咨询与建议

限定检索结果

文献类型

  • 10,992 篇 会议
  • 6,162 篇 期刊文献
  • 148 册 图书

馆藏范围

  • 17,302 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,954 篇 工学
    • 8,500 篇 计算机科学与技术...
    • 7,027 篇 软件工程
    • 2,374 篇 信息与通信工程
    • 1,427 篇 控制科学与工程
    • 1,225 篇 生物工程
    • 1,030 篇 电气工程
    • 770 篇 机械工程
    • 758 篇 电子科学与技术(可...
    • 718 篇 生物医学工程(可授...
    • 616 篇 光学工程
    • 411 篇 仪器科学与技术
    • 406 篇 动力工程及工程热...
    • 405 篇 安全科学与工程
    • 403 篇 化学工程与技术
    • 347 篇 交通运输工程
    • 332 篇 网络空间安全
  • 5,086 篇 理学
    • 2,897 篇 数学
    • 1,350 篇 生物学
    • 1,107 篇 物理学
    • 866 篇 统计学(可授理学、...
    • 612 篇 系统科学
    • 420 篇 化学
  • 3,398 篇 管理学
    • 2,100 篇 管理科学与工程(可...
    • 1,456 篇 图书情报与档案管...
    • 886 篇 工商管理
  • 693 篇 医学
    • 600 篇 临床医学
    • 532 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 525 篇 法学
    • 411 篇 社会学
  • 322 篇 经济学
    • 321 篇 应用经济学
  • 281 篇 教育学
  • 173 篇 农学
  • 55 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 472 篇 computer science
  • 435 篇 software enginee...
  • 387 篇 deep learning
  • 356 篇 computational mo...
  • 334 篇 feature extracti...
  • 271 篇 data mining
  • 270 篇 training
  • 233 篇 semantics
  • 229 篇 optimization
  • 227 篇 machine learning
  • 211 篇 educational inst...
  • 206 篇 internet of thin...
  • 200 篇 accuracy
  • 196 篇 predictive model...
  • 174 篇 software
  • 172 篇 neural networks
  • 171 篇 wireless sensor ...
  • 170 篇 support vector m...
  • 162 篇 computer archite...
  • 159 篇 image segmentati...

机构

  • 452 篇 college of compu...
  • 339 篇 state key labora...
  • 261 篇 school of comput...
  • 259 篇 school of inform...
  • 220 篇 school of comput...
  • 164 篇 school of softwa...
  • 139 篇 school of comput...
  • 127 篇 school of softwa...
  • 100 篇 school of comput...
  • 98 篇 college of compu...
  • 89 篇 school of comput...
  • 73 篇 department of co...
  • 72 篇 school of comput...
  • 70 篇 department of co...
  • 68 篇 department of co...
  • 66 篇 school of softwa...
  • 66 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...
  • 63 篇 school of comput...

作者

  • 38 篇 baowen xu
  • 37 篇 liu yang
  • 35 篇 sun xingming
  • 32 篇 gao yang
  • 31 篇 jiacun wang
  • 30 篇 wang lei
  • 30 篇 qi lianyong
  • 29 篇 niyato dusit
  • 29 篇 shen furao
  • 28 篇 wang chao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 26 篇 zheng zibin
  • 26 篇 zhao jian
  • 25 篇 yang yang
  • 24 篇 jun zhang
  • 23 篇 rehman attique u...
  • 22 篇 xiang li
  • 22 篇 tao dacheng
  • 21 篇 zhi-hui wang

