咨询与建议

限定检索结果

文献类型

  • 10,253 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,673 篇 工学
    • 8,341 篇 计算机科学与技术...
    • 6,834 篇 软件工程
    • 2,207 篇 信息与通信工程
    • 1,368 篇 控制科学与工程
    • 1,127 篇 生物工程
    • 877 篇 电气工程
    • 736 篇 机械工程
    • 659 篇 电子科学与技术(可...
    • 606 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 276 篇 建筑学
  • 4,828 篇 理学
    • 2,816 篇 数学
    • 1,236 篇 生物学
    • 956 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,067 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,332 篇 图书情报与档案管...
    • 750 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 443 篇 法学
    • 330 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 624 篇 computer science
  • 481 篇 software enginee...
  • 337 篇 semantics
  • 318 篇 computational mo...
  • 315 篇 feature extracti...
  • 306 篇 deep learning
  • 272 篇 training
  • 224 篇 data mining
  • 218 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 157 篇 computer archite...
  • 156 篇 machine learning
  • 155 篇 internet of thin...
  • 142 篇 authentication
  • 137 篇 servers
  • 136 篇 convolution

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 264 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 187 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 106 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,189 篇 英文
  • 978 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16424 条 记 录,以下是4561-4570 订阅
排序:
Improving Adversarial Transferability via Neuron Attribution-Based Attacks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Jianping Wu, Weibin Huang, Jen-Tse Huang, Yizhan Wang, Wenxuan Su, Yuxin Lyu, Michael R. Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong School of Software Engineering Sun Yat-sen University China
Deep neural networks (DNNs) are known to be vulnerable to adversarial examples. It is thus imperative to devise effective attack algorithms to identify the deficiencies of DNNs beforehand in security-sensitive applica... 详细信息
来源: 评论
An efficient and secure arbitrary N-party quantum key agreement protocol using Bell states
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Xu, Yong Yang, Ching-Nung Gao, Pei-Pei Yu, Wen-Bin Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. [Quantum Inf. Process. 13, 2391(2014)]. However, Zhu et al. pointed out that there are some security f... 详细信息
来源: 评论
Flexible Capacitive Pressure Sensors and Their Applications in Human-Machine Interactions
Flexible Capacitive Pressure Sensors and Their Applications ...
收藏 引用
Sensor Technology and Control (ISSTC), International Symposium on
作者: Chenyu Fang Tianli Fu Yao Shi Changzhou No.1 High School Changzhou China School of Mechanical and Electronic Engineering Wuhan University of Technology Wuhan China College of Computer and Information Science College of Software Southwest University Chongqing China
Flexible capacitive pressure sensors have shown excellent application potential in human-machine interactions, wearable electronic devices, biological and medical, and electronic skin. Compared with piezoresistive and...
来源: 评论
Handwritten Signature Recognition using Parallel CNNs and Transfer Learning for Forensics
Handwritten Signature Recognition using Parallel CNNs and Tr...
收藏 引用
International Conference on Control, Decision and Information Technologies (CoDIT)
作者: Jaouhar Fattahi Feriel Sghaier Mohamed Mejri Ridha Ghayoula Emil Pricop Baha Eddine Lakdher Department of Computer Science and Software Engineering Laval University Quebec Canada Carthage National Engineering School Carthage University Tunis Tunisia Faculty of Engineering University of Moncton Canada Computers & Electronics Department Automatic Control Petroleum-Gas University of Ploieşti Ploieşti Romania Faculty of Science University of Monastir Monastir Tunisia
Handwritten signatures hold paramount importance in legal, financial, and administrative domains, necessitating the development of robust signature recognition tools for forensic applications. This paper introduces a ... 详细信息
来源: 评论
Fusing Dynamics Equation: A Social Opinions Prediction Algorithm with LLM-based Agents
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Junchi Zhang, Hongjie Ou, Jie Zuo, Dingyi Yang, Zheng Dong, Zhicheng College of Computer Science Sichuan Normal University Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Fujian Provincial Engineering Technology Research Center of Photoelectric Sensing Application Fujian Normal University Fuzhou China College of Information Science Technology Tibet University Lhasa China
In the context where social media is increasingly becoming a significant platform for social movements and the formation of public opinion, accurately simulating and predicting the dynamics of user opinions is of grea... 详细信息
