咨询与建议

限定检索结果

文献类型

  • 3,879 篇 会议
  • 2,081 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,740 篇 工学
    • 3,000 篇 计算机科学与技术...
    • 2,472 篇 软件工程
    • 755 篇 信息与通信工程
    • 499 篇 控制科学与工程
    • 413 篇 生物工程
    • 357 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 227 篇 机械工程
    • 224 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 141 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 121 篇 交通运输工程
  • 1,686 篇 理学
    • 958 篇 数学
    • 451 篇 生物学
    • 365 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 148 篇 化学
  • 1,130 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 492 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 229 篇 医学
    • 203 篇 临床医学
    • 187 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 130 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 45 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 138 篇 feature extracti...
  • 135 篇 training
  • 132 篇 semantics
  • 122 篇 deep learning
  • 114 篇 machine learning
  • 111 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 88 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 223 篇 college of compu...
  • 96 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 55 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 51 篇 school of softwa...
  • 50 篇 software enginee...
  • 49 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 ismail leila
  • 27 篇 buyya rajkumar
  • 24 篇 zhang lei
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 xiaofei wang

语言

  • 5,784 篇 英文
  • 210 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6038 条 记 录,以下是21-30 订阅
排序:
Deniable Identity-Based Matchmaking Encryption for Anonymous Messaging
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2197-2210页
作者: Cao, Yanmei Wei, Jianghong Huang, Xinyi Chen, Xiaofeng Xiang, Yang Xi'an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Artifcial Intelligence Thrust Information Hub Guangzhou511400 China Swinburne University of Technology School of Software and Electrical Engineering MelbourneVIC3122 Australia
Anonymous messaging system allows users to deliver messages without revealing the sending content and their identifiers, which has attracted ongoing concerns. However, to the best of our knowledge, all the existing so... 详细信息
来源: 评论
UAV-Mounted Intelligent Reflecting Surface in Maritime Wireless Powered Communication Network
收藏 引用
China Communications 2025年 第3期22卷 254-269页
作者: Liu Yuan Han Fengxia Zhao Shengjie School of Information Science and Electrical Engineering Shandong Jiaotong UniversityJinan 250357China College of Electronic and Information Engineering Tongji UniversityShanghai 201804China School of Software Engineering Tongji UniversityShanghai 201804China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of EducationShanghai 200003China Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 201804China
Intelligent reflecting surface(IRS)assisted with the wireless powered communication network(WPCN)can enhance the desired signal energy and carry out the power-sustaining problem in ocean monitoring *** this paper,we i... 详细信息
来源: 评论
Multi-Modal Incomplete Brain Tumor Segmentation with Mamba  24
Multi-Modal Incomplete Brain Tumor Segmentation with Mamba
收藏 引用
5th International Symposium on Artificial Intelligence for Medicine Science, ISAIMS 2024
作者: Li, Yudan Zhang, Xiaozhi Xiong, Dongping Ouyang, Lijun School of Electrical Engineering University of South China Hunan Hengyang China School of Computing/Software University of South China Hunan Hengyang China
Accurately segmenting brain tumors from multimodal MRI sequences is a key prerequisite for brain tumor diagnosis, prognosis assessment, and surgical treatment. However, in practical applications, one or more modal dat... 详细信息
来源: 评论
RPPFL: Robust and Privacy-Preserving Federated Learning via Trusted Execution Environments
RPPFL: Robust and Privacy-Preserving Federated Learning via ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Xiaolei Chen, Zhaoyu Chen, Guangpu Feng, Xinyu Shen, Qingni Wu, Zhonghai School of Computer Science Peking University China School of Software and Microelectronics Peking University China National Engineering Research Center for Software Engineering Peking University China PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University China
Federated Learning (FL) is a distributed framework that enables multi-participant collaborative model training without the need for data sharing. Despite its advantages, FL is vulnerable to poisoning and inference att... 详细信息
来源: 评论
FBI-Net: Frequency Band Integration Network for Infrared Small Target Segmentation
FBI-Net: Frequency Band Integration Network for Infrared Sma...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Xin, Biqiao Li, Qiang Mao, Qianchen Wang, Jinbao Wang, Bingshu School of Software Northwestern Polytechnical University Xi'an China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Small targets in infrared imagery exhibit challenging characteristics due to their minimal semantic information and the extremely imbalanced distribution between the targets and the background. In this paper, we propo... 详细信息
来源: 评论
An Empirical Study on Meta Virtual Reality Applications: Security and Privacy Perspectives
收藏 引用
IEEE Transactions on software engineering 2025年 第5期51卷 1437-1454页
作者: Guo, Hanyang Dai, Hong-Ning Luo, Xiapu Xu, Gengyang He, Fengliang Zheng, Zibin Hong Kong Baptist University Department of Computer Science 999077 Hong Kong Sun Yat-sen University School of Software Engineering Zhuhai519082 China The Hong Kong Polytechnic University Department of Computing 999077 Hong Kong
Virtual Reality (VR) has accelerated its prevalent adoption in emerging metaverse applications, but it is not a fundamentally new technology. On the one hand, most VR operating systems (OS) are based on off-the-shelf ... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
Three-Stage Transfer Learning with AlexNet50 for MRI Image Multi-Class Classification with Optimal Learning Rate
收藏 引用
Computer Modeling in engineering & Sciences 2025年 第1期142卷 155-183页
作者: Suganya Athisayamani A.Robert Singh Gyanendra Prasad Joshi Woong Cho School of Computing Sastra Deemed to be UniversityThanjavur613401India Department of Computational Intelligence SRM Institute of Science and TechnologyKattankulathur603203India Department of AI and Software Engineering Kangwon National UniversitySamcheok25913Republic of Korea Department of Electronics Information and Communication EngineeringKangwon National UniversitySamcheok25913Republic of Korea
In radiology,magnetic resonance imaging(MRI)is an essential diagnostic tool that provides detailed images of a patient’s anatomical and physiological *** is particularly effective for detecting soft tissue ***,radiol... 详细信息
来源: 评论
Enhancing Classification Algorithm Recommendation in Automated Machine Learning: A Meta-Learning Approach Using Multivariate Sparse Group Lasso
收藏 引用
Computer Modeling in engineering & Sciences 2025年 第2期142卷 1611-1636页
作者: Irfan Khan Xianchao Zhang Ramesh Kumar Ayyasamy Saadat M.Alhashmi Azizur Rahim School of Software Dalian University of TechnologyDalian116620China Faculty of Information and Communication Technology Universiti Tunku Abdul RahmanKampar31900Malaysia College of Computing and Informatics University of SharjahSharjah27272United Arab Emirates Department of Computer Systems Engineering University of Engineering and Applied SciencesSwat19200Pakistan
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods... 详细信息
来源: 评论
Research on Authorization Verification Methods for Message Signatures Within Multi-Level Groups  1
Research on Authorization Verification Methods for Message S...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud computing, ICIMCC 2024
作者: Zhang, Hu Zhang, Jiarui Zhang, Han Undergraduate Software Engineering Class of 2021 Hefei University Hefei China Department of Information Engineering Yantai Institute of Technology Yantai China Beijing Academy of Blockchain and Edge Computing Beijing China
With the widespread adoption of digital signature,a variety of specialized digital signature methods have been developed. However, the need for authorization verification within hierarchical group structures has not g... 详细信息
来源: 评论