咨询与建议

限定检索结果

文献类型

  • 867 篇 期刊文献
  • 518 篇 会议
  • 12 册 图书

馆藏范围

  • 1,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 953 篇 工学
    • 714 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 235 篇 信息与通信工程
    • 149 篇 电气工程
    • 146 篇 生物工程
    • 112 篇 控制科学与工程
    • 99 篇 生物医学工程(可授...
    • 95 篇 光学工程
    • 77 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 43 篇 化学工程与技术
    • 36 篇 网络空间安全
    • 34 篇 交通运输工程
    • 32 篇 动力工程及工程热...
    • 31 篇 仪器科学与技术
    • 31 篇 安全科学与工程
  • 530 篇 理学
    • 267 篇 数学
    • 163 篇 生物学
    • 137 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 42 篇 化学
    • 39 篇 系统科学
  • 272 篇 管理学
    • 160 篇 管理科学与工程(可...
    • 117 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 109 篇 医学
    • 88 篇 临床医学
    • 73 篇 基础医学(可授医学...
    • 50 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 45 篇 法学
    • 38 篇 社会学
  • 25 篇 经济学
  • 15 篇 农学
  • 13 篇 教育学
  • 4 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 45 篇 feature extracti...
  • 39 篇 deep learning
  • 37 篇 machine learning
  • 32 篇 training
  • 31 篇 semantics
  • 31 篇 accuracy
  • 24 篇 computational mo...
  • 24 篇 artificial intel...
  • 23 篇 predictive model...
  • 22 篇 reinforcement le...
  • 21 篇 data models
  • 20 篇 deep neural netw...
  • 19 篇 federated learni...
  • 19 篇 convolutional ne...
  • 18 篇 convolution
  • 17 篇 contrastive lear...
  • 15 篇 image segmentati...
  • 15 篇 graph neural net...
  • 14 篇 data mining
  • 14 篇 privacy

机构

  • 52 篇 college of compu...
  • 43 篇 school of data a...
  • 36 篇 college of compu...
  • 28 篇 national enginee...
  • 27 篇 nanyang technolo...
  • 27 篇 school of comput...
  • 26 篇 school of comput...
  • 23 篇 key laboratory o...
  • 21 篇 school of electr...
  • 21 篇 key laboratory o...
  • 20 篇 school of cyber ...
  • 17 篇 shandong provinc...
  • 17 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 beijing advanced...
  • 16 篇 school of inform...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...

作者

  • 72 篇 niyato dusit
  • 23 篇 kang jiawen
  • 22 篇 huang qingming
  • 21 篇 chen mingzhe
  • 21 篇 jin hai
  • 20 篇 xiong zehui
  • 20 篇 xu qianqian
  • 19 篇 yang yang
  • 16 篇 shen linlin
  • 15 篇 yang zhiyong
  • 14 篇 zheng wei-shi
  • 14 篇 ezugwu absalom e...
  • 13 篇 hu shengshan
  • 13 篇 han zhu
  • 13 篇 zhang leo yu
  • 13 篇 ai bo
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 12 篇 li tianrui
  • 12 篇 zhang ruichen

