咨询与建议

限定检索结果

文献类型

  • 31,621 篇 会议
  • 19,413 篇 期刊文献
  • 443 册 图书

馆藏范围

  • 51,477 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32,734 篇 工学
    • 22,560 篇 计算机科学与技术...
    • 18,236 篇 软件工程
    • 9,198 篇 信息与通信工程
    • 5,320 篇 控制科学与工程
    • 4,296 篇 电气工程
    • 4,077 篇 电子科学与技术(可...
    • 3,644 篇 生物工程
    • 2,524 篇 机械工程
    • 2,492 篇 光学工程
    • 2,373 篇 生物医学工程(可授...
    • 1,845 篇 仪器科学与技术
    • 1,674 篇 动力工程及工程热...
    • 1,555 篇 化学工程与技术
    • 1,444 篇 网络空间安全
    • 1,321 篇 交通运输工程
    • 1,304 篇 安全科学与工程
  • 17,228 篇 理学
    • 9,183 篇 数学
    • 4,877 篇 物理学
    • 4,036 篇 生物学
    • 3,066 篇 统计学(可授理学、...
    • 1,874 篇 系统科学
    • 1,714 篇 化学
  • 8,992 篇 管理学
    • 5,637 篇 管理科学与工程(可...
    • 3,748 篇 图书情报与档案管...
    • 2,187 篇 工商管理
  • 2,325 篇 医学
    • 1,890 篇 临床医学
    • 1,679 篇 基础医学(可授医学...
    • 1,010 篇 药学(可授医学、理...
    • 984 篇 公共卫生与预防医...
  • 1,391 篇 法学
    • 1,111 篇 社会学
  • 821 篇 经济学
  • 609 篇 农学
  • 578 篇 教育学
  • 237 篇 文学
  • 146 篇 军事学
  • 128 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 1,325 篇 feature extracti...
  • 1,094 篇 accuracy
  • 1,070 篇 deep learning
  • 1,007 篇 training
  • 896 篇 computational mo...
  • 816 篇 machine learning
  • 778 篇 computer science
  • 728 篇 optimization
  • 638 篇 internet of thin...
  • 608 篇 data mining
  • 606 篇 semantics
  • 545 篇 predictive model...
  • 504 篇 support vector m...
  • 455 篇 artificial intel...
  • 431 篇 data models
  • 420 篇 neural networks
  • 415 篇 wireless sensor ...
  • 404 篇 real-time system...
  • 401 篇 educational inst...
  • 392 篇 security

机构

  • 708 篇 school of comput...
  • 564 篇 school of comput...
  • 475 篇 maharishi school...
  • 284 篇 faculty of scien...
  • 277 篇 department of ph...
  • 269 篇 departamento de ...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 258 篇 school of comput...
  • 247 篇 department for p...
  • 244 篇 department of ph...
  • 241 篇 department of ph...
  • 222 篇 department of ph...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 204 篇 school of comput...
  • 197 篇 department of ph...
  • 164 篇 maharishi school...
  • 155 篇 institute of phy...
  • 155 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 266 篇 f. siegert
  • 266 篇 a. c. könig
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 261 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 258 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 253 篇 g. gaudio
  • 244 篇 y. tayalati
  • 244 篇 d. guest
  • 235 篇 niyato dusit
  • 228 篇 s. mohapatra

