咨询与建议

限定检索结果

文献类型

  • 5,083 篇 会议
  • 3,486 篇 期刊文献
  • 28 册 图书

馆藏范围

  • 8,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,765 篇 工学
    • 4,487 篇 计算机科学与技术...
    • 3,674 篇 软件工程
    • 1,021 篇 信息与通信工程
    • 722 篇 控制科学与工程
    • 469 篇 电气工程
    • 469 篇 生物工程
    • 397 篇 机械工程
    • 365 篇 电子科学与技术(可...
    • 266 篇 光学工程
    • 251 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 167 篇 动力工程及工程热...
    • 162 篇 网络空间安全
    • 153 篇 安全科学与工程
    • 142 篇 建筑学
    • 134 篇 交通运输工程
    • 127 篇 土木工程
  • 2,677 篇 理学
    • 1,713 篇 数学
    • 530 篇 生物学
    • 510 篇 物理学
    • 463 篇 统计学(可授理学、...
    • 326 篇 系统科学
    • 211 篇 化学
  • 1,680 篇 管理学
    • 1,002 篇 管理科学与工程(可...
    • 741 篇 图书情报与档案管...
    • 309 篇 工商管理
  • 195 篇 医学
    • 160 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 194 篇 法学
    • 144 篇 社会学
  • 101 篇 经济学
  • 86 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 271 篇 laboratories
  • 207 篇 semantics
  • 167 篇 feature extracti...
  • 150 篇 computational mo...
  • 141 篇 data mining
  • 139 篇 software
  • 127 篇 software enginee...
  • 126 篇 training
  • 119 篇 algorithm design...
  • 118 篇 deep learning
  • 115 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 cloud computing
  • 95 篇 accuracy
  • 93 篇 software testing
  • 91 篇 testing
  • 90 篇 application soft...
  • 88 篇 costs

机构

  • 1,027 篇 state key labora...
  • 211 篇 state key labora...
  • 205 篇 department of co...
  • 204 篇 national key lab...
  • 170 篇 college of compu...
  • 169 篇 department of co...
  • 142 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 114 篇 school of inform...
  • 108 篇 state key labora...
  • 101 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 beijing key labo...
  • 92 篇 school of comput...
  • 90 篇 key laboratory o...
  • 88 篇 state key labora...
  • 87 篇 school of softwa...
  • 79 篇 shandong provinc...
  • 74 篇 national enginee...

作者

  • 66 篇 junping du
  • 65 篇 gao yang
  • 48 篇 yin baocai
  • 42 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 guihai chen
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 35 篇 shen linlin
  • 33 篇 xu baowen
  • 32 篇 yu huiqun
  • 32 篇 dou wanchun
  • 31 篇 zhao jian
  • 30 篇 shen furao
  • 30 篇 zhang hua
  • 29 篇 li wu-jun
  • 28 篇 fan guisheng
  • 27 篇 liu yang

