咨询与建议

限定检索结果

文献类型

  • 11,132 篇 会议
  • 6,163 篇 期刊文献
  • 148 册 图书

馆藏范围

  • 17,443 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,043 篇 工学
    • 8,566 篇 计算机科学与技术...
    • 7,034 篇 软件工程
    • 2,376 篇 信息与通信工程
    • 1,479 篇 控制科学与工程
    • 1,233 篇 生物工程
    • 998 篇 电气工程
    • 770 篇 机械工程
    • 763 篇 电子科学与技术(可...
    • 725 篇 生物医学工程(可授...
    • 622 篇 光学工程
    • 414 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 404 篇 化学工程与技术
    • 403 篇 安全科学与工程
    • 352 篇 交通运输工程
    • 330 篇 网络空间安全
  • 5,084 篇 理学
    • 2,894 篇 数学
    • 1,351 篇 生物学
    • 1,104 篇 物理学
    • 861 篇 统计学(可授理学、...
    • 612 篇 系统科学
    • 422 篇 化学
  • 3,406 篇 管理学
    • 2,105 篇 管理科学与工程(可...
    • 1,454 篇 图书情报与档案管...
    • 888 篇 工商管理
  • 698 篇 医学
    • 605 篇 临床医学
    • 539 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 530 篇 法学
    • 416 篇 社会学
  • 319 篇 经济学
    • 318 篇 应用经济学
  • 279 篇 教育学
  • 173 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 computer science
  • 440 篇 software enginee...
  • 398 篇 deep learning
  • 362 篇 computational mo...
  • 339 篇 feature extracti...
  • 285 篇 training
  • 273 篇 data mining
  • 239 篇 optimization
  • 234 篇 semantics
  • 224 篇 machine learning
  • 214 篇 accuracy
  • 208 篇 predictive model...
  • 206 篇 educational inst...
  • 204 篇 internet of thin...
  • 176 篇 neural networks
  • 175 篇 software
  • 174 篇 support vector m...
  • 170 篇 wireless sensor ...
  • 164 篇 computer archite...
  • 162 篇 image segmentati...

机构

  • 475 篇 college of compu...
  • 343 篇 state key labora...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 164 篇 school of softwa...
  • 141 篇 school of comput...
  • 126 篇 school of softwa...
  • 101 篇 school of comput...
  • 96 篇 college of compu...
  • 89 篇 school of comput...
  • 74 篇 school of softwa...
  • 73 篇 department of co...
  • 73 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of comput...
  • 65 篇 school of softwa...

作者

  • 38 篇 baowen xu
  • 38 篇 liu yang
  • 35 篇 sun xingming
  • 31 篇 jiacun wang
  • 31 篇 gao yang
  • 31 篇 qi lianyong
  • 30 篇 wang lei
  • 30 篇 wang chao
  • 29 篇 niyato dusit
  • 29 篇 shen furao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 25 篇 yang yang
  • 25 篇 zhao jian
  • 24 篇 jun zhang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 22 篇 zhou jie
  • 22 篇 xiang li
  • 22 篇 zhang zhao

