咨询与建议

限定检索结果

文献类型

  • 885 篇 期刊文献
  • 839 篇 会议
  • 11 册 图书

馆藏范围

  • 1,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,171 篇 工学
    • 859 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 201 篇 信息与通信工程
    • 145 篇 控制科学与工程
    • 138 篇 生物工程
    • 127 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 96 篇 电子科学与技术(可...
    • 73 篇 机械工程
    • 70 篇 化学工程与技术
    • 51 篇 材料科学与工程(可...
    • 51 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 41 篇 仪器科学与技术
    • 37 篇 建筑学
    • 37 篇 交通运输工程
  • 627 篇 理学
    • 322 篇 数学
    • 188 篇 物理学
    • 158 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 68 篇 化学
    • 56 篇 系统科学
  • 310 篇 管理学
    • 197 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 119 篇 医学
    • 102 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 50 篇 公共卫生与预防医...
    • 42 篇 药学(可授医学、理...
  • 52 篇 法学
  • 30 篇 经济学
  • 25 篇 教育学
  • 19 篇 农学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 3 篇 文学

主题

  • 77 篇 computer science
  • 67 篇 software enginee...
  • 44 篇 deep learning
  • 35 篇 semantics
  • 29 篇 machine learning
  • 27 篇 feature extracti...
  • 24 篇 internet of thin...
  • 24 篇 accuracy
  • 23 篇 computational mo...
  • 21 篇 quality of servi...
  • 20 篇 application soft...
  • 20 篇 software testing
  • 20 篇 training
  • 19 篇 software systems
  • 19 篇 optimization
  • 18 篇 programming
  • 18 篇 image segmentati...
  • 18 篇 clustering algor...
  • 18 篇 software
  • 17 篇 computer archite...

机构

  • 33 篇 renewable and su...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 25 篇 department of co...
  • 19 篇 national enginee...
  • 18 篇 center for soft ...
  • 18 篇 department of co...
  • 17 篇 department of ph...
  • 17 篇 national enginee...
  • 14 篇 school of comput...
  • 13 篇 renewable and su...
  • 13 篇 university of ch...
  • 13 篇 state key labora...
  • 12 篇 department of co...
  • 12 篇 collaborative in...
  • 12 篇 shanghai key lab...
  • 11 篇 school of softwa...
  • 11 篇 department of co...
  • 10 篇 school of softwa...
  • 10 篇 department of co...

作者

  • 35 篇 smalyukh ivan i.
  • 23 篇 ismail leila
  • 17 篇 du bo
  • 16 篇 ivan i. smalyukh
  • 12 篇 das ashok kumar
  • 12 篇 zhao hai
  • 12 篇 mahmood khalid
  • 12 篇 li zuchao
  • 12 篇 shen linlin
  • 12 篇 materwala huned
  • 11 篇 xu xiaolong
  • 10 篇 heidari arash
  • 10 篇 ashish ghosh
  • 10 篇 susmita ghosh
  • 10 篇 leung victor c.m...
  • 10 篇 shamshad salman
  • 9 篇 wang yasha
  • 9 篇 leila ismail
  • 9 篇 yao yao
  • 8 篇 seifedine kadry

