咨询与建议

限定检索结果

文献类型

  • 867 篇 期刊文献
  • 518 篇 会议
  • 12 册 图书

馆藏范围

  • 1,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 953 篇 工学
    • 714 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 235 篇 信息与通信工程
    • 149 篇 电气工程
    • 146 篇 生物工程
    • 112 篇 控制科学与工程
    • 99 篇 生物医学工程(可授...
    • 95 篇 光学工程
    • 77 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 43 篇 化学工程与技术
    • 36 篇 网络空间安全
    • 34 篇 交通运输工程
    • 32 篇 动力工程及工程热...
    • 31 篇 仪器科学与技术
    • 31 篇 安全科学与工程
  • 530 篇 理学
    • 267 篇 数学
    • 163 篇 生物学
    • 137 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 42 篇 化学
    • 39 篇 系统科学
  • 272 篇 管理学
    • 160 篇 管理科学与工程(可...
    • 117 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 109 篇 医学
    • 88 篇 临床医学
    • 73 篇 基础医学(可授医学...
    • 50 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 45 篇 法学
    • 38 篇 社会学
  • 25 篇 经济学
  • 15 篇 农学
  • 13 篇 教育学
  • 4 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 45 篇 feature extracti...
  • 39 篇 deep learning
  • 37 篇 machine learning
  • 32 篇 training
  • 31 篇 semantics
  • 31 篇 accuracy
  • 24 篇 computational mo...
  • 24 篇 artificial intel...
  • 23 篇 predictive model...
  • 22 篇 reinforcement le...
  • 21 篇 data models
  • 20 篇 deep neural netw...
  • 19 篇 federated learni...
  • 19 篇 convolutional ne...
  • 18 篇 convolution
  • 17 篇 contrastive lear...
  • 15 篇 image segmentati...
  • 15 篇 graph neural net...
  • 14 篇 data mining
  • 14 篇 privacy

机构

  • 52 篇 college of compu...
  • 43 篇 school of data a...
  • 36 篇 college of compu...
  • 28 篇 national enginee...
  • 27 篇 nanyang technolo...
  • 27 篇 school of comput...
  • 26 篇 school of comput...
  • 23 篇 key laboratory o...
  • 21 篇 school of electr...
  • 21 篇 key laboratory o...
  • 20 篇 school of cyber ...
  • 17 篇 shandong provinc...
  • 17 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 beijing advanced...
  • 16 篇 school of inform...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...

作者

  • 72 篇 niyato dusit
  • 23 篇 kang jiawen
  • 22 篇 huang qingming
  • 21 篇 chen mingzhe
  • 21 篇 jin hai
  • 20 篇 xiong zehui
  • 20 篇 xu qianqian
  • 19 篇 yang yang
  • 16 篇 shen linlin
  • 15 篇 yang zhiyong
  • 14 篇 zheng wei-shi
  • 14 篇 ezugwu absalom e...
  • 13 篇 hu shengshan
  • 13 篇 han zhu
  • 13 篇 zhang leo yu
  • 13 篇 ai bo
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 12 篇 li tianrui
  • 12 篇 zhang ruichen

