咨询与建议

限定检索结果

文献类型

  • 683,524 篇 会议
  • 281,015 篇 期刊文献
  • 6,815 册 图书
  • 21 篇 学位论文
  • 7 篇 专利
  • 6 篇 科技报告

馆藏范围

  • 971,384 篇 电子文献
  • 23 种 纸本馆藏

日期分布

学科分类号

  • 567,303 篇 工学
    • 410,953 篇 计算机科学与技术...
    • 326,765 篇 软件工程
    • 121,933 篇 信息与通信工程
    • 82,589 篇 控制科学与工程
    • 60,147 篇 电气工程
    • 57,647 篇 生物工程
    • 54,224 篇 电子科学与技术(可...
    • 41,924 篇 生物医学工程(可授...
    • 35,573 篇 光学工程
    • 35,379 篇 机械工程
    • 26,722 篇 化学工程与技术
    • 24,496 篇 仪器科学与技术
    • 22,073 篇 动力工程及工程热...
    • 18,922 篇 材料科学与工程(可...
    • 16,956 篇 安全科学与工程
    • 15,484 篇 网络空间安全
    • 15,044 篇 交通运输工程
  • 315,820 篇 理学
    • 181,755 篇 数学
    • 84,139 篇 物理学
    • 65,422 篇 生物学
    • 53,401 篇 统计学(可授理学、...
    • 34,052 篇 系统科学
    • 28,727 篇 化学
  • 147,749 篇 管理学
    • 83,397 篇 管理科学与工程(可...
    • 70,506 篇 图书情报与档案管...
    • 40,344 篇 工商管理
  • 38,260 篇 医学
    • 32,188 篇 临床医学
    • 28,673 篇 基础医学(可授医学...
    • 17,734 篇 药学(可授医学、理...
  • 25,019 篇 法学
    • 20,793 篇 社会学
  • 14,898 篇 经济学
  • 13,539 篇 教育学
  • 11,813 篇 农学
  • 4,700 篇 文学
  • 1,903 篇 军事学
  • 1,638 篇 艺术学
  • 759 篇 哲学
  • 312 篇 历史学

主题

  • 63,832 篇 computer science
  • 21,862 篇 computational mo...
  • 18,903 篇 feature extracti...
  • 17,499 篇 accuracy
  • 15,450 篇 training
  • 15,093 篇 data mining
  • 15,088 篇 machine learning
  • 14,431 篇 deep learning
  • 13,642 篇 application soft...
  • 12,880 篇 computer archite...
  • 12,223 篇 semantics
  • 12,175 篇 algorithm design...
  • 11,436 篇 costs
  • 11,386 篇 protocols
  • 11,266 篇 testing
  • 10,855 篇 artificial intel...
  • 10,768 篇 predictive model...
  • 10,497 篇 support vector m...
  • 10,480 篇 neural networks
  • 10,100 篇 optimization

机构

  • 5,008 篇 department of co...
  • 2,892 篇 school of comput...
  • 2,480 篇 college of compu...
  • 2,461 篇 school of comput...
  • 2,417 篇 college of compu...
  • 2,128 篇 chitkara univers...
  • 2,049 篇 department of co...
  • 1,652 篇 department of co...
  • 1,557 篇 university of ch...
  • 1,520 篇 school of comput...
  • 1,488 篇 department of co...
  • 1,443 篇 school of comput...
  • 1,277 篇 school of comput...
  • 1,273 篇 department of el...
  • 1,268 篇 department of co...
  • 1,257 篇 school of comput...
  • 1,223 篇 school of comput...
  • 1,156 篇 school of comput...
  • 1,082 篇 department of co...
  • 1,056 篇 department of el...

作者

  • 524 篇 liu yang
  • 426 篇 wang wei
  • 378 篇 niyato dusit
  • 307 篇 yang yang
  • 288 篇 wei li
  • 270 篇 wei wang
  • 257 篇 li li
  • 245 篇 li yang
  • 240 篇 barter w.
  • 238 篇 zhang lei
  • 232 篇 s. chen
  • 215 篇 j. wang
  • 214 篇 blake t.
  • 208 篇 bellee v.
  • 206 篇 bowcock t.j.v.
  • 204 篇 zhang wei
  • 203 篇 a. gomes
  • 201 篇 brundu d.
  • 201 篇 borsato m.
  • 199 篇 betancourt c.

语言

  • 917,623 篇 英文
  • 43,143 篇 其他
  • 10,590 篇 中文
  • 448 篇 日文
  • 219 篇 德文
  • 93 篇 法文
  • 76 篇 西班牙文
  • 68 篇 朝鲜文
  • 58 篇 俄文
  • 57 篇 斯洛文尼亚文
  • 29 篇 葡萄牙文
  • 25 篇 意大利文
  • 10 篇 土耳其文
  • 5 篇 阿拉伯文
  • 5 篇 荷兰文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
971388 条 记 录,以下是1-10 订阅
排序:
Laboratory or department?Exploration and Creation in computer science and technology
收藏 引用
计算机教育 2024年 第3期 13-16页
作者: Ann Copestake Department of Computer Science and Technology University of CambridgeWilliam Gates Building15 JJ Thomson AvenueCambridge CB30FDUK
In the very beginning,the computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the *** computer science developed as a discipline in its own righ... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Labeling-based centrality approaches for identifying critical edges on temporal graphs
收藏 引用
Frontiers of computer science 2025年 第2期19卷 89-104页
作者: Tianming ZHANG Jie ZHAO Cibo YU Lu CHEN Yunjun GAO Bin CAO Jing FAN Ge YU School of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310023China School of Computer Science and Technology Zhejiang UniversityHangzhou 310013China Department of Computer Science Northeastern UniversityShenyang 110819China
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte... 详细信息
来源: 评论
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 49-63页
作者: Yuhang Qiu Gongming Zhao Hongli Xu Long Li He Huang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Suzhou Institute for Advanced Research University of Science and Technology of China School of Computer Science and Technology Soochow University
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi... 详细信息
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(Information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
science China(Information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 400-414页
作者: Nasir Ahmad Jalali Hongsong Chen Department of Computer Science University of Science and Technology Beijing(USTB)Beijing 100083China
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants r... 详细信息
来源: 评论
Advances in neural architecture search
收藏 引用
National science Review 2024年 第8期11卷 24-38页
作者: Xin Wang Wenwu Zhu Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University
Automated machine learning(AutoML) has achieved remarkable success in automating the non-trivial process of designing machine learning *** the focal areas of AutoML,neural architecture search(NAS) stands out,aiming to... 详细信息
来源: 评论