咨询与建议

限定检索结果

文献类型

  • 1,813 篇 会议
  • 1,541 篇 期刊文献
  • 51 册 图书

馆藏范围

  • 3,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,185 篇 工学
    • 1,676 篇 计算机科学与技术...
    • 1,369 篇 软件工程
    • 459 篇 信息与通信工程
    • 314 篇 控制科学与工程
    • 265 篇 生物工程
    • 254 篇 电气工程
    • 210 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 149 篇 电子科学与技术(可...
    • 138 篇 光学工程
    • 113 篇 动力工程及工程热...
    • 99 篇 安全科学与工程
    • 86 篇 交通运输工程
    • 82 篇 网络空间安全
    • 80 篇 化学工程与技术
  • 1,038 篇 理学
    • 577 篇 数学
    • 306 篇 生物学
    • 217 篇 物理学
    • 183 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 88 篇 化学
  • 681 篇 管理学
    • 451 篇 管理科学与工程(可...
    • 239 篇 图书情报与档案管...
    • 208 篇 工商管理
  • 240 篇 医学
    • 209 篇 临床医学
    • 179 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
    • 96 篇 药学(可授医学、理...
  • 94 篇 法学
    • 72 篇 社会学
  • 74 篇 经济学
    • 74 篇 应用经济学
  • 50 篇 教育学
  • 43 篇 农学
  • 9 篇 文学
  • 7 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 117 篇 deep learning
  • 112 篇 machine learning
  • 86 篇 accuracy
  • 86 篇 training
  • 82 篇 feature extracti...
  • 74 篇 computational mo...
  • 71 篇 internet of thin...
  • 69 篇 software enginee...
  • 68 篇 computer science
  • 64 篇 educational inst...
  • 57 篇 optimization
  • 54 篇 artificial intel...
  • 52 篇 predictive model...
  • 49 篇 security
  • 48 篇 cloud computing
  • 48 篇 convolutional ne...
  • 44 篇 blockchain
  • 43 篇 semantics
  • 43 篇 data models
  • 41 篇 data mining

机构

  • 355 篇 college of compu...
  • 69 篇 shenzhen univers...
  • 46 篇 state key labora...
  • 41 篇 college of compu...
  • 35 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 college of compu...
  • 32 篇 the college of c...
  • 30 篇 department of co...
  • 29 篇 national enginee...
  • 23 篇 software college...
  • 23 篇 college of compu...
  • 22 篇 college of intel...
  • 22 篇 department of co...
  • 22 篇 department of so...
  • 19 篇 school of inform...
  • 19 篇 college of compu...
  • 18 篇 department of co...
  • 17 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 52 篇 leung victor c.m...
  • 29 篇 ismail leila
  • 26 篇 shen linlin
  • 23 篇 leung victor c. ...
  • 22 篇 lin qiuzhen
  • 20 篇 li jianqiang
  • 19 篇 pan haoyuan
  • 19 篇 materwala huned
  • 17 篇 niyato dusit
  • 17 篇 muhammad waseem ...
  • 17 篇 yazeed yasin gha...
  • 16 篇 victor c. m. leu...
  • 15 篇 chan tse-tin
  • 15 篇 wang xiaofei
  • 15 篇 jiacun wang
  • 15 篇 tan kay chen
  • 15 篇 guo ping
  • 14 篇 carmi paz
  • 13 篇 huang ziyun
  • 13 篇 r. saravanakumar

