咨询与建议

限定检索结果

文献类型

  • 2,546 篇 会议
  • 1,713 篇 期刊文献
  • 48 册 图书
  • 7 篇 学位论文

馆藏范围

  • 4,314 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,448 篇 工学
    • 1,896 篇 计算机科学与技术...
    • 1,574 篇 软件工程
    • 523 篇 信息与通信工程
    • 373 篇 生物工程
    • 341 篇 控制科学与工程
    • 303 篇 生物医学工程(可授...
    • 231 篇 电气工程
    • 196 篇 光学工程
    • 142 篇 电子科学与技术(可...
    • 135 篇 机械工程
    • 110 篇 安全科学与工程
    • 95 篇 仪器科学与技术
    • 91 篇 化学工程与技术
    • 85 篇 交通运输工程
  • 1,398 篇 理学
    • 626 篇 数学
    • 433 篇 生物学
    • 421 篇 物理学
    • 248 篇 统计学(可授理学、...
    • 126 篇 系统科学
    • 102 篇 化学
  • 766 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 381 篇 图书情报与档案管...
    • 233 篇 工商管理
  • 385 篇 医学
    • 326 篇 临床医学
    • 299 篇 基础医学(可授医学...
    • 193 篇 公共卫生与预防医...
    • 156 篇 药学(可授医学、理...
  • 146 篇 法学
    • 121 篇 社会学
  • 123 篇 教育学
    • 113 篇 教育学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 72 篇 农学
  • 18 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 129 篇 machine learning
  • 104 篇 deep learning
  • 94 篇 accuracy
  • 81 篇 training
  • 75 篇 feature extracti...
  • 71 篇 predictive model...
  • 67 篇 internet of thin...
  • 65 篇 covid-19
  • 63 篇 computational mo...
  • 62 篇 convolutional ne...
  • 59 篇 security
  • 55 篇 artificial intel...
  • 54 篇 data models
  • 53 篇 visualization
  • 53 篇 students
  • 52 篇 semantics
  • 48 篇 real-time system...
  • 47 篇 support vector m...
  • 47 篇 optimization
  • 45 篇 medical services

