咨询与建议

限定检索结果

文献类型

  • 140,031 篇 会议
  • 70,074 篇 期刊文献
  • 1,418 册 图书
  • 1 篇 学位论文

馆藏范围

  • 211,523 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 128,468 篇 工学
    • 85,637 篇 计算机科学与技术...
    • 69,909 篇 软件工程
    • 30,978 篇 信息与通信工程
    • 20,610 篇 控制科学与工程
    • 16,139 篇 电气工程
    • 15,924 篇 电子科学与技术(可...
    • 14,808 篇 生物工程
    • 10,402 篇 生物医学工程(可授...
    • 10,288 篇 光学工程
    • 9,623 篇 机械工程
    • 7,053 篇 化学工程与技术
    • 6,895 篇 仪器科学与技术
    • 6,396 篇 动力工程及工程热...
    • 4,976 篇 材料科学与工程(可...
    • 4,595 篇 交通运输工程
    • 4,512 篇 安全科学与工程
    • 4,382 篇 网络空间安全
  • 70,402 篇 理学
    • 35,725 篇 数学
    • 21,482 篇 物理学
    • 16,559 篇 生物学
    • 11,745 篇 统计学(可授理学、...
    • 7,744 篇 系统科学
    • 7,587 篇 化学
  • 33,151 篇 管理学
    • 20,619 篇 管理科学与工程(可...
    • 13,776 篇 图书情报与档案管...
    • 9,044 篇 工商管理
  • 9,857 篇 医学
    • 8,080 篇 临床医学
    • 7,214 篇 基础医学(可授医学...
    • 4,430 篇 药学(可授医学、理...
  • 5,623 篇 法学
    • 4,678 篇 社会学
  • 3,460 篇 经济学
  • 2,510 篇 农学
  • 2,166 篇 教育学
  • 951 篇 文学
  • 459 篇 军事学
  • 350 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,148 篇 computer science
  • 5,244 篇 accuracy
  • 5,128 篇 feature extracti...
  • 4,633 篇 deep learning
  • 4,624 篇 computational mo...
  • 4,611 篇 training
  • 3,748 篇 machine learning
  • 2,939 篇 optimization
  • 2,879 篇 predictive model...
  • 2,826 篇 semantics
  • 2,576 篇 data models
  • 2,363 篇 real-time system...
  • 2,330 篇 neural networks
  • 2,318 篇 support vector m...
  • 2,305 篇 data mining
  • 2,227 篇 convolutional ne...
  • 2,047 篇 internet of thin...
  • 1,975 篇 artificial intel...
  • 1,893 篇 educational inst...
  • 1,852 篇 image segmentati...

机构

  • 2,477 篇 school of comput...
  • 2,219 篇 school of comput...
  • 2,075 篇 school of comput...
  • 1,814 篇 school of comput...
  • 1,527 篇 school of comput...
  • 1,505 篇 school of comput...
  • 1,365 篇 school of comput...
  • 1,364 篇 school of electr...
  • 1,237 篇 school of comput...
  • 1,074 篇 cavendish labora...
  • 1,011 篇 school of comput...
  • 971 篇 department of ph...
  • 959 篇 school of comput...
  • 911 篇 school of comput...
  • 875 篇 university of ch...
  • 875 篇 oliver lodge lab...
  • 872 篇 physikalisches i...
  • 541 篇 school of comput...
  • 534 篇 school of comput...
  • 530 篇 school of comput...

作者

  • 398 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 241 篇 c. alexa
  • 235 篇 j. m. izen
  • 233 篇 s. chen
  • 227 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 borsato m.
  • 215 篇 brundu d.
  • 212 篇 beiter a.
  • 211 篇 g. bella
  • 210 篇 bencivenni g.
  • 209 篇 j. strandberg
  • 208 篇 c. amelung
  • 208 篇 bay a.

