咨询与建议

限定检索结果

文献类型

  • 4,134 篇 会议
  • 3,710 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 7,907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,430 篇 工学
    • 4,062 篇 计算机科学与技术...
    • 3,328 篇 软件工程
    • 1,278 篇 信息与通信工程
    • 691 篇 控制科学与工程
    • 649 篇 生物工程
    • 538 篇 电气工程
    • 417 篇 电子科学与技术(可...
    • 407 篇 光学工程
    • 405 篇 生物医学工程(可授...
    • 387 篇 机械工程
    • 230 篇 动力工程及工程热...
    • 216 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 168 篇 网络空间安全
    • 161 篇 安全科学与工程
    • 152 篇 交通运输工程
    • 149 篇 建筑学
  • 2,619 篇 理学
    • 1,423 篇 数学
    • 708 篇 生物学
    • 648 篇 物理学
    • 440 篇 统计学(可授理学、...
    • 254 篇 系统科学
    • 232 篇 化学
  • 1,570 篇 管理学
    • 922 篇 管理科学与工程(可...
    • 706 篇 图书情报与档案管...
    • 352 篇 工商管理
  • 360 篇 医学
    • 305 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 156 篇 药学(可授医学、理...
  • 262 篇 法学
    • 193 篇 社会学
  • 133 篇 经济学
  • 123 篇 教育学
  • 82 篇 农学
  • 30 篇 文学
  • 29 篇 军事学
  • 21 篇 艺术学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 191 篇 feature extracti...
  • 164 篇 semantics
  • 157 篇 deep learning
  • 157 篇 training
  • 155 篇 computational mo...
  • 148 篇 machine learning
  • 111 篇 data mining
  • 107 篇 optimization
  • 105 篇 internet of thin...
  • 102 篇 cloud computing
  • 92 篇 accuracy
  • 91 篇 convolution
  • 88 篇 predictive model...
  • 84 篇 authentication
  • 81 篇 software enginee...
  • 80 篇 computer science
  • 79 篇 reinforcement le...
  • 79 篇 data models
  • 77 篇 image segmentati...
  • 77 篇 neural networks

机构

  • 269 篇 school of inform...
  • 261 篇 school of comput...
  • 163 篇 school of comput...
  • 107 篇 state key labora...
  • 97 篇 college of compu...
  • 92 篇 school of softwa...
  • 85 篇 school of inform...
  • 68 篇 school of comput...
  • 61 篇 school of comput...
  • 54 篇 college of compu...
  • 46 篇 shandong provinc...
  • 45 篇 school of softwa...
  • 44 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 school of comput...
  • 40 篇 school of softwa...
  • 39 篇 shanghai key lab...
  • 39 篇 school of softwa...
  • 39 篇 school of comput...
  • 38 篇 school of comput...

作者

  • 49 篇 yang jian
  • 35 篇 qi lianyong
  • 34 篇 zhang wenqiang
  • 32 篇 xu xiaolong
  • 31 篇 wang wei
  • 30 篇 tao dacheng
  • 26 篇 sun xingming
  • 24 篇 wang lei
  • 23 篇 yang yang
  • 23 篇 hu shengshan
  • 23 篇 wang yan
  • 22 篇 qi liu
  • 22 篇 wang meng
  • 21 篇 zhang zhao
  • 20 篇 lu dianjie
  • 20 篇 timofte radu
  • 19 篇 niyato dusit
  • 19 篇 liu yang
  • 19 篇 liu qi
  • 19 篇 tao zhang

语言

  • 7,234 篇 英文
  • 564 篇 其他
  • 122 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Applied Software Engineering Lab School of Computer Engineering & Information Technology"
7907 条 记 录,以下是21-30 订阅
排序:
Residual diverse ensemble for long-tailed multi-label text classification
收藏 引用
Science China(information Sciences) 2024年 第11期67卷 92-105页
作者: Jiangxin SHI Tong WEI Yufeng LI National Key Laboratory for Novel Software Technology Nanjing University School of Artificial Intelligence Nanjing University School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of Education
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previo... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Boosting Adversarial Training with Learnable Distribution
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3247-3265页
作者: Kai Chen Jinwei Wang James Msughter Adeke Guangjie Liu Yuewei Dai School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of EducationNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Nanjing Center for Applied Mathematics Nanjing211135China
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe... 详细信息
来源: 评论
Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization
收藏 引用
Tsinghua Science and technology 2024年 第3期29卷 806-817页
作者: Lei Zeng Qi Liu Shigen Shen Xiaodong Liu School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Information Engineering Huzhou UniversityHuzhou 313000China School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study prop... 详细信息
来源: 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 评论
An attention-based channel estimation network with residual mechanism for 5G OFDM systems  4
An attention-based channel estimation network with residual ...
收藏 引用
4th International Conference on Electronic Communication, computer Science and technology, ECCST 2024
作者: Jiang, Jinjing Huang, Weipeng Zhang, Xiao Yang, Kun Peng, Tong School of Information Engineering Zhejiang Ocean University China School of Computer Science and Software Engineering Shenzhen Institute of Information Technology China
Due to the significant increase in data transmission speed and gradual increase in Doppler frequency shift, channel estimation accuracy has become one of the most prioritized considerations in many cases. Specifically... 详细信息
来源: 评论
Optimized Autonomous Computing with Trusted Resilient Data Management for IoT Emerging Networks
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20778-20785页
作者: Shafique, Ayesha Cheng, Benmao Zhao, Bo Alwakid, Ghadah Naif Haq, Muhammad Inaam Ul Laboratory of Intelligent IOT Technology and Applications in Universities China Jouf University College of Computer and Information Sciences Department of Computer Science Al Jowf Sakaka72341 Saudi Arabia Quanzhou University of Information Engineering School of Computer Science and Software Engineering Quanzhou362000 China
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre... 详细信息
来源: 评论
DIEONet:Domain-Invariant information Extraction and Optimization Network for Visual Place Recognition
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5019-5033页
作者: Shaoqi Hou Zebang Qin Chenyu Wu Guangqiang Yin Xinzhong Wang Zhiguo Wang School of Computer Science and Technology Xinjiang UniversityUrumqi830046China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR ... 详细信息
来源: 评论
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1412-1434页
作者: Shoaib Hassan Qianmu Li Khursheed Aurangzeb Affan Yasin Javed Ali Khan Muhammad Shahid Anwar School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingJiangsuChina Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Software Northwestern Polytechnical UniversityXianShaanxiChina Department of Computer Science School of PhysicsEngineering&Computer ScienceUniversity of HertfordshireHatfieldUK Department of AI and Software Gachon University Seongnam-siSeongnamSouth Korea
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a... 详细信息
来源: 评论
A dynamic and resource sharing virtual network mapping algorithm
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1101-1112页
作者: Xiancui Xiao Xiangwei Zheng Ji Bian Cun Ji Xinchun Cui School of Information Science and Engineering Shandong Normal UniversityJinan250014China School of Information Engineering Shandong Management UniversityJinan250358China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014China School of Computer Science and Technology Qufu Normal UniversityRizhao276800China
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind... 详细信息
来源: 评论