咨询与建议

限定检索结果

文献类型

  • 2,674 篇 期刊文献
  • 1,345 篇 会议
  • 9 册 图书

馆藏范围

  • 4,028 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,545 篇 工学
    • 1,757 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 502 篇 信息与通信工程
    • 438 篇 生物工程
    • 371 篇 生物医学工程(可授...
    • 357 篇 电气工程
    • 312 篇 控制科学与工程
    • 293 篇 光学工程
    • 254 篇 电子科学与技术(可...
    • 166 篇 化学工程与技术
    • 123 篇 机械工程
    • 86 篇 仪器科学与技术
    • 83 篇 动力工程及工程热...
    • 65 篇 材料科学与工程(可...
    • 64 篇 核科学与技术
    • 64 篇 网络空间安全
  • 1,794 篇 理学
    • 731 篇 物理学
    • 682 篇 数学
    • 545 篇 生物学
    • 290 篇 统计学(可授理学、...
    • 211 篇 化学
    • 115 篇 系统科学
  • 624 篇 管理学
    • 332 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 146 篇 工商管理
  • 357 篇 医学
    • 299 篇 临床医学
    • 248 篇 基础医学(可授医学...
    • 156 篇 药学(可授医学、理...
    • 121 篇 公共卫生与预防医...
  • 95 篇 法学
    • 78 篇 社会学
  • 54 篇 农学
  • 44 篇 经济学
  • 41 篇 教育学
  • 12 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 108 篇 deep learning
  • 89 篇 machine learning
  • 82 篇 feature extracti...
  • 81 篇 semantics
  • 80 篇 training
  • 74 篇 hadrons
  • 59 篇 accuracy
  • 57 篇 computational mo...
  • 52 篇 data models
  • 50 篇 hadron colliders
  • 45 篇 image segmentati...
  • 45 篇 hadronic decays
  • 41 篇 optimization
  • 40 篇 magnetic resonan...
  • 39 篇 predictive model...
  • 38 篇 bottom mesons
  • 35 篇 graph neural net...
  • 34 篇 contrastive lear...
  • 34 篇 branching fracti...
  • 33 篇 reinforcement le...

机构

  • 426 篇 department of ph...
  • 413 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 398 篇 iccub universita...
  • 397 篇 h.h. wills physi...
  • 387 篇 school of physic...
  • 383 篇 cavendish labora...
  • 378 篇 university of ch...
  • 376 篇 yandex school of...
  • 351 篇 department of ph...
  • 341 篇 imperial college...
  • 332 篇 stfc rutherford ...
  • 330 篇 center for high ...
  • 325 篇 institute of par...
  • 304 篇 henryk niewodnic...
  • 299 篇 nikhef national ...
  • 289 篇 school of physic...
  • 289 篇 physik-institut ...
  • 289 篇 oliver lodge lab...
  • 287 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 215 篇 amato s.
  • 210 篇 baryshnikov f.
  • 210 篇 boettcher t.
  • 209 篇 brundu d.
  • 207 篇 braun s.
  • 203 篇 borisyak m.
  • 195 篇 bizzeti a.
  • 182 篇 bencivenni g.
  • 175 篇 back j.j.
  • 173 篇 bjørn m.
  • 171 篇 bay a.

