咨询与建议

限定检索结果

文献类型

  • 5,187 篇 会议
  • 3,517 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,731 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,852 篇 工学
    • 4,550 篇 计算机科学与技术...
    • 3,684 篇 软件工程
    • 1,045 篇 信息与通信工程
    • 760 篇 控制科学与工程
    • 499 篇 电气工程
    • 474 篇 生物工程
    • 399 篇 机械工程
    • 393 篇 电子科学与技术(可...
    • 275 篇 光学工程
    • 254 篇 生物医学工程(可授...
    • 207 篇 化学工程与技术
    • 191 篇 仪器科学与技术
    • 178 篇 网络空间安全
    • 168 篇 动力工程及工程热...
    • 160 篇 安全科学与工程
    • 151 篇 建筑学
    • 142 篇 交通运输工程
    • 137 篇 土木工程
  • 2,683 篇 理学
    • 1,699 篇 数学
    • 536 篇 生物学
    • 524 篇 物理学
    • 460 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 216 篇 化学
  • 1,697 篇 管理学
    • 1,010 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 312 篇 工商管理
  • 200 篇 医学
    • 164 篇 临床医学
    • 142 篇 基础医学(可授医学...
  • 198 篇 法学
    • 147 篇 社会学
  • 102 篇 经济学
  • 91 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 26 篇 艺术学
  • 23 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 272 篇 laboratories
  • 208 篇 semantics
  • 172 篇 feature extracti...
  • 151 篇 computational mo...
  • 143 篇 data mining
  • 141 篇 software
  • 138 篇 software enginee...
  • 125 篇 training
  • 123 篇 deep learning
  • 119 篇 algorithm design...
  • 117 篇 optimization
  • 108 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 accuracy
  • 100 篇 cloud computing
  • 92 篇 costs
  • 91 篇 predictive model...
  • 90 篇 application soft...
  • 90 篇 software testing

机构

  • 1,027 篇 state key labora...
  • 209 篇 state key labora...
  • 201 篇 national key lab...
  • 193 篇 department of co...
  • 185 篇 college of compu...
  • 169 篇 department of co...
  • 154 篇 university of ch...
  • 122 篇 tianjin key labo...
  • 111 篇 school of inform...
  • 107 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 beijing key labo...
  • 93 篇 school of comput...
  • 91 篇 key laboratory o...
  • 87 篇 school of softwa...
  • 84 篇 state key labora...
  • 84 篇 shandong provinc...
  • 79 篇 national enginee...

作者

  • 65 篇 gao yang
  • 64 篇 junping du
  • 47 篇 yin baocai
  • 42 篇 wang wei
  • 41 篇 shi yinghuan
  • 40 篇 zhang hua
  • 38 篇 zhou zhi-hua
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 37 篇 shen linlin
  • 34 篇 xu baowen
  • 32 篇 dou wanchun
  • 31 篇 shen furao
  • 31 篇 zhao jian
  • 31 篇 yu huiqun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 li wu-jun

