咨询与建议

限定检索结果

文献类型

  • 3,879 篇 会议
  • 2,081 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,740 篇 工学
    • 3,000 篇 计算机科学与技术...
    • 2,472 篇 软件工程
    • 755 篇 信息与通信工程
    • 499 篇 控制科学与工程
    • 413 篇 生物工程
    • 357 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 227 篇 机械工程
    • 224 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 141 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 121 篇 交通运输工程
  • 1,686 篇 理学
    • 958 篇 数学
    • 451 篇 生物学
    • 365 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 148 篇 化学
  • 1,130 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 492 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 229 篇 医学
    • 203 篇 临床医学
    • 187 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 130 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 45 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 138 篇 feature extracti...
  • 135 篇 training
  • 132 篇 semantics
  • 122 篇 deep learning
  • 114 篇 machine learning
  • 111 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 88 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 223 篇 college of compu...
  • 96 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 55 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 51 篇 school of softwa...
  • 50 篇 software enginee...
  • 49 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 ismail leila
  • 27 篇 buyya rajkumar
  • 24 篇 zhang lei
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 xiaofei wang

语言

  • 5,784 篇 英文
  • 210 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6038 条 记 录,以下是41-50 订阅
排序:
AI-Powered IT Project Management: Analyzing the Effectiveness of Advanced Project Management Tools to Ensure Project Efficiency
AI-Powered IT Project Management: Analyzing the Effectivenes...
收藏 引用
2025 IEEE SoutheastCon, SoutheastCon 2025
作者: Das, Jiban Krisna Elegbe, Ifeoluwa Coffie, Lord Khadka, Rojeena Chen, Lei Ji, Yiming Georgia Southern University Dept. of Information Technology StatesboroGA United States College of Computing and Software Engineering Kennesaw State University United States
The integration of Artificial Intelligence (AI) into project management has significantly transformed traditional methodologies, particularly within the Information Technology (IT) sector. This study investigates the ... 详细信息
来源: 评论
Image Tampering Detection With Frequency-Aware Attention and Multiview Fusion
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 614-625页
作者: Xu, Xu Chen, Junxin Lv, Wenrui Wang, Wei Zhang, Yushu Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China
Manipulated images are flooding our daily lives, which poses a threat to social security. Recently, many studies have focused on image tampering detection. However, they have poor performance on independent validation... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
A Lightweight and High-Fidelity Model for Generalized Audio-Driven 3D Talking Face Synthesis  27th
A Lightweight and High-Fidelity Model for Generalized Audi...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Liu, Shunce Zhong, Yuwei Wang, Huixuan Peng, Jingliang Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China School of Information Science and Engineering University of Jinan Jinan China School of Software and Microelectronics Peking University Beijing China School of Software Shandong University Jinan China
We present LW-GeneFace, a lightweight and high-fidelity model for generalized audio-driven facial animation, in this paper. We develop this model by reducing the size while maintaining the synthetic quality of Ge... 详细信息
来源: 评论
COSIS: An AI-Enabled Digital Transformation Framework Integrating Large Language Models and Key Performance Indicators  21st
COSIS: An AI-Enabled Digital Transformation Framework Integr...
收藏 引用
21st International Conference on Services computing, SCC 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Zhang, Liang-Jie Chen, Huan He, Sheng Li, Changhu Chen, Junyang Zhang, Haodi Du, Wenfeng Center for AI Services Computing College of Computer Science and Software Engineering Shenzhen University Shenzhen China SF Technology Co. Ltd. Shenzhen China Kingdee Research Kingdee International Software Group Co. Ltd. Shenzhen China
The rapid advancement of Artificial Intelligence (AI) and Large Language Models (LLMs) has significantly transformed various sectors of society, compelling enterprises to undertake comprehensive digital transformation... 详细信息
来源: 评论
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-Box Scenario
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2666-2681页
作者: Liu, Renyang Lam, Kwok-Yan Zhou, Wei Wu, Sixing Zhao, Jun Hu, Dongting Gong, Mingming Yunnan University School of Information Science and Engineering Kunming650500 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Yunnan University School of Software Engineering Research Center of Cyberspace Kunming650500 China University of Melbourne Melbourne Centre for Data Science School of Mathematics and Statistics ParkvilleVIC3010 Australia
Extensive studies have revealed that deep neural networks (DNNs) are vulnerable to adversarial attacks, especially black-box ones, which can heavily threaten the DNNs deployed in the real world. Many attack techniques... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2889-2905页
作者: Meng Zhu Xingyue Wang Honge Ren Abeer Hakeem Linda Mohaisen College of Information Engineering Harbin UniversityHarbin150086China Heilongjiang Provincial Key Laboratory of the Intelligent Perception and Intelligent Software Harbin UniversityHarbin150086China College of Computer and Control Engineering Northeast Forestry UniversityHarbin150040China Heilongjiang Forestry Intelligent Equipment Engineering Research Center Northeast Forestry UniversityHarbin150040China Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network t... 详细信息
来源: 评论
The Robustness of Spiking Neural Networks in Federated Learning with Compression Against Non-omniscient Byzantine Attacks
arXiv
收藏 引用
arXiv 2025年
作者: Nguyen, Manh V. Zhao, Liang Deng, Bobin Wu, Shaoen College of Computing and Software Engineering Kennesaw State University Georgia United States
Spiking Neural Networks (SNNs), which offer exceptional energy efficiency for inference, and Federated Learning (FL), which offers privacy-preserving distributed training, is a rising area of interest that highly bene... 详细信息
来源: 评论
Unified and interoperable digital twin models for emergency evacuation using building simulation identity cards
收藏 引用
Automation in Construction 2025年 175卷
作者: Jahangir, Muhammad Farhan Kamari, Aliakbar Schultz, Carl Peter Leslie DIGIT Department of Civil and Architectural Engineering Aarhus University Denmark DIGIT Department of Software Engineering & Computing Aarhus University Denmark
Digital Twin (DT) technology is crucial for effective emergency evacuation planning in buildings, requiring specialized simulation models, from earthquake propagation to evacuation route planning. However, the lack of... 详细信息
来源: 评论