咨询与建议

限定检索结果

文献类型

  • 11,122 篇 会议
  • 6,127 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 17,398 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,999 篇 工学
    • 8,525 篇 计算机科学与技术...
    • 7,052 篇 软件工程
    • 2,358 篇 信息与通信工程
    • 1,432 篇 控制科学与工程
    • 1,232 篇 生物工程
    • 990 篇 电气工程
    • 768 篇 机械工程
    • 756 篇 电子科学与技术(可...
    • 725 篇 生物医学工程(可授...
    • 626 篇 光学工程
    • 413 篇 仪器科学与技术
    • 409 篇 动力工程及工程热...
    • 404 篇 化学工程与技术
    • 399 篇 安全科学与工程
    • 350 篇 交通运输工程
    • 324 篇 网络空间安全
  • 5,083 篇 理学
    • 2,895 篇 数学
    • 1,350 篇 生物学
    • 1,103 篇 物理学
    • 863 篇 统计学(可授理学、...
    • 611 篇 系统科学
    • 419 篇 化学
  • 3,404 篇 管理学
    • 2,103 篇 管理科学与工程(可...
    • 1,455 篇 图书情报与档案管...
    • 892 篇 工商管理
  • 693 篇 医学
    • 601 篇 临床医学
    • 537 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 530 篇 法学
    • 417 篇 社会学
  • 321 篇 经济学
    • 320 篇 应用经济学
  • 282 篇 教育学
  • 172 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 computer science
  • 440 篇 software enginee...
  • 390 篇 deep learning
  • 358 篇 computational mo...
  • 337 篇 feature extracti...
  • 280 篇 training
  • 273 篇 data mining
  • 237 篇 optimization
  • 231 篇 semantics
  • 221 篇 machine learning
  • 213 篇 accuracy
  • 209 篇 educational inst...
  • 209 篇 predictive model...
  • 203 篇 internet of thin...
  • 176 篇 neural networks
  • 176 篇 software
  • 174 篇 support vector m...
  • 167 篇 wireless sensor ...
  • 164 篇 computer archite...
  • 163 篇 image segmentati...

机构

  • 474 篇 college of compu...
  • 342 篇 state key labora...
  • 263 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 164 篇 school of softwa...
  • 141 篇 school of comput...
  • 126 篇 school of softwa...
  • 100 篇 school of comput...
  • 96 篇 college of compu...
  • 90 篇 school of comput...
  • 74 篇 school of softwa...
  • 73 篇 department of co...
  • 73 篇 department of co...
  • 72 篇 school of comput...
  • 70 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...
  • 65 篇 school of softwa...

作者

  • 39 篇 liu yang
  • 38 篇 baowen xu
  • 35 篇 sun xingming
  • 32 篇 gao yang
  • 31 篇 jiacun wang
  • 31 篇 qi lianyong
  • 30 篇 wang lei
  • 30 篇 shen furao
  • 29 篇 niyato dusit
  • 29 篇 wang chao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 26 篇 zhao jian
  • 24 篇 jun zhang
  • 24 篇 yang yang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 23 篇 zhang zhao
  • 22 篇 zhou jie
  • 22 篇 xiang li