语言

  • 7,450 篇 英文
  • 1,044 篇 其他
  • 248 篇 中文
  • 2 篇 德文
检索条件"机构=Computer and Software Technology Laboratory"
8731 条 记 录,以下是131-140 订阅
排序:
Optimisation of sparse deep autoencoders for dynamic network embedding
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1361-1376页
作者: Huimei Tang Yutao Zhang Lijia Ma Qiuzhen Lin Liping Huang Jianqiang Li Maoguo Gong College of Computer Science and Software Engineering Shenzhen UniversityShenzhenChina Institute for Infocomm Research Agency for Science Technology and ResearchSingaporeSingapore Key Laboratory of Collaborative Intelligence Systems Ministry of EducationXidian UniversityXi'anChina
Network embedding(NE)tries to learn the potential properties of complex networks represented in a low-dimensional feature ***,the existing deep learningbased NE methods are time-consuming as they need to train a dense... 详细信息
来源: 评论
Credit assignment for trained neural networks based on Koopman operator theory
收藏 引用
Frontiers of computer Science 2024年 第1期18卷 251-253页
作者: Zhen LIANG Changyuan ZHAO Wanwei LIU Bai XUE Wenjing YANG Zhengbin PANG Institute for Quantum Information&State Key Laboratory of High Performance Computing National University of Defense TechnologyChangsha 410000China Institute of Software Chinese Academy of SciencesBeijing 100190China College of Computer Science and Technology National University of Defense TechnologyChangsha 410000China
1 Introduction Artificial neural networks(ANNs,also NNs)have recently emerged as leading candidate models for deep learning,popularly used in various areas[1–3].Behind the enormous success,ANNs are generally with com... 详细信息
来源: 评论
SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits∗
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024年 第4期2024卷 1-39页
作者: Tan, Huiyu Gao, Pengfei Song, Fu Chen, Taolue Wu, Zhilin ShanghaiTech University Shanghai201210 China Wingsemi Technology Co. Ltd. Shanghai201203 China Bytedance Beijing100098 China Key Laboratory of System Software Chinese Academy of Sciences and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100190 China Nanjing Institute of Software Technology Nanjing211135 China Birkbeck University of London WC1E 7HX United Kingdom
Fault injection attacks represent a type of active, physical attack against cryptographic circuits. Various countermeasures have been proposed to thwart such attacks, however, the design and implementation of which ar... 详细信息
来源: 评论
Enhancing Cervical Segmentation via Alternate Diverse Teaching in Semi-Supervised Learning  22
Enhancing Cervical Segmentation via Alternate Diverse Teachi...
收藏 引用
22nd IEEE International Symposium on Biomedical Imaging, ISBI 2025
作者: Yu, Jiawei College of Computer Science National University of Defense Technology Changsha China State Key Laboratory of Complex & Critical Software Environment Changsha China
In clinical practice, the cervical structure plays a critical role in predicting preterm birth, thus making accurate segmentation of this structure in ultrasound images of paramount importance. However, the performanc... 详细信息
来源: 评论
Multi-scale convolutional fusion network embedded with improved attention mechanism for polarimetric synthetic aperture radar image classification
收藏 引用
Journal of Applied Remote Sensing 2025年 第1期19卷
作者: Li, Jiewen Zhu, Yanan Ai, Jiaqiu Zhao, Zhicheng Shi, Jun Hefei University of Technology School of Computer Science and Information Engineering Hefei China Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province Hefei China Hefei University of Technology School of Artificial Intelligence Hefei China Hefei University of Technology School of Software Hefei China
Convolutional neural networks (CNNs) have been widely applied in the field of polarimetric synthetic aperture radar (PolSAR) image classification and have achieved good classification results. However, due to the comp... 详细信息
来源: 评论
Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 6273-6286页
作者: Gong, Cheng Xiong, Ling He, Xingyu Niu, Xianhua College of Computer and Software Engineering Xihua University Sichuan Chengdu610099 China National Key Laboratory of Science and Technology Communications University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Security and privacy are two challenging issues in Vehicular Ad-hoc Networks (VANETs), which have attracted widespread concern from industry and academia. However, the existing security schemes for VANETs environment ... 详细信息
来源: 评论
FedHPM: Online Federated Learning via Heterogeneous Prediction Model  22
FedHPM: Online Federated Learning via Heterogeneous Predicti...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhang, Zhi Zhang, Shiwen Chen, Shuang Liang, Wei Hunan University of Science and Technology College of Computer Science and Technology Xiangtan China Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China
In the era of big data and growing privacy concerns, Federated Learning (FL) has emerged as a promising solution for collaborative model training while preserving user data privacy. However, FL faces challenges such a... 详细信息
来源: 评论
Constraint-aware and multi-objective optimization for micro-service composition in mobile edge computing
Constraint-aware and multi-objective optimization for micro-...
收藏 引用
作者: Wu, Jintao Zhang, Jingyi Zhang, Yiwen Wen, Yiping School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Technology Anhui University Anhui China Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Hunan China
As a new paradigm of distributed computing, mobile edge computing (MEC) has gained increasing attention due to its ability to expand the capabilities of centralized cloud computing. In MEC environments, a software app... 详细信息
来源: 评论
RandoMix: a mixed sample data augmentation method with multiple mixed modes
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4343-4359页
作者: Liu, Xiaoliang Shen, Furao Zhao, Jian Nie, Changhai National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Artificial Intelligence Nanjing University Nanjing China School of Electronic Science and Engineering Nanjing University Nanjing China
Data augmentation plays a crucial role in enhancing the robustness and performance of machine learning models across various domains. In this study, we introduce a novel mixed-sample data augmentation method called Ra... 详细信息
来源: 评论
Unsupervised image-to-image translation by semantics consistency and self-attention
收藏 引用
Optoelectronics Letters 2022年 第3期18卷 175-180页
作者: ZHANG Zhibin XUE Wanli FU Guokai The Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China
Unsupervised image-to-image translation is a challenging task for computer vision. The goal of image translation is to learn a mapping between two domains, without corresponding image pairs. Many previous works only f... 详细信息
来源: 评论