咨询与建议

限定检索结果

文献类型

  • 8,890 篇 期刊文献
  • 8,140 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,967 篇 工学
    • 8,319 篇 计算机科学与技术...
    • 7,018 篇 软件工程
    • 2,512 篇 信息与通信工程
    • 1,673 篇 生物工程
    • 1,366 篇 控制科学与工程
    • 1,143 篇 电气工程
    • 1,060 篇 生物医学工程(可授...
    • 926 篇 光学工程
    • 741 篇 电子科学与技术(可...
    • 591 篇 机械工程
    • 538 篇 化学工程与技术
    • 372 篇 动力工程及工程热...
    • 368 篇 交通运输工程
    • 368 篇 安全科学与工程
    • 356 篇 网络空间安全
    • 324 篇 仪器科学与技术
  • 6,354 篇 理学
    • 3,285 篇 数学
    • 1,889 篇 生物学
    • 1,600 篇 物理学
    • 1,237 篇 统计学(可授理学、...
    • 629 篇 化学
    • 581 篇 系统科学
  • 3,164 篇 管理学
    • 1,689 篇 管理科学与工程(可...
    • 1,602 篇 图书情报与档案管...
    • 811 篇 工商管理
  • 1,024 篇 医学
    • 852 篇 临床医学
    • 749 篇 基础医学(可授医学...
    • 440 篇 药学(可授医学、理...
    • 422 篇 公共卫生与预防医...
  • 545 篇 法学
    • 456 篇 社会学
  • 305 篇 经济学
  • 213 篇 农学
  • 182 篇 教育学
  • 53 篇 文学
  • 25 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 529 篇 deep learning
  • 424 篇 feature extracti...
  • 405 篇 semantics
  • 338 篇 machine learning
  • 321 篇 computational mo...
  • 312 篇 training
  • 305 篇 accuracy
  • 258 篇 predictive model...
  • 201 篇 reinforcement le...
  • 200 篇 data mining
  • 190 篇 optimization
  • 185 篇 task analysis
  • 180 篇 real-time system...
  • 178 篇 internet of thin...
  • 175 篇 neural networks
  • 170 篇 image segmentati...
  • 166 篇 graph neural net...
  • 163 篇 data models
  • 158 篇 convolution
  • 147 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 311 篇 university of ch...
  • 304 篇 van swinderen in...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 249 篇 barter w.
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 212 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 164 篇 bediaga i.
  • 157 篇 baker s.
  • 154 篇 amato s.
  • 148 篇 boettcher t.
  • 147 篇 baryshnikov f.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 15,356 篇 英文
  • 1,637 篇 其他
  • 125 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data and Computer Science"
17095 条 记 录,以下是761-770 订阅
排序:
VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism  26
VDDA: An Effective Software Vulnerability Detection Model Ba...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Jiaqi Ma, Zhujuan Cao, Binghao Zhu, Erzhou Anhui University School of Computer Science and Technology Hefei China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei China
Many of software vulnerability detection methods suffer from problems of dependent on expert experience, rough detection granularity, and incomplete syntax and semantics information on source codes. This paper propose... 详细信息
来源: 评论
Iterative methods via locally evolving set process  24
Iterative methods via locally evolving set process
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Baojian Zhou Yifan Sun Reza Babanezhad Harikandeh Xingzhi Guo Deqing Yang Yanghua Xiao The School of Data Science Fudan University and Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Department of Computer Science Stony Brook University Samsung SAIT AI Lab. Shanghai Key Laboratory of Data Science School of Computer Science Fudan University
Given the damping factor α and precision tolerance ε, Andersen et al. [2] introduced Approximate Personalized PageRank (APPR), the de facto local method for approximating the PPR vector, with runtime bounded by Θ(...
来源: 评论
Leveraging Support Vector Machines for Detection of Network Traffic Attacks  4
Leveraging Support Vector Machines for Detection of Network ...
收藏 引用
4th International Conference on Advancement in Electronics and Communication Engineering, AECE 2024
作者: Tiwari, Anurag Indian Institute of Technology School of Artificial Intelligence & Data Science Jodhpur India Babu Banarasi das Institute of Technology& Management Department of Computer Science & Engineering Lucknow India
Network security is crucial to ensure the protection of information systems in an increasingly connected world, and network traffic attack detection is an important aspect of maintaining system integrity. This study a... 详细信息
来源: 评论
Learning to Unlearn for Bayesian Personalized Ranking via Influence Function
收藏 引用
Chinese Journal of Electronics 2025年 第3期34卷 990-1001页
作者: Chen Jundong Zhang Honglei Li Haoxuan Li Yidong Key Laboratory of Big Data & Artificial Intelligence in Transportation (Beijing Jiaotong University) Ministry of Education Beijing 100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing 100044 China School of Computer Science and Technology Beijing Jiaotong University Beijing 100044 China Center for Data Science Peking University Beijing 100871 China
Learning recommender models from vast amounts of behavioral data has become a mainstream paradigm in recent information systems. Conversely, with privacy awareness grown, there has been increasing attention to the rem... 详细信息