机构

  • 80 篇 department of co...
  • 73 篇 college of compu...
  • 63 篇 college of compu...
  • 60 篇 college of compu...
  • 45 篇 college of compu...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 4,116 篇 英文
  • 188 篇 其他
  • 15 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=at College of Computing and Informatics"
4314 条 记 录,以下是31-40 订阅
排序:
Q-FAKER: Query-free Hard Black-box Attack via Controlled Generation
arXiv
收藏 引用
arXiv 2025年
作者: Na, CheolWon Choi, YunSeok Lee, Jee-Hyong College of Computing and Informatics Sungkyunkwan University Korea Republic of
Many adversarial attack approaches are proposed to verify the vulnerability of language models. However, they require numerous queries and the information on the target model. Even black-box attack methods also requir...
来源: 评论
DeCAP: Context-Adaptive Prompt Generation for Debiasing Zero-shot Question Answering in Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Bae, Suyoung Choi, YunSeok Lee, Jee-Hyong College of Computing and Informatics Sungkyunkwan University Korea Republic of
While Large Language Models (LLMs) excel in zero-shot Question Answering (QA), they tend to expose biases in their internal knowledge when faced with socially sensitive questions, leading to a degradation in performan... 详细信息
来源: 评论
Empirical Study on Data Attributes Insufficiency of Evaluation Benchmarks for LLMs  31
Empirical Study on Data Attributes Insufficiency of Evaluati...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Chuang Jin, Renren Yao, Zheng Li, Tianyi Cheng, Liang Steedman, Mark Xiong, Deyi College of Intelligence and Computing Tianjin University China School of Electrical Engineering and Computer Science University of Queensland Australia School of Informatics University of Edinburgh United Kingdom
Previous benchmarks for evaluating large language models (LLMs) have primarily emphasized quantitative metrics, such as data volume. However, this focus may neglect key qualitative data attributes that can significant... 详细信息
来源: 评论
AI-Powered Cloud computing for Performance Optimization and Scalability in Distributed Systems
AI-Powered Cloud Computing for Performance Optimization and ...
收藏 引用
2025 International Conference on computing for Sustainability and Intelligent Future, COMP-SIF 2025
作者: Selvam, Muthu Kishan, B.S. College of Computing and Informatics University of North Carolina at Charlotte CharlotreNC United States Bms Institute of Technology and Management Department of Mechanical Engineering Bangalore India
The IT profession has observed the ingenious application of Artificial Intelligence in the field of cloud computing as a solution to increase performance along with scalability within the distributed computing environ... 详细信息
来源: 评论
Improved Xception with Local Dense Connections and Transition Layer for Facial Expression Recognition  24
Improved Xception with Local Dense Connections and Transitio...
收藏 引用
3rd International Conference on Artificial Intelligence and Intelligent Information Processing, AIIIP 2024
作者: Zhang, Zhiping Abdul-Rahman, Shuzlina Sabri, Norlina Mohd College of Computing Informatics and Media Universiti Teknologi MARA Selangor Malaysia College of Computer and Mathematics Xinyu University Jiangxi Xinyu China Universiti Teknologi MARA Cawangan Terengganu Kuala Terengganu Malaysia
Traditional deep convolutional neural networks are used for facial expression recognition, which makes the number of neurons and parameters huge, wastes computing resources, and even causes problems such as overfittin... 详细信息
来源: 评论
Underwater Sonar Image Targets Detection Based on Improved RT-DETR
收藏 引用
IEEE Geoscience and Remote Sensing Letters 2025年 22卷
作者: Li, Ang Hamzah, Raseeda Gao, Yousheng Jiujiang Vocational University College of Information Engineering Jiangxi Jiujiang332000 China College of Computing Informatics and Mathematics Selangor Shah Alam40450 Malaysia Melaka College of Computing Informatics and Mathematics Jasin Melaka77300 Malaysia
Underwater sonar imagery is characterized by small target sizes and low resolution, which can result in detection failures or false positives. To counteract these challenges, we introduce the underwater sonar detectio... 详细信息
来源: 评论
Knowledge augmented significant language model-based chatbot for explainable diabetes mellitus prediction  19
Knowledge augmented significant language model-based chatbot...
收藏 引用
19th International Conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Elfayoumi, Mazen AbouElazm, Mohamed Mohamed, Omar Abuhmed, Tamer El-Sappagh, Shaker Faculty of Computer Science and Engineering Galala University Egypt Faculty of Computer Science Goldsmith UOL United Kingdom College of Computing and Informatics Sungkyunkwan University Korea Republic of
This study proposes an innovative diabetes prediction chatbot that utilizes large language models (LLMs) to determine the likelihood of diabetes based on specific patient inputs. Unlike conventional machine learning m... 详细信息
来源: 评论
Facilitating Gender Diverse Authorship: A Comparative Analysis of Academic Publisher Name Change Policies  25
Facilitating Gender Diverse Authorship: A Comparative Analys...
收藏 引用
Proceedings of the 17th ACM Web Science Conference 2025
作者: Deanna Zarrillo College of Computing & Informatics Drexel University Philadelphia PA USA
Post-publication name change policies are vital for safeguarding privacy and equity for authors navigating identity changes, including gender transitions, within academic publishing. Before the introduction of these p... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
LLM+RAG Driven Topic Modeling  2025
LLM+RAG Driven Topic Modeling
收藏 引用
Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 2
作者: Frank Ley Garcia College of Computing and Informatics UNC Charlotte Charlotte NC USA
This paper explores the use of Large Language Models (LLMs) combined with Retrieval-Augmented Generation (RAG) to assist instructors in identifying course-wide student challenges through topic modeling. Unlike previou... 详细信息
来源: 评论