咨询与建议

限定检索结果

文献类型

  • 21,669 篇 会议
  • 20,162 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 42,066 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,730 篇 工学
    • 15,387 篇 计算机科学与技术...
    • 12,299 篇 软件工程
    • 5,026 篇 信息与通信工程
    • 3,735 篇 电子科学与技术(可...
    • 3,599 篇 电气工程
    • 3,067 篇 控制科学与工程
    • 2,904 篇 生物工程
    • 2,879 篇 光学工程
    • 2,304 篇 生物医学工程(可授...
    • 1,877 篇 化学工程与技术
    • 1,801 篇 机械工程
    • 1,586 篇 材料科学与工程(可...
    • 1,519 篇 仪器科学与技术
    • 1,129 篇 动力工程及工程热...
    • 800 篇 力学(可授工学、理...
  • 17,427 篇 理学
    • 8,133 篇 物理学
    • 6,770 篇 数学
    • 3,436 篇 生物学
    • 2,353 篇 统计学(可授理学、...
    • 2,141 篇 化学
    • 1,249 篇 系统科学
    • 921 篇 地球物理学
  • 5,988 篇 管理学
    • 3,613 篇 管理科学与工程(可...
    • 2,534 篇 图书情报与档案管...
    • 1,448 篇 工商管理
  • 2,285 篇 医学
    • 1,871 篇 临床医学
    • 1,522 篇 基础医学(可授医学...
    • 942 篇 药学(可授医学、理...
    • 688 篇 公共卫生与预防医...
  • 946 篇 法学
    • 758 篇 社会学
  • 580 篇 农学
  • 522 篇 经济学
  • 470 篇 教育学
  • 169 篇 文学
  • 92 篇 军事学
  • 80 篇 艺术学
  • 8 篇 历史学
  • 7 篇 哲学

主题

  • 982 篇 computer science
  • 719 篇 feature extracti...
  • 714 篇 deep learning
  • 553 篇 computational mo...
  • 538 篇 training
  • 535 篇 machine learning
  • 467 篇 semantics
  • 443 篇 accuracy
  • 290 篇 data mining
  • 275 篇 support vector m...
  • 263 篇 data models
  • 248 篇 internet of thin...
  • 248 篇 image segmentati...
  • 238 篇 artificial intel...
  • 222 篇 reinforcement le...
  • 219 篇 computer archite...
  • 218 篇 predictive model...
  • 216 篇 optimization
  • 211 篇 routing
  • 205 篇 neural networks

机构

  • 1,085 篇 cavendish labora...
  • 1,010 篇 department of ph...
  • 964 篇 oliver lodge lab...
  • 956 篇 physikalisches i...
  • 799 篇 university of ch...
  • 610 篇 infn laboratori ...
  • 600 篇 infn sezione di ...
  • 578 篇 infn sezione di ...
  • 558 篇 fakultät physik ...
  • 554 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 520 篇 horia hulubei na...
  • 506 篇 school of physic...
  • 504 篇 iccub universita...
  • 494 篇 department of ph...
  • 493 篇 imperial college...
  • 489 篇 h.h. wills physi...
  • 483 篇 center for high ...
  • 481 篇 nikhef national ...
  • 479 篇 stfc rutherford ...

作者

  • 254 篇 beiter a.
  • 252 篇 barter w.
  • 251 篇 a. gomes
  • 243 篇 bellee v.
  • 235 篇 c. alexa
  • 232 篇 j. m. izen
  • 230 篇 s. chen
  • 226 篇 c. amelung
  • 225 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 218 篇 g. spigo
  • 217 篇 j. wang
  • 216 篇 f. siegert
  • 215 篇 bowcock t.j.v.
  • 214 篇 brundu d.
  • 214 篇 blake t.
  • 208 篇 amato s.
  • 207 篇 r. ströhmer
  • 204 篇 betancourt c.

