咨询与建议

限定检索结果

文献类型

  • 861 篇 期刊文献
  • 512 篇 会议
  • 12 册 图书

馆藏范围

  • 1,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 943 篇 工学
    • 708 篇 计算机科学与技术...
    • 589 篇 软件工程
    • 225 篇 信息与通信工程
    • 146 篇 生物工程
    • 137 篇 电气工程
    • 103 篇 控制科学与工程
    • 102 篇 生物医学工程(可授...
    • 98 篇 光学工程
    • 74 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 43 篇 化学工程与技术
    • 33 篇 交通运输工程
    • 32 篇 动力工程及工程热...
    • 32 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 28 篇 安全科学与工程
  • 527 篇 理学
    • 268 篇 数学
    • 163 篇 生物学
    • 133 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 39 篇 化学
    • 39 篇 系统科学
  • 266 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 108 篇 医学
    • 86 篇 临床医学
    • 74 篇 基础医学(可授医学...
    • 48 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 45 篇 法学
    • 38 篇 社会学
  • 25 篇 经济学
  • 15 篇 农学
  • 10 篇 教育学
  • 4 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 44 篇 feature extracti...
  • 38 篇 deep learning
  • 37 篇 machine learning
  • 30 篇 semantics
  • 30 篇 accuracy
  • 30 篇 training
  • 24 篇 artificial intel...
  • 22 篇 computational mo...
  • 21 篇 reinforcement le...
  • 21 篇 data models
  • 21 篇 convolutional ne...
  • 20 篇 deep neural netw...
  • 20 篇 predictive model...
  • 19 篇 federated learni...
  • 17 篇 convolution
  • 17 篇 contrastive lear...
  • 15 篇 image segmentati...
  • 14 篇 neural networks
  • 14 篇 graph neural net...
  • 14 篇 privacy

机构

  • 51 篇 college of compu...
  • 43 篇 school of data a...
  • 36 篇 college of compu...
  • 28 篇 national enginee...
  • 26 篇 nanyang technolo...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 23 篇 key laboratory o...
  • 21 篇 school of electr...
  • 21 篇 key laboratory o...
  • 20 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 shandong provinc...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 beijing advanced...
  • 16 篇 school of inform...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...

作者

  • 71 篇 niyato dusit
  • 23 篇 kang jiawen
  • 22 篇 huang qingming
  • 21 篇 jin hai
  • 20 篇 xiong zehui
  • 20 篇 chen mingzhe
  • 20 篇 xu qianqian
  • 18 篇 yang yang
  • 16 篇 shen linlin
  • 15 篇 yang zhiyong
  • 14 篇 zheng wei-shi
  • 13 篇 ezugwu absalom e...
  • 13 篇 hu shengshan
  • 13 篇 li tianrui
  • 13 篇 zhang leo yu
  • 13 篇 ai bo
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 13 篇 zhang ruichen
  • 12 篇 han zhu

