咨询与建议

限定检索结果

文献类型

  • 10,253 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,673 篇 工学
    • 8,341 篇 计算机科学与技术...
    • 6,834 篇 软件工程
    • 2,207 篇 信息与通信工程
    • 1,368 篇 控制科学与工程
    • 1,127 篇 生物工程
    • 877 篇 电气工程
    • 736 篇 机械工程
    • 659 篇 电子科学与技术(可...
    • 606 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 276 篇 建筑学
  • 4,828 篇 理学
    • 2,816 篇 数学
    • 1,236 篇 生物学
    • 956 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,067 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,332 篇 图书情报与档案管...
    • 750 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 443 篇 法学
    • 330 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 624 篇 computer science
  • 481 篇 software enginee...
  • 337 篇 semantics
  • 318 篇 computational mo...
  • 315 篇 feature extracti...
  • 306 篇 deep learning
  • 272 篇 training
  • 224 篇 data mining
  • 218 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 157 篇 computer archite...
  • 156 篇 machine learning
  • 155 篇 internet of thin...
  • 142 篇 authentication
  • 137 篇 servers
  • 136 篇 convolution

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 264 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 187 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 106 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,189 篇 英文
  • 978 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16424 条 记 录,以下是4551-4560 订阅
排序:
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on computer and Information Processing Technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论
An End-to-End Conformer-Based Speech Recognition Model for Mandarin Radiotelephony Communications in Civil Aviation  16th
An End-to-End Conformer-Based Speech Recognition Model for M...
收藏 引用
16th Chinese Conference on Biometric Recognition, CCBR 2022
作者: Shi, Yihua Ma, Guanglin Ren, Jin Zhang, Haigang Yang, Jinfeng Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area Shenzhen Polytechnic Shenzhen518055 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
In civil aviation radiotelephony communications, misunderstandings between air traffic controllers and flight crews can result in serious aviation accidents. Automatic semantic verification is a promising assistant so... 详细信息
来源: 评论
Digital Twin and DRL-Driven Semantic Dissemination for 6G Autonomous Driving Service
Digital Twin and DRL-Driven Semantic Dissemination for 6G Au...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yihang Tao Jun Wu Xi Lin Shahid Mumtaz Soumaya Cherkaoui School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Faculty of Science and Engineering Waseda University Japan Department of Engineering Nottingham Trent University UK Department of Computer and Software Engineering Polytechnique Montreal Canada
Data dissemination is critical for 6G autonomous driving (AD) service because of the extensive demand for real-time traffic information. However, the heavier data transmission burden and more stringent requirements of...
来源: 评论
A new lightweight data security system for data security in the cloud computing
收藏 引用
Measurement: Sensors 2023年 29卷
作者: Mohammed, Shameer Nanthini, S. Bala Krishna, N. Srinivas, Inumarthi V. Rajagopal, Manikandan Ashok Kumar, M. University of Technology and Applied Sciences Sur Oman Department of AI & DS Saveetha School of Engineering Saveetha Institute of Medical and Technical Science Thandalam Chennai India Department of CSE Mohan Babu University &SreeVidyanikethan Engineering College Andhrapradesh Tirupati517102 India Mumbai400077 India School of Business and Management Christ University Bangalore560029 India Faculty of Computer Science Department of Computer Science and Software Engineering Skyline University Nigeria Kano Nigeria
In recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and store... 详细信息
来源: 评论
A Light Transfer Model for Chinese Named Entity Recognition for Specialty Domain  15th
A Light Transfer Model for Chinese Named Entity Recognition ...
收藏 引用
15th CCF Conference on computer Supported Cooperative Work and Social Computing, Chinese CSCW 2020
作者: Wu, Jiaqi Liu, Tianyuan Sun, Yuqing Gong, Bin School of Software Shandong University Jinan China Engineering Research Center of Digital Media Technology Shandong University Jinan China School of Computer Science and Technology Shandong University Jinan China
Named entity recognition (NER) for specialty domain is a challenging task since the labels are specific and there are not sufficient labelled data for training. In this paper, we propose a simple but effective method,... 详细信息
来源: 评论
CNS-Net: Conservative Novelty Synthesizing Network for Malware Recognition in an Open-set Scenario
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Jingcai Guo, Song Ma, Shiheng Sun, Yuxia Xu, Yuanyuan The Department of Computing The Hong Kong Polytechnic University Hong Kong The Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200030 China The Department of Computer Science Jinan University Guangzhou510632 China The School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
We study the challenging task of malware recognition on both known and novel unknown malware families, called malware open-set recognition (MOSR). Previous works usually assume the malware families are known to the cl... 详细信息
来源: 评论
Dynamic personalized federated learning with adaptive differential privacy  23
Dynamic personalized federated learning with adaptive differ...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Xiyuan Yang Wenke Huang Mang Ye National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Hubei Luojia Laboratory Wuhan University Wuhan China
Personalized federated learning with differential privacy has been considered a feasible solution to address non-IID distribution of data and privacy leakage risks. However, current personalized federated learning met...
来源: 评论
A Semantic Trajectory Mining System Based on Deep Neural Network
A Semantic Trajectory Mining System Based on Deep Neural Net...
收藏 引用
第33届中国控制与决策会议
作者: Xinyuan Zhang Jiying Peng Xinqi Zhang School of Computer Science and Software Engineering University of Science and Technology Liaoning
At the beginning of 2020,epidemic of COrona VIrus Disease 19(COVID-19) broke *** the epidemic prevention and control,artificial intelligence,big data and other technologies have become powerful weapons against the epi... 详细信息
来源: 评论
MSM-VC: High-fidelity Source Style Transfer for Non-Parallel Voice Conversion by Multi-scale Style Modeling
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Zhichao Wang, Xinsheng Xie, Qicong Li, Tao Xie, Lei Tian, Qiao Wang, Yuping The ASLP Lab School of Computer Science Northwestern Polytechnical University Xi’an710072 China The School of Software Engineering Xi’an Jiaotong University Xi’an710049 China The ByteDance SAMI Group Shanghai200233 China
In addition to conveying the linguistic content from source speech to converted speech, maintaining the speaking style of source speech also plays an important role in the voice conversion (VC) task, which is essentia... 详细信息
来源: 评论
Robust Heterogeneous Federated Learning under Data Corruption
Robust Heterogeneous Federated Learning under Data Corruptio...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Xiuwen Fang Mang Ye Xiyuan Yang National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Hubei Luojia Laboratory Wuhan University Wuhan China
Model heterogeneous federated learning is a realistic and challenging problem. However, due to the limitations of data collection, storage, and transmission conditions, as well as the existence of free-rider participa...
来源: 评论