语言

  • 973 篇 英文
  • 415 篇 其他
  • 14 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1397 条 记 录,以下是961-970 订阅
排序:
Investigating effective transfer of deep learning models from adults to children for lung ultrasound data analysis
Investigating effective transfer of deep learning models fro...
收藏 引用
IEEE Symposium (IUS) Ultrasonics
作者: Russell Thompson Umair Khan Jason Li Lauren. P. Etter Ingrid Camello Rachel. C. Pieciak Ilse. Castro-Aragon Bindu Setty Christopher. C. Gill Libertario Demi Margrit Betke University of Massachusetts Dartmouth MA USA Department of Information Engineering & Computer Science University of Trento TN Italy The Faculty of Computing & Data Sciences Boston University Boston MA USA University of Wisconsin Madison Madison WI USA Pediatric Infectious Disease Augusta University Augusta GA USA Department of Global Health Boston University School of Public Health Boston MA USA Department of Radiology Boston Medical Center Boston MA USA
Automated assessment of LUS data from adult population is an ongoing research over the last few years. To this extent, various deep learning DL-based methods have been proposed to assess lung alterations caused by pne...
来源: 评论
Free-form tumor synthesis in computed tomography images via richer generative adversarial network
arXiv
收藏 引用
arXiv 2021年
作者: Jin, Qiangguo Cui, Hui Sun, Changming Meng, Zhaopeng Su, Ran School of Computer Software College of Intelligence and Computing Tianjin University Tianjin China Department of Computer Science and Information Technology La Trobe University Melbourne Australia Csiro Data61 Sydney Australia Tianjin University of Traditional Chinese Medicine Tianjin China
The insufficiency of annotatedmedical imaging scans for cancer makes it challenging to train and validate data-hungry deep learning models in precision oncology. We propose a new richer generative adversarial network ... 详细信息
来源: 评论
G3SR: Global Graph Guided Session-based Recommendation
arXiv
收藏 引用
arXiv 2022年
作者: Deng, Zhi-Hong Wang, Chang-Dong Huang, Ling Lai, Jian-Huang Yu, Philip S. School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China College of Mathematics and Informatics South China Agricultural University Guangzhou China Guangdong Provincial Key Laboratory of Public Finance and Taxation with Big Data Application China University of Illinois at Chicago ChicagoIL United States
Session-based recommendation tries to make use of anonymous session data to deliver high-quality recommendation under the condition that user-profiles and the complete historical behavioral data of a target user are u... 详细信息
来源: 评论
A maturity model for catalogues of semantic artefacts
arXiv
收藏 引用
arXiv 2023年
作者: Corcho, Oscar Ekaputra, Fajar J. Heibi, Ivan Jonquet, Clement Micsik, Andras Peroni, Silvio Storti, Emanuele Computer Science School Universidad Politécnica de Madrid Madrid Spain Vienna Austria Data Science Research Unit TU Wien Vienna Austria Department of Classical Philology and Italian Studies University of Bologna Bologna Italy Research Centre for Open Scholarly Metadata Department of Classical Philology and Italian Studies University of Bologna Bologna Italy MISTEA University of Montpellier INRAE Institut Agro France LIRMM University of Montpellier CNRS France Budapest Hungary Department of Information Engineering Polytechnic University of Marche Ancona Italy Brussels Belgium
This work presents a maturity model for assessing catalogues of semantic artefacts, one of the keystones that permit semantic interoperability of systems. We defined the dimensions and related features to include in t... 详细信息
来源: 评论
Motif Graph Neural Network
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Xuexin Cai, Ruichu Fang, Yuan Wu, Min Li, Zijian Hao, Zhifeng The School of Computer Science Guangdong University of Technology Guangzhou510006 China The School of Computer Science Guangdong University of Technology Guangdong Provincial Key Laboratory of Public Finance and Taxation with Big Data Application Guangzhou China Peng Cheng Laboratory Shenzhen518066 China The School of Computing and Information Systems Singapore Management University 178902 Singapore A*STAR 138632 Singapore The College of Science Shantou University Shantou515063 China
Graphs can model complicated interactions between entities, which naturally emerge in many important applications. These applications can often be cast into standard graph learning tasks, in which a crucial step is to... 详细信息
来源: 评论
Enhancing utility in the watchdog privacy mechanism
arXiv
收藏 引用
arXiv 2021年
作者: Zarrabian, Mohammad Amin Ding, Ni Sadeghi, Parastoo Rakotoarivelo, Thierry College of Engineering and Computer Science Australian National University Canberra Australia School of Computing and Information Systems University of Melbourne Melbourne Australia School of Engineering and Information Technology University of New South Wales Canberra Australia Data61 Commonwealth Scientific and Industrial Research Organisation Eveleigh Australia
This paper is concerned with enhancing data utility in the privacy watchdog method for attaining information-theoretic privacy. For a specific privacy constraint, the watchdog method filters out the high-risk data sym... 详细信息
来源: 评论
BCDAS: Blockchain-assisted Classifiable data Auditing Scheme with Dynamic Operations
收藏 引用
Blockchain: Research and Applications 2025年
作者: Yuxin Cui Chen Wang Bing Yang Wei Tong Jian Shen School of Information Science and Engineering (School of Cyber Science and Technology) Zhejiang Sci-Tech University Hangzhou 310018 Zhejiang China Zhejiang Provincial Key Laboratory of Digital Fashion and Data Governance Zhejiang Sci-Tech University Hangzhou 310018 Zhejiang China Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou 310018 Zhejiang China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing 312000 Zhejiang China School of Computer Science Nanjing University of Information Science Technology Nanjing 210044 Jiangsu China
As cloud computing gains widespread adoption, cloud storage services have become the primary means of data management for users. Authenticated data structures (ADS) are a novel computational model designed to address ... 详细信息
来源: 评论
Skeleton Recall Loss for Connectivity Conserving and Resource Efficient Segmentation of Thin Tubular Structures
arXiv
收藏 引用
arXiv 2024年
作者: Kirchhoff, Yannick Rokuss, Maximilian R. Roy, Saikat Kovacs, Balint Ulrich, Constantin Wald, Tassilo Zenk, Maximilian Vollmuth, Philipp Kleesiek, Jens Isensee, Fabian Maier-Hein, Klaus Heidelberg Division of Medical Image Computing Germany Faculty of Mathematics and Computer Science Heidelberg University Germany HIDSS4Health - Helmholtz Information and Data Science School for Health Heidelberg Karlsruhe Germany Medical Faculty Heidelberg Heidelberg University Heidelberg Germany Helmholtz Imaging German Cancer Research Center Heidelberg Germany Clinic for Neuroradiology University Hospital Bonn Bonn Germany Medical Faculty Bonn University of Bonn Bonn Germany University Hospital Essen Essen Germany West German Cancer Center Essen University Hospital Essen Essen Germany Pattern Analysis and Learning Group Department of Radiation Oncology Heidelberg University Hospital Germany
Accurately segmenting thin tubular structures, such as vessels, nerves, roads or concrete cracks, is a crucial task in computer vision. Standard deep learning-based segmentation loss functions, such as Dice or Cross-E... 详细信息
来源: 评论
Fast Subspace Clustering Based on the Kronecker Product
Fast Subspace Clustering Based on the Kronecker Product
收藏 引用
International Conference on Pattern Recognition
作者: Lei Zhou Xiao Bai Liang Zhang Jun Zhou Edwin Hancock School of Computer Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Jiangxi Research Institute Beihang University Beijing China School of Information and Communication Technology Griffith University Nathan Australia University of York York U.K.
Subspace clustering is a useful technique for many computer vision applications in which the intrinsic dimension of high-dimensional data is often smaller than the ambient dimension. Spectral clustering, as one of the... 详细信息
来源: 评论
Imperceptible diffusion modification for facial privacy protection
收藏 引用
Neurocomputing 2025年 649卷
作者: Jia Li Junhao Dong Jianhuang Lai Xiaohua Xie School of Computer Science and Engineering Sun Yat-sen University Guangzhou China College of Computing and Data Science Nanyang Technological University Singapore Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing (Sun Yat-sen University) Ministry of Education Guangzhou China
The remarkable success of Face Recognition (FR) systems has raised significant privacy concerns, particularly the potential for unauthorized tracking of individuals on social media. To mitigate these risks, various ad...
来源: 评论