咨询与建议

限定检索结果

文献类型

  • 8,890 篇 期刊文献
  • 8,140 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,967 篇 工学
    • 8,319 篇 计算机科学与技术...
    • 7,018 篇 软件工程
    • 2,512 篇 信息与通信工程
    • 1,673 篇 生物工程
    • 1,366 篇 控制科学与工程
    • 1,143 篇 电气工程
    • 1,060 篇 生物医学工程(可授...
    • 926 篇 光学工程
    • 741 篇 电子科学与技术(可...
    • 591 篇 机械工程
    • 538 篇 化学工程与技术
    • 372 篇 动力工程及工程热...
    • 368 篇 交通运输工程
    • 368 篇 安全科学与工程
    • 356 篇 网络空间安全
    • 324 篇 仪器科学与技术
  • 6,354 篇 理学
    • 3,285 篇 数学
    • 1,889 篇 生物学
    • 1,600 篇 物理学
    • 1,237 篇 统计学(可授理学、...
    • 629 篇 化学
    • 581 篇 系统科学
  • 3,164 篇 管理学
    • 1,689 篇 管理科学与工程(可...
    • 1,602 篇 图书情报与档案管...
    • 811 篇 工商管理
  • 1,024 篇 医学
    • 852 篇 临床医学
    • 749 篇 基础医学(可授医学...
    • 440 篇 药学(可授医学、理...
    • 422 篇 公共卫生与预防医...
  • 545 篇 法学
    • 456 篇 社会学
  • 305 篇 经济学
  • 213 篇 农学
  • 182 篇 教育学
  • 53 篇 文学
  • 25 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 529 篇 deep learning
  • 424 篇 feature extracti...
  • 405 篇 semantics
  • 338 篇 machine learning
  • 321 篇 computational mo...
  • 312 篇 training
  • 305 篇 accuracy
  • 258 篇 predictive model...
  • 201 篇 reinforcement le...
  • 200 篇 data mining
  • 190 篇 optimization
  • 185 篇 task analysis
  • 180 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 170 篇 image segmentati...
  • 166 篇 graph neural net...
  • 163 篇 data models
  • 158 篇 convolution
  • 147 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 304 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 164 篇 bediaga i.
  • 157 篇 baker s.
  • 154 篇 amato s.
  • 148 篇 boettcher t.
  • 147 篇 baryshnikov f.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,356 篇 英文
  • 1,637 篇 其他
  • 125 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Science"
17095 条 记 录,以下是741-750 订阅
排序:
Improved Particle Swarm Algorithm Using Multiple Strategies  1
收藏 引用
14th International Symposium on Intelligence Computation and Applications, ISICA 2023
作者: Yi, Yunfei Wang, Zhiyong Shi, Yunying School of Big Data and Computer Hechi University Guangxi Yizhou546300 China College of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541001 China
In order to address the issues of premature convergence and low search efficiency in the basic particle swarm algorithm, this paper analyzes the improved particle swarm optimization algorithms proposed by previous res... 详细信息
来源: 评论
Uncover Secrets Through the Cover: A Deep Learning-Based Side-Channel Attack Against Kyber Implementations With Anti-Tampering Covers
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2159-2167页
作者: Chen, Peng Li, Jinnuo Cheng, Wei Cheng, Chi China University of Geosciences School of Computer Science Wuhan430074 China City University of Macau Faculty of Data Science Macau999078 China Institut Polytechnique de Paris LTCI Télécom Paris Palaiseau91120 France Secure-IC S.A.S. Paris75014 France
The probe can directly contact the microcontrollerin a typical EM side-channel attack (SCA) targeting crypto-graphic implementations. However, in a more practical settingsuch as security level 2 of FIPS 140-3 or ISO/I... 详细信息
来源: 评论
A Deep Phishing Email Detection Model Combing Multi-Features Based on Word Frequency and Contextual Semantics  4
A Deep Phishing Email Detection Model Combing Multi-Features...
收藏 引用
4th International Conference on Communication Technology and Information Technology, ICCTIT 2024
作者: Liu, Yuntian Zhu, Erzhou Ma, Zhujuan Anhui University School of Computer Science and Technology Hefei230601 China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei230088 China
Due to the ability to automatically extract phishing features without relying on expert knowledge, deep learning methods have been widely applied in the research of phishing email classification and detection. However... 详细信息
来源: 评论
Machine Learning Approaches in Detecting Autism Spectrum Disorder  8
Machine Learning Approaches in Detecting Autism Spectrum Dis...
收藏 引用
8th International Conference on computer science and Computational Intelligence, ICCSCI 2023
作者: Daniel Dominic, Nicholas Cenggoro, Tjeng Wawan Pardamean, Bens Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia
Early detection of Autism Spectrum Disorder (ASD) needs to be increased to prevent further adverse impacts. Thus, the classification between ASD and Typically Development (TD) individuals is an intriguing task. This r... 详细信息
来源: 评论
Power-Measurement-Based Channel Autocorrelation Estimation for IRS-Assisted Wideband Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 4647-4662页
