咨询与建议

限定检索结果

文献类型

  • 8,821 篇 期刊文献
  • 8,177 篇 会议
  • 63 册 图书
  • 2 篇 专利

馆藏范围

  • 17,063 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,947 篇 工学
    • 8,282 篇 计算机科学与技术...
    • 6,968 篇 软件工程
    • 2,502 篇 信息与通信工程
    • 1,668 篇 生物工程
    • 1,356 篇 控制科学与工程
    • 1,108 篇 电气工程
    • 1,052 篇 生物医学工程(可授...
    • 917 篇 光学工程
    • 735 篇 电子科学与技术(可...
    • 588 篇 机械工程
    • 535 篇 化学工程与技术
    • 369 篇 动力工程及工程热...
    • 364 篇 安全科学与工程
    • 363 篇 交通运输工程
    • 355 篇 网络空间安全
    • 322 篇 仪器科学与技术
  • 6,311 篇 理学
    • 3,287 篇 数学
    • 1,881 篇 生物学
    • 1,593 篇 物理学
    • 1,253 篇 统计学(可授理学、...
    • 624 篇 化学
    • 578 篇 系统科学
  • 3,153 篇 管理学
    • 1,679 篇 管理科学与工程(可...
    • 1,600 篇 图书情报与档案管...
    • 810 篇 工商管理
  • 1,018 篇 医学
    • 847 篇 临床医学
    • 743 篇 基础医学(可授医学...
    • 442 篇 药学(可授医学、理...
    • 418 篇 公共卫生与预防医...
  • 542 篇 法学
    • 455 篇 社会学
  • 306 篇 经济学
  • 212 篇 农学
  • 182 篇 教育学
  • 52 篇 文学
  • 24 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学

主题

  • 534 篇 deep learning
  • 424 篇 feature extracti...
  • 400 篇 semantics
  • 341 篇 machine learning
  • 329 篇 training
  • 319 篇 computational mo...
  • 317 篇 accuracy
  • 264 篇 predictive model...
  • 205 篇 data mining
  • 200 篇 reinforcement le...
  • 189 篇 optimization
  • 184 篇 task analysis
  • 183 篇 internet of thin...
  • 183 篇 real-time system...
  • 173 篇 neural networks
  • 170 篇 image segmentati...
  • 162 篇 convolution
  • 162 篇 data models
  • 155 篇 graph neural net...
  • 144 篇 deep neural netw...

机构

  • 828 篇 school of data a...
  • 427 篇 department of ph...
  • 398 篇 iccub universita...
  • 374 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 312 篇 university of ch...
  • 305 篇 van swinderen in...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 imperial college...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 237 篇 bellee v.
  • 222 篇 casse g.
  • 215 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 206 篇 borsato m.
  • 204 篇 brundu d.
  • 202 篇 betancourt c.
  • 163 篇 bediaga i.
  • 158 篇 baker s.
  • 149 篇 amato s.
  • 149 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 baryshnikov f.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman

