咨询与建议

限定检索结果

文献类型

  • 8,890 篇 期刊文献
  • 8,140 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,967 篇 工学
    • 8,319 篇 计算机科学与技术...
    • 7,018 篇 软件工程
    • 2,512 篇 信息与通信工程
    • 1,673 篇 生物工程
    • 1,366 篇 控制科学与工程
    • 1,143 篇 电气工程
    • 1,060 篇 生物医学工程(可授...
    • 926 篇 光学工程
    • 741 篇 电子科学与技术(可...
    • 591 篇 机械工程
    • 538 篇 化学工程与技术
    • 372 篇 动力工程及工程热...
    • 368 篇 交通运输工程
    • 368 篇 安全科学与工程
    • 356 篇 网络空间安全
    • 324 篇 仪器科学与技术
  • 6,354 篇 理学
    • 3,285 篇 数学
    • 1,889 篇 生物学
    • 1,600 篇 物理学
    • 1,237 篇 统计学(可授理学、...
    • 629 篇 化学
    • 581 篇 系统科学
  • 3,164 篇 管理学
    • 1,689 篇 管理科学与工程(可...
    • 1,602 篇 图书情报与档案管...
    • 811 篇 工商管理
  • 1,024 篇 医学
    • 852 篇 临床医学
    • 749 篇 基础医学(可授医学...
    • 440 篇 药学(可授医学、理...
    • 422 篇 公共卫生与预防医...
  • 545 篇 法学
    • 456 篇 社会学
  • 305 篇 经济学
  • 213 篇 农学
  • 182 篇 教育学
  • 53 篇 文学
  • 25 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 529 篇 deep learning
  • 424 篇 feature extracti...
  • 405 篇 semantics
  • 338 篇 machine learning
  • 321 篇 computational mo...
  • 312 篇 training
  • 305 篇 accuracy
  • 258 篇 predictive model...
  • 201 篇 reinforcement le...
  • 200 篇 data mining
  • 190 篇 optimization
  • 185 篇 task analysis
  • 180 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 170 篇 image segmentati...
  • 166 篇 graph neural net...
  • 163 篇 data models
  • 158 篇 convolution
  • 147 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 304 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 164 篇 bediaga i.
  • 157 篇 baker s.
  • 154 篇 amato s.
  • 148 篇 boettcher t.
  • 147 篇 baryshnikov f.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,356 篇 英文
  • 1,637 篇 其他
  • 125 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Science"
17095 条 记 录,以下是591-600 订阅
排序:
Research on a Technology of Mail Anti-virus Gateway for Industrial Internet
Research on a Technology of Mail Anti-virus Gateway for Indu...
收藏 引用
2023 IEEE International Conference on Image Processing and computer Applications, ICIPCA 2023
作者: Wu, Yuhong Lv, Yunshan Zhang, Ling School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
With the rapid rise of the Industrial Internet, emails that convey a large amount of information require a strong network security environment. Aiming at the increasingly complex mail virus prevention and control work... 详细信息
来源: 评论
SpeAr: A Spectral Approach for Zero-Shot Node Classification  38
SpeAr: A Spectral Approach for Zero-Shot Node Classification
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Guo, Ting Wang, Da Liang, Jiye Zhang, Kaihan Zeng, Jianchao Data Science and Technology North University of China Taiyuan China School of Computer and Information Technology Shanxi University Taiyuan China
Zero-shot node classification is a vital task in the field of graph data processing, aiming to identify nodes of classes unseen during the training process. Prediction bias is one of the primary challenges in zero-sho...
来源: 评论
ICL: Iterative Continual Learning for Multi-domain Neural Machine Translation
ICL: Iterative Continual Learning for Multi-domain Neural Ma...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Man, Zhibo Huang, Kaiyu Zhang, Yujie Chen, Yuanmeng Chen, Yufeng Xu, Jinan Beijing Key Lab of Traffic Data Analysis and Mining School of Computer Science and Technology Beijing Jiaotong University Beijing China
In a practical scenario, multi-domain neural machine translation (MDNMT) aims to continuously acquire knowledge from new domain data while retaining old *** work separately learns each new domain knowledge based on pa... 详细信息
来源: 评论
GrammarGPT: Exploring Open-Source LLMs for Native Chinese Grammatical Error Correction with Supervised Fine-Tuning  12th
GrammarGPT: Exploring Open-Source LLMs for Native Chinese G...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Fan, Yaxin Jiang, Feng Li, Peifeng Li, Haizhou School of Data Science The Chinese University of Hong Kong Shenzhen China School of Computer Science and Technology Soochow University Suzhou China Shenzhen Research Institute of Big Data Guangdong Shenzhen China School of Information Science and Technology University of Science and Technology of China Hefei China
Grammatical error correction aims to correct ungrammatical sentences automatically. Recently, some work has demonstrated the excellent capabilities of closed-source Large Language Models (LLMs, e.g., ChatGPT) in gramm... 详细信息
来源: 评论
Efficient Dual-Confounding Eliminating for Weakly-supervised Temporal Action Localization  24
Efficient Dual-Confounding Eliminating for Weakly-supervised...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Li, Ao Liu, Huijun Sheng, Jinrong Chen, Zhongming Ge, Yongxin School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China
Weakly-supervised Temporal Action Localization (WTAL) following a localization-by-classification paradigm has achieved significant results, yet still grapples with confounding arising from ambiguous snippets. Previous... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
Privacy Preservation Fully Homomorphic Encryption for Cloud-assisted Biometric Identification with Multi-key
Privacy Preservation Fully Homomorphic Encryption for Cloud-...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Peng, Shenghui Jia, Peiheng Xiong, Jinbo Zhu, Liehuang Liu, Ximeng Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Fujian Normal University College of Computer and Cyber Security Fuzhou China Fuzhou University College of Computer and Data Science Fuzhou China
Biometrics is a technology that utilizes individual physiological or behavioral characteristics for identity authentication and identification, ensuring secure and accurate identity verification by comparing biometric... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
DFA-GNN: Forward Learning of Graph Neural Networks by Direct Feedback Alignment  38
DFA-GNN: Forward Learning of Graph Neural Networks by Direct...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhao, Gongpei Wang, Tao Lang, Congyan Jin, Yi Li, Yidong Ling, Haibin Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education China School of Computer Science & Technology Beijing Jiaotong University China Department of Computer Science Stony Brook University United States
Graph neural networks (GNNs) are recognized for their strong performance across various applications, with the backpropagation (BP) algorithm playing a central role in the development of most GNN models. However, desp...
来源: 评论
IoT Authentication Protocols: Classification, Trend and Opportunities
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 515-533页
作者: N.alsheavi, Amar Hawbani, Ammar Wang, Xingfu Othman, Wajdy Zhao, Liang Liu, Zhi Alsamhi, Saeed Hamood Al-Qaness, Mohammed A. A. University of Science and Technology of China School of Computer Science and Technology Anhui Hefei230027 China Shenyang Aerospace University School of Computer Science Shenyang110136 China Nankai University Haihe Laboratory of ITAI School of Cyber Science Tianjin300459 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo Japan University of Galway Insight Centre for Data Analytics Galway Ireland IBB University Faculty of Engineering Ibb Yemen Zhejiang Normal University College of Physics and Electronic Information Engineering Jinhua321004 China Zhejiang Institute of Optoelectronics Jinhua321004 China
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authenticati... 详细信息
来源: 评论