咨询与建议

限定检索结果

文献类型

  • 6,399 篇 期刊文献
  • 5,449 篇 会议
  • 58 册 图书

馆藏范围

  • 11,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,633 篇 工学
    • 4,740 篇 计算机科学与技术...
    • 3,809 篇 软件工程
    • 1,545 篇 信息与通信工程
    • 1,120 篇 电气工程
    • 986 篇 电子科学与技术(可...
    • 878 篇 控制科学与工程
    • 798 篇 生物工程
    • 692 篇 光学工程
    • 585 篇 生物医学工程(可授...
    • 579 篇 化学工程与技术
    • 507 篇 机械工程
    • 486 篇 材料科学与工程(可...
    • 384 篇 动力工程及工程热...
    • 343 篇 仪器科学与技术
    • 270 篇 力学(可授工学、理...
    • 215 篇 交通运输工程
    • 203 篇 网络空间安全
  • 5,237 篇 理学
    • 2,585 篇 数学
    • 2,107 篇 物理学
    • 894 篇 生物学
    • 832 篇 统计学(可授理学、...
    • 663 篇 化学
    • 421 篇 系统科学
    • 219 篇 地球物理学
  • 1,692 篇 管理学
    • 1,021 篇 管理科学与工程(可...
    • 724 篇 图书情报与档案管...
    • 393 篇 工商管理
  • 470 篇 医学
    • 403 篇 临床医学
    • 344 篇 基础医学(可授医学...
    • 235 篇 药学(可授医学、理...
  • 213 篇 法学
  • 130 篇 经济学
  • 120 篇 农学
  • 72 篇 教育学
  • 39 篇 军事学
  • 26 篇 文学
  • 21 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 220 篇 computational mo...
  • 215 篇 feature extracti...
  • 211 篇 laboratories
  • 185 篇 deep learning
  • 180 篇 semantics
  • 165 篇 computer science
  • 140 篇 machine learning
  • 124 篇 computer archite...
  • 108 篇 neural networks
  • 108 篇 optimization
  • 108 篇 predictive model...
  • 106 篇 image segmentati...
  • 96 篇 training
  • 87 篇 application soft...
  • 86 篇 data mining
  • 83 篇 visualization
  • 81 篇 deep neural netw...
  • 81 篇 resource managem...
  • 80 篇 real time system...
  • 79 篇 grid computing

机构

  • 184 篇 key laboratory o...
  • 179 篇 university of ch...
  • 127 篇 university of sc...
  • 121 篇 college of compu...
  • 103 篇 school of comput...
  • 98 篇 shandong provinc...
  • 97 篇 tianfu cosmic ra...
  • 91 篇 hubei key labora...
  • 90 篇 department of ph...
  • 89 篇 hebei normal uni...
  • 86 篇 center for quant...
  • 86 篇 state key labora...
  • 86 篇 real-time comput...
  • 84 篇 school of inform...
  • 83 篇 yunnan observato...
  • 83 篇 peng cheng labor...
  • 71 篇 key laboratory f...
  • 67 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 67 篇 state key labora...

作者

  • 103 篇 bastieri d.
  • 96 篇 k.g. shin
  • 85 篇 niyato dusit
  • 83 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 axikegu
  • 75 篇 li xin
  • 73 篇 jiang k.
  • 71 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 liu d.
  • 68 篇 chen m.j.
  • 65 篇 liu s.m.
  • 65 篇 huang d.h.
  • 65 篇 dai h.l.
  • 63 篇 min z.
  • 56 篇 heller m.
  • 54 篇 guo y.q.
  • 52 篇 pang b.y.

语言

  • 10,958 篇 英文
  • 767 篇 其他
  • 192 篇 中文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Laboratory of Computing Science and Engineering"
11906 条 记 录,以下是161-170 订阅
排序:
OblivTime: Oblivious and Efficient Interval Skyline Query Processing Over Encrypted Time-Series Data
收藏 引用
IEEE Transactions on Services computing 2025年 第03期18卷 1602-1617页
作者: Ouyang, Huajie Zheng, Yifeng Wang, Songlei Hua, Zhongyun Harbin Institute of Technology School of Computer Science and Technology Guangdong Shenzhen518055 China The Hong Kong Polytechnic University Department of Electrical and Electronic Engineering Hong Kong Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518055 China
Time-series data is prevalent in many applications like smart homes, smart grids, and healthcare. And it is now increasingly common to store and query time-series data in the cloud. Despite the benefits, data privacy ... 详细信息
来源: 评论
A novel observation points‐based positive‐unlabeled learning algorithm
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1425-1443页
作者: Yulin He Xu Li Manjing Zhang Philippe Fournier‐Viger Joshua Zhexue Huang Salman Salloum Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) ShenzhenChina College of Computer Science and Software Engineering Shenzhen UniversityShenzhenChina School of Computing National University of SingaporeSingaporeSingapore
In this study,an observation points‐based positive‐unlabeled learning algorithm(hence called OP‐PUL)is proposed to deal with positive‐unlabeled learning(PUL)tasks by judiciously assigning highly credible labels to... 详细信息
来源: 评论
A Transformer-Based Approach for Effective Visual Question Answering  10
A Transformer-Based Approach for Effective Visual Question A...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Zakari, Rufai Yusuf Owusu, Jim Wilson Qin, Ke Sagir, Auwal Muhammad University of Electronic Science and Technology of China School of Computer Science and Engineering China Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart Cities Xiamen China
Visual Question Answering (VQA) presents a multifaceted challenge, requiring models to process and integrate both textual and visual data. The Transformer architecture, with its self-attention mechanism, has proven hi... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
ProgMate: An Intelligent Programming Assistant Based on LLM  54
ProgMate: An Intelligent Programming Assistant Based on LLM
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Li, Ying Yang, Runze Zhang, Xiantao Shi, Peng Yang, Da Huang, Xuefei School of Computer Science and Engineering Beihang University Beijing China International Innovation Institute Beihang University Key Laboratory of Data Science and Intelligent Computing Hangzhou China
This study addresses the challenges faced in personalized tutoring within large-scale programming courses, such as significant ability gaps among students, limited available resources, among others. For these reasons,... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code  6
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
6th International Conference on Communications, Information System and Computer engineering, CISCE 2024
作者: Xiong, Zhe Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
Visualizing Program Behavior: A Study of Enhanced Program Diagrams Using LLM  54
Visualizing Program Behavior: A Study of Enhanced Program Di...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Li, Ying Yang, Runze Gui, ShiJie Shi, Peng Huang, Xuefei Yang, Da Zhang, Xiaozhou Gai, Yiming School of Computer Science and Engineering Beihang University Beijing China International Innovation Institute Beihang University Key Laboratory of Data Science and Intelligent Computing Hangzhou China
This paper aims to address the difficulties faced by novice programmers in grasping code structure and execution flow, improving programming thinking, and pinpointing code errors with accuracy. It proposes providing s... 详细信息
来源: 评论
PAIR: Protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: Protein-aptamer interaction prediction based on langua...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhang, Jun Yan, Zhiqiang Zeng, Hao Zhu, Zexuan Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论
Generalize Audio Deepfake Algorithm Recognition via Attribution Enhancement
Generalize Audio Deepfake Algorithm Recognition via Attribut...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Zhigang Ye, Dengpan Li, Jingyang Deng, Jiacheng Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China
The development of voice cloning techniques has made forgery audios indistinguishable, posing an urgency to trace their sources. Many existing works focus on improving identification accuracy for audio deepfake algori... 详细信息
来源: 评论
Key Management and Authentication Scheme Forward Trusted Pervasive Container computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论