语言

  • 8,056 篇 英文
  • 286 篇 其他
  • 263 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8597 条 记 录,以下是241-250 订阅
排序:
Self‐training maximum classifier discrepancy for EEG emotion recognition
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第4期8卷 1480-1491页
作者: Xu Zhang Dengbing Huang Hanyu Li Youjia Zhang Ying Xia Jinzhuo Liu School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqingChina Key Laboratory of Tourism Multisource Data Perception and Decision Ministry of Culture and TourismChongqingChina School of Electrical and Computer Engineering Inha UniversityIncheonSouth Korea School of Software Yunnan UniversityYunnanChina
Even with an unprecedented breakthrough of deep learning in electroencephalography(EEG),collecting adequate labelled samples is a critical problem due to laborious and time‐consuming *** study proposed to solve the l... 详细信息
来源: 评论
Less Traces Are All It Takes: Efficient Side-Channel Analysis on AES
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2024年 第6期44卷 2080-2092页
作者: Xiao, Zhiyuan Wang, Chen Shen, Jian Wu, Q. M. Jonathan He, Debiao Zhejiang Sci-Tech University School of Information Science and Engineering School of Cyber Science and Technology the Zhejiang Provincial Key Laboratory of Digital Fashion and Data Governance Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Hangzhou310018 China University of Windsor Department of Electrical and Computer Engineering WindsorON Canada Wuhan University State Key Laboratory of Software Engineering Computer School Wuhan430072 China
In cryptography, side-channel analysis (SCA) is a technique used to recover cryptographic keys by examining the physical leakages that occur during the operation of cryptographic devices. Recent advancements in Deep L... 详细信息
来源: 评论
Generalized Image Embedding for Multi-Domain Image Retrieval  26
Generalized Image Embedding for Multi-Domain Image Retrieval
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Xiao, Boao Wu, Siyuan He, Xin Dou, Wanchun Nanjing University State Key Laboratory for Novel Software Technology China Nanjing University of Posts and Telecommunications School of Computer Science China
Image embedding, being a fundamental task in computer vision, plays a crucial role in various downstream tasks such as image retrieval. Widely adopted in e-commerce and social media collaboration, image retrieval bene... 详细信息
来源: 评论
Sequence generation model of traditional Chinese medicine  12
Sequence generation model of traditional Chinese medicine
收藏 引用
12th International Conference on Information technology in Medicine and Education, ITME 2022
作者: Duan, Chengzhi Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
The application of artificial intelligence in the field of traditional Chinese medicine is more and more extensive, and the related research is also more and more. Increasingly, the electronic processing of TCM textua... 详细信息
来源: 评论
Honeytoken-Detector: A Symbolic Execution-Based Honeypot Token Detection Tool  26
Honeytoken-Detector: A Symbolic Execution-Based Honeypot Tok...
收藏 引用
26th ACIS International Winter Conference on software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Liu, Yi Cai, Lizhi School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Testing & Evaluating Shanghai China
Smart contracts have emerged as one of the most successful applications in the blockchain domain, playing a significant role in various blockchain ecosystems. Inspired by smart contracts, a multitude of cryptographic ... 详细信息
来源: 评论
GridDroid--An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface
收藏 引用
Journal of computer Science & technology 2022年 第1期37卷 147-181页
作者: Jun Ma Qing-Wei Sun Chang Xu Xian-Ping Tao State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Huatai Securities Co. Ltd.Nanjing 210019China
Repackaging brings serious threats to Android *** birthmark techniques are typically applied to detect repackaged *** based on apps'runtime graphical user interfaces(GUI)are effective,especially for obfuscated or ... 详细信息
来源: 评论
General Category Network: Handwritten Mathematical Expression Recognition with Coarse-Grained Recognition Task  48
General Category Network: Handwritten Mathematical Expressio...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Zhang, Xinyu Ying, Han Tao, Ye Xing, Youlu Feng, Guihuan Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China Nanjing University Software Institute Nanjing210023 China Nanjing University School of Computer Science and Technology Nanjing210023 China
Handwritten Mathematical Expression Recognition (HMER) is an important task in pattern recognition. It is a challenging task due to symbols resembling each other in appearance("z/2", "B/β") and th... 详细信息
来源: 评论
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 58-73页
作者: Qingsong Zhao Lei Shu Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li the College of Artificial Intelligence Nanjing Agricultural UniversityNanjing 210031 the State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023 the State Key Laboratory of Cryptology Beijing 100878China IEEE the School of Engineering University of LincolnLincoln LN67TSUK the Artificial Intelligence and Digital Science Research Center Technology Innovation InstituteMasdar City 9639UAE the College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... 详细信息
来源: 评论
CPDG: A Contrastive Pre-Training Method for Dynamic Graph Neural Networks  40
CPDG: A Contrastive Pre-Training Method for Dynamic Graph Ne...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Bei, Yuanchen Xu, Hao Zhou, Sheng Chi, Huixuan Wang, Haishuai Zhang, Mengdi Li, Zhao Bu, Jiajun Meituan China College of Computer Science and Technology Zhejiang Provincial Key Laboratory of Service Robot Zhejiang University China School of Software Technology Zhejiang University China Institute of Computing Technology Chinese Academy of Science China
Dynamic graph data mining has gained popularity in recent years due to the rich information contained in dynamic graphs and their widespread use in the real world. Despite the advances in dynamic graph neural networks... 详细信息
来源: 评论
Monitorability for Runtime Verification  23rd
Monitorability for Runtime Verification
收藏 引用
23rd International Conference on Runtime Verification, RV 2023
作者: Havelund, Klaud Peled, Doron Laboratory for Reliable Software Jet Propulsion Laboratory California Institute of Technology Pasadena United States Department of Computer Science Bar Ilan University Ramat Gan Israel
Runtime verification (RV) facilitates the formal analysis of execution traces. In particular, it permits monitoring the execution of a system and checking it against a temporal specification. Online RV observes, at an... 详细信息
来源: 评论