语言

  • 3,620 篇 英文
  • 378 篇 其他
  • 34 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=The Center for Data Center and AI and School of Engineering and Computer Science"
4028 条 记 录,以下是681-690 订阅
排序:
CT perfusion parameter estimation in stroke using neural network with transformer and physical model priors
收藏 引用
computers in Biology and Medicine 2024年 182卷 109134-109134页
作者: Luo, Luyao Liu, Pan Ye, Wanxing Chen, Fengwei Liu, Yu Liu, Ziyang Jing, Jing Xiong, Yunyun Zhu, Wanlin Jiang, Yong Cheng, Jian Wang, Yongjun Liu, Tao Beijing Advanced Innovation Center for Biomedical Engineering School of Biological Science and Medical Engineering Beihang University Beijing China Medical Big Data Research Center Chinese PLA General Hospital Beijing China China National Clinical Research Center for Neurological Diseases Beijing China Department of Neurology Beijing Tiantan Hospital Capital Medical University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Objectives: CT perfusion (CTP) imaging is vital in treating acute ischemic stroke by identifying salvageable tissue and the infarcted core. CTP images allow quantitative estimation of CT perfusion parameters, which ca... 详细信息
来源: 评论
Convolutional Neural Network and Deep One-Class Support Vector Machine with Imbalanced dataset for Anomaly Network Traffic Detection
Convolutional Neural Network and Deep One-Class Support Vect...
收藏 引用
International Conference on Cyber Security, Privacy and Networking, ICSPN 2022
作者: Chui, Kwok Tai Gupta, Brij B. Chi, Hao Ran Zhao, Mingbo Hong Kong International Center for AI and Cyber Security Research and Innovations & Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Lebanese American University Beirut1102 Lebanon Instituto de Telecomunicações Aveiro3810-193 Portugal School of Information Science & Technology Donghua University Shanghai200051 China
Anomaly detection of network traffic is important for real-time network monitoring and management. The research challenges for anomaly network traffic detection (ANTD) are attributable to the nature of highly imbalanc... 详细信息
来源: 评论
TOWARDS FaiTHFUL Xai EVALUATION VIA GENERALIZATION-LIMITED BACKDOOR WATERMARK  12
TOWARDS FAITHFUL XAI EVALUATION VIA GENERALIZATION-LIMITED B...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Ya, Mengxi Li, Yiming Dai, Tao Wang, Bin Jiang, Yong Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China The State Key Laboratory of Blockchain and Data Security Zhejiang University China ZJU-Hangzhou Global Scientific and Technological Innovation Center China College of Computer Science and Software Engineering Shenzhen University China Guangzhou Intelligence Communications Technology Co. Ltd. China
Saliency-based representation visualization (SRV) (e.g., Grad-CAM) is one of the most classical and widely adopted explainable artificial intelligence (Xai) methods for its simplicity and efficiency. It can be used to... 详细信息
来源: 评论
DarkFed: A data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Correction of Read Biases Induced by Complex Reference Genome Regions for Improving Copy Number Variation Detection Using a Gaussian Mixture Model
Correction of Read Biases Induced by Complex Reference Genom...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Xuwen Chang, Zhili Wang, Shenjie Liu, Ruoyu Liu, Yuqian Zhu, Xiaoyan Shao, Yang Lai, Xin Yang, Shuanying Wang, Jiayin Second Affiliated Hospital Xi'an Jiaotong University Department of Respiratory Medicine Xi'an710003 China Xi'an Jiaotong University School of Computer Science and Technology Xi'an710049 China Xi'an Jiaotong University Shaanxi Engineering Research Center of Medical and Health Big Data Xi'an710049 China Nanjing Geneseeq Technology INC. China
Copy number variations are crucial in cancer research, but their detection through next-generation sequencing is often hindered by read biases, particularly in complex genomic regions. Existing bias-correction methods... 详细信息
来源: 评论
Leveraging Deep Learning for Improved Sentiment Analysis in Natural Language Processing  3
Leveraging Deep Learning for Improved Sentiment Analysis in ...
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Kulkarni, Aniket Gollavilli, Venkata Surya Bhavana Harish Alsalami, Zaid Bhatia, Manpreet Kaur Jovanovska, Sashka Absur, Md Nurul Drata Inc San DiegoCA United States Under Armour MD United States College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq Asian School of Media Studies Department of Data Science Noida India Goce Delcev University Faculty of Philology Department of English Language and Literature Stip Macedonia Cuny Graduate Center Computer Science New York United States
Sentiment analysis is viewed as quite possibly of the main works in mental science and normal language handling. To work on the productivity of sentiment analysis techniques, it is crucial for separate the useful word... 详细信息
来源: 评论
Application of TimeMachine Model in Predicting Operational Parameters of Wastewater Treatment Plants
Application of TimeMachine Model in Predicting Operational P...
收藏 引用
computers and Artificial Intelligence Technologies (CaiT), International Conference on
作者: Bailing Zhang Shuchang Zheng Kai Meng Kexuan Zhou School of Computer and Data Engineering NingboTech University Ningbo China Digital Technology Center China Water Environment Group Beijing China College of Computer Science and Technology Zhejiang University Hangzhou China
Efficient operation of wastewater treatment plants is crucial for environmental protection and public health. However, accurately predicting key operational parameters has been a challenging task due to the complexity... 详细信息
来源: 评论
AegonKV: a high bandwidth, low tail latency, and low storage cost KV-separated LSM store with SmartSSD-based GC offloading  25
AegonKV: a high bandwidth, low tail latency, and low storage...
收藏 引用
Proceedings of the 23rd USENIX Conference on File and Storage Technologies
作者: Zhuohui Duan Hao Feng Haikun Liu Xiaofei Liao Hai Jin Bangyu Li National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ...
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
LVOS: A Benchmark for Large-scale Long-term Video Object Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Hong, Lingyi Liu, Zhongying Chen, Wenchao Tan, Chenzhi Feng, Yuang Zhou, Xinyu Guo, Pinxue Li, Jinglun Chen, Zhaoyu Gao, Shuyong Zhang, Wei Zhang, Wenqiang Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China The Shanghai Engineering Research Center of AI&Robotics Academy for Engineering&Technology Fudan University Shanghai China Engineering Research Center of AI&Robotics Ministry of Education Academy for Engineering&Technology Fudan University Shanghai China The Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University Shanghai China
Video object segmentation (VOS) aims to distinguish and track target objects in a video. Despite the excellent performance achieved by off-the-shell VOS models, existing VOS benchmarks mainly focus on short-term video... 详细信息
来源: 评论