learning
  • 288 篇 feature extracti...
  • 279 篇 accuracy
  • 237 篇 semantics
  • 234 篇 machine learning
  • 233 篇 training
  • 199 篇 computational mo...
  • 170 篇 predictive model...
  • 152 篇 internet of thin...
  • 150 篇 real-time system...
  • 137 篇 data models
  • 131 篇 optimization
  • 122 篇 reinforcement le...
  • 120 篇 data mining
  • 119 篇 convolutional ne...
  • 106 篇 image segmentati...
  • 103 篇 artificial intel...
  • 102 篇 neural networks
  • 100 篇 security
  • 94 篇 support vector m...

机构

  • 426 篇 department of ph...
  • 406 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 390 篇 h.h. wills physi...
  • 363 篇 van swinderen in...
  • 337 篇 yandex school of...
  • 311 篇 school of physic...
  • 310 篇 cavendish labora...
  • 303 篇 university of ch...
  • 291 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 287 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 215 篇 betancourt c.
  • 207 篇 brundu d.
  • 204 篇 bediaga i.
  • 199 篇 amato s.
  • 192 篇 baryshnikov f.
  • 186 篇 boettcher t.
  • 165 篇 braun s.
  • 163 篇 borisyak m.
  • 161 篇 baker s.
  • 153 篇 bjørn m.
  • 152 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 8,527 篇 英文
  • 1,957 篇 其他
  • 85 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Engineering"
10544 条 记 录,以下是4571-4580 订阅
排序:
scRCA: A Siamese network-based pipeline for annotating cell types using noisy single-cell RNA-seq reference data
收藏 引用
computers in Biology and Medicine 2025年 190卷 110068-110068页
作者: Liu, Yan Li, Chen Shen, Long-Chen Yan, He Wei, Guo Gasser, Robin B. Hu, Xiaohua Song, Jiangning Yu, Dong-Jun Department of Computer Science Yangzhou University Yangzhou225100 China Biomedicine Discovery Institute and Department of Biochemistry and Molecular Biology Monash University Melbourne Victoria3800 Australia School of Computer Science and Engineering Nanjing University of Science and Technology 200 Xiaolingwei Nanjing210094 China School of Life Sciences Nanjing University Nanjing210023 China Monash Data Futures Institute Monash University Melbourne Victoria3800 Australia Information Department The First Affiliated Hospital of Naval Military Medical University Changhai Road 168 Shanghai200433 China
Accurate cell type annotation is fundamentally critical for single-cell sequencing (scRNA-seq) data analysis to provide insightful knowledge of tissue-specific cell heterogeneity and cell state transition tracking. Ce... 详细信息
来源: 评论
Surrogate-Assisted Search with Competitive Knowledge Transfer for Expensive Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Xiaoming Hu, Yao Feng, Liang Zhang, Kai Song, Linqi Tan, Kay Chen Department of Computer Science City University of Hong Kong Hong Kong City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China College of Computer Science Chongqing University Chongqing400044 China Civil Engineering School Qingdao University of Technology Qingdao266520 China Department of Data Science and Artificial Intelligence The Hong Kong Polytechnic University Hong Kong
Expensive optimization problems (EOPs) have attracted increasing research attention over the decades due to their ubiquity in a variety of practical applications. Despite many sophisticated surrogate-assisted evolutio... 详细信息
来源: 评论
How Does the Smoothness Approximation Method Facilitate Generalization for Federated Adversarial Learning?  39
How Does the Smoothness Approximation Method Facilitate Gene...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ding, Wenjun An, Ying Chen, Lixing Kan, Shichao Wu, Fan Qu, Zhe School of Computer Science and Engineering Central South University Changsha China Xiangjiang Laboratory Changsha China Big Data Institute Central South University Changsha China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China
Federated Adversarial Learning (FAL) is a robust framework for resisting adversarial attacks on federated learning. Although some FAL studies have developed efficient algorithms, they primarily focus on convergence pe... 详细信息
来源: 评论
The Entry-Extensible Cuckoo Filter  17th
The Entry-Extensible Cuckoo Filter
收藏 引用
17th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2020
作者: Yu, Shuiying Wu, Sijie Chen, Hanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The emergence of large-scale dynamic sets in real applications brings severe challenges in approximate set representation structures. A dynamic set with changing cardinality requires an elastic capacity of the approxi... 详细信息
来源: 评论
Aerial Secure Collaborative Communications under Eavesdropper Collusion in Low-altitude Economy: A Generative Swarm Intelligent Approach
arXiv
收藏 引用
arXiv 2025年
作者: Li, Jiahui Sun, Geng Wu, Qingqing Liang, Shuang Wang, Jiacheng Niyato, Dusit Kim, Dong In College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China School of Information Science and Technology Northeast Normal University Changchun130117 China Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of
The rapid development of the low-altitude economy (LAE) has significantly increased the utilization of autonomous aerial vehicles (AAVs) in various applications, necessitating efficient and secure communication method... 详细信息
来源: 评论
Ensemble Learning for Mapper Parameter Optimization
Ensemble Learning for Mapper Parameter Optimization
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Padraig Fitzpatrick Anna Jurek-Loughrey Paweł Dłotko Jesus Martinez Del Rincon School of Electronics Electrical Engineering and Computer Science Queen’s University Belfast Belfast United Kingdom Dioscuri Centre in Topological Data Analysis Mathematical Institute and Polish Academy of Sciences Warsaw Poland
The Mapper algorithm is a technique from TDA used to create low-dimensional graph-based representations of high-dimensional data, proven effective in numerous exploratory data analysis tasks. The Mapper algorithm’s o...
