咨询与建议

限定检索结果

文献类型

  • 21,639 篇 会议
  • 9,606 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 31,547 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,523 篇 工学
    • 15,489 篇 计算机科学与技术...
    • 12,927 篇 软件工程
    • 3,926 篇 信息与通信工程
    • 2,369 篇 控制科学与工程
    • 2,073 篇 生物工程
    • 1,518 篇 电气工程
    • 1,302 篇 机械工程
    • 1,201 篇 生物医学工程(可授...
    • 1,154 篇 电子科学与技术(可...
    • 1,023 篇 光学工程
    • 693 篇 安全科学与工程
    • 661 篇 仪器科学与技术
    • 657 篇 化学工程与技术
    • 577 篇 动力工程及工程热...
    • 572 篇 交通运输工程
    • 556 篇 建筑学
  • 8,719 篇 理学
    • 5,149 篇 数学
    • 2,272 篇 生物学
    • 1,661 篇 物理学
    • 1,489 篇 统计学(可授理学、...
    • 1,050 篇 系统科学
    • 667 篇 化学
  • 5,861 篇 管理学
    • 3,484 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,586 篇 工商管理
  • 1,062 篇 医学
    • 919 篇 临床医学
    • 828 篇 基础医学(可授医学...
  • 889 篇 法学
    • 695 篇 社会学
  • 568 篇 经济学
    • 566 篇 应用经济学
  • 548 篇 教育学
    • 532 篇 教育学
  • 301 篇 农学
  • 101 篇 文学
  • 77 篇 军事学
  • 65 篇 艺术学
  • 12 篇 哲学
  • 5 篇 历史学

主题

  • 1,625 篇 computer science
  • 1,453 篇 software enginee...
  • 635 篇 feature extracti...
  • 628 篇 training
  • 601 篇 computational mo...
  • 542 篇 deep learning
  • 536 篇 semantics
  • 473 篇 software
  • 419 篇 accuracy
  • 416 篇 application soft...
  • 410 篇 machine learning
  • 386 篇 data mining
  • 357 篇 computer archite...
  • 302 篇 support vector m...
  • 294 篇 internet of thin...
  • 282 篇 predictive model...
  • 276 篇 software systems
  • 258 篇 programming
  • 254 篇 data models
  • 253 篇 testing

机构

  • 1,224 篇 college of compu...
  • 354 篇 school of comput...
  • 274 篇 state key labora...
  • 219 篇 school of comput...
  • 196 篇 department of co...
  • 190 篇 school of inform...
  • 170 篇 school of comput...
  • 156 篇 college of compu...
  • 152 篇 school of comput...
  • 151 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 122 篇 national enginee...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 104 篇 school of softwa...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 90 篇 department of co...

