咨询与建议

限定检索结果

文献类型

  • 4,563 篇 会议
  • 3,048 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,678 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,892 篇 工学
    • 3,766 篇 计算机科学与技术...
    • 3,056 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,276 篇 理学
    • 1,329 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 92 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,003 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science&Software Engineering"
7678 条 记 录,以下是191-200 订阅
排序:
A real-time data acquisition method of industrial production line based on OPC technology
收藏 引用
International Journal of Internet Manufacturing and Services 2023年 第1期9卷 16-31页
作者: Xu, Airong He, Panpan Meng, Kaiyuan Xue, Jijun Wang, Chao College of Mechanical Engineering Xi’an Shiyou University Xi’an710065 China Software Research Institute College of Computer Science Xi’an Shiyou University Xi’an710065 China
In view of the low timeliness and accuracy of traditional production line data acquisition methods, this study proposed a real-time data acquisition method of industrial production line based on OPC technology. Consid... 详细信息
来源: 评论
Unpaired 3D Shape-to-Shape Translation via Gradient-Guided Triplane Diffusion
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 3376-3386页
作者: Zhang, Wenxiao Rahmani, Hossein Liu, Jun Hohai University College of Computer Science and Software Engineering Nanjing211100 China Lancaster University School of Computing and Communications LancasterLA1 4YW United Kingdom
Unpaired shape-to-shape translation refers to the task of transforming the geometry and semantics of an input shape into a new shape domain without paired training data. Previous methods utilize GAN-based architecture... 详细信息
来源: 评论
Ubiquitous WiFi and Acoustic Sensing:Principles,Technologies,and Applications
收藏 引用
Journal of computer science & Technology 2023年 第1期38卷 25-63页
作者: 黄佳玲 王云舒 邹永攀 伍楷舜 倪明选 The IoT Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060 China The Hong Kong University of Science and Technology(Guangzhou) Guangzhou 511455China The Hong Kong University of Science and Technology Hong KongChina
With the increasing pervasiveness of mobile devices such as smartphones,smart TVs,and wearables,smart sensing,transforming the physical world into digital information based on various sensing medias,has drawn research... 详细信息
来源: 评论
A Novel Secure Scan Design Based on Delayed Physical Unclonable Function
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6605-6622页
作者: Weizheng Wang Xingxing Gong Xiangqi Wang Gwang-jun Kim Fayez Alqahtani Amr Tolba School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China College of Information Science and Engineering Hunan Women’s UniversityChangsha410138China College of Mathematics and Computational Science Hunan First Normal UniversityChangsha410138China Department of Computer Engineering Chonnam National UniversityGwangju61186Korea Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be ri... 详细信息
来源: 评论
Improve Robustness of Safe Reinforcement Learning Against Adversarial Attacks  4
Improve Robustness of Safe Reinforcement Learning Against Ad...
收藏 引用
4th International Conference on Electronic Information engineering and computer science, EIECS 2024
作者: Wang, Xiaoyan Zhang, Yujuan Huang, Lan College of Computer Science and Technology Jilin University Changchun China Jilin University Software Engineering Changchun China
Models trained with adversarial attack can be significantly improved stability and performance when faced with new uncertain environment. In this paper, we propose the robust training framework based on Wasserstein SA... 详细信息
来源: 评论
A Novel Data Mining Framework for Discovering Association Rules in Multivariate Time Series  7
A Novel Data Mining Framework for Discovering Association Ru...
收藏 引用
7th International Conference on Advanced Algorithms and Control engineering, ICAACE 2024
作者: Wang, Shengwei Lyu, Jianhua Zhang, Baili School Of Software Southeast University Nanjing China College Of Computer Science And Engineering Southeast University Nanjing China
As a significant field within data mining, association rule mining plays a pivotal role in unveiling relationships between items within a dataset. Existing approaches in multivariate time series (MTS) association rule... 详细信息
来源: 评论
ALQ: An Efficient Active Learning Recommendation Algorithm  6
ALQ: An Efficient Active Learning Recommendation Algorithm
收藏 引用
6th IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2024
作者: Song, Ao Lei, Zhou Chen, Shengbo Shanghai University College of Computer Engineering and Science Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
With the rapid development of the Internet, the problem of information overload is becoming more and more serious, which makes it difficult for users to choose the content they are interested in from a large number of... 详细信息
来源: 评论
Anomaly Detection in Spatial Information Networks: A Security Knowledge Graph-based Approach
Anomaly Detection in Spatial Information Networks: A Securit...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Tan, Yayue Zhang, Yaqi Liu, Hui Tang, Yongqing College of Computer and Information Science School of Software Southwest University Chongqing China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies.... 详细信息
来源: 评论
Group Signature with Time-Bound Keys for Secure E-health Record Sharing
Group Signature with Time-Bound Keys for Secure E-health Rec...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lu, Junze Hu, Chunqiang Ruan, Conghao Cai, Bin Xiang, Tao Chongqing University School of Big Data & Software Engineering China Chongqing University College of Computer Science China
With the advent of various mobile IoT devices, a large amount of e-health record (EHR) data has been generated. This data has great potential to improve medical research. However, there are many challenges regarding t... 详细信息
来源: 评论
SFPL: Improving CRS via Prompt Learning based Semantic Fusion Module  4
SFPL: Improving CRS via Prompt Learning based Semantic Fusio...
收藏 引用
4th IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Song, Ao Lei, Zhou Chen, Shengbo Shanghai University College of Computer Engineering and Science Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
With the popularity of the Internet and the massive increase of content production, users are faced with massive information and content, and it is often difficult to accurately and efficiently find the content that m... 详细信息
来源: 评论