语言

  • 16,221 篇 英文
  • 971 篇 其他
  • 278 篇 中文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17443 条 记 录,以下是4401-4410 订阅
排序:
OSFormer: One-Stage Camouflaged Instance Segmentation with Transformers
arXiv
收藏 引用
arXiv 2022年
作者: Pei, Jialun Cheng, Tianyang Fan, Deng-Ping Tang, He Chen, Chuanbo Van Gool, Luc School of Computer Science and Technology Hust China School of Software Engineering Hust China Computer Vision Lab Eth Zurich Switzerland
We present OSFormer, the first one-stage transformer framework for camouflaged instance segmentation (CIS). OSFormer is based on two key designs. First, we design a location-sensing transformer (LST) to obtain the loc... 详细信息
来源: 评论
A Method for Depth Camera Calibration Based on Motion Capture System
A Method for Depth Camera Calibration Based on Motion Captur...
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Jianchu Lin Ming Zhao Guojun Yin Haiping Zhou Toshboev Hudoyberdi Bo Jiang Faculty of Computer and Software Engineering Huaiyin Institue of Technology Huai’an China Faculty of Art and Design Huaiyin Institue of Technology Huai’an China Jiangsu Eazytec Co. LTD Yixin China
With the rapid development of 3D computer vision technology, depth cameras have been widely used. Depth camera calibration is mainly constrained by two aspects: (1) alignment of depth data, and (2) distortion in RGB i...
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
Computational Methods for Inferring and Reconstructing Gene Regulatory Networks
Computational Methods for Inferring and Reconstructing Gene ...
收藏 引用
作者: Xianglu Zhou Haiyang Jia College of Computer Science and Technology Jilin University College of Software Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of EducationJilin University
Gene regulatory network(GRN) describes dynamic and complex gene interactions that determine the functions of ***,understanding of GRNs has played a great role in cancer treatment,drug design,and gene ***,the GRN study... 详细信息
来源: 评论
GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Tao Cao, Xinwen Wang, Chao Qiao, Shaojie Xian, Xingping Yuan, Lin Cui, Canyixing Liu, Yanbing The School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China The School of Software Engineering Chengdu University of Information Technology Chengdu610225 China The School of Computer and Information Science Chongqing Normal University Chongqing401331 China Yunnan Key Laboratory of Software Engineering Yunnan650504 China
Graph Neural Networks (GNNs) have demonstrated significant application potential in various fields. However, GNNs are still vulnerable to adversarial attacks. Numerous adversarial defense methods on GNNs are proposed ... 详细信息
来源: 评论
Dual Antenna-Based Line Crossing Detection with UHF RFID
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Chen, Xingyu Wang, Xuan Xun, Kai Wang, Xia Liu, Jia Zhao, Zhihong Chen, Lijun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Engineering Jinling Institute of Technology Nanjing China Principal of Suzhou City College Suzhou China
Line crossing detection is to check whether people or objects go across a given barrier line, which is quite common and important in our daily life, such as the electronic article surveillance (EAS) checkpoint in a re... 详细信息
来源: 评论
A Self-play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario : Extended Abstract
A Self-play and Sentiment-Emphasized Comment Integration Fra...
收藏 引用
International Conference on Data engineering
作者: Huan Rong Victor S. Sheng Tinghuai Ma Yang Zhou Mznah Al-Rodhaan School of Artificial Intelligence Nanjing University of Information Science & Technology Nanjing China Department of Computer Science Texas Tech University Lubbock USA School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Department of Computer Science & Software Engineering Auburn University Auburn USA College of Computer & Information Sciences King Saud University Riyadh Kingdom of Saudi Arabia
Crowdsourcing is a sourcing model where individuals or organizations obtain goods and services from a large, relatively open and often rapidly evolving group of internet users. The most common way that crowdsourcing c...
来源: 评论
Enabling Generalized Zero-Shot Vulnerability Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Hu, Jinghao Guo, Jinsong Luo, Chen Hu, Yang Lanzinger, Matthias Li, Zhanshan Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education College of Software Changchun130012 China University College London Department of Computer Science United Kingdom Amazon United States United Kingdom University of Oxford Department of Computer Science United Kingdom Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education College of Computer Science and Technology Changchun130012 China
Regarding computer security, the growth of code vulnerability types presents a persistent challenge. These vulnerabilities, which may cause severe consequences, necessitate precise classification for effective mitigat... 详细信息
来源: 评论
Dual-Tower Model with Semantic Perception and Timespan-Coupled Hypergraph for Next Basket Recommendation
SSRN
收藏 引用
SSRN 2023年
作者: Zhou, Yangtao Chu, Hua Li, Qingshan Li, Jianan Zhang, Shuai Zhu, Feifei Hu, Jingzhao Wang, Luqiao Yang, Wanqiang School of Computer Science and Technology XiDian University Xi’an710071 China Intelligent Financial Software Engineering New Technology Joint Laboratory XiDian University Xi’an710071 China Shanghai Fairyland Software Corp. Ltd. Shanghai200233 China
Next Basket Recommendation (NBR) is an essential task within the realm of recommendation systems, dedicated to the anticipation of user preferences in the next moment based on the analysis of users’ historical sequen... 详细信息
来源: 评论
Quantum Privacy-Preserving Price E-Negotiation
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Li, Chun-Tang Zheng, Yu Xu, Yong Xu, Yin-Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China
Privacy-preserving price e-negotiation (3PEN) is an important topic of secure multi-party computation (SMC) in the electronic commerce field, and the key point of its security is to guarantee the privacy of seller’s ... 详细信息
来源: 评论