咨询与建议

限定检索结果

文献类型

  • 2,648 篇 期刊文献
  • 1,344 篇 会议
  • 9 册 图书

馆藏范围

  • 4,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,408 篇 软件工程
    • 493 篇 信息与通信工程
    • 435 篇 生物工程
    • 370 篇 生物医学工程(可授...
    • 341 篇 电气工程
    • 294 篇 光学工程
    • 290 篇 控制科学与工程
    • 245 篇 电子科学与技术(可...
    • 162 篇 化学工程与技术
    • 119 篇 机械工程
    • 87 篇 仪器科学与技术
    • 84 篇 核科学与技术
    • 80 篇 动力工程及工程热...
    • 69 篇 材料科学与工程(可...
    • 63 篇 网络空间安全
  • 1,777 篇 理学
    • 727 篇 物理学
    • 681 篇 数学
    • 540 篇 生物学
    • 295 篇 统计学(可授理学、...
    • 207 篇 化学
    • 113 篇 系统科学
  • 619 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 341 篇 医学
    • 289 篇 临床医学
    • 240 篇 基础医学(可授医学...
    • 157 篇 药学(可授医学、理...
    • 121 篇 公共卫生与预防医...
  • 96 篇 法学
    • 79 篇 社会学
  • 56 篇 农学
  • 45 篇 经济学
  • 41 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 106 篇 deep learning
  • 91 篇 machine learning
  • 82 篇 feature extracti...
  • 80 篇 semantics
  • 78 篇 training
  • 74 篇 hadrons
  • 59 篇 accuracy
  • 57 篇 computational mo...
  • 52 篇 data models
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 42 篇 image segmentati...
  • 39 篇 magnetic resonan...
  • 39 篇 optimization
  • 38 篇 bottom mesons
  • 38 篇 predictive model...
  • 37 篇 federated learni...
  • 34 篇 branching fracti...
  • 33 篇 data mining
  • 32 篇 task analysis

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 407 篇 van swinderen in...
  • 399 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 387 篇 school of physic...
  • 384 篇 cavendish labora...
  • 379 篇 yandex school of...
  • 377 篇 university of ch...
  • 354 篇 department of ph...
  • 347 篇 imperial college...
  • 334 篇 stfc rutherford ...
  • 331 篇 center for high ...
  • 326 篇 institute of par...
  • 305 篇 henryk niewodnic...
  • 297 篇 nikhef national ...
  • 290 篇 school of physic...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 287 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 225 篇 casse g.
  • 220 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 217 篇 bediaga i.
  • 216 篇 amato s.
  • 212 篇 boettcher t.
  • 211 篇 baryshnikov f.
  • 209 篇 brundu d.
  • 209 篇 braun s.
  • 207 篇 borisyak m.
  • 198 篇 bizzeti a.
  • 185 篇 bencivenni g.
  • 176 篇 back j.j.
  • 174 篇 bjørn m.
  • 172 篇 bay a.

