咨询与建议

限定检索结果

文献类型

  • 2,626 篇 期刊文献
  • 1,304 篇 会议
  • 9 册 图书

馆藏范围

  • 3,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,459 篇 工学
    • 1,694 篇 计算机科学与技术...
    • 1,405 篇 软件工程
    • 489 篇 信息与通信工程
    • 434 篇 生物工程
    • 365 篇 生物医学工程(可授...
    • 345 篇 电气工程
    • 291 篇 光学工程
    • 273 篇 控制科学与工程
    • 248 篇 电子科学与技术(可...
    • 161 篇 化学工程与技术
    • 116 篇 机械工程
    • 85 篇 仪器科学与技术
    • 81 篇 动力工程及工程热...
    • 64 篇 核科学与技术
    • 63 篇 材料科学与工程(可...
    • 62 篇 网络空间安全
  • 1,765 篇 理学
    • 726 篇 物理学
    • 670 篇 数学
    • 536 篇 生物学
    • 285 篇 统计学(可授理学、...
    • 205 篇 化学
    • 115 篇 系统科学
  • 612 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 279 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 345 篇 医学
    • 288 篇 临床医学
    • 241 篇 基础医学(可授医学...
    • 156 篇 药学(可授医学、理...
    • 117 篇 公共卫生与预防医...
  • 94 篇 法学
    • 78 篇 社会学
  • 53 篇 农学
  • 44 篇 经济学
  • 36 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学

主题

  • 104 篇 deep learning
  • 89 篇 machine learning
  • 80 篇 feature extracti...
  • 79 篇 semantics
  • 76 篇 training
  • 74 篇 hadrons
  • 57 篇 computational mo...
  • 57 篇 accuracy
  • 52 篇 data models
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 43 篇 image segmentati...
  • 40 篇 optimization
  • 39 篇 magnetic resonan...
  • 38 篇 bottom mesons
  • 38 篇 predictive model...
  • 34 篇 graph neural net...
  • 34 篇 branching fracti...
  • 32 篇 reinforcement le...
  • 32 篇 task analysis

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 397 篇 h.h. wills physi...
  • 388 篇 school of physic...
  • 383 篇 cavendish labora...
  • 377 篇 university of ch...
  • 376 篇 yandex school of...
  • 352 篇 department of ph...
  • 345 篇 imperial college...
  • 334 篇 stfc rutherford ...
  • 331 篇 center for high ...
  • 325 篇 institute of par...
  • 307 篇 henryk niewodnic...
  • 301 篇 nikhef national ...
  • 289 篇 school of physic...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 287 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 218 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 215 篇 amato s.
  • 210 篇 baryshnikov f.
  • 210 篇 boettcher t.
  • 209 篇 brundu d.
  • 207 篇 braun s.
  • 204 篇 borisyak m.
  • 195 篇 bizzeti a.
  • 183 篇 bencivenni g.
  • 177 篇 back j.j.
  • 173 篇 bjørn m.
  • 173 篇 bay a.

语言

  • 3,683 篇 英文
  • 228 篇 其他
  • 31 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
3939 条 记 录,以下是251-260 订阅
排序:
Cross-Scale Bilevel Aggregation for Multi-exposure Fusion via Conditional Generative Adversarial Network  9th
Cross-Scale Bilevel Aggregation for Multi-exposure Fusion v...
收藏 引用
9th International Conference on Internet of Things, ICIOT 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Wang, Longchun Yu, Mali Zhang, Hai Yang, Taojun Leng, Qingming Dong, Xiwei Guo, Jingjuan Wang, Guangxing School of Computer and Big Data Science Jiujiang University Jiujiang332005 China School of Information Management Jiangxi University of Finance and Economics Nanchang330013 China Jiujiang Engineering Research Center for Collaborative Cyber Security Protection Jiujiang332005 China School of Electronic and Information Engineering Jiujiang University Jiujiang332005 China
The aim of multi-exposure fusion (MEF) is to generate a high-dynamic-range-like image from images captured by common cameras under different exposure settings. The existing generative adversarial network (GAN)-ba... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Yujun Chen, Yanqu Wang, Jiakai Hu, Jin Tao, Renshuai Liu, Xianglong State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Language-guided Image Reflection Separation
Language-guided Image Reflection Separation
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Haofeng Zhong Yuchen Hong Shuchen Weng Jinxiu Liang Boxin Shi National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University National Engineering Research Center of Visual Technology School of Computer Science Peking University AI Innovation Center School of Computer Science Peking University
This paper studies the problem of language-guided re-flection separation, which aims at addressing the ill-posed reflection separation problem by introducing language de-scriptions to provide layer content. We propose... 详细信息
来源: 评论
Optimizing Healthcare Delivery through CloudBased Clinical Decision Support Systems
Optimizing Healthcare Delivery through CloudBased Clinical D...
收藏 引用
2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Ebenezar, U. Samson Jenila Vennila, G. Balakrishnan, T. Suresh Krishnan, Prabhakar Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Mohan Babu University School of Computing Department of Ai & Ml Andhra Pradesh Tirupati India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-campus India
The experiment aims at evaluating how four machine learning algorithms work: Decision Tree, Random Forest, SVM, and Neural Network, in a task, of binary classification. Models were evaluated using comprehensive metric... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on data science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
FedMoS: Taming Client Drift in Federated Learning with Double Momentum and Adaptive Selection  42
FedMoS: Taming Client Drift in Federated Learning with Doubl...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Wang, Xiong Chen, Yuxin Li, Yuqing Liao, Xiaofei Jin, Hai Li, Bo Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Federated learning (FL) enables massive clients to collaboratively train a global model by aggregating their local updates without disclosing raw data. Communication has become one of the main bottlenecks that prolong... 详细信息
来源: 评论
A novel hybrid butterfly optimization algorithm for feature selection with sine cosine velocity in the high-dimensional classification data
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第5-6期47卷 369-391页
作者: Zhang, Li Chen, Xiaobo Key Laboratory of Data Science and Intelligence Education Hainan Normal University Ministry of Education Haikou Hainan China School of Computer Engineering Jiangsu University of Technology Changzhou Jiangsu China Changzhou City Center Branch People's Bank of China Changzhou Jiangsu China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China
aiming at the shortcomings of the traditional butterfly optimization algorithm in solving the high-dimensional classification feature selection problem, which has low convergence and is prone to fall into local optima... 详细信息
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning  30
PPA: Preference Profiling Attack Against Federated Learning
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Syndey Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
—Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and ...
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Tensor and Minimum Connected Dominating Set based Confident Information Coverage Reliability Evaluation for IoT
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第03期10卷 547-561页
作者: Xiao, Ziheng Zhu, Chenlu Feng, Wei Liu, Shenghao Deng, Xianjun Lu, Hongwei Yang, Laurence T. Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Company Ltd United States Network and Industrial Control Information Security Technology Department China Nuclear Power Operation Technology Company Ltd. 1011 Xiongchu Avenue Hubei Wuhan430070 China The Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul01811 Korea Republic of
Internet of Things (IoT) reliability evaluation contributes to the sustainable computing and enhanced stability of the network. Previous algorithms usually evaluate the reliability of IoT by enumenating the states of ... 详细信息
来源: 评论