咨询与建议

限定检索结果

文献类型

  • 4,473 篇 会议
  • 2,973 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,764 篇 工学
    • 3,668 篇 计算机科学与技术...
    • 3,019 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 342 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,258 篇 理学
    • 1,323 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 210 篇 training
  • 205 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 148 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 101 篇 internet of thin...
  • 92 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 83 篇 artificial intel...

机构

  • 1,215 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 114 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 95 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 82 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 59 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 56 篇 college of softw...
  • 52 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 36 篇 he jingsha
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 25 篇 wu kaishun
  • 24 篇 yan li

语言

  • 7,073 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science&Software Engineering"
7513 条 记 录,以下是71-80 订阅
排序:
Dual-Enhanced High-Order Self-Learning Tensor Singular Value Decomposition for Robust Principal Component Analysis
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3564-3578页
作者: Xu, Honghui Fang, Chuangjie Wang, Renfang Chen, Shengyong Zheng, Jianwei Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Zhejiang Wanli University College of Big Data and Software Engineering Ningbo315200 China Tianjin University of Technology College of Computer Sciences and Engineering Tianjin300384 China
Recently, tensor singular value decomposition (TSVD) within high-order (Ho) algebra framework has shed new light on tensor robust principal component analysis (TRPCA) problem. However, HoTSVD lacks flexibility in hand... 详细信息
来源: 评论
Theoretical Analysis of an Adaptive Closeness Centrality-Based Algorithm for Dynamic Optimization of Transportation Networks
Theoretical Analysis of an Adaptive Closeness Centrality-Bas...
收藏 引用
2024 International Conference on engineering Management of Communication and Technology, EMCTECH 2024
作者: Mann, Michael Afeka - the Academic College of Engineering School of Software Engineering and Computer Science Tel Aviv Israel
Purpose: This paper presents a theoretical analysis of the DynaTrans algorithm, a novel approach for dynamic optimization of urban transportation networks. Design/methodology/approach: We introduce an Adaptive Closene... 详细信息
来源: 评论
DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management
DECAY: Dynamic Evaluation and Component Analysis for Enhanci...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Samuel Ginn College of Engineering Computer Science and Software Engineering United States
The Internet of Things (IoT) has gained widespread use across various domains, necessitating robust trust management for safeguarding data integrity and device reliability. Existing trust management algorithms often o... 详细信息
来源: 评论
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
收藏 引用
computer Modeling in engineering & sciences 2023年 第3期134卷 2137-2162页
作者: Lei Yan Maode Ma Dandan Li Xiaohong Huang Yan Ma Kun Xie School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijingChina College of Engineering QatarUniversityDohaQatar
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mech... 详细信息
来源: 评论
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Zero Trust+: A Trusted-based Zero Trust architecture for IoT...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Computer Science and Software Engineering Samuel Ginn College of Engineering United States
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a... 详细信息
来源: 评论
Optimized Autonomous Computing with Trusted Resilient Data Management for IoT Emerging Networks
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20778-20785页
作者: Shafique, Ayesha Cheng, Benmao Zhao, Bo Alwakid, Ghadah Naif Haq, Muhammad Inaam Ul Laboratory of Intelligent IOT Technology and Applications in Universities China Jouf University College of Computer and Information Sciences Department of Computer Science Al Jowf Sakaka72341 Saudi Arabia Quanzhou University of Information Engineering School of Computer Science and Software Engineering Quanzhou362000 China
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre... 详细信息
来源: 评论
A Novel Approach to Energy Optimization:Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2945-2970页
作者: Muhammad Salman Qamar Ihsan ulHaq Amil Daraz Atif MAlamri Salman A.AlQahtani Muhammad Fahad Munir Department of Electrical and Computer Engineering International Islamic UniversityIslamabad44000Pakistan School of Information Science and Engineering NingboTech UniversityNingbo315100China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia
In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing ***,the limited energy resources of Sensor Nodes(SNs)a... 详细信息
来源: 评论
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2287-2308页
作者: Shiyan Zhang Ruohan Xu Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing100876China College of Computer Science and Technology Tianjin UniversityTianjin300072China Institute of Artificial Intelligence Nankai UniversityTianjin300071China College of Information Science and Engineering East China University of Science and TechnologyShanghai200237China
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... 详细信息
来源: 评论
Algorithm for Identifying Critical Nodes in Networks Based on Spectral Clustering to Construct Hypergraphs  16
Algorithm for Identifying Critical Nodes in Networks Based o...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Li, Xujie Shao, Fei Li, Haotian College of Computer Science and Software Engineering Hohai University Nanjing China College of Information Science and Engineering Hohai University Nanjing China
Currently, the basis for critical nodes definition and identification lies in the representation learning of the network and the extraction of local and global features of the nodes. The effectiveness of the algorithm... 详细信息
来源: 评论
A Length-Adaptive Non-Dominated Sorting Genetic Algorithm for Bi-Objective High-Dimensional Feature Selection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第9期10卷 1834-1844页
作者: Yanlu Gong Junhai Zhou Quanwang Wu MengChu Zhou Junhao Wen College of Computer Science Chongqing UniversityChongqing 400044China IEEE Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA College of Big Data and Software Engineering Chongqing UniversityChongqing 400044China
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** c... 详细信息
来源: 评论