作者: Sun, He Zhu, Lipeng Mei, Weidong Zhang, Rui National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications 611731 China The Chinese University of Hon g Kong School of Science and Engineering Shenzhen Research Institute of Big Data Guangdong Shenzhen518172 China
Channel state information (CSI) is essential to the performance optimization of intelligent reflecting surface (IRS)-aided wireless communication systems. However, the passive and frequency-flat reflection of IRS, as ... 详细信息
来源: 评论
Exploring the Role of Generative AI in Constructing Knowledge Graphs for Drug Indications with Medical Context  15
Exploring the Role of Generative AI in Constructing Knowledg...
收藏 引用
15th International Conference on Semantic Web Applications and Tools for Health Care and Life sciences, SWAT4HCLS 2024
作者: Alharbi, Reham Ahmed, Umair Dobriy, Daniil Lajewska, Weronika Menotti, Laura Saeedizade, Mohammad Javad Dumontier, Michel Department of Computer Science University of Liverpool Liverpool United Kingdom School of Science and Technology University of Camerino Camerino Italy Institute for Data Process and Knowledge Management Vienna University of Economics and Business Vienna Austria Department of Electrical Engineering and Computer Science University of Stavanger Stavanger Norway Department of Information Engineering University of Padua Padova Italy Department of Computer Science Linköping University Linköping Sweden Institute of Data Science Maastricht University Maastricht Netherlands
The medical context for a drug indication provides crucial information on how the drug can be used in practice. However, the extraction of medical context from drug indications remains poorly explored, as most researc... 详细信息
来源: 评论
Long Short-Term Memory-based Models for Sleep Quality Prediction from Wearable Device Time Series data  8
Long Short-Term Memory-based Models for Sleep Quality Predic...
收藏 引用
8th International Conference on computer science and Computational Intelligence, ICCSCI 2023
作者: Hidayat, Alam Ahmad Budiarto, Arif Pardamean, Bens Mathematics Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Jakarta11480 Indonesia
Several studies suggest that sleep quality is associated with physical activities. Moreover, deep sleep time can be used to determine the sleep quality of an individual. In this work, we aim to find the association be... 详细信息
来源: 评论
Sentiment Analysis for TikTok Review Using VADER Sentiment and SVM Model  8
Sentiment Analysis for TikTok Review Using VADER Sentiment a...
收藏 引用
8th International Conference on computer science and Computational Intelligence, ICCSCI 2023
作者: Isnan, Mahmud Elwirehardja, Gregorius Natanael Pardamean, Bens Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Jakarta11480 Indonesia
TikTok, a social networking site for uploading short videos, has become one of the most popular. Despite this, not all users are happy with the app;there are criticisms and suggestions, one of which is reviewed via th... 详细信息
来源: 评论
HORIZON-FREE REGRET FOR LINEAR MARKOV DECISION PROCESSES  12
HORIZON-FREE REGRET FOR LINEAR MARKOV DECISION PROCESSES
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Zhang, Zihan Lee, Jason D. Chen, Yuxin Du, Simon S. Department of Electrical and Computer Engineering Princeton University United States Department of Statistics and Data Science University of Pennsylvania United States Paul G. Allen School of Computer Science and Engineering University of Washington United States
A recent line of works showed regret bounds in reinforcement learning (RL) can be (nearly) independent of planning horizon, a.k.a. the horizon-free bounds. However, these regret bounds only apply to settings where a p... 详细信息
来源: 评论
Phishing Detection Model Integrating URL Characters and HTML Word Semantic Deep Features  4
Phishing Detection Model Integrating URL Characters and HTML...
收藏 引用
4th International Conference on Communication Technology and Information Technology, ICCTIT 2024
作者: Meng, Lihui Ma, Zhujuan Zhu, Erzhou Anhui University School of Computer Science and Technology Hefei230601 China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei230088 China
Deep learning methods, known for their powerful feature learning and classification capabilities, are widely used in phishing detection. To improve accuracy, this study proposes DPMLF (Deep Learning Phishing Detection... 详细信息
来源: 评论