来源: 评论
Solving Math Word Problems Following Logically Consistent Template
Solving Math Word Problems Following Logically Consistent Te...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Zeyu Huang Xiaofeng Zhang Jun Bai Wenge Rong Yuanxin Ouyang Zhang Xiong State Key Laboratory of Software Development Environment Beihang University Beijing China Sino-French Engineer School Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Solving math word problems (MWPs) is a challenging task. Some existing solvers retrieve textually similar problems and draw on their solutions to solve the given problem. However, textually similar questions are not g...
来源: 评论
Towards Time-Series Key Points Detection Through Self-supervised Learning and Probability Compensation  28th
Towards Time-Series Key Points Detection Through Self-superv...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Yuan, Mingxu Bi, Xin Huang, Xuechun Zhang, Wei Hu, Lei Yuan, George Y. Zhao, Xiangguo Sun, Yongjiao Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern University Shenyang110819 China Key Laboratory of Liaoning Province on Deep Engineering and Intelligent Technology Northeastern University Shenyang110819 China School of Computer Science and Engineering Northeastern University Shenyang China Thinvent Digital Technology Co. Ltd. Nanchang India College of Software Northeastern University Shenyang China
Key points detection is crucial for signal analysis by marking the identification points of specific events. Deep learning methods have been introduced into key points detection tasks due to their significant represen... 详细信息
来源: 评论
Deep Learning-Based Approach for Identification of Potato Leaf Diseases Using Wrapper Feature Selection and Feature Concatenation
arXiv
收藏 引用
arXiv 2025年
作者: Naeem, Muhammad Ahtsam Saleem, Muhammad Asim Sharif, Muhammad Imran Akber, Shahzad Saleem, Sajjad Akhtar, Zahid Siddique, Kamran School of Information and Software Engineering University of Electronic Science and Technology of China China Faculty of Computing Riphah International University Faisalabad Campus Pakistan Department of Computer Science COMSATS University Islamabad Wah Campus Pakistan Department of Information and Technology Washington University of Science and Technology AlexandriaVA United States Department of Network and Computer Security State University of New York Polytechnic Institute United States Department of Computer Science and Engineering University of Alaska Anchorage Anchorage United States
The potato is a widely grown crop in many regions of the world. In recent decades, potato farming has gained incredible traction in the world. Potatoes are susceptible to several illnesses that stunt their development... 详细信息
来源: 评论
Hyper-IIoT: A Smart Contract-inspired Access Control Scheme for Resource-constrained Industrial Internet of Things
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年
作者: Li, Dun Li, Hongzhi Crespi, Noel Minerva, Roberto Li, Ming Liang, Wei Li, Kuan-Ching Tsinghua University Department of Industrial Engineering China Institut Polytechnique de Paris Samovar Telecom SudParis Palaiseau91120 France Chizhou University College of Big Data and Artificial Intelligence Chizhou247100 China The Hong Kong Polytechnic University Research Institute for Advanced Manufacturing Hung Hom Hong Kong Hunan University of Science and Technology School of Computer Science and Engineering Hunan University of Science and Technology Sanya Research Institute Hunan Key Laboratory for Service Computing and Novel Software Technology China Providence University Dept. of Computer Science and Information Engineering Taiwan
In recent years, the refinements in industrial processes and the increasing complexity of managing privacy-sensitive data in Industrial Internet of Things (IIoT) devices have highlighted the need for secure, robust, a... 详细信息
来源: 评论
Subgraph-Oriented Heterogeneous Drug-Target Interaction Identification
Subgraph-Oriented Heterogeneous Drug-Target Interaction Iden...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xiaofeng Zhang Zeyu Huang Jun Bai Wenge Rong Yuanxin Ouyang Zhang Xiong State Key Laboratory of Software Development Environment Beihang University Beijing China Sino-French Engineer School Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Drug-target interaction (DTI) is an important task in drug discovery and drug repurposing. Currently, most methods utilizing drug-based and protein-based similarity values to predict DTIs achieve promising results. Ho...
来源: 评论