咨询与建议

限定检索结果

文献类型

  • 11,132 篇 会议
  • 6,163 篇 期刊文献
  • 148 册 图书

馆藏范围

  • 17,443 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,043 篇 工学
    • 8,566 篇 计算机科学与技术...
    • 7,034 篇 软件工程
    • 2,376 篇 信息与通信工程
    • 1,479 篇 控制科学与工程
    • 1,233 篇 生物工程
    • 998 篇 电气工程
    • 770 篇 机械工程
    • 763 篇 电子科学与技术(可...
    • 725 篇 生物医学工程(可授...
    • 622 篇 光学工程
    • 414 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 404 篇 化学工程与技术
    • 403 篇 安全科学与工程
    • 352 篇 交通运输工程
    • 330 篇 网络空间安全
  • 5,084 篇 理学
    • 2,894 篇 数学
    • 1,351 篇 生物学
    • 1,104 篇 物理学
    • 861 篇 统计学(可授理学、...
    • 612 篇 系统科学
    • 422 篇 化学
  • 3,406 篇 管理学
    • 2,105 篇 管理科学与工程(可...
    • 1,454 篇 图书情报与档案管...
    • 888 篇 工商管理
  • 698 篇 医学
    • 605 篇 临床医学
    • 539 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 530 篇 法学
    • 416 篇 社会学
  • 319 篇 经济学
    • 318 篇 应用经济学
  • 279 篇 教育学
  • 173 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 computer science
  • 440 篇 software enginee...
  • 398 篇 deep learning
  • 362 篇 computational mo...
  • 339 篇 feature extracti...
  • 285 篇 training
  • 273 篇 data mining
  • 239 篇 optimization
  • 234 篇 semantics
  • 224 篇 machine learning
  • 214 篇 accuracy
  • 208 篇 predictive model...
  • 206 篇 educational inst...
  • 204 篇 internet of thin...
  • 176 篇 neural networks
  • 175 篇 software
  • 174 篇 support vector m...
  • 170 篇 wireless sensor ...
  • 164 篇 computer archite...
  • 162 篇 image segmentati...

机构

  • 475 篇 college of compu...
  • 343 篇 state key labora...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 164 篇 school of softwa...
  • 141 篇 school of comput...
  • 126 篇 school of softwa...
  • 101 篇 school of comput...
  • 96 篇 college of compu...
  • 89 篇 school of comput...
  • 74 篇 school of softwa...
  • 73 篇 department of co...
  • 73 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of comput...
  • 65 篇 school of softwa...

作者

  • 38 篇 baowen xu
  • 38 篇 liu yang
  • 35 篇 sun xingming
  • 31 篇 jiacun wang
  • 31 篇 gao yang
  • 31 篇 qi lianyong
  • 30 篇 wang lei
  • 30 篇 wang chao
  • 29 篇 niyato dusit
  • 29 篇 shen furao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 25 篇 yang yang
  • 25 篇 zhao jian
  • 24 篇 jun zhang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 22 篇 zhou jie
  • 22 篇 xiang li
  • 22 篇 zhang zhao

