咨询与建议

限定检索结果

文献类型

  • 2,674 篇 期刊文献
  • 1,345 篇 会议
  • 9 册 图书

馆藏范围

  • 4,028 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,545 篇 工学
    • 1,757 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 502 篇 信息与通信工程
    • 438 篇 生物工程
    • 371 篇 生物医学工程(可授...
    • 357 篇 电气工程
    • 312 篇 控制科学与工程
    • 293 篇 光学工程
    • 254 篇 电子科学与技术(可...
    • 166 篇 化学工程与技术
    • 123 篇 机械工程
    • 86 篇 仪器科学与技术
    • 83 篇 动力工程及工程热...
    • 65 篇 材料科学与工程(可...
    • 64 篇 核科学与技术
    • 64 篇 网络空间安全
  • 1,794 篇 理学
    • 731 篇 物理学
    • 682 篇 数学
    • 545 篇 生物学
    • 290 篇 统计学(可授理学、...
    • 211 篇 化学
    • 115 篇 系统科学
  • 624 篇 管理学
    • 332 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 146 篇 工商管理
  • 357 篇 医学
    • 299 篇 临床医学
    • 248 篇 基础医学(可授医学...
    • 156 篇 药学(可授医学、理...
    • 121 篇 公共卫生与预防医...
  • 95 篇 法学
    • 78 篇 社会学
  • 54 篇 农学
  • 44 篇 经济学
  • 41 篇 教育学
  • 12 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 108 篇 deep learning
  • 89 篇 machine learning
  • 82 篇 feature extracti...
  • 81 篇 semantics
  • 80 篇 training
  • 74 篇 hadrons
  • 59 篇 accuracy
  • 57 篇 computational mo...
  • 52 篇 data models
  • 50 篇 hadron colliders
  • 45 篇 image segmentati...
  • 45 篇 hadronic decays
  • 41 篇 optimization
  • 40 篇 magnetic resonan...
  • 39 篇 predictive model...
  • 38 篇 bottom mesons
  • 35 篇 graph neural net...
  • 34 篇 contrastive lear...
  • 34 篇 branching fracti...
  • 33 篇 reinforcement le...

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 397 篇 h.h. wills physi...
  • 387 篇 school of physic...
  • 383 篇 cavendish labora...
  • 378 篇 university of ch...
  • 376 篇 yandex school of...
  • 351 篇 department of ph...
  • 341 篇 imperial college...
  • 332 篇 stfc rutherford ...
  • 330 篇 center for high ...
  • 325 篇 institute of par...
  • 304 篇 henryk niewodnic...
  • 299 篇 nikhef national ...
  • 289 篇 school of physic...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 287 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 215 篇 amato s.
  • 210 篇 baryshnikov f.
  • 210 篇 boettcher t.
  • 209 篇 brundu d.
  • 207 篇 braun s.
  • 203 篇 borisyak m.
  • 195 篇 bizzeti a.
  • 182 篇 bencivenni g.
  • 175 篇 back j.j.
  • 173 篇 bjørn m.
  • 171 篇 bay a.