语言

  • 973 篇 英文
  • 415 篇 其他
  • 14 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1397 条 记 录,以下是1181-1190 订阅
排序:
Synergy of Binary Substitutions for Improving the Cycle Performance in LiNiO2 Revealed by Ab Initio Materials Informatics
arXiv
收藏 引用
arXiv 2020年
作者: Yoshida, Tomohiro Maezono, Ryo Hongo, Kenta Department of Computer-Aided Engineering and Development Sumitomo Metal Mining Co. Ltd. 3-5 Sobiraki-cho NiihamaEhime792-0001 Japan School of Information Science JAIST Asahidai 1-1 IshikawaNomi923-1292 Japan Computational Engineering Applications Unit RIKEN 2-1 Hirosawa SaitamaWako351-0198 Japan Research Center for Advanced Computing Infrastructure JAIST Asahidai 1-1 NomiIshikawa923-1292 Japan Center for Materials Research by Information Integration Research and Services Division of Materials Data and Integrated System National Institute for Materials Science 1-2-1 Sengen TsukubaIbaraki305-0047 Japan PRESTO Japan Science and Technology Agency 4-1-8 Honcho SaitamaKawaguchi-shi322-0012 Japan
We explore LiNiO2-based cathode materials with two-element substitutions by an ab initio simulation based materials informatics (AIMI) approach. According to our previous study, a higher cycle performance strongly cor... 详细信息
来源: 评论
Weakly supervised open-set domain adaptation by dual-domain collaboration
arXiv
收藏 引用
arXiv 2019年
作者: Tan, Shuhan Jiao, Jiening Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China School of Electronics and Information Technology Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Accuvision Technology Co. Ltd.
In conventional domain adaptation, a critical assumption is that there exists a fully labeled domain (source) that contains the same label space as another unlabeled or scarcely labeled domain (target). However, in th... 详细信息
来源: 评论
Deep dual relation modeling for egocentric interaction recognition
arXiv
收藏 引用
arXiv 2019年
作者: Li, Haoxin Cai, Yijun Zheng, Wei-Shi School of Electronics and Information Technology Sun Yat-sen University China School of Data and Computer Science Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518005 China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Egocentric interaction recognition aims to recognize the camera wearer’s interactions with the interactor who faces the camera wearer in egocentric videos. In such a human-human interaction analysis problem, it is cr... 详细信息
来源: 评论
Detect camouflaged spam content via stoneskipping: Graph and text joint embedding for Chinese character variation representation
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Zhuoren Gao, Zhe He, Guoxiu Kang, Yangyang Sun, Changlong Zhang, Qiong Si, Luo Liu, Xiaozhong School of Data and Computer Science Sun Yat-sen University Guangzhou China Alibaba Group Hangzhou and Sunnyvale and Seattle China United States School of Information Management Wuhan University Wuhan China School of Informatics Computing and Engineering Indiana University Bloomington Bloomington United States
The task of Chinese text spam detection is very challenging due to both glyph and phonetic variations of Chinese characters. This paper proposes a novel framework to jointly model Chinese variational, semantic, and co... 详细信息
来源: 评论
A survey on edge computing systems and tools
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Fang Tang, Guoming Li, Youhuizi Cai, Zhiping Zhang, Xingzhou Zhou, Tongqing School of Data and Computer Science Sun Yat-sen University GuangzhouGuangdong China Key Laboratory of Science and Technology on Information System Engineering National University of Defense Technology ChangshaHunan China School of Compute Science and Technology Hangzhou Dianzi University China College of Computer National University of Defense Technology ChangshaHunan China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China
—Driven by the visions of Internet of Things and 5G communications, the edge computing systems integrate computing, storage and network resources at the edge of the network to provide computing infrastructure, enabli... 详细信息
来源: 评论
Unsupervised Person Re-Identification by Camera-Aware Similarity Consistency Learning
Unsupervised Person Re-Identification by Camera-Aware Simila...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ancong Wu Wei-Shi Zheng Jian-Huang Lai School of Electronics and Information Technology Sun Yat-sen University China School of Data and Computer Science Sun Yat-sen University China Peng Cheng Laboratory China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security China
For matching pedestrians across disjoint camera views in surveillance, person re-identification (Re-ID) has made great progress in supervised learning. However, it is infeasible to label data in a number of new scenes... 详细信息
来源: 评论
Defending against advanced persistent threat: A risk management perspective  1st
Defending against advanced persistent threat: A risk managem...
收藏 引用
1st International Conference on science of Cyber Security, SciSec 2018
作者: Zhong, Xiang Yang, Lu-Xing Yang, Xiaofan Xiong, Qingyu Wen, Junhao Tang, Yuan Yan School of Big Data and Software Engineering Chongqing University Chongqing400044 China School of Information Technology Deakin University MelbourneVIC3125 Australia Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China Department of Computer and Information Science The University of Macau China
Advanced persistent threat (APT) as a new form of cyber attack has posed a severe threat to modern organizations. When an APT has been detected, the target organization has to develop a response resource allocation st... 详细信息
来源: 评论
Strict pattern matching under non-overlapping condition
收藏 引用
science China(information sciences) 2017年 第1期60卷 5-20页
作者: Youxi WU Cong SHEN He JIANG Xindong WU School of Computer Science and Engineering Hebei University of Technology Hebei Province Key Laboratory of Big Data Calculation School of Computer Science and Technology Tianjin University School of Software Dalian University of Technology School of Computer Science and Information Engineering Hefei University of Technology School of Computing and Informatics University of Louisiana at Lafayette
Pattern matching(or string matching) is an essential task in computer science, especially in sequential pattern mining, since pattern matching methods can be used to calculate the support(or the number of occurrences)... 详细信息
来源: 评论
Residual Networks for Light Field Image Super-Resolution
Residual Networks for Light Field Image Super-Resolution
收藏 引用
IEEE/CVF Conference on computer Vision and Pattern Recognition
作者: Shuo Zhang Youfang Lin Hao Sheng Beijing Key Lab of Traffic Data Analysis and Mining School of Computer and Information Technology Beijing Jiaotong University Key Laboratory of Intelligent Passenger Service of Civil Aviation CAAC State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University
Light field cameras are considered to have many potential applications since angular and spatial information is captured simultaneously. However, the limited spatial resolution has brought lots of difficulties in deve...
来源: 评论
Lattice Blind Signatures with Forward Security
arXiv
收藏 引用
arXiv 2020年
作者: Le, Huy Quoc Duong, Dung Hoang Susilo, Willy Tran, Ha Thanh Nguyen Trinh, Viet Cuong Pieprzyk, Josef Plantard, Thomas Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Northfields Avenue WollongongNSW2522 Australia Department of Mathematical and Physical Sciences Concordia University of Edmonton 7128 Ada Blvd NW EdmontonABT5B 4E4 Canada Faculty of Information and Communication Technology Hong Duc University 565 Quang Trung Thanh Hoa Viet Nam CSIRO Data61 SydneyNSW Australia Institute of Computer Science Polish Academy of Sciences Warsaw Poland
Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention... 详细信息
来源: 评论