语言

  • 16,221 篇 英文
  • 971 篇 其他
  • 278 篇 中文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17443 条 记 录,以下是4571-4580 订阅
排序:
DomainDrop: Suppressing Domain-Sensitive Channels for Domain Generalization
DomainDrop: Suppressing Domain-Sensitive Channels for Domain...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Jintao Guo Lei Qi Yinghuan Shi State Key Laboratory for Novel Software Technology Nanjing University National Institute of Healthcare Data Science Nanjing University School of Computer Science and Engineering Southeast University
Deep Neural Networks have exhibited considerable success in various visual tasks. However, when applied to unseen test datasets, state-of-the-art models often suffer performance degradation due to domain shifts. In th...
来源: 评论
An Improved Quantum Private Set Intersection Protocol Based on Hadamard Gates
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Li, Wen-Bo Wang, Hai-Bin School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China
Recently, Liu and Yin (Int. J. Theor. Phys. 60, 2074-2083 (2021)) proposed a two-party private set intersection protocol based on quantum Fourier transform. We find the participant can deduce the other party’s privat... 详细信息
来源: 评论
Towards Gradient Equalization and Feature Diversification for Long-Tailed Multi-Label Image Recognition
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3489-3500页
作者: Chen, Zhao-Min Cui, Quan Zhang, Xiaoqin Deng, Ruoxi Xia, Chaoqun Lu, Shijian Nanjing University National Key Laboratory for Novel Software Technology Nanjing210093 China Waseda University Graduate School of Information Production and Systems Fukuoka169-8050 Japan Wenzhou University College of Computer Science and Artificial Intelligence Wenzhou325060 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore
Multi-label image recognition with convolutional neural networks has achieved remarkable progress in the past few years. However, most existing multi-label image recognition methods suffer from the long-tailed data di... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou Chengsheng Yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 评论
UT-GAN: A Novel Unpaired Textual-Attention Generative Adversarial Network for Low-Light Text Image Enhancement
UT-GAN: A Novel Unpaired Textual-Attention Generative Advers...
收藏 引用
IEEE International Conference on Image Processing
作者: Minglong Xue Zhengyang He Yanyi He Peiqi Xie Xin Feng School of Computer Science and Engineering Chongqing University of Technology Chongqing P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing P.R. China
How to balance lighting and texture details to achieve the desired visual effect remains the bottleneck of existing low-light image enhancement methods. In this paper, we propose a novel Unpaired Textual-attention Gen...
来源: 评论
DomainAdaptor: A Novel Approach to Test-time Adaptation
DomainAdaptor: A Novel Approach to Test-time Adaptation
收藏 引用
International Conference on computer Vision (ICCV)
作者: Jian Zhang Lei Qi Yinghuan Shi Yang Gao State Key Laboratory for Novel Software Technology Nanjing University National Institute of Healthcare Data Science Nanjing University School of Computer Science and Engineering Southeast University
To deal with the domain shift between training and test samples, current methods have primarily focused on learning generalizable features during training and ignore the specificity of unseen samples that are also cri...
来源: 评论
Integrating Exact Simulation into Sweeping for Datapath Combinational Equivalence Checking
Integrating Exact Simulation into Sweeping for Datapath Comb...
收藏 引用
IEEE International Conference on computer-Aided Design
作者: Zhihan Chen Xindi Zhang Yuhang Qian Qiang Xu Shaowei Cai School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science & Engineering The Chinese University of Hong Kong
In the application of IC design for microprocessors, there are often demands for optimizing the implementation of datapath circuits, on which various arithmetic operations are performed. Combinational equivalence chec...
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage Systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
Recent Advances in Science and engineering technology (ICRASET), International Conference on
作者: P.S. Ramesh I. Sudha J. Jagannathan Rajkumar Pandiarajan A. Ponmalar Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai Tamilnadu India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences SIMATS University Chennai Tamil Nadu India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Katpadi Vellore India Department of Information and Technology School of Computing Kalasalingam Academy Of Research and Education Krishnankoil Virudhunagar India R.M.K. Engineering College Chennai Tamilnadu India
With a steady increase in the adoption of cloud storage systems, the client’s data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the features o... 详细信息
来源: 评论
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data
Ant: An Efficient Lossless Compression Algorithm for IoT Tim...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Junhui Li Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Science and Engineering University of Bristol Bristol U.K
In various applications in Internet of Things like industrial monitoring, large amounts of floating-point time series data are generated at an unprecedented rate. Efficient compression algorithms can effectively reduc...
来源: 评论
Generative Adversarial Networks for Anomaly Detection: A Systematic Literature Review
Generative Adversarial Networks for Anomaly Detection: A Sys...
收藏 引用
International Conference on Computing, Mathematics and engineering Technologies (iCoMET)
作者: Shah Noor Sibghat Ullah Bazai Muhammad Imran Ghafoor Shah Marjan Saira Akram Fatima Ali Dept. Computer Science Balochistan University of Information Technology Engineering and Management Sciences (BUITEMS) Quetta Pakistan Dept. of Computer Engineering Balochistan University of Information Technology Engineering and Management Sciences (BUITEMS) Quetta Pakistan Dept. of Electrical Engineering Superior University Pakistan Television Corporation Lahore Pakistan Dept. of Software Engineering Balochistan University of Information Technology Engineering and Management Sciences (BUITEMS) Quetta Pakistan
In numerous research areas, anomaly identification is a major problem. Identifying and properly classifying data as anomalous is a challenging task that is resolved in various manners over the years. Different approac... 详细信息
来源: 评论