咨询与建议

限定检索结果

文献类型

  • 5,635 篇 期刊文献
  • 4,828 篇 会议
  • 46 册 图书

馆藏范围

  • 10,509 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,746 篇 工学
    • 5,032 篇 计算机科学与技术...
    • 4,210 篇 软件工程
    • 1,632 篇 信息与通信工程
    • 1,057 篇 生物工程
    • 867 篇 控制科学与工程
    • 812 篇 电气工程
    • 685 篇 生物医学工程(可授...
    • 610 篇 光学工程
    • 541 篇 电子科学与技术(可...
    • 365 篇 机械工程
    • 326 篇 化学工程与技术
    • 255 篇 交通运输工程
    • 250 篇 动力工程及工程热...
    • 236 篇 网络空间安全
    • 221 篇 安全科学与工程
    • 218 篇 仪器科学与技术
  • 3,949 篇 理学
    • 1,961 篇 数学
    • 1,203 篇 生物学
    • 1,100 篇 物理学
    • 745 篇 统计学(可授理学、...
    • 397 篇 化学
    • 348 篇 系统科学
  • 1,921 篇 管理学
    • 1,107 篇 管理科学与工程(可...
    • 896 篇 图书情报与档案管...
    • 539 篇 工商管理
  • 641 篇 医学
    • 531 篇 临床医学
    • 464 篇 基础医学(可授医学...
    • 284 篇 药学(可授医学、理...
    • 267 篇 公共卫生与预防医...
  • 329 篇 法学
    • 277 篇 社会学
  • 209 篇 经济学
  • 150 篇 农学
  • 108 篇 教育学
  • 38 篇 文学
  • 18 篇 军事学
  • 15 篇 艺术学

主题

  • 360 篇 deep learning
  • 288 篇 feature extracti...
  • 285 篇 accuracy
  • 240 篇 training
  • 236 篇 semantics
  • 234 篇 machine learning
  • 199 篇 computational mo...
  • 170 篇 predictive model...
  • 151 篇 internet of thin...
  • 150 篇 real-time system...
  • 140 篇 data models
  • 130 篇 optimization
  • 126 篇 convolutional ne...
  • 122 篇 reinforcement le...
  • 120 篇 data mining
  • 106 篇 image segmentati...
  • 102 篇 neural networks
  • 102 篇 artificial intel...
  • 98 篇 security
  • 94 篇 support vector m...

机构

  • 426 篇 department of ph...
  • 407 篇 horia hulubei na...
  • 398 篇 iccub universita...
  • 391 篇 h.h. wills physi...
  • 369 篇 van swinderen in...
  • 344 篇 yandex school of...
  • 314 篇 cavendish labora...
  • 312 篇 school of physic...
  • 304 篇 university of ch...
  • 291 篇 imperial college...
  • 291 篇 nikhef national ...
  • 289 篇 department of ph...
  • 289 篇 center for high ...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 stfc rutherford ...
  • 283 篇 institute of par...
  • 283 篇 school of physic...
  • 283 篇 school of physic...

作者

  • 251 篇 barter w.
  • 245 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 209 篇 bediaga i.
  • 207 篇 brundu d.
  • 198 篇 amato s.
  • 193 篇 baryshnikov f.
  • 187 篇 boettcher t.
  • 164 篇 braun s.
  • 162 篇 borisyak m.
  • 160 篇 baker s.
  • 155 篇 bjørn m.
  • 150 篇 bizzeti a.
  • 144 篇 bencivenni g.
  • 144 篇 albrecht j.

