咨询与建议

限定检索结果

文献类型

  • 521 篇 会议
  • 503 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 671 篇 工学
    • 498 篇 计算机科学与技术...
    • 419 篇 软件工程
    • 143 篇 信息与通信工程
    • 97 篇 电气工程
    • 89 篇 控制科学与工程
    • 88 篇 生物工程
    • 64 篇 化学工程与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 电子科学与技术(可...
    • 45 篇 机械工程
    • 31 篇 光学工程
    • 29 篇 安全科学与工程
    • 28 篇 动力工程及工程热...
    • 28 篇 交通运输工程
    • 19 篇 材料科学与工程(可...
  • 343 篇 理学
    • 194 篇 数学
    • 98 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 54 篇 物理学
    • 38 篇 化学
    • 33 篇 系统科学
  • 203 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 62 篇 医学
    • 48 篇 临床医学
    • 45 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
    • 23 篇 药学(可授医学、理...
  • 27 篇 法学
    • 19 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 农学
  • 6 篇 教育学
  • 3 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 39 篇 deep learning
  • 36 篇 accuracy
  • 34 篇 training
  • 32 篇 data models
  • 29 篇 computational mo...
  • 25 篇 semantics
  • 25 篇 cloud computing
  • 22 篇 predictive model...
  • 21 篇 big data
  • 19 篇 federated learni...
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 18 篇 machine learning
  • 17 篇 internet of thin...
  • 17 篇 visualization
  • 16 篇 security
  • 15 篇 conferences
  • 14 篇 image segmentati...
  • 14 篇 convolution

机构

  • 136 篇 college of compu...
  • 77 篇 national enginee...
  • 39 篇 school of big da...
  • 38 篇 school of big da...
  • 37 篇 college of compu...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 college of compu...
  • 23 篇 big data institu...
  • 22 篇 college of compu...
  • 21 篇 college of data ...
  • 19 篇 college of compu...
  • 18 篇 shenzhen univers...
  • 17 篇 state key labora...
  • 16 篇 school of data a...
  • 16 篇 shenzhen univers...
  • 15 篇 college of big d...
  • 14 篇 college of big d...
  • 14 篇 college of scien...
  • 13 篇 shenzhen researc...

作者

  • 20 篇 shen linlin
  • 19 篇 li jianqiang
  • 18 篇 huang joshua zhe...
  • 18 篇 lan li
  • 15 篇 victor c. m. leu...
  • 14 篇 li leixiao
  • 13 篇 jianqiang li
  • 13 篇 leung victor c.m...
  • 13 篇 xiaofei wang
  • 12 篇 niyato dusit
  • 11 篇 xiuhua li
  • 10 篇 gao can
  • 10 篇 jie chen
  • 9 篇 shi qingjiang
  • 9 篇 li xiuhua
  • 9 篇 zhong ming
  • 9 篇 jian-tao zhou
  • 9 篇 leung victor c. ...
  • 9 篇 gao jing
  • 9 篇 lyu shen-huan