作者

  • 63 篇 liu yang
  • 57 篇 baowen xu
  • 53 篇 chen zhong
  • 51 篇 rajkumar buyya
  • 45 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 44 篇 wang ping
  • 38 篇 zhou jie
  • 38 篇 wang lei
  • 37 篇 zhen ji
  • 37 篇 zhang lei
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 34 篇 jun zhang
  • 34 篇 ruimin hu
  • 34 篇 hu ruimin
  • 33 篇 niyato dusit
  • 33 篇 wang xingwei
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 30,260 篇 英文
  • 893 篇 其他
  • 405 篇 中文
  • 11 篇 德文
  • 6 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Software Engineering"
31547 条 记 录,以下是541-550 订阅
排序:
No-Reference Image Quality Assessment via Multibranch Convolutional Neural Networks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第1期4卷 148-160页
作者: Pan, Zhaoqing Yuan, Feng Wang, Xu Xu, Long Shao, Xiao Kwong, Sam the School of Electrical and Information Engineering Tianjin University Tianjin300072 China the College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China the Key Laboratory of Solar Activity National Astronomical Observatories Chinese Academy of Sciences Beijing100012 China the School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China the Department of Computer Science City University of Hong Kong Hong Kong
No-reference image quality assessment (NR-IQA) aims to evaluate image quality without using the original reference images. Since the early NR-IQA methods based on distortion types were only applicable to specific dist... 详细信息
来源: 评论
DeepOCL:A deep neural network for Object Constraint Language generation from unrestricted nature language
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 250-263页
作者: Yilong Yang Yibo Liu Tianshu Bao Weiru Wang Nan Niu Yongfeng Yin School of Software Beihang UniversityBeijingChina College of Computer Science and Technology Guizhou UniversityGuiyangGuizhouChina Faculty of Information Technology Beijing University of TechnologyBeijingChina Department of Electrical Engineering and Computer Sciences University of CincinnatiCincinnatiOhioUSA
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn... 详细信息
来源: 评论
Deep-USIpred: identifying substrates of ubiquitin protein ligases E3 and deubiquitinases with pretrained protein embedding and bayesian neural network
Deep-USIpred: identifying substrates of ubiquitin protein li...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Jia Pan, Gui-Qing Li, Jian-Qiang Shang, Xue-Qun You, Zhu-Hong Huang, Yu-An Shenzhen University College of Computer Science and Software Engineering Shenzhen China Northwesterm Polytechnical University School of Computer Science Shaanxi China
Identifying the substrates of ubiquitin protein ligase (E3) and deubiquitinases (DUB) contributes to the discovery of potential therapeutic targets for diseases. However, experimental identification of E3/DUB-substrat... 详细信息
来源: 评论
A Low-complexity DOA Estimation Method for Nested Array via Root-MUSIC  24
A Low-complexity DOA Estimation Method for Nested Array via ...
收藏 引用
8th International Conference on Electronic Information Technology and computer engineering, EITCE 2024
作者: Huang, Juntan Xu, Shufang College of Electrical and Power Engineering Hohai University Jiangsu Nanjing China College of Computer Science and Software Engineering Hohai University Jiangsu Nanjing China
The nested array results in a hole-free difference coarray (DCA) after virtualization, enhancing the utilization of virtual array elements. MUSIC algorithm is an algorithm with high estimation accuracy, but the angle ... 详细信息
来源: 评论
Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4713-4733页
作者: Muhammad Bilal Sandile C.Showngwe Abid Bashir Yazeed Y.Ghadi College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Department of Mathematical Statistics and Actuarial Science Faculty of Natural and Agricultural SciencesUniversity of the Free StateBloemfontein9301South Africa Department of Computer Science National Textile UniversityFaisalabad38000Pakistan Department of Computer Science/Software Engineering Al Ain UniversityAbu DhabiUAE
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on... 详细信息
来源: 评论
Transferable Adversarial Facial Images for Privacy Protection  24
Transferable Adversarial Facial Images for Privacy Protectio...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Li, Minghui Wang, Jiangxiong Zhang, Hao Zhou, Ziqi Hu, Shengshan Pei, Xiaobing Software Engineering Huazhong University of Science and Technology Wuhan China Computer Science and Technology Huazhong University of Science and Technology Wuhan China Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
The success of deep face recognition (FR) systems has raised serious privacy concerns due to their ability to enable unauthorized tracking of users in the digital world. Previous studies proposed introducing impercept... 详细信息
来源: 评论
Arm PSA-Certified IoT Chip Security: A Case Study
收藏 引用
Tsinghua science and Technology 2023年 第2期28卷 244-257页
作者: Fei Chen Duming Luo Jianqiang Li Victor C.M.Leung Shiqi Li Junfeng Fan College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China Department of Electrical and Computer Engineering the University of British ColumbiaVancouverBC V6T 1Z4Canada Open Security Research Inc.Shenzhen 518000China
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the secu... 详细信息
来源: 评论
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on Data engineering and Communication Systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Density estimation-based method to determine sample size for random sample partition of big data
收藏 引用
Frontiers of computer science 2024年 第5期18卷 57-70页
作者: Yulin HE Jiaqi CHEN Jiaxing SHEN Philippe FOURNIER-VIGER Joshua Zhexue HUANG Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen 518107China College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China Department of Computing and Decision Sciences Lingnan UniversityHong Kong 999077China
Random sample partition(RSP)is a newly developed big data representation and management model to deal with big data approximate computation *** research and practical applications have confirmed that RSP is an efficie... 详细信息
来源: 评论