语言

  • 3,136 篇 英文
  • 246 篇 其他
  • 26 篇 中文
  • 2 篇 日文
检索条件"机构=Department of College of Computer Science& Software Engineering"
3405 条 记 录,以下是331-340 订阅
排序:
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Gamification of E-Learning Apps via Acceptance Requirements Analysis  19
Gamification of E-Learning Apps via Acceptance Requirements ...
收藏 引用
19th International Conference on Evaluation of Novel Approaches to software engineering, ENASE 2024
作者: Calabrese, Federico Piras, Luca Al-Obeidallah, Mohammed Ghazi Egbikuadje, Benedicta Oghenevoke Alkubaisy, Duaa Department of Information Engineering and Computer Science University of Trento Trento Italy Department of Computer Science Middlesex University London United Kingdom Department of Software Engineering Al Ain University Abu Dhabi United Arab Emirates College of Applied Studies and Community Service Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia
In the last few years, and particularly during and after the COVID-19 pandemic, E-Learning has become a very important and strategic asset for our society, relevant both for academic and industry settings, involving p... 详细信息
来源: 评论
Arithmetic Expression Evaluations with Membranes
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 55-60页
作者: Ping Guo Haizhu Chen Hui Zheng College of Computer Science Chongqing University Chongqing China Chongqing Key Laboratory of Software Theory and Technology Chongqing China Department of Software Engineering Chongqing College of Electronic Engineering Chongqing China
Arithmetic operations and expression evaluations are fundamental in computing models. This paper firstly designs arithmetic membranes without priority rules for basic arithmetic operations, and then proposes an algori... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
Mutual Reconstruction-based Linear Discriminant Hashing for Image Retrieval  7
Mutual Reconstruction-based Linear Discriminant Hashing for ...
收藏 引用
7th International Conference on Vision, Image and Signal Processing, ICVISP 2023
作者: Huang, Danlu Lai, Zhihui Kong, Heng College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Breast and Thyroid Surgery BaoAn Central Hospital of Shenzhen Shenzhen China
Recently, hash learning has attracted much attention due to its ability to convert high-dimensional data into compact binary codes for efficient retrieval and storage. However, most classification-based supervised has... 详细信息
来源: 评论
Time-Division Online Speculative Inference for Cost-Effective Intelligent Internet of Things  10
Time-Division Online Speculative Inference for Cost-Effectiv...
收藏 引用
10th IEEE World Forum on Internet of Things, WF-IoT 2024
作者: Du, Yao Wang, Zehua Leung, Cyril Leung, Victor C.M. The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada China University of Mining and Technology School of Computer Science and Technology Xuzhou221116 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
Intelligent Internet of Things (IIoT), a network paradigm, is an interconnection of intelligent edge devices, empowered by machine learning models. The recent emergence of large language models (LLMs) opens a new path... 详细信息
来源: 评论
On workflow scheduling for latency-sensitive edge computing applications  14
On workflow scheduling for latency-sensitive edge computing ...
收藏 引用
14th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Badidi, Elarbi Department of Computer Science and Software Engineering College of Information Technology UAE University PO Box. 15551 AL-AIN United Arab Emirates
With the rapid proliferation of edge computing-based solutions, many edge computing applications use the cloud for data processing and analysis. However, latency-sensitive applications have low latency requirements an... 详细信息
来源: 评论
TSEML: A task-specific embedding-based method for few-shot classification of cancer molecular subtypes
TSEML: A task-specific embedding-based method for few-shot c...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Su, Ran Shi, Rui Cui, Hui Xuan, Ping Fang, Chengyan Feng, Xikang Jin, Qiangguo Tianjin University School of Computer Software College of Intelligence and Computing Tianjin China La Trobe University Department of Computer Science and Information Technology Melbourne Australia Shantou University School of Engineering Department of Computer Science Guangdong China Northwestern Polytechnical University School of Software Shaanxi China Yangtze River Delta Research Institute Northwestern Polytechnical University Taicang China
Molecular subtyping of cancer is recognized as a critical and challenging upstream task for personalized therapy. Existing deep learning methods have achieved significant performance in this domain when abundant data ... 详细信息
来源: 评论
An empirical IoT and cloud-based customizable healthcare surveillance system
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第8期16卷 5317-5323页
作者: Meti, Subhash Razauddin, S. Nallakumar, R. Mansingh, P. M. Benson Sameen, Aws Zuhair Pandey, Sakshi Bhatt, Sanjeev Kumar Jayabalan, Bhuvana Department of Electronics and Communication Engineering SKSVMACET Lakshmeshwar Karnataka Gadag India College of Computer Science and Engineering University of Hail Hail Saudi Arabia Department of Artificial Intelligence and Data Science Karpagam Institute of Technology Coimbatore India Department of Advanced Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Andhra Pradesh Guntur India College of Medical Techniques Al-Farahidi University Baghdad Iraq Centre of Interdisciplinary Research in Business and Technology Chitkara Institute of Engineering and Technology Chitkara University Punjab Rajpura India Software Architect and Research Scholar Digital Innovation College PDM University Bahadurgarh India Department of Computer Science and Information Technology JAIN (Deemed-to-Be University) Karnataka Bengaluru India
In certain emergencies, patients must be continuously monitored and cared for. However, visiting the hospital to do such activities is difficult because of time constraints. To modernize the healthcare sector, the stu... 详细信息
来源: 评论
A Data-Driven Analysis of software Testing Automation Challenges Using Structural Equation Modeling (SEM) Approach
收藏 引用
IEEE Access 2025年 13卷 96159-96181页
作者: Abrar, Muhammad Faisal Majeed, Muhammad Faran Saqib, Muhammad Alferaidi, Ali Uddin, Raza University of ha'Il College of Computer Science and Engineering 55476 Saudi Arabia Kohsar University Department of Computer Science Punjab Muree Pakistan University of Engineering & Technology Department of Software Engineering Peshawar25000 Pakistan
The adoption of automation in software testing presents challenges that can hinder its effectiveness and scalability. This study systematically investigates these challenges using a multi-phase research approach. Firs... 详细信息
来源: 评论