咨询与建议

限定检索结果

文献类型

  • 7,665 篇 会议
  • 5,017 篇 期刊文献
  • 82 册 图书

馆藏范围

  • 12,764 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,174 篇 工学
    • 5,658 篇 计算机科学与技术...
    • 4,689 篇 软件工程
    • 1,697 篇 信息与通信工程
    • 1,452 篇 控制科学与工程
    • 1,013 篇 电气工程
    • 898 篇 生物工程
    • 724 篇 电子科学与技术(可...
    • 709 篇 机械工程
    • 642 篇 生物医学工程(可授...
    • 494 篇 光学工程
    • 376 篇 动力工程及工程热...
    • 362 篇 仪器科学与技术
    • 362 篇 化学工程与技术
    • 291 篇 安全科学与工程
    • 275 篇 交通运输工程
    • 260 篇 网络空间安全
  • 4,113 篇 理学
    • 2,279 篇 数学
    • 988 篇 生物学
    • 920 篇 物理学
    • 682 篇 统计学(可授理学、...
    • 546 篇 系统科学
    • 351 篇 化学
  • 2,293 篇 管理学
    • 1,408 篇 管理科学与工程(可...
    • 937 篇 图书情报与档案管...
    • 528 篇 工商管理
  • 664 篇 医学
    • 559 篇 临床医学
    • 472 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 245 篇 公共卫生与预防医...
  • 313 篇 法学
    • 256 篇 社会学
  • 194 篇 经济学
  • 159 篇 教育学
  • 135 篇 农学
  • 32 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 297 篇 feature extracti...
  • 290 篇 deep learning
  • 280 篇 educational inst...
  • 275 篇 computational mo...
  • 211 篇 training
  • 201 篇 optimization
  • 199 篇 semantics
  • 184 篇 machine learning
  • 163 篇 predictive model...
  • 162 篇 computer science
  • 155 篇 software enginee...
  • 148 篇 data mining
  • 146 篇 neural networks
  • 144 篇 accuracy
  • 140 篇 image segmentati...
  • 127 篇 internet of thin...
  • 123 篇 support vector m...
  • 116 篇 wireless sensor ...
  • 105 篇 real-time system...
  • 104 篇 visualization

机构

  • 1,260 篇 college of compu...
  • 238 篇 college of compu...
  • 171 篇 college of compu...
  • 118 篇 college of contr...
  • 109 篇 college of compu...
  • 108 篇 college of compu...
  • 106 篇 software college...
  • 102 篇 college of compu...
  • 89 篇 college of compu...
  • 81 篇 college of compu...
  • 77 篇 college of compu...
  • 76 篇 state key labora...
  • 75 篇 school of comput...
  • 67 篇 shenzhen univers...
  • 62 篇 college of compu...
  • 60 篇 college of softw...
  • 57 篇 the college of c...
  • 54 篇 college of infor...
  • 54 篇 school of inform...
  • 53 篇 fujian provincia...

作者

  • 39 篇 chen zengqiang
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 niyato dusit
  • 35 篇 lin qiuzhen
  • 33 篇 zhen ji
  • 33 篇 zhong ming
  • 32 篇 victor c. m. leu...
  • 32 篇 zengqiang chen
  • 30 篇 zhou jie
  • 29 篇 kaishun wu
  • 26 篇 liu yang
  • 25 篇 li xin
  • 25 篇 wang hui
  • 25 篇 shen linlin
  • 24 篇 el-sayed m.el-ke...
  • 23 篇 wang jian
  • 22 篇 liu jun
  • 22 篇 zuoyong li
  • 22 篇 ismail leila

