咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是301-310 订阅
排序:
Similar Locality Based Transfer Evolutionary Optimization for Minimalistic Attacks  13
Similar Locality Based Transfer Evolutionary Optimization fo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Ma, Wenqiang Hau, Yaqing Yu, Hua Tong, Xiangrong Zhu, Zexuan Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian116024 China School of Computer and Control Engineering Yantai University Yantai264005 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Deep neural networks are powerful and popular learning models;however, recent studies have shown that deep neural network-based policies are susceptible to deception by adversarial attacks. A minimalistic attack is a ... 详细信息
来源: 评论
Multi-Optimiser Training for GANs Based on Evolutionary Computation  13
Multi-Optimiser Training for GANs Based on Evolutionary Comp...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Zhang, Yixia Xue, Yu Neri, Ferrante School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Electronic Engineering University of Surrey Guildford United Kingdom
Generative adversarial networks (GANs) are widely recognized for their impressive ability to generate realistic data. Despite the popularity of GANs, training them poses challenges such as mode collapse and instabilit... 详细信息
来源: 评论
Region-adaptive Concept Aggregation for Few-shot Visual Recognition
收藏 引用
Machine Intelligence Research 2023年 第4期20卷 554-568页
作者: Mengya Han Yibing Zhan Baosheng Yu Yong Luo Han Hu Bo Du Yonggang Wen Dacheng Tao School of Computer Science National Engineering Research Center for Multimedia SoftwareWuhan UniversityWuhan430072China Hubei Luojia Laboratory Wuhan430072China School of Computer Science The University of SydneySydney2006Australia JD Explore Academy Beijing101116China School of Information and Electronics Beijing Institute of TechnologyBeijing100081China School of Computer Science and Engineering Nanyang Technological UniversitySingapore639798Singapore
Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking robustness in concept learning. Specifically, existing FSL methods usually ig... 详细信息
来源: 评论
Applying blockchain-based method to smart contract classification for CPS applications
收藏 引用
Digital Communications and Networks 2022年 第6期8卷 964-975页
作者: Zigui Jiang Kai Chen Hailin Wen Zibin Zheng School of Software Engineering Sun Yat-Sen UniversityChina School of Mathematics Sun Yat-Sen UniversityChina School of Computer Science and Engineering Sun Yat-Sen UniversityChina
Smart contract has been the core of blockchain systems and other blockchain-based systems since Blockchain *** operations on blockchain are performed through the invocation and execution of smart *** leads to extensiv... 详细信息
来源: 评论
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua science and Technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论
CRAYM: Neural Field Optimization via Camera RAY Matching  38
CRAYM: Neural Field Optimization via Camera RAY Matching
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Lin, Liqiang Wu, Wenpeng Fu, Chi-Wing Zhang, Hao Huang, Hui College of Computer Science and Software Engineering Shenzhen University China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong School of Computing Science Simon Fraser University Canada
We introduce camera ray matching (CRAYM) into the joint optimization of camera poses and neural fields from multi-view images. The optimized field, referred to as a feature volume, can be "probed" by the cam...
来源: 评论
A Reputation Layered Coding Based Storage Strategy for Consortium Blockchain  22
A Reputation Layered Coding Based Storage Strategy for Conso...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Li, Ziqian Pan, Maolin Yu, Yang Sun Yat-Sen University School of Computer Science and Engineering Guangzhou China Sun Yat-Sen University School of Software Engineering Zhuhai China
The improvement of consensus algorithms has greatly enhanced the performance of consortium blockchain, making it possible to be applied in large-scale network scenarios such as finance, healthcare and supply chain man... 详细信息
来源: 评论
Multi-Scale Fusion and Decomposition Network for Single Image Deraining
收藏 引用
IEEE Transactions on Image Processing 2024年 33卷 191-204页
作者: Wang, Qiong Jiang, Kui Wang, Zheng Ren, Wenqi Zhang, Jianhui Lin, Chia-Wen Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan430072 China Sun Yat-sen University School of Cyber Science and Technology Guangzhou510275 China Hangzhou Dianzi University College of Computer Science and Technology Hangzhou310018 China National Tsing Hua University Department of Electrical Engineering The Institute of Communications Engineering Hsinchu30013 Taiwan
Convolutional neural networks (CNNs) and self-attention (SA) have demonstrated remarkable success in low-level vision tasks, such as image super-resolution, deraining, and dehazing. The former excels in acquiring loca... 详细信息
来源: 评论
An elastic framework construction method based on task migration in edge computing
An elastic framework construction method based on task migra...
收藏 引用
作者: Pu, Yonglin Li, Ziyang Yu, Jiong Lu, Liang Guo, Binglei School of Software Nanjing University of Information Science and Technology Nanjing China School of Software Xinjiang University Urumqi China College of Computer Science and Technology Civil Aviation University of China Tianjin China School of Computer Engineering Hubei University of Arts and Science Xiangyang China
Edge computing (EC) serves as an effective technology, empowering end-users to attain high bandwidth and low latency by offloading tasks with high computational demands from mobile devices to edge servers. However, a ... 详细信息
来源: 评论
Knowledge Graph Driven Inference Testing for Question Answering software  24
Knowledge Graph Driven Inference Testing for Question Answer...
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Wang, Jun Li, Yanhui Chen, Zhifei Chen, Lin Zhang, Xiaofang Zhou, Yuming Nanjing University State Key Laboratory for Novel Software Technology China School of Computer Science and Engineering Nanjing University of Science and Technology China School of Computer Science and Technology Soochow University China
In the wake of developments in the field of Natural Language Processing, Question Answering (QA) software has penetrated our daily lives. Due to the data-driven programming paradigm, QA software inevitably contains bu... 详细信息
来源: 评论