咨询与建议

限定检索结果

文献类型

  • 4,445 篇 会议
  • 2,996 篇 期刊文献
  • 70 册 图书

馆藏范围

  • 7,511 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,771 篇 工学
    • 3,671 篇 计算机科学与技术...
    • 3,008 篇 软件工程
    • 1,063 篇 信息与通信工程
    • 589 篇 控制科学与工程
    • 583 篇 生物工程
    • 531 篇 电气工程
    • 363 篇 生物医学工程(可授...
    • 334 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 271 篇 光学工程
    • 200 篇 动力工程及工程热...
    • 182 篇 化学工程与技术
    • 169 篇 网络空间安全
    • 167 篇 安全科学与工程
    • 163 篇 交通运输工程
    • 161 篇 仪器科学与技术
  • 2,262 篇 理学
    • 1,317 篇 数学
    • 638 篇 生物学
    • 435 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 194 篇 化学
  • 1,460 篇 管理学
    • 860 篇 管理科学与工程(可...
    • 645 篇 图书情报与档案管...
    • 338 篇 工商管理
  • 360 篇 医学
    • 303 篇 临床医学
    • 271 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 157 篇 药学(可授医学、理...
  • 204 篇 法学
    • 162 篇 社会学
  • 135 篇 经济学
  • 96 篇 教育学
  • 85 篇 农学
  • 21 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 212 篇 training
  • 203 篇 feature extracti...
  • 200 篇 deep learning
  • 178 篇 computational mo...
  • 166 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 145 篇 accuracy
  • 140 篇 computer science
  • 123 篇 software enginee...
  • 119 篇 predictive model...
  • 118 篇 data models
  • 117 篇 optimization
  • 104 篇 data mining
  • 104 篇 cloud computing
  • 100 篇 internet of thin...
  • 91 篇 security
  • 86 篇 artificial intel...
  • 85 篇 neural networks
  • 84 篇 clustering algor...

机构

  • 1,214 篇 college of compu...
  • 156 篇 college of compu...
  • 136 篇 shenzhen univers...
  • 113 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 96 篇 college of compu...
  • 92 篇 software college...
  • 90 篇 state key labora...
  • 80 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 college of softw...
  • 55 篇 college of compu...
  • 53 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 60 篇 shen linlin
  • 48 篇 jingsha he
  • 46 篇 leung victor c.m...
  • 37 篇 zhong ming
  • 36 篇 laizhong cui
  • 35 篇 he jingsha
  • 33 篇 jianqiang li
  • 32 篇 zhen ji
  • 32 篇 leung victor c. ...
  • 31 篇 victor c. m. leu...
  • 31 篇 lin qiuzhen
  • 30 篇 kaishun wu
  • 30 篇 wang xingwei
  • 29 篇 zhou jie
  • 27 篇 ismail leila
  • 26 篇 niyato dusit
  • 26 篇 yan li
  • 25 篇 huang min
  • 24 篇 wu kaishun
  • 23 篇 gao can

