咨询与建议

限定检索结果

文献类型

  • 130,253 篇 会议
  • 68,036 篇 期刊文献
  • 2,134 册 图书

馆藏范围

  • 200,422 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 118,503 篇 工学
    • 80,281 篇 计算机科学与技术...
    • 64,132 篇 软件工程
    • 27,749 篇 信息与通信工程
    • 18,521 篇 控制科学与工程
    • 14,780 篇 电气工程
    • 14,572 篇 电子科学与技术(可...
    • 12,765 篇 生物工程
    • 9,734 篇 生物医学工程(可授...
    • 8,818 篇 光学工程
    • 8,206 篇 机械工程
    • 6,641 篇 化学工程与技术
    • 6,085 篇 仪器科学与技术
    • 5,940 篇 动力工程及工程热...
    • 5,114 篇 材料科学与工程(可...
    • 4,370 篇 网络空间安全
    • 4,074 篇 安全科学与工程
  • 67,861 篇 理学
    • 35,257 篇 数学
    • 21,254 篇 物理学
    • 14,593 篇 生物学
    • 10,988 篇 统计学(可授理学、...
    • 7,407 篇 系统科学
    • 7,182 篇 化学
  • 31,639 篇 管理学
    • 19,378 篇 管理科学与工程(可...
    • 13,423 篇 图书情报与档案管...
    • 8,782 篇 工商管理
  • 9,612 篇 医学
    • 7,991 篇 临床医学
    • 7,012 篇 基础医学(可授医学...
    • 4,273 篇 药学(可授医学、理...
    • 3,928 篇 公共卫生与预防医...
  • 5,543 篇 法学
    • 4,594 篇 社会学
  • 3,353 篇 经济学
  • 2,439 篇 农学
  • 2,301 篇 教育学
  • 1,093 篇 文学
  • 411 篇 军事学
  • 356 篇 艺术学
  • 58 篇 哲学
  • 35 篇 历史学

主题

  • 8,992 篇 computer science
  • 4,628 篇 accuracy
  • 4,113 篇 feature extracti...
  • 4,067 篇 computational mo...
  • 3,837 篇 deep learning
  • 3,792 篇 machine learning
  • 3,343 篇 training
  • 2,766 篇 data mining
  • 2,585 篇 artificial intel...
  • 2,379 篇 support vector m...
  • 2,344 篇 optimization
  • 2,226 篇 predictive model...
  • 2,109 篇 internet of thin...
  • 2,079 篇 computer archite...
  • 2,071 篇 wireless sensor ...
  • 2,045 篇 algorithm design...
  • 1,968 篇 protocols
  • 1,835 篇 application soft...
  • 1,806 篇 convolutional ne...
  • 1,790 篇 neural networks

机构

  • 5,010 篇 department of co...
  • 1,086 篇 cavendish labora...
  • 986 篇 department of ph...
  • 939 篇 university of ch...
  • 923 篇 oliver lodge lab...
  • 915 篇 physikalisches i...
  • 834 篇 department of el...
  • 663 篇 department of el...
  • 662 篇 department of co...
  • 584 篇 infn sezione di ...
  • 558 篇 infn sezione di ...
  • 556 篇 department of co...
  • 555 篇 infn laboratori ...
  • 549 篇 chitkara univers...
  • 529 篇 infn sezione di ...
  • 528 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 512 篇 school of physic...
  • 510 篇 fakultät physik ...
  • 509 篇 school of physic...

作者

  • 250 篇 barter w.
  • 237 篇 s. chen
  • 236 篇 a. gomes
  • 230 篇 j. wang
  • 227 篇 c. alexa
  • 227 篇 blake t.
  • 223 篇 j. m. izen
  • 221 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.
  • 215 篇 beiter a.
  • 215 篇 borsato m.
  • 214 篇 g. bella
  • 213 篇 j. strandberg
  • 213 篇 brundu d.
  • 211 篇 d. calvet
  • 211 篇 c. amelung
  • 206 篇 bencivenni g.