语言

  • 195,362 篇 英文
  • 12,961 篇 其他
  • 3,183 篇 中文
  • 182 篇 日文
  • 39 篇 朝鲜文
  • 21 篇 德文
  • 15 篇 法文
  • 7 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School Computer Engineering and Science"
211524 条 记 录,以下是51-60 订阅
排序:
LoRa Sense:Sensing and Optimization of LoRa Link Behavior Using Path-Loss Models in Open-Cast Mines
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 425-466页
作者: Bhanu Pratap Reddy Bhavanam Prashanth Ragam School of Computer Science and Engineering VIT-AP UniversityAmaravati52237India
The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic *** stud... 详细信息
来源: 评论
Endogenous Security Formal Definition,Innovation Mechanisms,and Experiment Research in Industrial Internet
收藏 引用
Tsinghua science and Technology 2024年 第2期29卷 492-505页
作者: Hongsong Chen Xintong Han Yiying Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism withou... 详细信息
来源: 评论
Boosting Adaptive Weighted Broad Learning System for Multi-Label Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2204-2219页
作者: Yuanxin Lin Zhiwen Yu Kaixiang Yang Ziwei Fan C.L.Philip Chen the School of Computer Science and Engineering in South China University of Technology IEEE the Pengcheng Laboratory
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone... 详细信息
来源: 评论
Facial Expression Recognition with High Response-Based Local Directional Pattern (HR-LDP) Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2067-2086页
作者: Sherly Alphonse Harshit Verma School of Computer Science and Engineering Vellore Institute of TechnologyChennaiIndia
Although lots of research has been done in recognizing facial expressions,there is still a need to increase the accuracy of facial expression recognition,particularly under uncontrolled *** use of Local Directional Pa... 详细信息
来源: 评论
AsyCo: an asymmetric dual-task co-training model for partial-label learning
收藏 引用
science China(Information sciences) 2025年 第5期68卷 332-347页
作者: Beibei LI Yiyuan ZHENG Beihong JIN Tao XIANG Haobo WANG Lei FENG College of Computer Science Chongqing University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences School of Software Technology Zhejiang University School of Computer Science and Engineering Nanyang Technological University
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance b... 详细信息
来源: 评论
Partial multi-label learning via label-specific feature corrections
收藏 引用
science China(Information sciences) 2025年 第3期68卷 95-109页
作者: Jun-Yi HANG Min-Ling ZHANG School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education
Partial multi-label learning(PML) allows learning from rich-semantic objects with inaccurate annotations, where a set of candidate labels are assigned to each training example but only some of them are valid. Existi... 详细信息
来源: 评论
DyHDGE:Dynamic heterogeneous transaction graph embedding for safety-centric fraud detection in financial scenarios
收藏 引用
Journal of Safety science and Resilience 2024年 第4期5卷 486-497页
作者: Xinzhi Wang Jiayu Guo Xiangfeng Luo Hang Yu School of Computer Engineering and Science Shanghai UniversityShanghai200444China
Dynamic graph fraud detection aims to distinguish fraudulent entities that deviate significantly from most benign entities within an ever-changing graph ***,when dealing with different financial fraud scenarios,existi... 详细信息
来源: 评论
When Software Security Meets Large Language Models:A Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 317-334页
作者: Xiaogang Zhu Wei Zhou Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang IEEE the School of Computer and Mathematical Sciences the University of Adelaide the School of Science Computing and Engineering Technologies Swinburne University of Technology
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... 详细信息
来源: 评论
Research on Image Defogging Algorithm Based on Improved FFA-Net
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第6期51卷 634-641页
作者: Qinrong, Li Chi, Ma Qiang, Guo Hui, Hu School of Computer Science and Software Engineering University of Science and Technology LiaoNing AnShan114051 China School of Computer Science and Engineering Huizhou University Huizhou516007 China
Images captured under severe weather conditions, such as haze and fog, suffer from image quality degradation caused by atmospheric particle diffusion. This degradation manifests as color fading, reduced contrast, and ... 详细信息
来源: 评论
Chess Puzzle: Evolution of Cyber Deception Strategies for IoT Security Enhancement
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16668-16680页
作者: Wang, Xiran Shi, Leyi Zhao, Zhihao Luo, Wenbin Ding, Bingtao School of Computer Science and Technology Qingdao266580 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
Nowadays, the proliferation of open Internet of Things (IoT) devices has made IoT systems increasingly vulnerable to cyber attacks. It is of great practical significance to solve the security issues of IoT systems. Dr... 详细信息
来源: 评论