咨询与建议

限定检索结果

文献类型

  • 837 篇 期刊文献
  • 480 篇 会议
  • 12 册 图书

馆藏范围

  • 1,329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 673 篇 计算机科学与技术...
    • 568 篇 软件工程
    • 213 篇 信息与通信工程
    • 144 篇 生物工程
    • 140 篇 电气工程
    • 95 篇 生物医学工程(可授...
    • 94 篇 控制科学与工程
    • 92 篇 光学工程
    • 74 篇 电子科学与技术(可...
    • 62 篇 机械工程
    • 43 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 33 篇 网络空间安全
    • 30 篇 动力工程及工程热...
    • 30 篇 安全科学与工程
    • 28 篇 仪器科学与技术
  • 509 篇 理学
    • 255 篇 数学
    • 159 篇 生物学
    • 128 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 39 篇 化学
    • 37 篇 系统科学
  • 259 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 46 篇 法学
    • 39 篇 社会学
  • 23 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 42 篇 feature extracti...
  • 37 篇 deep learning
  • 37 篇 machine learning
  • 29 篇 semantics
  • 29 篇 training
  • 26 篇 computational mo...
  • 26 篇 accuracy
  • 23 篇 artificial intel...
  • 22 篇 predictive model...
  • 21 篇 reinforcement le...
  • 21 篇 data models
  • 20 篇 deep neural netw...
  • 19 篇 convolutional ne...
  • 17 篇 contrastive lear...
  • 17 篇 federated learni...
  • 16 篇 convolution
  • 15 篇 graph neural net...
  • 13 篇 data mining
  • 13 篇 forecasting
  • 13 篇 robustness

机构

  • 42 篇 school of data a...
  • 41 篇 college of compu...
  • 33 篇 college of compu...
  • 27 篇 nanyang technolo...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 22 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 school of electr...
  • 19 篇 school of cyber ...
  • 17 篇 shandong provinc...
  • 17 篇 school of cyber ...
  • 16 篇 beijing advanced...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of inform...
  • 14 篇 hubei key labora...
  • 14 篇 services computi...

作者

  • 68 篇 niyato dusit
  • 22 篇 kang jiawen
  • 20 篇 huang qingming
  • 20 篇 xiong zehui
  • 20 篇 chen mingzhe
  • 20 篇 jin hai
  • 18 篇 yang yang
  • 18 篇 xu qianqian
  • 14 篇 zheng wei-shi
  • 14 篇 shen linlin
  • 13 篇 ezugwu absalom e...
  • 13 篇 yang zhiyong
  • 13 篇 han zhu
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 13 篇 zhang ruichen
  • 12 篇 hu shengshan
  • 12 篇 mahmood khalid
  • 12 篇 zhang leo yu
  • 12 篇 ai bo

