咨询与建议

限定检索结果

文献类型

  • 21,590 篇 会议
  • 9,721 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,613 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,646 篇 工学
    • 15,592 篇 计算机科学与技术...
    • 12,991 篇 软件工程
    • 3,986 篇 信息与通信工程
    • 2,419 篇 控制科学与工程
    • 2,071 篇 生物工程
    • 1,588 篇 电气工程
    • 1,315 篇 机械工程
    • 1,202 篇 生物医学工程(可授...
    • 1,172 篇 电子科学与技术(可...
    • 1,026 篇 光学工程
    • 703 篇 安全科学与工程
    • 662 篇 仪器科学与技术
    • 660 篇 化学工程与技术
    • 584 篇 交通运输工程
    • 575 篇 动力工程及工程热...
    • 552 篇 建筑学
    • 540 篇 网络空间安全
  • 8,761 篇 理学
    • 5,169 篇 数学
    • 2,280 篇 生物学
    • 1,676 篇 物理学
    • 1,499 篇 统计学(可授理学、...
    • 1,052 篇 系统科学
    • 670 篇 化学
  • 5,886 篇 管理学
    • 3,496 篇 管理科学与工程(可...
    • 2,644 篇 图书情报与档案管...
    • 1,586 篇 工商管理
  • 1,072 篇 医学
    • 924 篇 临床医学
    • 831 篇 基础医学(可授医学...
  • 890 篇 法学
    • 696 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 551 篇 教育学
  • 305 篇 农学
  • 104 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,454 篇 software enginee...
  • 635 篇 feature extracti...
  • 620 篇 training
  • 599 篇 computational mo...
  • 542 篇 deep learning
  • 535 篇 semantics
  • 475 篇 software
  • 416 篇 accuracy
  • 414 篇 application soft...
  • 413 篇 machine learning
  • 386 篇 data mining
  • 355 篇 computer archite...
  • 301 篇 support vector m...
  • 296 篇 internet of thin...
  • 277 篇 predictive model...
  • 276 篇 software systems
  • 259 篇 programming
  • 254 篇 data models
  • 253 篇 testing

机构

  • 1,223 篇 college of compu...
  • 356 篇 school of comput...
  • 273 篇 state key labora...
  • 220 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 172 篇 school of comput...
  • 156 篇 college of compu...
  • 152 篇 school of softwa...
  • 152 篇 school of comput...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 121 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 100 篇 school of softwa...
  • 94 篇 school of softwa...
  • 90 篇 school of comput...
  • 90 篇 department of co...

作者

  • 64 篇 liu yang
  • 57 篇 baowen xu
  • 54 篇 chen zhong
  • 52 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 40 篇 zhang lei
  • 39 篇 zhou jie
  • 39 篇 wang lei
  • 37 篇 zhen ji
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 33 篇 niyato dusit
  • 33 篇 hu ruimin
  • 33 篇 shen linlin
  • 32 篇 wang xingwei
  • 31 篇 kaishun wu

