咨询与建议

限定检索结果

文献类型

  • 5,058 篇 会议
  • 3,522 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,607 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,805 篇 工学
    • 4,524 篇 计算机科学与技术...
    • 3,701 篇 软件工程
    • 1,038 篇 信息与通信工程
    • 738 篇 控制科学与工程
    • 490 篇 电气工程
    • 470 篇 生物工程
    • 398 篇 机械工程
    • 374 篇 电子科学与技术(可...
    • 265 篇 光学工程
    • 250 篇 生物医学工程(可授...
    • 206 篇 化学工程与技术
    • 188 篇 仪器科学与技术
    • 171 篇 网络空间安全
    • 164 篇 动力工程及工程热...
    • 159 篇 安全科学与工程
    • 141 篇 建筑学
    • 139 篇 交通运输工程
    • 126 篇 土木工程
  • 2,694 篇 理学
    • 1,721 篇 数学
    • 536 篇 生物学
    • 510 篇 物理学
    • 469 篇 统计学(可授理学、...
    • 328 篇 系统科学
    • 214 篇 化学
  • 1,693 篇 管理学
    • 1,007 篇 管理科学与工程(可...
    • 753 篇 图书情报与档案管...
    • 309 篇 工商管理
  • 197 篇 医学
    • 159 篇 临床医学
    • 139 篇 基础医学(可授医学...
  • 191 篇 法学
    • 142 篇 社会学
  • 101 篇 经济学
  • 88 篇 教育学
  • 73 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 271 篇 laboratories
  • 208 篇 semantics
  • 172 篇 feature extracti...
  • 152 篇 computational mo...
  • 141 篇 data mining
  • 139 篇 software
  • 127 篇 software enginee...
  • 122 篇 training
  • 119 篇 algorithm design...
  • 117 篇 deep learning
  • 113 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 101 篇 cloud computing
  • 98 篇 accuracy
  • 93 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 costs

机构

  • 1,024 篇 state key labora...
  • 213 篇 state key labora...
  • 205 篇 department of co...
  • 204 篇 national key lab...
  • 172 篇 college of compu...
  • 168 篇 department of co...
  • 143 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 113 篇 school of inform...
  • 107 篇 state key labora...
  • 103 篇 college of compu...
  • 102 篇 guangxi key labo...
  • 97 篇 state key labora...
  • 94 篇 beijing key labo...
  • 92 篇 school of comput...
  • 90 篇 key laboratory o...
  • 90 篇 state key labora...
  • 88 篇 school of softwa...
  • 80 篇 shandong provinc...
  • 75 篇 national enginee...

作者

  • 66 篇 junping du
  • 65 篇 gao yang
  • 49 篇 yin baocai
  • 43 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 guihai chen
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 35 篇 shen linlin
  • 34 篇 yu huiqun
  • 33 篇 xu baowen
  • 31 篇 zhao jian
  • 31 篇 dou wanchun
  • 30 篇 shen furao
  • 30 篇 zhang hua
  • 28 篇 li xuandong
  • 28 篇 fan guisheng
  • 27 篇 liu yang