语言

  • 16,224 篇 英文
  • 923 篇 其他
  • 275 篇 中文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17398 条 记 录,以下是4151-4160 订阅
排序:
Stargan-based camera style transfer for person retrieval
收藏 引用
International Journal of Information and Communication technology 2020年 第1期16卷 1-16页
作者: Wang, Yuanyuan Wang, Zhijian Jiang, Mingxin College of Computer and Software Engineering Huaiyin Institute of Technology Huaian China College of Computer and Information Hohai University Nanjing China College of Electronic Information Engineering Huaiyin Institute of Technology Huaian China
Person retrieval is also known as person re-identification (ReID) aiming to match person among cross cameras. Although the results of the person ReID have performed well in small datasets, the issues of the large numb... 详细信息
来源: 评论
Intelligent Phishing Url Detection: A Solution Based on Deep Learning Framework  18
Intelligent Phishing Url Detection: A Solution Based on Deep...
收藏 引用
18th International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2021
作者: Butt, Muhammad Hassaan Farooq Li, Jian Ping Saboor, Tehreem Arslan, Muhammad Butt, Muhammad Adnan Farooq University of Electronic Science and Technology of China School of Computer Science and Engineering China Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Pakistan COMSATS University Islamabad Pakistan Foundation University Department of Software Engineering Pakistan
On the Internet, every different day, kinds of attacks are deployed on innocent users. Among all, phishing is the most severe attack in which users lose their credentials or private information and their financial sta... 详细信息
来源: 评论
Bilevel Progressive Homography Estimation Via Correlative Region-Focused Transformer
SSRN
收藏 引用
SSRN 2023年
作者: Jia, Qi Zhang, Wei Feng, Xiaomei Liu, Yu Pu, Nan Sebe, Nicu DUT School of Software Technology DUT-RU International School of Information Science and Engineering Dalian University of Technology Dalian116620 China Department of Information Engineering and Computer Science University of Trento Trento38122 Italy
We propose a novel correlative region-focused transformer for accurate homography estimation by a bilevel progressive architecture. Existing methods typically consider the entire image features to establish correlatio... 详细信息
来源: 评论
A Hybrid Transformer Topology for Distribution Network Voltage Regulation
A Hybrid Transformer Topology for Distribution Network Volta...
收藏 引用
2021 IEEE Southern Power Electronics Conference, SPEC 2021
作者: Power, Rupert Mithani, Alykhan Madawala, Udaya Baguley, Craig The University of Auckland Department of Electrical Computer and Software Engineering Auckland New Zealand Auckland University of Technology Department of Engineering Computing and Mathematical Sciences Auckland New Zealand
Worldwide, distributed generation sources are being installed in increasing numbers within distribution networks. This poses new challenges for distribution network operators, including voltage fluctuations beyond per... 详细信息
来源: 评论
Fast Second-order Method for Neural Networks under Small Treewidth Setting
Fast Second-order Method for Neural Networks under Small Tre...
收藏 引用
IEEE International Conference on Big Data
作者: Xiaoyu Li Jiangxuan Long Zhao Song Tianyi Zhou Department of Computer Science Stevens Institute of Technology Hoboken NJ School of Software Engineering South China University of Technology Guangzhou China The Simons Institute for the Theory of Computing University of California Berkeley Berkeley CA Department of Computer Science University of Southern California Los Angeles CA
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order... 详细信息
来源: 评论
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2155-2171页
作者: Zhao, Ziming Li, Zhaoxuan Xie, Xiaofei Liu, Zhipeng Li, Tingting Yu, Jiongchi Zhang, Fan Chen, Binbin School of Software Technology Zhejiang University Ningbo315100 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center 311200 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province 310027 China Jiaxing Research Institute Zhejiang University 314000 China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou450001 China Singapore State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security UCAS Beijing100049 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore Advanced Digital Sciences Center Singapore138632 Singapore Singapore University of Technology and Design SingaporeB96049 Singapore
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva... 详细信息
来源: 评论
R2DET: EXPLORING RELAXED ROTATION EQUIVARIANCE IN 2D OBJECT DETECTION
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Zhiqiang Liu, Yingjie Dong, Hanlin Tang, Xuan Yang, Jian Jin, Bo Chen, Mingsong Wei, Xian Software Engineering Institute East China Normal University China School of Communication and Electronic Engineering East China Normal University China School of Geospatial Information Information Engineering University China School of Computer Science and Technology Tongji University China
Group Equivariant Convolution (GConv) empowers models to explore underlying symmetry in data, improving performance. However, real-world scenarios often deviate from ideal symmetric systems caused by physical permutat... 详细信息
来源: 评论
Wavelet-based Global-Local Interaction Network with Cross-Attention for Multi-View Diabetic Retinopathy Detection
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Yongting Lin, Yuxin Liu, Chengliang Luo, Xiaoling Dou, Xiaoyan Xu, Qihao Xu, Yong School of Computer Science and Technology Harbin Institute of Technology Shenzhen Shenzhen China Shenzhen Key Laboratory of Visual Object Detection and Recognition Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Ophthalmology Department Shenzhen Second People’s Hospital Shenzhen China
Multi-view diabetic retinopathy (DR) detection has recently emerged as a promising method to address the issue of incomplete lesions faced by single-view DR. However, it is still challenging due to the variable sizes ... 详细信息
来源: 评论
Categorical Data Clustering via Value Order Estimated Distance Metric Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yiqun Zhao, Mingjie Jia, Hong Lu, Yang Li, Mengke Cheung, Yiu-Ming School of Computer Science and Technology Guangdong University of Technology Guangzhou China College of Electronics and Information Engineering Shenzhen University Shenzhen China Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University China School of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer Science Hong Kong Baptist University Hong Kong
Categorical data composed of qualitative valued attributes are ubiquitous in machine learning tasks. Due to the lack of well-defined metric space, categorical data distributions are difficult to be intuitively underst... 详细信息
来源: 评论
Reliable Central Nervous System Tumor Differentiation on MRI Images with Deep Neural Networks and Conformal Prediction  1
Reliable Central Nervous System Tumor Differentiation on MRI...
收藏 引用
1st Workshop on Explainable Artificial Intelligence for the Medical Domain, EXPLIMED 2024
作者: Balderas, Luis de Castro, María Moreno Lastra, Miguel Martínez, Jose P. Pérez, Francisco J. Laínez, Antonio Arauzo-Azofra, Antonio Benítez, José M. School of Sciences Technology and Engineering’s Doctorates Department of Computer Science and Artificial Intelligence DiCITS DaSCI iMUDS University of Granada Granada18071 Spain Department of Software Engineering DiCITS DaSCI iMUDS University of Granada Granada18071 Spain Radiodiagnosis Service Hospital Universitario "Virgen de las Nieves" Granada Spain ibs.Granada: Instituto Biosanitario de Granada Granada Spain Rural Engineering Department DiCITS Lab University of Córdoba Córdoba14005 Spain
Central nervous system tumors, particularly gliomas, rank among the top 10 causes of cancer-related deaths worldwide. Thus, precise differentiation of these tumors is crucial for effective treatment, which can reduce ... 详细信息
来源: 评论