语言

  • 30,288 篇 英文
  • 930 篇 其他
  • 406 篇 中文
  • 10 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31613 条 记 录,以下是141-150 订阅
排序:
A Novel Lightweight IoT Intrusion Detection Model Based on Self-knowledge Distillation
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16912-16930页
作者: Wang, Zhendong Zhou, Renqiang Yang, Shuxin He, Daojing Chan, Sammy Jiangxi University of Science and Technology School of Information Engineering Ganzhou341000 China Nanchang University Software Engineering Institute Nanchang330047 China Harbin Institute of Technology School of Computer Science and Technology Shenzhen518055 China City University of Hong Kong Department of Electrical Engineering Hong Kong
The Internet of Things (IoT) environment contains many different types of devices, each with different functionalities, communication protocols, and security capabilities, which makes the IoT a complex challenge for s... 详细信息
来源: 评论
Joint-Wise Distributed Perception Graph Convolutional Network for Skeleton-Based Action Recognition
Joint-Wise Distributed Perception Graph Convolutional Networ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Qian Geng, Qiang Chen, Zhaoyu Li, Xin Li, Yangyang Li, Xing College of Computer Science and Software Engineering Hohai University China College of Information Science and Technology & Artificial Intelligence Nanjing Forestry University China
Recent studies have achieved remarkable results for action recognition with human skeletal data by utilizing graph convolutional models. Traditional approaches typically aggregate local spatio-temporal information bot... 详细信息
来源: 评论
Unpaired 3D Shape-to-Shape Translation via Gradient-Guided Triplane Diffusion
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 3376-3386页
作者: Zhang, Wenxiao Rahmani, Hossein Liu, Jun Hohai University College of Computer Science and Software Engineering Nanjing211100 China Lancaster University School of Computing and Communications LancasterLA1 4YW United Kingdom
Unpaired shape-to-shape translation refers to the task of transforming the geometry and semantics of an input shape into a new shape domain without paired training data. Previous methods utilize GAN-based architecture... 详细信息
来源: 评论
Deep domain adaptation by joint distribution neural matching
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Hong, Zijie Chen, Sentao Wen, Lisheng Yang, Xiaowei School of Software Engineering South China University of Technology Panyu District Guangdong Guangzhou510006 China Department of Computer Science Shantou University Daxue Road Guangdong Shantou515063 China
Domain adaptation aims to learn a prediction model that performs well in a target domain with unlabeled data by harnessing the distributionally different labeled data from a source domain. In this paper, we design a s... 详细信息
来源: 评论
Adaptive dynamic graphs for anomaly detection via inter- and intra-diffusion
收藏 引用
International Journal of Machine Learning and Cybernetics 2025年 1-22页
作者: Yuan, Ziqi Zhou, Haoyi Sun, Qingyun School of Computer Science and Engineering Beihang University Beijing China School of Software Beihang University Beijing China Zhongguancun Laboratory Beijing China
Commonly adopted anomaly detection frameworks in security systems typically rely on natural time cycles to construct a single dynamic graph, which enables the unified detection of diverse anomalies. However, different... 详细信息
来源: 评论
A Lightweight Authentication Protocol for RFID-Assisted Supply Chain Management System
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12845-12852页
作者: Tariq, Tayyaba Kuo, Wen-Chung Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J. F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia
In the evolving landscape of supply chain management, the integration of radio-frequency identification (RFID) technology has marked a significant milestone. This development has led to the emergence of a new system i... 详细信息
来源: 评论
SQUMUTH squirrel search based algorithm for high order mutant generation in mutation testing
收藏 引用
Discover Computing 2025年 第1期28卷 1-17页
作者: Mohanty, Subhasish Mishra, Jyotirmaya Mohapatra, Sudhir Kumar Bejo, Seifu Detso Deferisha, Aliazar Deneke Computer Science and Engineering GIET University Odisha Gunupur India Faculty of Engineering and Technology Sri Sri University Cuttack India Department of Software Engineering CCI Wolkite University Wolkite Ethiopia Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia
In today's software testing community, quality assessment remains critical, with mutation testing standing as a cornerstone technique for evaluating the effectiveness of test cases. This method involves introducin... 详细信息
来源: 评论
Enhancing Elderly Care with Socially Assistive Robots: A Holistic Framework for Mobility, Interaction, and Well-Being
收藏 引用
IEEE Access 2025年 13卷 82698-82717页
作者: Naseer, Fawad Nasir Khan, Muhammad Tahir, Muhammad Addas, Abdullah Kashif, Hasnain Beaconhouse International College Computer Science and Software Engineering Department Faisalabad38000 Pakistan Government College University Lahore Electrical Engineering Department Lahore54000 Pakistan Sir Syed University of Engineering and Technology Department of Software Engineering Karachi75300 Pakistan Prince Sattam Bin Abdulaziz University College of Engineering Department of Civil Engineering Al-Kharj11942 Saudi Arabia King Abdulaziz University Faculty of Architecture and Planning Landscape Architecture Department Jeddah21589 Saudi Arabia University of South Asia Department of Computer Science Lahore54000 Pakistan
The global elderly population is projected to double by 2050, creating challenges in mobility, social isolation, and cognitive decline. Socially Assistive Robots (SARs) offer a promising solution, yet gaps remain in i... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
Heterogeneous signcryption scheme from CLC to IBC for IIoT
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第4期18卷 1-14页
作者: Jin, Chunhua Qin, Wenyu Chen, Zhiwei Li, Chenhao Chen, Xiaobing Chen, Guanhua Zhang, Hao Weng, Jian Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai’an 233003 China The College of Information Science and Technology Jinan University Zhuhuai 510632 China
The Industrial Internet of Things (IIoT) involves the real-time gathering of information from physical devices and technologies for improved perception and management. To ensure information transmission security, an e... 详细信息
来源: 评论