语言

  • 940 篇 英文
  • 81 篇 其他
  • 12 篇 中文
检索条件"机构=College of Data Science and Software Engineering"
1029 条 记 录,以下是91-100 订阅
排序:
Ultra-short-term wind power prediction based on hybrid denoising with improved CEEMD decomposition
收藏 引用
Renewable Energy 2025年 251卷
作者: Gao, JiaJing Xing, HongMei Wang, YongSheng Liu, GuangChen Cheng, Bo Zhang, DeLong College of Data Science and Application Inner Mongolia University of Technology Hohhot010080 China Software Service Engineering Technology Research Center Inner Mongolia Autonomous Region Hohhot010080 China College of Electric Power Inner Mongolia University of Technology Hohhot010080 China Information Construction and Management Center Inner Mongolia University of Technology Hohhot010080 China Meteorological Data Centre Inner Mongolia Autonomous Region Hohhot010051 China
Ultra-short-term wind power prediction plays a crucial role in grid stability and energy management. To tackle the complexity of wind power data, this paper presents a Grey Relation Analysis-Improved Complete Ensemble... 详细信息
来源: 评论
GPT-Based Wasm Instruction Analysis for Program Language Processing  5th
GPT-Based Wasm Instruction Analysis for Program Language Pro...
收藏 引用
5th International Conference on Emerging Information Security and Applications, EISA 2024
作者: Deng, Liangjun Zhong, Qi Lei, Hang Qiu, Yao Chen, Jingxue School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Faculty of Data Science City University of Macau China Ningbo Polytechnic College Zhejiang Ningbo315800 China School of Mathematical and Physical Sciences University of Technology Sydney SydneyNSW2007 Australia
Capturing the logical structure of programming languages poses a significant challenge for program analysis. Given the complex syntax rules, subjective code vulnerabilities, irrelevant statements, code annotations, an... 详细信息
来源: 评论
Secure Audio Steganography with Reversible data Hiding and Encryption
Secure Audio Steganography with Reversible Data Hiding and E...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: P. S. Arthy K. Sanjai Kumar S. Vinson Joshua G. Sahaana R. Kalpana D. David Neels Ponkumar S. Siamala Devi S. Jeya Lakshmi Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai Tamil Nadu India Department of Artificial Intelligence and Data Science Dhanalakshmi College of Engineering Chennai Tamil Nadu India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering (Cyber Security) Sri Eshwar College of Engineering Coimbatore Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
This research study enhances secure data transmission by embedding sensitive information within audio files. Using Python for the frontend and PHP with MySQL as the backend, this approach employs reversible data hidin... 详细信息
来源: 评论
TPE for JPEG images with Dynamic M-ary Decomposition and Adaptive Threshold Constraints
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Ma, Yakun Chai, Xiuli Long, Guoqiang Gan, Zhihua Zhang, Yushu Henan University School of Artificial Intelligence Henan Engineering Research Center for Industrial Internet of Things Zhengzhou450046 China Henan University School of Software Intelligent Data Processing Engineering Research Center of Henan Province Institute of Intelligent Network System Kaifeng475004 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China
Traditional JPEG image encryption that prioritizes solely confidentiality fails to account for the pressing usability requirements of cloud-based environments, thus boosting the boom in thumbnail-preserving encryption... 详细信息
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
Constraint Boundary Wandering Framework: Enhancing Constrained Optimization with Deep Neural Networks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Wu, Shuang Chen, Shixiang Shen, Li Zhang, Lefei Tao, Dacheng Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan430072 China University of Science and Technology of China Key Laboratory of the Ministry of Education for Mathematical Foundations and Applications of Digital Technology School of Mathematical Sciences China Shenzhen Campus of Sun Yat-sen University School of Cyber Science and Technology Shenzhen518107 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
Constrained optimization problems are pervasive in various fields, and while conventional techniques offer solutions, they often struggle with scalability. Leveraging the power of deep neural networks (DNNs) in optimi... 详细信息
来源: 评论
Dual consistent constraint via disentangled consistency and complementarity for multi-view clustering
收藏 引用
Neurocomputing 2025年 641卷
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
A segmentation method for oral CBCT image based on Segment Anything Model and semi-supervised teacher-student model
收藏 引用
Medical Physics 2025年 2025 May 7页
作者: Gan, Jianhong Kang, Runqing Deng, Xun He, Tongli Yu, Nie Gan, Yuling Wei, Peiyang Chen, Xiangyi Peng, Xiaoli Li, Zhibin College of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Key Laboratory of Software Automatic Generation and Intelligent Service Chengdu University of Information Technology Chengdu China Key Laboratory of Meteorological Software China Meteorological Administration Chengdu China Dazhou Key Laboratory of Government Data Security Sichuan University of Arts and Science Dazhou China College of Applied Mathematics Chengdu University of Information Technology Chengdu China The Fifth Research Institute of Telecommunications Technology Chengdu China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Xinjiang Technical Institute of Physics &Chemistry Chinese Academy of Sciences Urumqi China College of Instrumentation and Electrical Engineering Jilin University Changchun China
Background: Accurate segmentation of oral cone beam computed tomography (CBCT) images is essential for research and clinical diagnosis. However, irregular and blurred tooth boundaries in CBCT images complicate the lab... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving data Aggregation Scheme in V2G Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Cybersecurity Threat Detection using Machine Learning on Network Traffic
Cybersecurity Threat Detection using Machine Learning on Net...
收藏 引用
International Conference on ent Computing and Control Systems (ICICCS)
作者: R. Rithi N. Nithya A. Akila R. Saravanakumar M. Vargheese S. Jeya Lakshmi Master of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Artificial Intelligence and Data Science R.M.K College of Engineering and Technology Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India Department of Computer Science and Engineering PSN College of Engineering and Technology Tirunelveli Tamil Nadu India
Web phishing is a prevalent online attack in which victims are tricked into revealing their personal information by visiting fraudulent websites. Phishers often use URL shortening tools to disguise malicious links, ma... 详细信息
来源: 评论