语言

  • 39,951 篇 英文
  • 1,417 篇 其他
  • 662 篇 中文
  • 34 篇 日文
  • 5 篇 德文
  • 5 篇 俄文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center of Computer Science and Technology"
42066 条 记 录,以下是71-80 订阅
排序:
MetaHG: Enhancing HGNN Systems Leveraging Advanced Metapath Graph Abstraction  25
MetaHG: Enhancing HGNN Systems Leveraging Advanced Metapath ...
收藏 引用
20th European Conference on computer Systems, EuroSys 2025, co-located 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2025
作者: He, Haiheng Liu, Haifeng Zheng, Long Huang, Yu Shen, Xinyang Huang, Wenkan Cao, Chuaihu Liao, Xiaofei Jin, Hai Xue, Jingling National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering University of New South Wales Australia
Heterogeneous Graph Neural Networks (HGNNs) are pivotal for extracting semantic and structural information from heterogeneous graphs. Traditional HGNN implementations often grapple with the challenges of excessive met... 详细信息
来源: 评论
Improving Speaker Verification Back-End with Graph Neural Networks
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-9页
作者: Chen, Jinfeng Fang, Zhihua He, Liang School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Signal Detection and Processing Urumqi830017 China School of Intelligence Science and Technology Xinjiang University Urumqi830017 China Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
Currently, research on speaker verification tasks is primarily concentrated on enhancing deep speaker models to extract high-quality speaker embeddings. Nevertheless, this speaker embeddings can be regarded as potenti... 详细信息
来源: 评论
Anomalous Sound Detection Using Time-Frequency Feature and Mixbatch
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-8页
作者: Huang, Shun Zhang, Yunxiang Fang, Zhihua Tang, Minrui Xu, Ruifeng He, Liang School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Signal Detection and Processing Urumqi830017 China School of Intelligence Science and Technology Xinjiang University Urumqi830017 China Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
The sound emitted by machines under abnormal working conditions exhibits various frequency patterns. Currently, the most advanced anomalous sound detection (ASD) approach is to apply a multi-head self-attention mechan... 详细信息
来源: 评论
Dual-Path Spectrogram Refinement Network for Robust Speaker Verification
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-9页
作者: Wang, Zonghui Fang, Zhihua He, Liang School of Computer Science and Technology Xinjiang University Urumqi830017 China School of Intelligence Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Signal Detection and Processing Urumqi830017 China Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
The accuracy and reliability of automatic speaker verification (ASV) face significant challenges in noisy environments. In recent years, joint training of speech enhancement front-end and ASV back-end has been widely ... 详细信息
来源: 评论
ColorVein: Colorful Cancelable Vein Biometrics
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4943-4955页
作者: Wang, Yifan Gui, Jie Shi, Xinli Gui, Linqing Tang, Yuan Yan Kwok, James Tin-Yau Southeast University School of Cyber Science and Engineering Nanjing210000 China Ministry of Education Purple Mountain Laboratories Engineering Research Center of Blockchain Application Nanjing210000 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210003 China University of Macao Department of Computer and Information Science 999078 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong
Vein recognition technologies have become one of the primary solutions for high-security identification systems. However, the issue of biometric information leakage can still pose a serious threat to user privacy and ... 详细信息
来源: 评论
CAST: Contrastive Analysis of Spatial and Temporal Features for QIM-Based VoIP Steganalysis
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 1935-1939页
作者: Zhang, Cheng Yan, Yue Jiang, Shujuan Chen, Zhong China University of Mining and Technology School of Computer Science and Technology Engineering Research Center of Mine Digitalization Ministry of Education Xuzhou221116 China Swinburne College of Shandong University of Science and Technology Shandong 250031 China China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China
QIM(quantization index modulation)-based VoIP steganography is an information-hiding technology that malicious users could misuse to engage in illegal activities. Its countermeasure, commonly known as the QIM-based Vo... 详细信息
来源: 评论
SLARD: A Chinese Superior Legal Article Retrieval Dataset  31
SLARD: A Chinese Superior Legal Article Retrieval Dataset
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Chen, Zhe Ren, Pengjie Sun, Fuhui Wang, Xiaoyan Li, Yunjun Zhao, Siwen Yang, Tengyi School of Information Science and Engineering Shandong University China School of Computer Science and Technology Shandong University China Information Technology Service Center of People's Court
Retrieving superior legal articles involves identifying relevant legal articles that hold higher legal effectiveness. This process is crucial in legislative work because superior legal articles form the legal basis fo...
来源: 评论
Distributed Distortion-Aware Beamforming Designs for Cell-Free mMIMO Systems
收藏 引用
IEEE Journal on Selected Topics in Signal Processing 2025年 第2期19卷 381-397页
作者: Liu, Mengzhen Li, Ming Liu, Rang Liu, Qian Dalian University of Technology School of Information and Communication Engineering Dalian116024 China University of California Center for Pervasive Communications and Computing IrvineCA92697 United States Dalian University of Technology School of Computer Science and Technology Dalian116024 China
Cell-free massive multi-input multi-output (CF-mMIMO) systems have emerged as a promising paradigm for next-generation wireless communications, offering enhanced spectral efficiency and coverage through distributed an... 详细信息
来源: 评论
LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection  6th
LMCF-FS: A Novel Lightweight Malware Classification Framewor...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yun, Cui Zhou, Lei Xing, Shuangshuang Yang, Ning Zhao, Pan Chen, Zhiguo School of Computer Jiangsu University of Science and Technology Zhenjiang212100 China Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and School of Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China
The rapid increase in the number of malware and its variants poses a significant threat to internet security. While existing machine learning-based malware classification methods can improve accuracy, they often requi... 详细信息
来源: 评论
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage Cost KV-Separated LSM Store with SmartSSD-based GC Offloading  23
AegonKV: A High Bandwidth, Low Tail Latency, and Low Storage...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Duan, Zhuohui Feng, Hao Liu, Haikun Liao, Xiaofei Jin, Hai Li, Bangyu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ... 详细信息
来源: 评论