语言

  • 16,426 篇 英文
  • 627 篇 其他
  • 265 篇 中文
  • 3 篇 日文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17302 条 记 录,以下是61-70 订阅
排序:
Author profiling from Romanized Urdu text using transfer learning models
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4455-4470页
作者: Ali, Abid khan, Muhammad Sohail Khan, Muhammad Amin Khan, Sajid Ullah Khan, Faheem Department of Computer Software Engineering University of Engineering & Technology Mardan KPK Mardan23200 Pakistan Islamabad H-11/4 Islamabad44000 Pakistan Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia Department of Computer Engineering Gachon University Seongnam-Si Korea Republic of
This research concentrates on author profiling using transfer learning models for classifying age and gender. The investigation encompassed a diverse set of transfer learning techniques, including Roberta, BERT, ALBER... 详细信息
来源: 评论
Research On Fatigue Driving Detection Based On Deep Learning
收藏 引用
engineering Letters 2025年 第2期33卷 348-356页
作者: Zhou, Huinan Dai, Hong University of Science and Technology Liaoning Liaoning AnshanCO 114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning AnshanCO 114051 China
Fatigue driving is one of the main causes of traffic accidents. Effective fatigue driving detection technology can reduce traffic accidents caused by fatigue driving. Traditional fatigue driving detection methods usua... 详细信息
来源: 评论
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2771-2787页
作者: Guo, Bobiao Ping, Ping Xu, Feng Hohai University College of Computer Science and Software Engineering Nanjing210098 China Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources Nanjing210098 China Jiangsu Ocean University School of Computer Engineering Lianyungang222005 China
To avoid the pixel modification traces left by steganography from being detected by passive steganalysis, and to prevent the hidden data from being destroyed by active steganalysis attacks, Coverless Image Steganograp... 详细信息
来源: 评论
An Efficient Dialogue Policy Agent with Model-Based Causal Reinforcement Learning  31
An Efficient Dialogue Policy Agent with Model-Based Causal R...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Xu, Kai Wang, Zhenyu Zhao, Yangyang Fang, Bopeng School of Software Engineering South China University of Technology Guangdong China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Dialogue policy trains an agent to select dialogue actions frequently implemented via deep reinforcement learning (DRL). The model-based reinforcement methods built a world model to generate simulated data to alleviat... 详细信息
来源: 评论
Training Latency Minimization for Model-Splitting Allowed Federated Edge Learning
收藏 引用
IEEE Transactions on Network Science and engineering 2025年 第3期12卷 2081-2092页
作者: Wen, Yao Zhang, Guopeng Wang, Kezhi Yang, Kun China University of Mining and Technology School of Computer Science and Technology Xuzhou221116 China Brunel University London Department of Computer Science MiddlesexUB8 3PH United Kingdom Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Nanjing University Suzhou Campus Suzhou215163 China
To alleviate the shortage of computing power faced by clients in training deep neural networks (DNNs) using federated learning (FL), we leverage the edge computing and split learning to propose a model-splitting allow... 详细信息
来源: 评论
Runtime Verification of Neural-Symbolic Systems  10th
Runtime Verification of Neural-Symbolic Systems
收藏 引用
10th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2024
作者: Deng, Shaojun Liu, Wanwei Zhang, Miaomiao College of Computer Science and Technology National University of Defense Technology Changsha China School of Software Engineering Tongji Uniersity Shanghai China
Neural-symbolic systems (NSSs), which are typically cyber-physical systems integrated with artificial intelligence modules, have received much attention in both academic and industrial fields. However, thorough verifi... 详细信息
来源: 评论
Dual-encoder model for typhoon path prediction with multiscale spatiotemporal data fusion
收藏 引用
Earth Science Informatics 2025年 第2期18卷 1-17页
作者: Ren, Shuxia Zhong, Ruikun Guo, Zewei Zhang, Zining School of Software Engineering Tiangong University Tianjin 300387 China School of Computer Science and Technology Tiangong University Tianjin 300387 China
Extreme weather caused by typhoons poses a severe threat to human life safety and socio-economic development, making accurate prediction of typhoon paths crucial. However, existing prediction models struggle to effect... 详细信息
来源: 评论
Enhancing Security in Distributed Drone-Based Litchi Fruit Recognition and Localization Systems
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1985-1999页
作者: Liang Mao Yue Li Linlin Wang Jie Li Jiajun Tan Yang Meng Cheng Xiong Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence Application Technology Research Institute Shenzhen Polytechnic UniversityShenzhen518055China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China
This paper introduces an advanced and efficient method for distributed drone-based fruit recognition and localization, tailored to satisfy the precision and security requirements of autonomous agricultural operations.... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论
ViF-SD2E: a robust weakly-supervised framework for neural decoding
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6645-6661页
作者: Feng, Jingyi Luo, Yong Song, Shuang Hu, Han National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China School of Information and Electronics Beijing Institute of Technology Beijing100081 China
Neural decoding plays a vital role in the interaction between the brain and the outside world. Our task in this paper is to decode the movement track of a finger directly based on the neural data. Existing neural deco... 详细信息
来源: 评论