语言

  • 3,310 篇 英文
  • 666 篇 其他
  • 29 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
4001 条 记 录,以下是1091-1100 订阅
排序:
ML_Recognition: A Robust Model for Handwritten Digit Recognition Using Machine Learning Classifiers  3
ML_Recognition: A Robust Model for Handwritten Digit Recogni...
收藏 引用
3rd International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2023
作者: Abdelminaam, Diaa Salama Madbouly, Magda M. Zeid, Magdy Abd-Elghany Abualigah, Laith Misr International University Faculty of Computer Science Cairo Egypt Benha University Faculty of Computers and Artificial Intelligence Benha Egypt Alexandria University Faculty of Computer and Data Science Alexandria Egypt Alobour High Institute for Computer and Informatics Ibrahim Abd Elatif Gomaa Computer Science Department Cairo Egypt Lebanese American University Department of Electrical and Computer Engineering Byblos13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Middle East University Meu Research Unit Amman11831 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia
Handwritten digit recognition is a branch of machine learning in which a computer is taught to recognize hand-written numbers. Classification and regression are applied using deep learning and machine learning algorit... 详细信息
来源: 评论
Optimal Green Energy Estimation for Sustainable Electric Vehicle Networks Using Queueing-Based Retrial Process
Optimal Green Energy Estimation for Sustainable Electric Veh...
收藏 引用
Sustainable Energy Technologies and Computational Intelligence (SETCOM), International Conference on
作者: Shreekant Varshney Jainit Raval Rahul Priyadarshi Vidhi Manek Yash Dadheech Manthan Shah Department of Mathematics School of Technology Pandit Deendayal Energy University Gandhinagar Gujarat India Department of Electrical Engineering School of Energy Technology Pandit Deendayal Energy University Gandhinagar Gujarat India Symbiosis Institute of International Business Symbiosis International University Hinjewadi Pune Maharashtra India Department of Center for Data Science Center for Data Science New York University New York NY USA Department of Computer Science and Engineering School of Technology Pandit Deendayal Energy University Gandhinagar Gujarat India Department of Mechanical Engineering School of Technology Pandit Deendayal Energy University Gandhinagar Gujarat India
This paper presents a stochastic model for addressing a single-server service station offering both EV charging and battery swapping services, considering the realistic retrial-based queueing behavior of the waiting i... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
Scalable Optimal Margin Distribution Machine
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yilin Cao, Nan Zhang, Teng Shi, Xuanhua Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Optimal margin Distribution Machine (ODM) is a newly proposed statistical learning framework rooting in the latest margin theory, which demonstrates better generalization performance than the traditional large margin ... 详细信息
来源: 评论
Machine learning applications in scaffold based bioprinting
Machine learning applications in scaffold based bioprinting
收藏 引用
作者: Sun, Jie Yao, Kai Huang, Kaizhu Huang, Dejian School of Advanced Technology Xi'an Jiaotong-Liverpool University 111 Ren'ai Road Jiangsu Suzhou215123 China School of Engineering University of Liverpool The Quadrangle Brownlow HillL69 3GH Australia Data Science Research Center Duke Kunshan University Kunshan China Department of Food Science and Technology National University of Singapore 3 Science Drive 2 117542 Singapore
Bioprinting has tremendous potential to fabricate biomimetic architectures or living tissue constructs for applications in cell biology, tissue engineering and drug screening. Bioprinted constructs, called scaffolds h... 详细信息
来源: 评论
Enabling Efficient Large Recommendation Model Training with Near CXL Memory Processing
Enabling Efficient Large Recommendation Model Training with ...
收藏 引用
Annual International Symposium on computer Architecture, ISCA
作者: Haifeng Liu Long Zheng Yu Huang Jingyi Zhou Chaoqiang Liu Runze Wang Xiaofei Liaot Hai Jinf Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab Huazhong University of Science and Technology China School of Computer Science and Engineering University of New South Wales Australia Zhejiang Lab Hangzhou China
Personalized recommendation systems have become one of the most important Internet services nowadays. A critical challenge of training and deploying the recommendation models is their high memory capacity and bandwidt... 详细信息
来源: 评论
JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 6019-6032页
作者: Tiewei Qin Bingwen Feng Bingbing Zhou Jilian Zhang Zhihua Xia Jian Weng Wei Lu College of Cyber Security Jinan University Guangzhou China College of Cyber Security Engineering Research Center for Trustworthy AI Ministry of Education Jinan University Guangzhou China School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Generative steganography is renowned for its exceptional undetectability. However, prevalent generative methods often have insufficient capacity for concealing secret images. Furthermore, the sensitivity of commonly u... 详细信息
来源: 评论
Towards Demystifying Android Adware: dataset and Payload Location
Towards Demystifying Android Adware: Dataset and Payload Loc...
收藏 引用
IEEE/ACM International Conference on Automated Software engineering - Workshops (ASE Workshops)
作者: Chao Wang Tianming Liu Yanjie Zhao Lin Zhang Xiaoning Du Li Li Haoyu Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Monash University Clayton Australia Huazhong University of Science and Technology Wuhan China The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC) Beijing China Beihang University Beijing China
Adware represents a pervasive threat in the mobile ecosystem, yet its inherent characteristics have been largely overlooked by previous research. This work takes a crucial step towards demystifying Android adware. We ... 详细信息
来源: 评论
Lightweight Pedestrian Detection through Guided Filtering and Deep Learning  10
Lightweight Pedestrian Detection through Guided Filtering an...
收藏 引用
10th IEEE Global Conference on Consumer Electronics, GCCE 2021
作者: Muchtar, Kahlil Saddami, Khairun Bintang, Akhyar Cenggoro, Tjeng Wawan Pardamean, Bens Lin, Chih-Yang Ernita, Tia Universitas Syiah Kuala Department of Electrical And Computer Engineering Aceh Indonesia Universitas Syiah Kuala Department of Electrical And Computer Engineering Aceh Indonesia Bina Nusantara University School of Computer Science Bina Nusantara University Bioinformatics And Data Science Research Center Computer Science Department Jakarta Indonesia Bina Nusantara University BINUS Graduate Program-Master of Computer Science Program Bina Nusantara University Bioinformatics And Data Science Research Center Computer Science Department Jakarta Indonesia Yuan-Ze University Department of Electrical And Engineering Taoyuan Taiwan
In this paper, we propose a novel approach to locate and detect moving pedestrians in a video. Our proposed method first locates the region of interest (ROI) using a background subtraction algorithm based on guided fi... 详细信息
来源: 评论