来源: 评论
On learning rates and schrödinger operators
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 18153-18205页
作者: Bin Shi Weijie J. Su Michael I. Jordan Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China and School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China Department of Statistics and Data Science University of Pennsylvania Philadelphia PA Department of Electrical Engineering and Computer Sciences Department of Statistics University of California Berkeley CA
Understanding the iterative behavior of stochastic optimization algorithms for minimizing nonconvex functions remains a crucial challenge in demystifying deep learning. In particular, it is not yet understood why cert... 详细信息
来源: 评论
Graph for science: From API based Programming to Graph Engine based Programming for HPC
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yu Wang, Zixiao Zhao, Jin Guo, Yuluo Yu, Hui Huang, Zhiying Shi, Xuanhua Liao, Xiaofei National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab. Cluster and Grid Computing Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Modern scientific applications predominantly run on large-scale computing platforms, necessitating collaboration between scientific domain experts and high-performance computing (HPC) experts. While domain experts are... 详细信息
来源: 评论
Evaluation of the Montenegrin Academic Digital Innovation Hub  27
Evaluation of the Montenegrin Academic Digital Innovation Hu...
收藏 引用
27th International Conference on Information Technology, IT 2023
作者: Lakovic, Luka Kara, Peter A. Ognjanovic, Ivana Bokor, Laszlo Sendelj, Ramo Reich, Christoph Roganovic, Milovan Zoulias, Emmanouil Erakovic, Jevto Radusinovic, Tanja Rakocevic, Nada Simon, Aniko University of Donja Gorica Faculty for Information Systems and Technologies Podgorica81000 Montenegro Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Networked Systems and Services Budapest1111 Hungary Faculty of Science Engineering and Computing Kingston University Wireless Multimedia and Networking Research Group Department of Computer Science School of Computer Science and Mathematics LondonKT1 2EE United Kingdom University of Donja Gorica Humanistic Studies Podgorica81000 Montenegro Furtwangen University Institute of Data Science Cloud Computing and It Security Furtwangen78120 Germany Clinical Centre of Montenegro Clinic for Neurology Podgorica81000 Montenegro National and Kapodistrian University of Athens Faculty of Nursing School of Health Sciences Goudi 11527 Greece Chamber of Economy of Montenegro Podgorica81000 Montenegro Sigma Technology Budapest1093 Hungary
In the era of global digitalization, digital innovation hubs have become essential, as they function as transforming forces. In this paper, we provide an analysis of the Montenegrin Academic Digital Innovation Hub by ... 详细信息
来源: 评论
Action-Manipulation Attack and Defense to X-Armed Bandits
Action-Manipulation Attack and Defense to X-Armed Bandits
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhi Luo Youqi Li Lixing Chen Zichuan Xu Pan Zhou School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science School of Cyberspace Science and Technology Beijing Institute of Technology Institute of Cyber Science and Technology Shanghai Jiao Tong University School of Software Dalian University of Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology
As a continuous variant of Multi-armed bandits (MAB), $\mathcal{X}$-armed bandits have enriched many applications of online machine learning like personalized recommendation system. However, the attack and defense to ... 详细信息
来源: 评论