语言

  • 11,775 篇 英文
  • 732 篇 其他
  • 257 篇 中文
  • 18 篇 日文
  • 3 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=College of Computer and Control Engineering College of Software"
12764 条 记 录,以下是391-400 订阅
排序:
Arm PSA-Certified IoT Chip Security: A Case Study
收藏 引用
Tsinghua Science and Technology 2023年 第2期28卷 244-257页
作者: Fei Chen Duming Luo Jianqiang Li Victor C.M.Leung Shiqi Li Junfeng Fan College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China Department of Electrical and Computer Engineering the University of British ColumbiaVancouverBC V6T 1Z4Canada Open Security Research Inc.Shenzhen 518000China
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the secu... 详细信息
来源: 评论
Research on abnormal behavior recognition of the elderly based on spatial-temporal feature fusion  22
Research on abnormal behavior recognition of the elderly bas...
收藏 引用
3rd International Symposium on Artificial Intelligence for Medical Sciences, ISAIMS 2022
作者: He, Yulong Huang, Hanming Wu, Yezheng Zhu, Guanglei College of Computer Science and Engineering College of Software Guangxi Normal University China
With the deepening of the aging society, the health care of the elderly and disabled people has been widely concerned by society. It is of great practical significance to monitor the physical conditions and abnormal b... 详细信息
来源: 评论
A Hybrid Deep Fused Learning Approach to Segregate Infectious Diseases
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4239-4259页
作者: Jawad Rasheed Shtwai Alsubai Department of Software Engineering Nisantasi UniversityIstanbul34398Turkey Dapartment of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam Bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia
Humankind is facing another deadliest pandemic of all times in history,caused by *** from this challenging pandemic,World Health Organization(WHO)considers tuberculosis(TB)as a preeminent infectious disease due to its... 详细信息
来源: 评论
MemSpate: Memory Usage Protocol Guided Fuzzing  1
收藏 引用
25th International Conference on Formal engineering Methods, ICFEM 2024
作者: Fu, Zhiyuan Jiang, Jiacheng Wen, Cheng Xu, Zhiwu Qin, Shengchao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangzhou Institute of Technology Xidian University Xi’An China
Memory safety vulnerabilities are high-risk and common vulnerabilities in software testing, often leading to a series of system errors. Fuzz testing is widely recognized as one of the most effective methods for detect... 详细信息
来源: 评论
Enhancing Code Generation for Dataflow Programming: Fine-Tuning Large Language Models with the DFCPP Dataset  22
Enhancing Code Generation for Dataflow Programming: Fine-Tun...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Luo, Qiuming Ma, Xi Wei, Xuan Shenzhen University College of Computer Science and Software Engineering Shenzhen China Tianjin Yuyi Kaihong Intelligent Technology Tianjin China
In recent years, large language models (LLMs) based on the Transformer architecture have demonstrated excellent performance in code generation, but there have been fewer studies on data flow languages. This study prop... 详细信息
来源: 评论
Efficient Dual-Confounding Eliminating for Weakly-supervised Temporal Action Localization  24
Efficient Dual-Confounding Eliminating for Weakly-supervised...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Li, Ao Liu, Huijun Sheng, Jinrong Chen, Zhongming Ge, Yongxin School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China
Weakly-supervised Temporal Action Localization (WTAL) following a localization-by-classification paradigm has achieved significant results, yet still grapples with confounding arising from ambiguous snippets. Previous... 详细信息
来源: 评论
Multimodal Biometric Recognition Neural Networks with Branch Attention Mechanisms  2
Multimodal Biometric Recognition Neural Networks with Branch...
收藏 引用
2nd Asia Conference on Advanced Robotics, Automation, and control engineering, ARACE 2023
作者: Liujun Mingjin, Chen Guoyong Zengxi, Huang Xihua University College of Computer and Software Engineering Chengdu China Sichuan Police College Criminal Science and Technology Department Chengdu China
It is generally known that compared to unimodal systems, the multi-modal biometric systems can improve recognition accuracy by utilizing the complementary features of multiple biometric. Nevertheless, the modalities u... 详细信息
来源: 评论
DDN: Dual-domain Dynamic Normalization for Non-stationary Time Series Forecasting  38
DDN: Dual-domain Dynamic Normalization for Non-stationary Ti...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Dai, Tao Wu, Beiliang Liu, Peiyuan Li, Naiqi Yuerong, Xue Xia, Shu-Tao Zhu, Zexuan College of Computer Science and Software Engineering Shenzhen University China Tsinghua Shenzhen International Graduate School Tsinghua University China
Deep neural networks (DNNs) have recently achieved remarkable advancements in time series forecasting (TSF) due to their powerful ability of sequence dependence modeling. To date, existing DNN-based TSF methods still ...
来源: 评论
Towards 360∘ image compression for machines via modulating pixel significance
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90271-90288页
作者: Zheng, Silin Shen, Xuelin Zhang, Qiudan Chen, Zhuo Yang, Wenhan Wang, Xu College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen51800 China Guangdong Shenzhen51800 China Peng Cheng Laboratory Guangdong Shenzhen51800 China
The rapid growth of computer vision-based applications, including smart cities and autonomous driving, has created a pressing demand for efficient 360∘ image compression and computer vision analytics. In most circums...
来源: 评论
Video2Reward: Generating Reward Function from Videos for Legged Robot Behavior Learning  27
Video2Reward: Generating Reward Function from Videos for Leg...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zeng, Runhao Zhou, Dingjie Liang, Qiwei Liu, Junlin Li, Hui Huang, Changxin Li, Jianqiang Hu, Xiping Sun, Fuchun Artificial Intelligence Research Institute Shenzhen MSU-BIT University China College of Mechatronics and Control Engineering Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science and Technology Tsinghua University China
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func... 详细信息
来源: 评论