语言

  • 8,492 篇 英文
  • 1,957 篇 其他
  • 85 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Engineering"
10509 条 记 录,以下是4611-4620 订阅
排序:
Decision-Feedback Single-Layer Read Reconstruction and Separation for Three-dimensional Magnetic Recording
Decision-Feedback Single-Layer Read Reconstruction and Separ...
收藏 引用
Magnetic Conference - Short Papers (INTERMAG Short Papers), IEEE International
作者: Yanzhe Liao Kezheng Zhang Yugen Jian Shaobing Wang Jincai Chen Ping Lu Ke Luo School of Computer Science & Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China Huazhong University of Science and Technology Wuhan China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China School of Public Health Hubei University of Medicine Shiyan China
Three-dimensional magnetic recording (3DMR) based on energy-assisted recording techniques by either heat or microwave is a leading storage solution. Separation and detection are impeded by inter-symbol interference, i... 详细信息
来源: 评论
Low Pass Filtering and Bandwidth Extension for Robust Anti-spoofing Countermeasure Against Codec Variabilities
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Yikang Wang, Xingming Nishizaki, Hiromitsu Li, Ming Integrated Graduate School of Medicine Engineering and Agricultural Sciences University of Yamanashi Japan Data Science Research Center Duke Kunshan University China School of Computer Science Wuhan University China
A reliable voice anti-spoofing countermeasure system needs to robustly protect automatic speaker verification (ASV) systems in various kinds of spoofing scenarios. However, the performance of countermeasure systems co... 详细信息
来源: 评论
A Probability-Based All-Zero Block Early Termination Algorithm for QSHVC
A Probability-Based All-Zero Block Early Termination Algorit...
收藏 引用
IEEE International Conference on Image Processing
作者: Dayong Wang Xin Lu Frederic Dufaux Qianmin Wang Weisheng Li Bo Hang Ce Zhu Chongqing Key Laboratory on Big Data for Bio Intelligence Chongqing University of Posts and Telecommunications School of Computer Science and Informatics De Montfort University CNRS CentraleSupélec Laboratoire des Signaux et systèmes Université Paris-Saclay School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Computer School Hubei University of Arts and Science School of Information and Communication Engineering University of Electronic Science and Technology of China
To seamlessly adapt to time-varying network bandwidths, Quality Scalable High-Efficiency Video Coding (QSHVC) is developed. However, its coding process is overwhelmingly complex, and this seriously limits its wide app...
来源: 评论
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction  23
Membership Inference Attacks via Dynamic Adversarial Perturb...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo Ma, Jianfeng Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China Xidian University School of Cyber Engineering Xian China
Existing membership inference attacks (MIAs) based on adversarial attacks typically introduce excessively large adversarial perturbations to change the model predictions. However, such methods are not only likely to o... 详细信息
来源: 评论
Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate
arXiv
收藏 引用
arXiv 2023年
作者: Niu, Jianyu Gai, Fangyu Han, Runchao Zhang, Ren Zhang, Yinqian Feng, Chen The Engineering Research Institute of Trustworthy Autonomous Systems The School and Computer Science and Engineering Department Southern University of Science and Technology Shenzhen China The Blockchain@UBC The School of Engineering The University of British Columbia Okanagan Campus KelownaBC Canada Monash University CSIRO-Data61 Australia Cryptape Co. Ltd. and Nervos
Researchers have discovered a series of theoretical attacks against Bitcoin’s Nakamoto consensus;the most damaging ones are selfish mining, double-spending, and consistency delay attacks. These attacks have one commo... 详细信息
来源: 评论
Classification of Breast Thermal Images into Healthy/Cancer Group Using Pre-Trained Deep Learning Schemes
收藏 引用
Procedia computer science 2023年 218卷 24-34页
作者: Seifedine Kadry Rubén González Crespo Enrique Herrera-Viedma Sujatha Krishnamoorthy Venkatesan Rajinikanth Faculty of Applied Computing and Technology Noroff University College Kristiansand 94612 Norway Computer Science Department School of Engineering and Technology Universidad Internacional de La Rioja 26006 Andalusian Spain Research Institute in Data Science and Computational Intelligence University of Granada Granada Spain Zhejiang Bioinformatics International Science and Technology Cooperation Center Wenzhou-Kean University Zhejiang Province China Wenzhou Municipal Key Lab of Applied Biomedical and Biopharmaceutical Informatics Wenzhou-Kean University Zhejiang Province China Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai 602105 Tamil Nadu India
In the women's community, Breast Cancer (BC) is a severe disease. The World Health Organization reported in 2020 that 2.26 million deaths occur due to BC. BC is curable if detected early. Since thermal imaging is ... 详细信息
来源: 评论
LSTM-ANN Based Price Hike Sentiment Analysis from Bangla Social Media Comments
LSTM-ANN Based Price Hike Sentiment Analysis from Bangla Soc...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Sovon Chakraborty Muhammad Borahn Uddin Talukdar Muhammed Yaseen Morshed Adib Sowmen Mitra Md. Golam Rabiul Alam Department of Computer Scinece and Engineering School of Data and Sciences BRAC University Dhaka Bangladesh Department of Computer Science and Engineering Dhaka Bangladesh Department of Artificial Intelligence Hebei University of Technology Beijing China
Price hike has always been a substantial concern for people all over the world. The crisis gets more conspicuous, and people find themselves more confounded when even the bare minimum of expenses still exceeds the amo... 详细信息
来源: 评论
SPA: a graph spectral alignment perspective for domain adaptation  23
SPA: a graph spectral alignment perspective for domain adapt...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zhiqing Xiao Haobo Wang Ying Jin Lei Feng Gang Chen Fei Huang Junbo Zhao College of Computer Science and Technology Zhejiang University and Key Lab of Intelligent Computing based Big Data of Zhejiang Province Zhejiang University School of Software Technology Zhejiang University and Key Lab of Intelligent Computing based Big Data of Zhejiang Province Zhejiang University CUHK-SenseTime Joint Lab The Chinese University of Hong Kong School of Computer Science and Engineering Nanyang Technological University Alibaba Group
Unsupervised domain adaptation (UDA) is a pivotal form in machine learning to extend the in-domain model to the distinctive target domains where the data distributions differ. Most prior works focus on capturing the i...
来源: 评论
Camouflaged Object Detection via Context-aware Cross-level Fusion
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Geng Liu, Si-Jie Sun, Yu-Jia Ji, Ge-Peng Wu, Ya-Feng Zhou, Tao Northwestern Polytechnical University Xi’an710072 China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering China Data Processing Center School of Power and Energy China Key Laboratory of System Control and Information Processing Ministry of Education Shanghai200240 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China School of Computer Science Inner Mongolia University Hohhot010021 China Artificial Intelligence Institute School of Computer Science Wuhan University Wuhan430072 China
Camouflaged object detection (COD) aims to identify the objects that conceal themselves in natural scenes. Accurate COD suffers from a number of challenges associated with low boundary contrast and the large variation... 详细信息
来源: 评论
Low Pass Filtering and Bandwidth Extension for Robust Anti-spoofing Countermeasure Against Codec Variabilities
Low Pass Filtering and Bandwidth Extension for Robust Anti-s...
收藏 引用
International Symposium on Chinese Spoken Language Processing
作者: Yikang Wang Xingming Wang Hiromitsu Nishizaki Ming Li Integrated Graduate School of Medicine Engineering and Agricultural Sciences University of Yamanashi Japan Data Science Research Center Duke Kunshan University China School of Computer Science Wuhan University China
A reliable voice anti-spoofing countermeasure system needs to robustly protect automatic speaker verification (ASV) systems in various kinds of spoofing scenarios. However, the performance of countermeasure systems co... 详细信息
来源: 评论