语言

  • 187,353 篇 英文
  • 10,421 篇 其他
  • 2,638 篇 中文
  • 99 篇 日文
  • 35 篇 德文
  • 21 篇 法文
  • 18 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 9 篇 俄文
  • 5 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and EngineeringSouthern University of Science and Technology"
200423 条 记 录,以下是261-270 订阅
排序:
One Shot Learning for Edge Detection on Point Clouds
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 3503-3513页
作者: Tu, Zhikun Zhang, Yuhe Jia, Yiou Li, Kang Cohen-Or, Daniel Northwest University School of Information Science and Technology Xi'an China Tel Aviv University Department of Computer Science Tel Aviv Israel
Each scanner possesses its unique characteristics and exhibits its distinct sampling error distribution. Training a network on a dataset that includes data collected from different scanners is less effective than trai... 详细信息
来源: 评论
Data centric redundancy elimination for network data traffic
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 107-117页
作者: Narayanan, Sandhya Samuel, Philip Chacko, Mariamma Information Technology Cochin University of Science and Technology Kochi India Department of Computer Science Cochin University of Science and Technology Kochi India Department of Ship Technology Cochin University of Science and Technology Kochi India
Network traffic occurring in the internet is a challenging issue due to the increase in internet users. Nowadays, internet traffic increases exponentially every month. Communication capability between the networks bec... 详细信息
来源: 评论
FLAG: frequency-based local and global network for face forgery detection
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 647-663页
作者: Zhou, Kai Sun, Guanglu Wang, Jun Wang, Jiahui Yu, Linsen School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China Department of Information Engineering and Mathematics University of Siena Siena53100 Italy
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ... 详细信息
来源: 评论
VivID: A Visually Improved GIF Encoding Network Design
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第6期35卷 6101-6113页
作者: Wang, Yifei Liu, Gaozhi Zhu, Zhiying Zhang, Xinpeng Qian, Zhenxing Fudan University Department of School of Computer Science Shanghai200433 China East China University of Science and Technology Department of China School of Information Science and Engineering Shanghai200237 China
Graphics Interchange Format (GIF) encoding is the art of reproducing an image with limited colors. Existing GIF encoding schemes often introduce unpleasant visual artifacts such as banding artifact, dotted-pattern noi... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFEL Tool
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第3期5卷 473-488页
作者: Al-Janabi, Anmar A. Al-Janabi, Sufyan Al-Khateeb, Belal Computer Science Department University of Technology – Iraq Baghdad10066 Iraq University of Anbar Ramadi Iraq College of Computer Science & Information Technology Anbar Ramadi31001 Iraq
Digitization of healthcare data has shown an urgent necessity to deal with privacy concerns within the field of deep learning for healthcare organizations. A promising approach is federated transfer learning, enabling... 详细信息
来源: 评论
Inductive Lottery Ticket Learning for Graph Neural Networks
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1223-1237页
作者: Yong-Duo Sui Xiang Wang Tianlong Chen Meng Wang Xiang-Nan He Tat-Seng Chua School of Data Science University of Science and Technology of ChinaHefei 230027China Department of Electrical and Computer Engineering The University of Texas at AustinAustin 78712U.S.A School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China School of Computing National University of SingaporeSingapore
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor... 详细信息
来源: 评论
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1539-1556页
作者: Weihao Song Zidong Wang Zhongkui Li Jianan Wang Qing-Long Han IEEE the State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering ScienceCollege of Engineering Peking University the Department of Computer Science Brunel University London the School of Aerospace Engineering Beijing Institute of Technology the School of Science Computing and Engineering Technologies Swinburne University of Technology
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i... 详细信息
来源: 评论
Effects of feature selection and normalization on network intrusion detection
Data Science and Management
收藏 引用
Data science and Management 2025年 第1期8卷 23-39页
作者: Umar, Mubarak Albarka Chen, Zhanfang Shuaib, Khaled Liu, Yan College of Information Technology United Arab Emirates University Al Ain15551 United Arab Emirates School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Department of Computer Science Shantou University Guangdong Shantou515063 China
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence (AI) techniques (such as machine learning (ML) and deep learning (DL)) to build... 详细信息
来源: 评论
A fast and highly scalable frequent pattern mining algorithm
收藏 引用
Future Generation computer Systems 2024年 160卷 854-868页
作者: Cheng, Wan-Shu Lin, Yi-Ting Huang, Peng-Yu Chen, Ju-Chin Lin, Kawuu W. Department of Computer Science and Information Management Providence University Taichung Taiwan Department of Computer Science and Information Engineering National Kaohsiung University of Science and Technology Kaohsiung Taiwan
As the use of big data and its potential benefits become more widespread, public and private organizations around the world have realized the imperative of incorporating comprehensive and robust technologies into thei... 详细信息
来源: 评论