语言

  • 1,620 篇 英文
  • 97 篇 其他
  • 17 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Software Engineering and Computer Science Soft Center"
1735 条 记 录,以下是151-160 订阅
排序:
Using analytic hierarchy process to evaluate deep learning for infrared target recognition
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86229-86245页
作者: Xu, Laixiang Cao, Bingxu Wei, Xinhong Li, Bei Su, Jingfeng Ning, Shiyuan Zhao, Junmin School of Computer and Data Science Henan University of Urban Construction Pingdingshan467036 China School of Information Engineering Luohe Vocational Technology College Henan University of Technology Luohe Institute of Technology Luohe462000 China School of Computer and Data Science Innovation Laboratory of Smart Traffic and Big Data Development of Hainan Province Pingdingshan467036 China School of Computer and Data Science Research Center of Smart City and Big Data Engineering of Henan Province Henan University of Urban Construction Pingdingshan467036 China Department of Software Information China Electronics Technology Group Corporation 36-th Research Institute Jiaxing314033 China School of Computer and Data Science Research Center of Smart City and Big Data Engineering of Henan Province Research Center of Intelligent Campus Application Engineering of Henan Province Innovation Laboratory of Smart Traffic and Big Data Development of Hainan Province Henan University of Urban Construction Pingdingshan467036 China
In order to promote the evaluation performance of deep learning infrared automatic target recognition (ATR) algorithms in the complex environment of air-to-air missile research, we proposed an analytic hierarchy proce... 详细信息
来源: 评论
Reference trustable decoding: a training-free augmentation paradigm for large language models  24
Reference trustable decoding: a training-free augmentation p...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Luohe Shi Yao Yao Zuchao Li Lefei Zhang Hai Zhao National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan P. R. China Department of Computer Science and Engineering Shanghai Jiao Tong University
Large language models (LLMs) have rapidly advanced and demonstrated impressive capabilities. In-Context Learning (ICL) and Parameter-Efficient Fine-Tuning (PEFT) are currently two mainstream methods for augmenting LLM...
来源: 评论
Machine learning-based models for predicting calibration cost of flowmeters in the oil industry
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 2537-2556页
作者: Mohammed, Awsan Javaid, Abdullah Ghaithan, Ahmed AlDhafer, Osamah Al-shaibani, Maged S. Alshibani, Adel Architectural Engineering and Construction Management Department King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia Interdisciplinary Research Center for Smart Mobility and Logistics King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia Software Engineering University of Prince Mugrin Madinah40202 Saudi Arabia Department of Computer Science King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia Interdisciplinary Research Center of Construction and Building Materials King Fahd University of Petroleum and Minerals Dhahran34463 Saudi Arabia
Accurate measurement of liquid volume in pipelines is a crucial and sensitive process in the petroleum industry. Flowmeter is a common device used to measure the volume of the liquid passing through the pipeline and t... 详细信息
来源: 评论
How Do Hackathons Foster Creativity? Towards Automated Evaluation of Creativity at Scale  25
How Do Hackathons Foster Creativity? Towards Automated Evalu...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Falk, Jeanette Chen, Yiyi Rafner, Janet Zhang, Mike Bjerva, Johannes Nolte, Alexander Computer Science Aalborg University Copenhagen Denmark Department of Computer Science Aalborg University Copenhagen Denmark Center for Hybrid Intelligence Department of Management Aarhus University Aarhus Denmark Aarhus Institute for Advanced Studies Aarhus University Aarhus Denmark Software Engineering and Technology Eindhoven University of Technology Eindhoven Netherlands
Hackathons have become popular collaborative events for accelerating the development of creative ideas and prototypes. There are several case studies showcasing creative outcomes across domains such as industry, educa... 详细信息
来源: 评论
Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 573-589页