语言

  • 13,886 篇 英文
  • 3,083 篇 其他
  • 138 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Data and Computer Science"
17063 条 记 录,以下是771-780 订阅
排序:
Resfusion: Denoising Diffusion Probabilistic Models for Image Restoration Based on Prior Residual Noise  38
Resfusion: Denoising Diffusion Probabilistic Models for Imag...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shi, Zhenning Zheng, Haoshuai Xu, Chen Dong, Changsheng Pan, Bin Xie, Xueshuo He, Along Li, Tao Fu, Huazhu College of Computer Science Nankai University China School of Statistics and Data Science Nankai University China Haihe Lab of ITAI China Institute of High Performance Computing A*STAR Singapore
Recently, research on denoising diffusion models has expanded its application to the field of image restoration. Traditional diffusion-based image restoration methods utilize degraded images as conditional input to ef...
来源: 评论
Iterative methods via locally evolving set process  24
Iterative methods via locally evolving set process
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Baojian Zhou Yifan Sun Reza Babanezhad Harikandeh Xingzhi Guo Deqing Yang Yanghua Xiao The School of Data Science Fudan University and Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Department of Computer Science Stony Brook University Samsung SAIT AI Lab. Shanghai Key Laboratory of Data Science School of Computer Science Fudan University
Given the damping factor α and precision tolerance ε, Andersen et al. [2] introduced Approximate Personalized PageRank (APPR), the de facto local method for approximating the PPR vector, with runtime bounded by Θ(...
来源: 评论
An Intrusion Detection Scheme Based on Sequential Tri-Way Decisions of Multiple Granularity for Intelligent Connected Vehicles
An Intrusion Detection Scheme Based on Sequential Tri-Way De...
收藏 引用
International Conference on Artificial Intelligence and Autonomous Transportation, AIAT 2024
作者: Li, Yongzhong Wang, Qi Li, Yuheng Zhang, Shipeng School of Automotive Engineering Nantong Institute of Technology Nantong226010 China Internet of Things and Big Data Major of Macao Polytechnic University Macao China School of Computer Science Jiangsu University of Science and Technology Zhenjiang212003 China
With the rapid developing technology of the Internet of Things, intelligent connected vehicles are facing more and more serious cybersecurity threats and challenges. With the developing of cybersecurity technology for... 详细信息
来源: 评论
Predicting Protein-Protein Interactions Using Self-Attention-Based Deep Neural Networks and FastText Embeddings  15
Predicting Protein-Protein Interactions Using Self-Attention...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Oviya, I.R. Shanmukha Sravya, N. Raja, Kalpana Amrita Vishwa Vidyapeetham Amrita School Of Computing Department of Computer Science Engineering Chennai601103 India Yale University Section for Biomedical Informatics and Data Science School of Medicine New HavenCT United States
Predicting Protein-protein interactions are central to understanding the intricate mechanisms governing cellular functions, as proteins seldom act in isolation. While current machine learning and deep learning models ... 详细信息
来源: 评论
Locating What You Need: Towards Adapting Diffusion Models to OOD Concepts In-the-Wild  38
Locating What You Need: Towards Adapting Diffusion Models to...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yang, Jianan Gao, Chenchao Xiao, Zhiqing Zhao, Junbo Wu, Sai Chen, Gang Wang, Haobo College of Computer Science and Technology Zhejiang University China Institute of Blockchain and Data Security China School of Software Technology Zhejiang University China International School of Information Science and Engineering Dalian University of Technology China
The recent large-scale text-to-image generative models have attained unprecedented performance, while people established adaptor modules like LoRA and DreamBooth to extend this performance to even more unseen concept ...
来源: 评论
VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism  26
VDDA: An Effective Software Vulnerability Detection Model Ba...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Jiaqi Ma, Zhujuan Cao, Binghao Zhu, Erzhou Anhui University School of Computer Science and Technology Hefei China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei China
Many of software vulnerability detection methods suffer from problems of dependent on expert experience, rough detection granularity, and incomplete syntax and semantics information on source codes. This paper propose... 详细信息
来源: 评论
Learning to Unlearn for Bayesian Personalized Ranking via Influence Function
收藏 引用
Chinese Journal of Electronics 2025年 第3期34卷 990-1001页
作者: Chen Jundong Zhang Honglei Li Haoxuan Li Yidong Key Laboratory of Big Data & Artificial Intelligence in Transportation (Beijing Jiaotong University) Ministry of Education Beijing 100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing 100044 China School of Computer Science and Technology Beijing Jiaotong University Beijing 100044 China Center for Data Science Peking University Beijing 100871 China
Learning recommender models from vast amounts of behavioral data has become a mainstream paradigm in recent information systems. Conversely, with privacy awareness grown, there has been increasing attention to the rem... 详细信息
来源: 评论
Effective In-Context Learning for Named Entity Recognition
Effective In-Context Learning for Named Entity Recognition
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhao, Jin Guo, Qian Liang, Jiaqing Li, Zhixu Xiao, Yanghua Fudan University Shanghai Key Laboratory of Data Science School of Computer Science Shanghai China Fuyang Normal University College of Information Engineering Anhui China Renmin University of China School of Information Suzhou China
Named entity recognition aims to identify meaningful words or phrases from text. Traditional NER methods depend heavily on training datasets to learn entity features, which often leads to poor performance in recognizi... 详细信息
来源: 评论
PREVALENCE OF TRESILLO RHYTHM IN CONTEMPORARY POPULAR MUSIC  21
PREVALENCE OF TRESILLO RHYTHM IN CONTEMPORARY POPULAR MUSIC
收藏 引用
21st Sound and Music Computing Conference, SMC 2024
作者: Jajoria, Pushkar Mäder, Aurel Ruben Krenn, Florian McDermott, James Data Science Institute School of Computer Science University of Galway Galway Ireland Digital and Cognitive Musicology Lab École Polytechnique Fédérale de Lausanne Lausanne Switzerland
This paper presents an investigation into the prevalence and significance of the Tresillo rhythm in contemporary popular music. Initially, the Tresillo rhythm is defined and formalized within a computational framework... 详细信息
来源: 评论
A Dual-Defense Self-balancing Framework Against Bilateral Model Attacks in Federated Learning  24th
A Dual-Defense Self-balancing Framework Against Bilateral Mo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Xiang Yao, Aiting Pal, Shantanu Jiang, Frank Li, Xuejun Xu, Jia Dong, Chengzu Chen, Xuefei Zhang, Xiuyi Liu, Xiao Anhui Provincial International Joint Research Center for Advanced Technology in Medical Imaging School of Computer Science and Technology Anhui University Anhui China Deakin University Melbourne Australia School of Data Science Lingnan University Hong Kong
With the rapid expansion of Artificial Intelligence (AI) services, smart devices generate a large amount of user data at the edge network, which urgently needs to be protected while effectively extracting information.... 详细信息
来源: 评论