咨询与建议

限定检索结果

文献类型

  • 10,269 篇 会议
  • 5,969 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,582 篇 工学
    • 8,259 篇 计算机科学与技术...
    • 6,818 篇 软件工程
    • 2,174 篇 信息与通信工程
    • 1,288 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 850 篇 电气工程
    • 730 篇 机械工程
    • 644 篇 电子科学与技术(可...
    • 613 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 279 篇 建筑学
  • 4,800 篇 理学
    • 2,807 篇 数学
    • 1,232 篇 生物学
    • 951 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,066 篇 管理学
    • 1,855 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 440 篇 法学
    • 330 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 625 篇 computer science
  • 486 篇 software enginee...
  • 338 篇 semantics
  • 326 篇 feature extracti...
  • 325 篇 computational mo...
  • 305 篇 deep learning
  • 262 篇 training
  • 224 篇 data mining
  • 212 篇 educational inst...
  • 211 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 159 篇 machine learning
  • 156 篇 internet of thin...
  • 156 篇 computer archite...
  • 142 篇 authentication
  • 139 篇 servers
  • 137 篇 accuracy

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 106 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,497 篇 英文
  • 1,646 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16379 条 记 录,以下是4121-4130 订阅
排序:
PERSON RETRIEVAL IN PHYSICAL WORLD
PERSON RETRIEVAL IN PHYSICAL WORLD
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Huang, Wenxin Li, Dongyang Hu, Ruimin Liang, Chao Zhong, Xian School of Computer and Information Engineering Hubei University China National Engineering Research Center for Multimedia Software Wuhan University China Research Institute of Wuhan University Shenzhen China School of Computer Science and Technology Wuhan University of Technology China
Person re-identification (re-ID) gains plenty of achievements as a retrieval problem in constrained camera networks. However, most of the researches are concentrated on visual appearance, they still suffer from the co... 详细信息
来源: 评论
Theoretical Analyses of Integral-Type Zhang Neurodynamics with Disturbances Inhibited Handling Temporally-Varying Nonlinear System of Equations
Theoretical Analyses of Integral-Type Zhang Neurodynamics wi...
收藏 引用
Chinese Automation Congress (CAC)
作者: Mingzhi Mao Ji Lu Yang Shi Yunong Zhang School of Software Engineering Sun Yat-sen University Zhuhai P. R. China School of Computer Science and Engineering Sun Yat-sen University Guangzhou P. R. China
We design and present an integral-type Zhang neurodynamics (ITZN) model for handling temporally-varying nonlinear system of equations (TVNSE). To investigate the disturbances inhibition of the model, the general form ...
来源: 评论
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Che Zhang, Jiashuo Gao, Jianbo Xia, Libin Guan, Zhi Chen, Zhong School of Computer Science Peking University Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China
Smart contracts are susceptible to being exploited by attackers, especially when facing real-world vulnerabilities. To mitigate this risk, developers often rely on third-party audit services to identify potential vuln... 详细信息
来源: 评论
GPUSCAN++: Efficient Structural Graph Clustering on GPUs
arXiv
收藏 引用
arXiv 2023年
作者: Yuan, Long Zhou, Zeyu Lin, Xuemin Chen, Zi Zhao, Xiang Zhang, Fan The School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China The School of Computer Science and Engineering The University of New South Wales Sydney Australia The Software Engineering Institute East China Normal University Shanghai China The College of Systems Engineering National University of Defense Technology Changsha China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Structural clustering is one of the most popular graph clustering methods, which has achieved great performance improvement by utilizing GPUs. Even though, the state-of-the-art GPU-based structural clustering algorith... 详细信息
来源: 评论
Privacy-preserving cloud-fog–based traceable road condition monitoring in VANET
Privacy-preserving cloud-fog–based traceable road condition...
收藏 引用
作者: Wang, Wei Wu, Lei Qu, Wenlei Liu, Zhaoman Wang, Hao School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China Shandong Provincial Key Laboratory for Software Engineering Jinan China
With the development of intelligent vehicles, the research on road condition monitoring has attracted much attention in the vehicular ad hoc network (VANET). The combination of VANET, cloud computing, and fog computin... 详细信息
来源: 评论
One-to-Multiple Clean-Label Image Camouflage (Omclic) Based Backdoor Attack on Deep Learning
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Guohong Ma, Hua Gao, Yansong Abuadbba, Alsharif Zhang, Zhi Wei, Kang Al-Sarawi, Said F. Zhang, Gongxuan Abbott, Derek School of Cyber Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing China School of Electrical and Electronic Engineering The University of Adelaide Australia Department of Computer Science and Software Engineering The University of Western Australia Australia Data61 Commonwealth Scientific and Industrial Research Organisation CSIRO Australia
Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size o... 详细信息
来源: 评论
Financial Loan Overdue Risk Detection via Meta-path-based Graph Neural Network
Financial Loan Overdue Risk Detection via Meta-path-based Gr...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Jinze Chen Jieli Liu Zhiying Wu Shanhe Zhao Quanzhong Li Jiajing Wu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China Merchants Union Consumer Finance Company Limited Shenzhen China
Overdue risk detection of consumer loans is a critical issue faced by consumer finance companies. Unlike other types of loans, such as mortgage loans and guaranteed loans, consumer loans only regard personal credit as...
来源: 评论
Explicit Analysis of Age of Synchronization in IoT Networks
Explicit Analysis of Age of Synchronization in IoT Networks
收藏 引用
IEEE International Conference on Information Communication and Signal Processing (ICICSP)
作者: Zhiwei Jin Siyuan Zhou Yunquan Dong Bin Tang Guoping Tan College of Information Science and Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing China
The Internet of Things (IoT) has the capability to support the synchronous transmission of dynamically sensed environmental status information to base stations. To improve transmission timeliness, previous studies hav... 详细信息
来源: 评论
A Crossover Algebra for Solving Minimum Spanning Tree in Network Design with Diameter Constraints
A Crossover Algebra for Solving Minimum Spanning Tree in Net...
收藏 引用
2021 International Conference on Cloud computer, IoT and Intelligence System, CCIIS 2021
作者: Wang, Ziyi Shi, Kai Qiao, Fuqiang Li, Huanran School of Computer Science and Engineering Tianjin University of Technology China College of Software and Communications Tianjin Sino-German University of Applied Sciences Tianjin China
The minimum spanning tree problem with diameter constraint is an important problem for many applications such as network design and reliability. The diameter constraint makes it be different from the common minimum sp... 详细信息
来源: 评论
computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Tailin Liang Zhaolin Yuan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Industrial and Systems Engineering Research Institute of Advanced Manufacturing The Hong Kong Polytechnic University Hong Kong China
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论