语言

  • 42,157 篇 英文
  • 8,413 篇 其他
  • 981 篇 中文
  • 52 篇 日文
  • 10 篇 德文
  • 10 篇 法文
  • 8 篇 斯洛文尼亚文
  • 3 篇 朝鲜文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Engineering and Information Technology"
51477 条 记 录,以下是171-180 订阅
排序:
Siamese Visual Tracking with Feature Enhancement Fusion  24
Siamese Visual Tracking with Feature Enhancement Fusion
收藏 引用
10th International Conference on Computing and Artificial Intelligence, ICCAI 2024
作者: Wu, Zhixi Liu, Baichen Zhu, Shunzhi Xiamen University of Technology School of Computer and Information Engineering China
In object tracking tasks, the use of a Siamese-based approach to construct trackers inevitably involves a crucial step-cross-correlation operations, which are employed to assess the similarity relationship between the... 详细信息
来源: 评论
HASHL: Dynamic Hash Verification for Detecting and Preventing Eclipse Attacks
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23524-23535页
作者: He, Daojing Gong, Wei Tu, Chen Chan, Sammy Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Jiangxi University of Science and Technology School of Information Engineering Jiangxi Ganzhou China City University of Hong Kong Department of Electrical Engineering Hong Kong
With the rapid development of blockchain technology, P2P networks are facing increasing security threats, among which Eclipse attacks, as a type of network isolation attack, have seriously affected the normal operatio... 详细信息
来源: 评论
A Combined Approach of Deep Reinforcement Learning and Simulated Annealing for Task offloading in Edge Computing  24
A Combined Approach of Deep Reinforcement Learning and Simul...
收藏 引用
4th International Conference on Artificial Intelligence, Automation and High Performance Computing, AIAHPC 2024
作者: Lin, Ke Liu, Yanggai Zhu, Zilu Li, Lin School of Computer and Information Engineering Xiamen University of Technology China
Edge computing paradigms shifts data processing tasks from remote cloud servers to the network’s edge, closer to data origination points. This approach reduces data transmission delays, enhances processing efficiency... 详细信息
来源: 评论
Robust copy-move detection and localization of digital audio based CFCC feature
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9573-9589页
作者: Wang, Dongyu Li, Xiaojie Shi, Canghong Niu, Xianhua Xiong, Ling Wu, Hanzhou Qian, Qing Qi, Chao School of Computer and Software Engineering Xihua University Chengdu610039 China The College of Computer Science Chengdu University of Information Technology Chengdu610225 China School of Information Shanghai University Shanghai200444 China School of Information Guizhou University of Finance and Economics Guiyang550000 China
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema... 详细信息
来源: 评论
Resource allocation for wireless networks based on enhanced Harris hawks optimisation algorithm
收藏 引用
International Journal of Security and Networks 2024年 第4期19卷 178-187页
作者: Meng, Xianmeng Cai, Cuicui Tan, Linglong Wang, Qijian School of Electronics Engineering Anhui Xinhua University Hefei230088 China School of Computer Science and Information Engineering Hefei University of Technology Hefei230601 China School of Electronics and Information Engineering West Anhui University Lu’an237012 China
Efficient resource allocation is critical to improve the quality of service in wireless networks. The problem of resource allocation is usually non-convex and non-deterministic polynomial-hard. Meta-heuristic algorith... 详细信息
来源: 评论
Automated object recognition in high-resolution optical remote sensing imagery
收藏 引用
National Science Review 2023年 第6期10卷 38-41页
作者: Yazhou Yao Tao Chen Hanbo Bi Xinhao Cai Gensheng Pei Guoye Yang Zhiyuan Yan Xian Sun Xing Xu Hai Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Aerospace Information Research Institute Chinese Academy of Sciences School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Key Laboratory of Network Information System Technology (NIST) Aerospace Information Research Institute Chinese Academy of Sciences Department of Computer Science and Technology Tsinghua University School of Computer Science and Engineering University of Electronic Science and Technology of China Pazhou Laboratory (Huangpu) School of Mathematics Northwest University
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
来源: 评论
Constructing a Secure Charity NFT Auction Platform Using Fisco Bcos Blockchain for Enhancing Transparency and Traceability
收藏 引用
IEEE Access 2024年 12卷 36924-36941页
作者: Chen, Chin-Ling Zhan, Wan-Bing Tsaur, Woei-Jiunn Huang, Der-Chen Liu, Ling-Chun Changchun Sci-Tech University Changchun School of Information Engineering Jilin130600 China Chaoyang University of Technology Department of Computer Science and Information Engineering Taichung413310 Taiwan Xiamen University of Technology Xiamen School of Computer and Information Engineering Fujian361024 China National Taipei University Computer Center New Taipei City237303 Taiwan National Taipei University Department of Computer Science and Information Engineering New Taipei City237303 Taiwan National Chung Hsing University Department of Computer Science and Engineering Taichung402202 Taiwan
In the charity sector, fundraising and transparency have long been key issues. Charity NFT (Non-Fungible Token) auctions, an emerging charity fundraising model integrating blockchain and NFT concepts, bring opportunit... 详细信息
来源: 评论
How graph convolutions amplify popularity bias for recommendation?
收藏 引用
Frontiers of computer Science 2024年 第5期18卷 121-132页
作者: Jiajia CHEN Jiancan WU Jiawei CHEN Xin XIN Yong LI Xiangnan HE School of Information Science and Technology University of Science and Technology of ChinaHefei 230026China School of Computer Science and Technology Zhejiang UniversityHangzhou 310058China School of Computer Science and Technology Shandong UniversityQingdao 250100China Department of Electronic Engineering Tsinghua UniversityBeijing 100084China
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail ite... 详细信息
来源: 评论
Representation learning via an integrated autoencoder for unsupervised domain adaptation
收藏 引用
Frontiers of computer Science 2023年 第5期17卷 75-87页
作者: Yi ZHU Xindong WU Jipeng QIANG Yunhao YUAN Yun LI School of Information Engineering Yangzhou UniversityYangzhou 225127China Key Laboratory of Knowledge Engineering with Big Data(Ministry of Education of China) Hefei University of TechnologyHefei 230009China School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230601China
The purpose of unsupervised domain adaptation is to use the knowledge of the source domain whose data distribution is different from that of the target domain for promoting the learning task in the target *** key bott... 详细信息
来源: 评论
A dynamic and resource sharing virtual network mapping algorithm
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1101-1112页
作者: Xiancui Xiao Xiangwei Zheng Ji Bian Cun Ji Xinchun Cui School of Information Science and Engineering Shandong Normal UniversityJinan250014China School of Information Engineering Shandong Management UniversityJinan250358China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014China School of Computer Science and Technology Qufu Normal UniversityRizhao276800China
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind... 详细信息
来源: 评论