作者: Halah Hasan Mahmoud Marwan Kadhim Mohammed Al-Shammari Gehad Abdullah Amran Elsayed Tag eldin Ala R.Alareqi Nivin A.Ghamry Ehaa A.Lnajjar Esmail Almosharea Computer Center University of BaghdadBaghdad6751Iraq Department of Management Science and Engineering Dalian University of TechnologyLiaoningDalian116024China Department of Information Technology Faculty of Computer Sciences and Information Technology AL Razi UniversitySana’aYemen Faculty of Engineering and Technology Future University in EgyptNew Cairo11835Egypt Faculty of Engineering Mechanics Dalian University of TechnologyLiaoningDalian116024China Faculty of Computers and Artificial Intelligence Cairo UniversityGizaEgypt Department of Business Administration Dalian University of TechnologyLiaoningDalian116024China College of Software Engineering Dalian University of TechnologyChina
Utilizing artificial intelligence(AI)to protect smart coastal cities has become a novel vision for scientific and industrial *** of these AI technologies is using efficient and secure multi-environment Unmanned Vehicl... 详细信息
来源: 评论
MACRO: Incentivizing Multi-Leader Game-Based Pareto-Efficient Crowdsourcing for Video Analytics  40
MACRO: Incentivizing Multi-Leader Game-Based Pareto-Efficien...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Chen, Yu Zhang, Sheng Zhou, Ziying Wang, Xiaokun Liang, Yu Chen, Ning Yan, Yuting Xiao, Mingjun Wu, Jie Qian, Zhuzhong Xu, Harry Nanjing University State Key Lab. for Novel Software Technology China School of Systems Science Beijing Normal University China School of Computer and Electronic Information School of Artificial Intelligence Nanjing Normal University China School of Computer Science and Technology University of Science and Technology of China China Temple University Center for Networked Computing United States Samueli School of Engineering University of California Computer Science Department Los Angeles United States
In recent years, many crowdsourcing platforms have emerged, using the resources of recruited workers to perform diverse outsourcing tasks, where the video analytics attracts much attention due to its practical implica... 详细信息
来源: 评论
Model X-Ray: Detection of Hidden Malware in AI Model Weights using Few Shot Learning
arXiv
收藏 引用
arXiv 2024年
作者: Gilkarov, Daniel Dubin, Ran The Department of Computer Science Ariel Cyber Innovation Center Ariel University Ariel Israel The Department of Computer and Software Engineering Ariel Cyber Innovation Center Ariel University Ariel Israel
The potential for exploitation of AI models has increased due to the rapid advancement of Artificial Intelligence (AI) and the widespread use of platforms like Model Zoo for sharing AI models. Attackers can embed malw... 详细信息
来源: 评论
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
收藏 引用
Journal of Electronic science and Technology 2022年 第4期20卷 396-415页
作者: Xiao-Hang Wang Shou-Bin Li Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo School of Cyber Science and Technology Zhejiang UniversityHangzhou 310012 ZJU-Hangzhou Global Scientific and Technological Innovation Center Hangzhou 310012 School of Software Engineering South China University of TechnologyGuangzhou 510006 Department of Electrical and Computer Engineering University of NevadaLas Vegas 89154 School of Computer Science and Electronic Engineering University of EssexColchester CO43SQ School of Electronics and Information Engineering South China University of TechnologyGuangzhou 510640 School of Electronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then *** receiver at the other end picks up the sound signal,from which... 详细信息
来源: 评论
Attack and Improvement of a Hidden Vector Encryption Scheme  12
Attack and Improvement of a Hidden Vector Encryption Scheme
收藏 引用
12th International Conference on Electronics, Communications and Networks, CECNet 2022
作者: Wang, Ke Wang, Zhikun Luo, Song Guan, Zhi Key Laboratory of High Confidence Software Technologies Peking University MoE Beijing China Department of Computer Science and Technology Eecs Peking University Beijing China School of Computer Science and Engineering Chongqing University of Technology Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
Hidden Vector Encryption (HVE) is a new kind of attribute-based encryption in which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014, Phuong et al. proposed an HVE scheme with consta... 详细信息
来源: 评论
SDN control plane security: Attacks and mitigation techniques  2021
SDN control plane security: Attacks and mitigation technique...
收藏 引用
4th International Conference on Networking, Information Systems and Security, NISS 2021
作者: Fatima, Kiran Zahoor, Kanwal Bawany, Narmeen Zakaria Center for Computing Research Department of Computer Science and Software Engineering Jinnah University for Women
Traditional networks are complex and hard to manage due to many reasons such as manual configuration requirements of dedicated devices, lack of flexibility and a non-dynamic approach. To overcome these limitations and... 详细信息
来源: 评论