咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是381-390 订阅
排序:
Memristor-Based Genetic Algorithm for Image Restoration
收藏 引用
Journal of Electronic science and Technology 2022年 第2期20卷 149-158页
作者: Yong-Bin Yu Chen Zhou Quan-Xin Deng Yuan-Jing-Yang Zhong Man Cheng Zheng-Fei Kang the School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054 the School of Computer Science Chengdu College of University of Electronic Science and Technology of ChinaChengdu 611731
This paper explores a way of deploying the classical algorithm named genetic algorithm(GA) with the memristor. The memristor is a type of circuit device with both characteristics of storage and computing, which provid... 详细信息
来源: 评论
Defense Mechanisms Against Audio Adversarial Attacks: Recent Advances and Future Directions  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Li, Routing Xue, Meng School of Software Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science Wuhan University Wuhan China
With the popularity of speech and speaker recognition systems in recent years, voice interfaces are increasingly integrated into various Internet of Things (IoT) devices. However, studies have demonstrated that such s... 详细信息
来源: 评论
Dual Cross-Stage Partial Learning for Detecting Objects in Dehazed Images  24
Dual Cross-Stage Partial Learning for Detecting Objects in D...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhao, Jinbiao Zhang, Zhao Ren, Jiahuan Zhang, Haijun Zhao, Zhongqiu Wang, Meng School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China Harbin Institute of Technology Department of Computer Science Shenzhen China
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf... 详细信息
来源: 评论
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of computer science 2022年 第2期16卷 152-159页
作者: Zhangjie FU Yan WANG Xingming SUN Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c... 详细信息
来源: 评论
Deep-USIpred: identifying substrates of ubiquitin protein ligases E3 and deubiquitinases with pretrained protein embedding and bayesian neural network
Deep-USIpred: identifying substrates of ubiquitin protein li...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Jia Pan, Gui-Qing Li, Jian-Qiang Shang, Xue-Qun You, Zhu-Hong Huang, Yu-An Shenzhen University College of Computer Science and Software Engineering Shenzhen China Northwesterm Polytechnical University School of Computer Science Shaanxi China
Identifying the substrates of ubiquitin protein ligase (E3) and deubiquitinases (DUB) contributes to the discovery of potential therapeutic targets for diseases. However, experimental identification of E3/DUB-substrat... 详细信息
来源: 评论
Virtual Assembly Collision Detection Algorithm Using Backpropagation Neural Network
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1085-1100页
作者: Baowei Wang Wen You School of Computer Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software Nanjing University of Information Science and TechnologyNanjing210044China
As computer graphics technology continues to advance,Collision Detection(CD)has emerged as a critical element in fields such as virtual reality,computer graphics,and interactive *** is indispensable for ensuring the f... 详细信息
来源: 评论
Internet of Things (IoT) applications security trends and challenges
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-22页
作者: Laghari, Asif Ali Li, Hang Khan, Abdullah Ayub Shoulin, Yin Karim, Shahid Khani, Muhammad Adnan Kaim Software College Shenyang Normal University Shenyang China Department of Computer Science Bahria University Karachi Campus Karachi75000 Pakistan School of Information Engineering Xi’an Eurasia University Shaanxi Xian710065 China Department of Computer Science Ilma University Karachi Pakistan
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie... 详细信息
来源: 评论
RealDriftGenerator: A Novel Approach to Generate Concept Drift in Real World Scenario
RealDriftGenerator: A Novel Approach to Generate Concept Dri...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lin, Borong Huang, Chao Zhu, Xiaohui Jin, Nanlin School of Advance Technology Xi'an Jiaotong-Liverpool University Department of Computer Science and Software Engineering SuZhou China University of Liverpool Department of Computer Science Liverpool United Kingdom
Concept drift refers to the probability distribution of data generation changes over time in a data stream environment. In recent years, there has been an increasing interest in drift detection models. However, due to...
来源: 评论
Deletion and Recovery Scheme of Electronic Health Records Based onMedical Certificate Blockchain
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 849-859页
作者: Baowei Wang Neng Wang Yuxiao Zhang Zenghui Xu Junhao Zhang School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044JiangsuChina Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044JiangsuChina
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and th... 详细信息
来源: 评论
Limited Resources Usage of Deep-Learning-Based IoT Devices in Healthcare  2
Limited Resources Usage of Deep-Learning-Based IoT Devices i...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Gao, Xian He, Peixiong Zhou, Yi Qin, Xiao Columbus State University Tsys School of Computer Science ColumbusGA United States Auburn University Department of Computer Science and Software Engineering AuburnAL United States
Deep learning models are widely used in healthcare. Given the large amount of data and the need for real-time processing, running these models on IoT devices is a viable solution. This study examines the impact of dee... 详细信息
来源: 评论