语言

  • 1,194 篇 英文
  • 125 篇 其他
  • 13 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1329 条 记 录,以下是101-110 订阅
排序:
Machine learning tool for exploring sentiment analysis on twitter data
收藏 引用
Materials Today: Proceedings 2022年 56卷 1927-1934页
作者: Biradar, Shanta H. Gorabal, J.V. Gupta, Gaurav Department of Information Science & Engineering Sir M Visvesvaraya Institute of Technology Bengaluru562157 India Department of Computer Science & Engineering ATME College of Engineering Mysore570028 India Yogananda School of AI Computing and Data Science Shoolini University Himachal Pradesh Solan India
In social media, micro-blogging is a common routine of most people around the world. Social media analytics gathering structure and unstructured Big-data from various social sites and analyzing to make business decisi... 详细信息
来源: 评论
Hyperbolic Variational Graph Auto-Encoder for Next POI Recommendation  25
Hyperbolic Variational Graph Auto-Encoder for Next POI Recom...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Liu, Yuwen Qi, Lianyong Mao, Xingyuan Liu, Weiming Wang, Fan Xu, Xiaolong Zhang, Xuyun Dou, Wanchun Zhou, Xiaokang Beheshti, Amin Qingdao China College of Computer Science and Technology Zhejiang University Hangzhou China School of Software Nanjing University of Information Science and Technology Nanjing China School of Computing Macquarie University Sydney Australia Department of Computer Science and Technology Nanjing University Nanjing China Faculty of Business and Data Science Kansai University Osaka Japan
Next Point-of-Interest (POI) recommendation has become a crucial task in Location-Based Social Networks (LBSNs), which provide personalized recommendations by predicting the user’s next check-in locations. Commonly u... 详细信息
来源: 评论
Analysis of Schema Formation in Genetic Algorithms: A Review  16th
Analysis of Schema Formation in Genetic Algorithms: A Review
收藏 引用
16th International Conference on Genetic and Evolutionary computing, ICGEC 2024
作者: Zhang, Tiancong Chu, Shu-Chuan Weng, Shaowei Dao, Thi-Kien Nguyen, Trong-The School of Computing and Information Science Fuzhou Institute of Technology Fuzhou350506 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China College of Computer Science and Engineering Shandong University of Science and Technology Qing-Dao266590 China University of Information Technology Ho Chi Minh City700000 Viet Nam
Genetic algorithms (GAs) are a powerful class of optimization techniques inspired by the principles of natural selection and genetics. One of the theoretical cornerstones of GAs is schema theory, which provides a fram... 详细信息
来源: 评论
Evolving Effective Drug Therapies with Multi-objective Genetic Algorithm  16th
Evolving Effective Drug Therapies with Multi-objective Genet...
收藏 引用
16th International Conference on Genetic and Evolutionary computing, ICGEC 2024
作者: Zhang, Tiancong Weng, Shaowei Chu, Shu-Chuan Nguyen, Trong-The Dao, Thi-Kien School of Computing and Information Science Fuzhou Institute of Technology Fuzhou350506 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China College of Computer Science and Engineering Shandong University of Science and Technology Qing-dao266590 China University of Information Technology Ho Chi Minh City700000 Viet Nam
The development of effective drug therapies is a complex and multifaceted problem involving various biological, chemical, and computational challenges. Traditional drug development methods are often time-consuming and... 详细信息
来源: 评论
Learning Self-Supervised Vision Transformers from Scratch for Aerial Person Re- Identification  13
Learning Self-Supervised Vision Transformers from Scratch fo...
收藏 引用
13th International Conference on information Technology in Medicine and Education, ITME 2023
作者: Peng, Houfu Xu, Lili Lu, Xing Xia, Daoxun Guizhou Normal University Guizhou Key Laboratory of Information and Computing Science Guiyang China School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
In recent years, person re-identification (Re-ID) as a widely studied computer vision task, has reached a saturation state under closed-world setting, which encourages researchers to further explore more realistic sce... 详细信息
来源: 评论
Real-time Student Classroom Feedback with the RFMNet Framework in a Smart Classroom  13
Real-time Student Classroom Feedback with the RFMNet Framewo...
收藏 引用
13th International Conference on information Technology in Medicine and Education, ITME 2023
作者: Tang, Xianpiao Hu, Pengyun Yu, Dewei Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang China Guizhou Normal University Guizhou Key Laboratory of Information and Computing Science Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
Facial expression recognition is the ability to interpret human feelings from facial features. Teachers can use it to visualize the state of emotion and estimate students' learning effects to take corresponding in... 详细信息
来源: 评论
Defending Against Vishing Attacks: A Comprehensive Review for Prevention and Mitigation Techniques
Defending Against Vishing Attacks: A Comprehensive Review fo...
收藏 引用
International Conference on Recent Developments in Cyber Security, ReDCySec 2023
作者: Ashfaq, Shaikh Chandre, Pankaj Pathan, Shafi Mande, Uday Nimbalkar, Madhukar Mahalle, Parikshit Information Technology Department M H Saboo Siddik College of Engineering Mumbai India Computer Science and Engineering Department MIT School of Computing MIT Art Design and Technology University Loni Kalbhor Pune India Artificial Intelligence and Data Science Department Vishwakarma Institute of Information Technology Kondhwa Pune India
Vishing attacks, or voice phishing attacks, are a type of social engineering attack in which attackers use voice communication channels, such as phone calls, to trick victims into divulging sensitive information or pe... 详细信息
来源: 评论
Multi-View Graph Embedding Learning for Image Co-Segmentation and Co-Localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2024年 第6期34卷 4942-4956页
作者: Huang, Aiping Li, Lijian Zhang, Le Niu, Yuzhen Zhao, Tiesong Lin, Chia-Wen Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou350108 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou350108 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering The Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou350108 China Institute of Communications Engineering National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan
Image co-segmentation and co-localization exploit inter-image information to identify and extract foreground objects with a batch mode. However, they remain challenging when confronted with large object variations or ... 详细信息
来源: 评论
Note on a New Construction of Kantorovich Form q-Bernstein Operators Related to Shape Parameter λ
收藏 引用
computer Modeling in Engineering & sciences 2022年 第3期130卷 1479-1493页
作者: Qingbo Cai Resat Aslan Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information ProcessingSchool of Mathematics and Computer ScienceQuanzhou Normal UniversityQuanzhou362000China Department of Mathematics Faculty of Sciences and ArtsHarran UniversitySanlıurfa63300Turkey
The main purpose of this paper is to introduce some approximation properties of a Kantorovich kind q-Bernstein operators related to B′ezier basis functions with shape parameterλ∈[−1,1].Firstly,we compute some basic... 详细信息
来源: 评论
FedEdge: Accelerating Edge-Assisted Federated Learning  23
FedEdge: Accelerating Edge-Assisted Federated Learning
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Federated learning (FL) has been widely acknowledged as a promising solution to training machine learning (ML) model training with privacy preservation. To reduce the traffic overheads incurred by FL systems, edge ser... 详细信息
来源: 评论