语言

  • 3,620 篇 英文
  • 378 篇 其他
  • 34 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
4028 条 记 录,以下是581-590 订阅
排序:
Model learning:a survey of foundations,tools and applications
收藏 引用
Frontiers of computer science 2021年 第5期15卷 71-92页
作者: Shahbaz ALI Hailong SUN Yongwang ZHAO Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing 100191China SKLSDE School of Computer Science and EngineeringBeihang UniversityBeijing 100191China School of Software Beihang UniversityBeijing 100191China School of Cyber Science and Technology College of Computer ScienceZhejiang UniversityHangzhou 310058China
Software systems are present all around us and playing their vital roles in our daily *** correct functioning of these systems is of prime *** addition to classical testing techniques,formal techniques like model chec... 详细信息
来源: 评论
Compact Visual data Representation for Green Multimedia - A Human Visual System Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Peilin Fang, Xiaohan Wang, Meng Wang, Shiqi Ma, Siwei Department of Computer Science City University of Hong Kong Hong Kong The School of Data Science Lingnan University Hong Kong National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing100871 China
The Human Visual System (HVS), with its intricate sophistication, is capable of achieving ultra-compact information compression for visual signals. This remarkable ability is coupled with high generalization capabilit... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based ai services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Enhancing Visual Representation with Textual Semantics: Textual Semantics-Powered Prototypes for Heterogeneous Federated Learning
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Xinghao Niu, Jianwei Liu, Xuefeng Zhu, Guogang Zhang, Jiayuan Tang, Shaojie School of Computer Science and Engineering Beihang University Beijing China Zhongguancun Laboratory Beijing China Department of Management Science and Systems School of Management Center for AI Business Innovation University at Buffalo BuffaloNY United States
Federated Prototype Learning (FedPL) has emerged as an effective strategy for handling data heterogeneity in Federated Learning (FL). In FedPL, clients collaboratively construct a set of global feature centers (protot... 详细信息
来源: 评论
DG-CNN:Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images
收藏 引用
Journal of computer science & Technology 2022年 第2期37卷 277-294页
作者: Xiao-Zheng Xie Jian-Wei Niu Senior Member Xue-Feng Liu Qing-Feng Li Yong Wang Jie Han Shaojie Tang State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang UniversityBeijing 100191China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityHangzhou 310051China Department of Diagnostic Ultrasound National Cancer CenterChinese Academy of Medical SciencesPeking Union Medical CollegeBeijing 100021China Naveen Jindal School of Management The University of Texas at DallasRichardsonTX 75080-3021U.S.A.
Although using convolutional neural networks(CNNs)for computer-aided diagnosis(CAD)has made tremendous progress in the last few years,the small medical datasets remain to be the major bottleneck in this *** address th... 详细信息
来源: 评论
Generative Multi-Form Bayesian Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Zhendong Liu, Haitao Ong, Yew-Soon Qu, Xinghua Zhang, Yuzhe Zheng, Jianmin The Data Science and Artificial Intelligence Research Center School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore The School of Energy and Power Engineering Dalian University of Technology Dalian116024 China Singapore The Computational Intelligence Lab. School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore The School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore
Many real-world problems, such as airfoil design, involve optimizing a black-box expensive objective function over complex structured input space (e.g., discrete space or non-Euclidean space). By mapping the complex s... 详细信息
来源: 评论
Spikformer V2: Join the High Accuracy Club on ImageNet with an SNN Ticket
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Zhaokun Che, Kaiwei Fang, Wei Tian, Keyu Zhu, Yuesheng Yan, Shuicheng Tian, Yonghong Yuan, Li Peking University School of Electronic and Computer Engineering Shenzhen Graduate School China PengCheng Laboratory China Peking University School of Computer Science China Peking University Center for Data Science China Beijing Academy of Artificial Intelligence China
Spiking Neural Networks (SNNs), known for their biologically plausible architecture, face the challenge of limited performance. The self-attention mechanism, which is the cornerstone of the high-performance Transforme... 详细信息
来源: 评论
Pre-Training and Fine-Tuning for Efficient Routing in Opportunistic Networks
Pre-Training and Fine-Tuning for Efficient Routing in Opport...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jia Hao Xiaorui Wu Winston K. G. Seah Feng Zhang Gang Xu Ministry of Education College of Computer Science Engineering Research Center of Ecological Big Data Inner Mongolia University Hohhot China School of Engineering & Computer Science Victoria University of Wellington Wellington New Zealand School of Computer and Information Technology Shanxi University Taiyuan China
In opportunistic networks, it is a challenge to find the best relay node instead of blindly selecting from among available nodes to forward messages and effectively transmit them to their destinations. By comparing th... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Video Stabilization via Prediction with Time-Series Network and Image Inpainting with Pyramid Fusion
收藏 引用
Chinese Journal of Electronics 2021年 第6期30卷 1103-1110页
作者: CHENG Keyang LI Shichao RONG Lan WANG Wenshan SHI Wenxi ZHAN Yongzhao School of Computer Science and Communication Engineering Jiangsu University Jiangsu Province Big Data Ubiquitous Perception and Intelligent Agricultural Application Engineering Research Center Cyber Space Security Academy of Jiangsu University National Engineering Laboratory for Public Safety Risk Perception and Control by Big Data Xinjiang Lianhaichuangzhi Information Technology Co. Ltd.
Due to the poor filling effect of the video image defect commonly used in the video stabilization field, the video is seemed still unstable after the image stabilization process, which seriously affects the visual eff... 详细信息
来源: 评论