语言

  • 963 篇 英文
  • 413 篇 其他
  • 14 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1385 条 记 录,以下是431-440 订阅
NOMANet: A Graph Neural Network Enabled Power Allocation Scheme for NOMA
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Yipu Lu, Yang Chen, Wei Ai, Bo Niyato, Dusit Ding, Zhiguo State Key Laboratory of Advanced Rail Autonomous Operation China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University 639798 Singapore Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates
This paper proposes a graph neural network (GNN) enabled power allocation scheme for non-orthogonal multiple access (NOMA) networks. In particular, a downlink scenario with one base station serving multiple users over... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
Comprehensive review of academic search systems: evolution, analysis, and future research directions
收藏 引用
Social Network Analysis and Mining 2025年 第1期15卷 1-23页
作者: Khalid, Shah Almutairi, Sulaiman Namoun, Abdallah Khan, Jawad Ali Khattak, Hasan Shah, Habib School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan Department of Health Informatics College of Applied Medical Sciences Qassim University Buraydahm Qassim Kingdom of Saudi Arabia AI Center Faculty of Computer and Information Systems Faculty of Computer and Information Systems Islamic University of Madinah Madinah Kingdom of Saudi Arabia School of Computing Gachon University Seongnam Republic of Korea School of Computer Data and Mathematical Sciences Western Sydney University Sydney Western Sydney Australia Code Crush Technologies Islamabad Pakistan
Most countries today emphasize scientific research and invest heavily in it. As a result, the number of scholarly documents has increased dramatically. Both academics and industry professionals seek to retrieve releva...
来源: 评论
Optimizing Wireless Resource Management and Synchronization in Digital Twin Networks
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Hanzhi Liu, Yuchen Yang, Zhaohui Sun, Haijian Chen, Mingzhe Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States Department of Computer Science North Carolina State University RaleighNC27695 United States College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China School of Electrical and Computer Engineering University of Georgia AthensGA30602 United States
In this paper, we investigate an accurate synchronization between a physical network and its digital network twin (DNT), which serves as a virtual representation of the physical network. The considered network include... 详细信息
来源: 评论
One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control
One-Time Rewritable Blockchain with Traitor Tracing and Bila...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Lifeng Guo Huide Lei Wei-Chuen Yau School of Computer and Information Technology Shanxi University Taiyuan China School of Computing and Data Science Xiamen University Malaysia Sepang Selangor Malaysia
One of the solutions for rewriting blockchain data is to replace the standard hash function with a chameleon hash function. This enables users with the trapdoor to generate hash collision for rewriting operation. Howe... 详细信息
来源: 评论
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsourced Taxis
Cooperative Air-Ground Instant Delivery by UAVs and Crowdsou...
收藏 引用
International Conference on data Engineering
作者: Junhui Gao Qianru Wang Xin Zhang Juan Shi Xiang Zhao Qingye Han Yan Pan School of Computer Science Northwestern Polytechnical University School of Computer Science and Technology Xidian University National Key Laboratory of Information Systems Engineering National University of Defense Technology Air Force Engineering University Laboratory for Big Data and Decision National University of Defense Technology School of Management Science and Real Estate Chongqing University National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology
Instant delivery has become a fundamental service in people's daily lives. Different from the traditional express service, the instant delivery has a strict shipping time constraint after being ordered. However, t... 详细信息
来源: 评论
Beam Tracking for High-Speed UAV Via Generative Diffusion Model-Enabled Joint Optimization Approach
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Zhang, Jing Zhang, Chaofeng Feng, Xin Yang, Hongwei Liang, Shuang Sun, Geng Wang, Jiacheng Niyato, Dusit Changchun University of Science and Technology College of Computer Science and Technology Changchun130022 China Jilin University College of Communication Engineering Changchun130012 China Northeast Normal University School of Information Science and Technology Changchun130117 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Jilin University College of Computer Science and Technology Changchun130012 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Nanyang Technological University 639798 Singapore
Beam tracking is crucial for maintaining stable data transmission in unmanned aerial vehicle (UAV) communications. However, a communication link can be disrupted by frequent switching of narrow beams between a base st... 详细信息
来源: 评论
Parallel Dual-Branch Fusion Network for Epileptic Seizure Prediction
收藏 引用
computers in Biology and Medicine 2024年 176卷 108565-108565页
作者: Ma, Hongcheng Wu, Yajing Tang, Yongqiang Chen, Rui Xu, Tao Zhang, Wensheng School of Information and Communication Engineering Hainan University Haikou China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Taiyuan China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Epilepsy is a prevalent chronic disorder of the central nervous system. The timely and accurate seizure prediction using the scalp Electroencephalography (EEG) signal can make patients adopt reasonable preventive meas... 详细信息
来源: 评论
Implicit U-KAN2.0: Dynamic, Efficient and Interpretable Medical Image Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Chun-Wun Zhao, Yining Cheng, Yanqi Montoya, Javier Schönlieb, Carola-Bibiane Aviles-Rivero, Angelica I. Department of Applied Mathematics and Theoretical Physics University of Cambridge United Kingdom Siebel School of Computing and Data Science University of Illinois Urbana-Champaign United States Lucerne School of Computer Science and Information Technology Lucerne University of Applied Sciences and Arts United States Yau Mathematical Sciences Center Tsinghua University China
Image segmentation is a fundamental task in both image analysis and medical applications. State-of-the-art methods predominantly rely on encoder-decoder architectures with a U-shaped design, commonly referred to as U-... 详细信息
来源: 评论