语言

  • 8,059 篇 英文
  • 293 篇 其他
  • 263 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8607 条 记 录,以下是181-190 订阅
排序:
Multi-view aggregation and multi-relation alignment for few-shot fine-grained recognition
收藏 引用
Expert Systems with Applications 2025年 283卷
作者: Chen, Jiale Xu, Feng Lyu, Xin Zeng, Tao Li, Xin Chen, Shangjing College of Computer Science and Software Engineering Hohai University Nanjing210024 China School of Computer Engineering Jiangsu Ocean University Lianyungang222005 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing211106 China
Few-shot fine-grained recognition (FS-FGR) aims to recognize nuanced categories with a limited number of labeled samples that were not encountered during training. Previous work has made significant progress by enhanc... 详细信息
来源: 评论
Knowledge-driven prototype refinement for few-shot fine-grained recognition
收藏 引用
Knowledge-Based Systems 2025年 318卷
作者: Chen, Jiale Xu, Feng Lyu, Xin Zeng, Tao Li, Xin Chen, Shangjing College of Computer Science and Software Engineering Hohai University Nanjing210024 China School of Computer Engineering Jiangsu Ocean University Lianyungang222005 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing211106 China
Advancements in deep learning have made image classification rival human performance with sufficient data and supervision. However, in domains with limited visual samples and high labeling costs, enabling AI systems t... 详细信息
来源: 评论
SGAN-RL: Fusion classification method for network intrusion detection based on data augmentation
收藏 引用
Journal of Intelligent and Fuzzy Systems 2025年 第4期48卷 569-583页
作者: Li, Lining Liu, Shuai Ren, Rong Wu, Lianhai Wang, Qian Zhang, Bing College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information Science and Engineering Yanshan University P.R. Qinhuangdao China The Key Laboratory of Software Engineering Yanshan University Qinhuangdao China
Although traditional research methods for intrusion detection can effectively prevent and mitigate issues such as data leaks to avoid severe consequences, existing intrusion detection technologies encounter limitation... 详细信息
来源: 评论
FedCGAT: A federated demand prediction method for shared bicycles based on contrastive graph attention mechanism
收藏 引用
Journal of Intelligent & Fuzzy Systems 2025年 第3期48卷 329-344页
作者: Zhu, Yichang Chen, Leiming Zhang, Weishan Zhang, Baoyu Dong, Cihao Qiu, Jiakang Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) China Shandong Data Open Innovative Application Laboratory Qingdao China School of Computing and Data Science Nanyang Technological University Singapore
Demand prediction for shared bicycles based on historical trip data helps bicycle management organizations plan the scheduling of bicycles. However, the current prediction methods have the following problems: (1) the ... 详细信息
来源: 评论
A Self-Evolving Framework for Multi-Agent Medical Consultation Based on Large Language Models
A Self-Evolving Framework for Multi-Agent Medical Consultati...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kai Chen Ji Qi Jing Huo Pinzhuo Tian Fanyu Meng Xi Yang Yang Gao State Key Laboratory for Novel Software Technology Nanjing University Nanjing China China Mobile (Suzhou) Software Technology Co. Ltd. Suzhou China School of Computer Engineering and Science Shanghai University Shanghai China China Mobile Research Institute Beijing China
We propose a multi-agent approach (SeM-Agents) based on large language models for medical consultations. This framework incorporates various doctor roles and auxiliary roles, with agents communicating through natural ... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yujun Zhang Yanqu Chen Jiakai Wang Jin Hu Renshuai Tao Xianglong Liu State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Hyperbolic Variational Graph Auto-Encoder for Next POI Recommendation  34
Hyperbolic Variational Graph Auto-Encoder for Next POI Recom...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Liu, Yuwen Qi, Lianyong Mao, Xingyuan Liu, Weiming Wang, Fan Xu, Xiaolong Zhang, Xuyun Dou, Wanchun Zhou, Xiaokang Beheshti, Amin Shandong Key Laboratory of Intelligent Oil and Gas Industrial Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao China College of Computer Science and Technology Zhejiang University Hangzhou China School of Software Nanjing University of Information Science and Technology Nanjing China School of Computing Macquarie University Sydney Australia Department of Computer Science and Technology Nanjing University Nanjing China Faculty of Business and Data Science Kansai University Osaka Japan
Next Point-of-Interest (POI) recommendation has become a crucial task in Location-Based Social Networks (LBSNs), which provide personalized recommendations by predicting the user’s next check-in locations. Commonly u... 详细信息
来源: 评论
WeakMedSAM: Weakly-Supervised Medical Image Segmentation via SAM with Sub-Class Exploration and Prompt Affinity Mining
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Haoran Huai, Lian Li, Wenbin Qi, Lei Jiang, Xingqun Shi, Yinghuan National Key Laboratory for Novel Software Technology The National Institute of Healthcare Data Science Nanjing University Jiangsu Nanjing China National Key Laboratory for Novel Software Technology National Institute of Healthcare Data Science Nanjing University Nanjing Drum Tower Hospital Jiangsu Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China Lab School of Computer Science and Engineering Southeast University Jiangsu Nanjing China BOE Technology Group Co. Ltd. Beijing China
We have witnessed remarkable progress in foundation models in vision tasks. Currently, several recent works have utilized the segmenting anything model (SAM) to boost the segmentation performance in medical images, wh... 详细信息
来源: 评论
Distributed Learning for Privacy-Preserving Semi-Supervised Video Anomaly Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Xie, Xiao-Dong Zhan, Yu-Wei Ma, Zhen-Xiang Liu, Hong-Mei Chen, Zhen-Duo Luo, Xin Xu, Xin-Shun Shandong University School of Software Jinan250101 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Innovation Institute Jinan250001 China Quan Cheng Laboratory Jinan250103 China
Semi-supervised video anomaly detection (SS-VAD) is essential for intelligent monitoring. However, collecting large-scale surveillance videos from various organizations raises significant privacy concerns regarding se... 详细信息
来源: 评论
Partially Hidden Policy Attribute-Based Multi-Keyword Searchable Encryption with Verification and Revocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Chen, Liqing Xu, Shiguo Jin, Chunhua Zhang, Hao Weng, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Jiangsu Huai'an223003 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE). However, most... 详细信息
来源: 评论