语言

  • 7,094 篇 英文
  • 291 篇 其他
  • 132 篇 中文
  • 4 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=College of Computer Science and Software Engineering"
7511 条 记 录,以下是151-160 订阅
排序:
A Joint Secure Mechanism of Multi-task Learning For A UAV Team Under FDI Attacks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zeng, Rongfei Jiang, Chenyang Wang, Xingwei Li, Baochun Northeastern University Software College Shenyang China AliCloud Hangzhou China Northeastern University Department of Computer Science and Engineering Shenyang China University of Toronto Department of Electrical and Computer Engineering Canada
A UAV team shows tremendous potential for various mobile scenarios. However, some evidences reveal their vulnerability to False Data Injection (FDI) attacks, which can significantly jeopardize the flight security or e... 详细信息
来源: 评论
FLEKE: Federated Locate-then-Edit Knowledge Editing
arXiv
收藏 引用
arXiv 2025年
作者: Zhao, Zongkai Xu, Guozeng Li, Xiuhua Wei, Kaiwen Zhong, Jiang School of Big Data & Software Engineering Chongqing University China College of Computer Science Chongqing University China
Locate-then-Edit Knowledge Editing (LEKE) is a key technique for updating large language models (LLMs) without full retraining. However, existing methods assume a single-user setting and become inefficient in real-wor... 详细信息
来源: 评论
WQuatNet: Wide range quaternion-based head pose estimation
收藏 引用
Journal of King Saud University - computer and Information sciences 2025年 第3期37卷 1-14页
作者: Algabri, Redhwan Shin, Hyunsoo Abdu, Ahmed Bae, Ji-Hun Lee, Sungon Dept. of Computer Science & Engineering College of AI Convergence Sejong University Seoul 05006 South Korea Research Institute of Engineering and Technology Hanyang University Ansan 15588 South Korea School of Software Northwestern Polytechnical University Xi’an 710072 China Department of Robotics Hanyang University Ansan 15588 South Korea
Head pose estimation (HPE) is a critical task for numerous applications ranging from human-computer interaction, healthcare, and robotics, to surveillance. Most existing methods employ Euler angles as a representation... 详细信息
来源: 评论
Novel Load Balancing Mechanism Based on Deep Reinforcement Learning for Human-Centric Applications in Data Centers
收藏 引用
Human-centric Computing and Information sciences 2025年 15卷
作者: Hu, Jinbin Luo, Wangqing He, Yi Rao, Shuying Alqahtani, Fayez Tolba, Amr Zhu, Min Wang, Jin School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China Software Engineering Department College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia Department of Computer Science Community College King Saud University Riyadh Saudi Arabia College of Information Science and Technology Zhejiang Shuren University Zhejiang China
Human-computer interaction applications require ultra-low response delays to achieve a better user experience. With the rapid growth of data center network (DCN) topologies, the number of equal-cost paths has increase... 详细信息
来源: 评论
EBCFL: An Efficient BlockChain-based Federated Learning Framework for Internet of Vehicles
收藏 引用
IEEE Network 2025年
作者: Cao, Dun Liao, Yonghui Alqahtani, Fayez Wang, Jin School of Computer and Communication Engineering Changsha University of Science and Technology China Changsha University of Science and Technology China Software Engineering Department College of Computer and Information Sciences King Saud University Saudi Arabia Hunan University of Science and Technology China
Federated Learning (FL) can train a shared model while protecting vehicle data privacy, which has significant advantages in improving driving safety and efficiency. However, there are still many challenges in applying... 详细信息
来源: 评论
An Overview of Security Threats, Attack Detection and Defense for Large-Scale Multi-Agent Systems (LSMAS) in Internet of Things (IoT)
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 70-81页
作者: Cai, Jijing Wen, Long Feng, Hailin Fang, Kai Chen, Junxin Wei, Wei Wang, Wei Zhejiang A and F University College of Mathematics and Computer Science Hangzhou311300 China Macau University of Science and Technology School of Innovation Engineering Macau999078 China Dalian University of Technology School of Software Dalian116621 China Xi'an University of Technology School of Computer Science and Engineering Xi'an710048 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Shenzhen518172 China
With the global advancement of the Internet of Things (IoT), large-scale multi-agent systems (LSMAS) technology has been increasingly adopted across various industries. Despite the widespread use of IoT, vulnerabiliti... 详细信息
来源: 评论
A Survey on Anomaly Detection with Few-Shot Learning  8th
A Survey on Anomaly Detection with Few-Shot Learning
收藏 引用
8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Chen, Junyang Wang, Changbo Hong, Yifan Mi, Rui Zhang, Liang-Jie Wu, Yirui Wang, Huan Zhou, Yue College of Computer Science and Software Engineering Shenzhen University Shenzhen China Center of Health Administration and Development Studies Hubei University of Medicine Shiyan China College of Informatics Huazhong Agricultural University Wuhan China Hohai University Nanjing China Department of Obstetrics and Gynecology Tianyou Hospital Affiliated to Wuhan University of Science and Technology Wuhan China
The primary objective of anomaly detection is to identify abnormal or unusual patterns within a dataset, where the number of normal samples typically exceeds that of abnormal samples. Due to the scarcity of labeled ab... 详细信息
来源: 评论
Multi-perception large kernel convnet for efficient image super-resolution
收藏 引用
四川大学学报(自然科学版) 2025年 第1期62卷 67-78页
作者: MIAO Xuan LI Zheng XU Wen-Zheng College of Computer Science(College of Software) Sichuan UniversityChengdu 610065China Tianfu Engineering-Oriented Numerical Simulation&Software Innovation Center Sichuan UniversityChengdu 610207China
Significant advancements have been achieved in the field of Single Image Super-Resolution(SISR)through the utilization of Convolutional Neural Networks(CNNs)to attain state-of-the-art *** efforts have explored the inc... 详细信息
来源: 评论
A Safety Evaluation Method and System for a High Core Wall Dam Based on Construction Data
Journal of Intelligent Construction
收藏 引用
Journal of Intelligent Construction 2025年 第1期3卷 1-14页
作者: Zicheng Wang Yingchi Mao Yaosheng Tan Qiaoling Shen Houlei Xu College of Computer Science and Software Engineering Hohai University Nanjing China PowerChina Kunming Engineering Corporation Limited Kunming China China Three Gorges Group Corporation Beijing China
In view of the complex operational conditions and dynamically changing safety risks associated with high core wall dams in the construction period, a comprehensive safety evaluation system for high core wall dams, whi... 详细信息
来源: 评论
An Efficient Intrusion Detection System using Advanced Machine Learning Techniques in SDN for Healthcare System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Asif, Muhammad Waseem Aqdus, Aqsa Amin, Rashid Chaudhry, Shehzad Ashraf Alsubaei, Faisal S. Iqbal, Sajid Department of Computer Science and IT The University of Lahore Lahore54000 Pakistan Department of Computer Science University of Chakwal Chakwal48800 Pakistan Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering and Architecture Nisantasi University Istanbul Turkey The Department of Cybersecurity College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges... 详细信息
来源: 评论