来源: 评论
Online multi-label streaming feature selection based on neighborhood rough set with label correlation  24
Online multi-label streaming feature selection based on neig...
收藏 引用
3rd International Conference on Artificial Intelligence and Education, ICAIE 2024
作者: Pan, Siping Lin, Yaojin Mao, Yu Lin, Shaojie School of Computer Science Minnan Normal University Fujian Zhangzhou China Key Laboratory of Data Science and Intelligence Application Minnan Normal University Fujian Zhangzhou China
Online multi-label streaming feature selection has gained significant interest in high-volume data applications. Neighborhood Rough Set (NRS) has emerged as a practical tool for handling multi-label feature selection.... 详细信息
来源: 评论
RoCEL: Advancing Table Entity Linking through Distinctive Row and Column Contexts
RoCEL: Advancing Table Entity Linking through Distinctive Ro...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wang, Yuanzheng Fan, Yixing Guo, Jiafeng Zhang, Ruqing Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Table entity linking (TEL) aims to map entity mentions in the table to their corresponding entities in a knowledge base (KB). The core of this task is to leverage structured contexts, specifically row and column conte... 详细信息
来源: 评论
Locating What You Need: Towards Adapting Diffusion Models to OOD Concepts In-the-Wild  38
Locating What You Need: Towards Adapting Diffusion Models to...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yang, Jianan Gao, Chenchao Xiao, Zhiqing Zhao, Junbo Wu, Sai Chen, Gang Wang, Haobo College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China School of Software Technology Zhejiang University China International School of Information Science and Engineering Dalian University of Technology China
The recent large-scale text-to-image generative models have attained unprecedented performance, while people established adaptor modules like LoRA and DreamBooth to extend this performance to even more unseen concept ...
来源: 评论
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary relational Knowledge Graph Construction  38
Text2NKG: Fine-Grained N-ary Relation Extraction for N-ary r...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Luo, Haoran Haihong, E. Yang, Yuhao Yao, Tianyu Guo, Yikai Tang, Zichen Zhang, Wentai Peng, Shiyao Wan, Kaiyang Song, Meina Lin, Wei Zhu, Yifan Tuan, Luu Anh School of Computer Science Beijing University of Posts and Telecommunications China School of Automation Science and Electrical Engineering Beihang University China Beijing Institute of Computer Technology and Application China Inspur Group Co. Ltd. China College of Computing and Data Science Nanyang Technological University Singapore
Beyond traditional binary relational facts, n-ary relational knowledge graphs (NKGs) are comprised of n-ary relational facts containing more than two entities, which are closer to real-world facts with broader applica...
来源: 评论
An Intrusion Detection Scheme Based on Sequential Tri-Way Decisions of Multiple Granularity for Intelligent Connected Vehicles
An Intrusion Detection Scheme Based on Sequential Tri-Way De...
收藏 引用
International Conference on Artificial Intelligence and Autonomous Transportation, AIAT 2024
作者: Li, Yongzhong Wang, Qi Li, Yuheng Zhang, Shipeng School of Automotive Engineering Nantong Institute of Technology Nantong226010 China Internet of Things and Big Data Major of Macao Polytechnic University Macao China School of Computer Science Jiangsu University of Science and Technology Zhenjiang212003 China
With the rapid developing technology of the Internet of Things, intelligent connected vehicles are facing more and more serious cybersecurity threats and challenges. With the developing of cybersecurity technology for... 详细信息
来源: 评论
Low-Overhead General-Purpose Near-data Processing in CXL Memory Expanders  57
Low-Overhead General-Purpose Near-Data Processing in CXL Mem...
收藏 引用
57th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2024
作者: Ham, Hyungkyu Hong, Jeongmin Park, Geonwoo Shin, Yunseon Woo, Okkyun Yang, Wonhyuk Bae, Jinhoon Park, Eunhyeok Sung, Hyojin Lim, Euicheol Kim, Gwangsun POSTECH Department of Computer Science and Engineering Korea Republic of POSTECH Graduate School of Artificial Intelligence Korea Republic of Seoul National University Graduate School of Data Science Korea Republic of SK Hynix Korea Republic of
Emerging Compute Express Link (CXL) enables cost-efficient memory expansion beyond the local DRAM of processors. While its *** protocol provides minimal latency overhead through an optimized protocol stack, frequent C... 详细信息
来源: 评论