咨询与建议

限定检索结果

文献类型

  • 10,281 篇 会议
  • 6,032 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,676 篇 工学
    • 8,343 篇 计算机科学与技术...
    • 6,861 篇 软件工程
    • 2,219 篇 信息与通信工程
    • 1,344 篇 控制科学与工程
    • 1,129 篇 生物工程
    • 904 篇 电气工程
    • 734 篇 机械工程
    • 657 篇 电子科学与技术(可...
    • 616 篇 光学工程
    • 612 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 371 篇 安全科学与工程
    • 365 篇 仪器科学与技术
    • 339 篇 交通运输工程
    • 325 篇 动力工程及工程热...
    • 322 篇 网络空间安全
    • 282 篇 建筑学
  • 4,834 篇 理学
    • 2,814 篇 数学
    • 1,232 篇 生物学
    • 961 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 522 篇 系统科学
    • 418 篇 化学
  • 3,112 篇 管理学
    • 1,885 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 753 篇 工商管理
  • 529 篇 医学
    • 453 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 444 篇 法学
    • 333 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 239 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 487 篇 software enginee...
  • 339 篇 semantics
  • 326 篇 computational mo...
  • 323 篇 feature extracti...
  • 310 篇 deep learning
  • 262 篇 training
  • 223 篇 data mining
  • 212 篇 optimization
  • 211 篇 educational inst...
  • 177 篇 neural networks
  • 175 篇 predictive model...
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 163 篇 machine learning
  • 159 篇 computer archite...
  • 155 篇 internet of thin...
  • 143 篇 authentication
  • 137 篇 servers
  • 136 篇 accuracy

机构

  • 435 篇 college of compu...
  • 359 篇 school of comput...
  • 271 篇 school of inform...
  • 263 篇 school of comput...
  • 222 篇 school of comput...
  • 219 篇 school of comput...
  • 186 篇 state key labora...
  • 155 篇 school of softwa...
  • 135 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 108 篇 school of softwa...
  • 107 篇 school of comput...
  • 102 篇 school of softwa...
  • 101 篇 state key labora...
  • 100 篇 college of compu...
  • 98 篇 school of softwa...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...

作者

  • 68 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 gao yang
  • 34 篇 wang yasha
  • 33 篇 huang di
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 28 篇 niyato dusit
  • 28 篇 cui lizhen
  • 28 篇 shen furao

语言

  • 14,017 篇 英文
  • 2,202 篇 其他
  • 270 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16454 条 记 录,以下是4281-4290 订阅
排序:
SCeFSTA: Smart Contract enabled Fair, Secure, and Transparent Auction for Healthcare Transportation
SCeFSTA: Smart Contract enabled Fair, Secure, and Transparen...
收藏 引用
Annual IEEE Systems Conference
作者: Suman Bunia Owen Campbell Arthur Carvalho Vamsi Alluri Department of Computer Science and Software Engineering Miami University Oxford Ohio USA Farmer School of Business Miami University Oxford Ohio USA Freelance Blockchain Protocol Architect North Carolina USA
The healthcare transport sector has progressed considerably in recent years, yet it continues to face persistent challenges such as payment, staffing, record redundancy, and resource waste. This paper proposes a block... 详细信息
来源: 评论
NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks  7
NESec: A Modified-UI Honeyword Generation Strategy for Mitig...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Chakraborty, Nilesh Shojafar, Mohammad Chen, Zhuangzhuang Leung, Victor C. M. Li, Jianqiang Zulkernine, Mohammad School of Computing Queen's University K7L 3N6 Canada Institute for Communication Systems University of Surrey 5GIC & 6GIC GU27XH United Kingdom College of Computer Science and Software Engineering Shenzhen University 518060 China
By harnessing Graphics Processing Unit (GPU), Field-programmable Gate Array (FPGA), and advanced cracking techniques, the success rates of server-side threats on passwords have reached unprecedented levels. Honeywords... 详细信息
来源: 评论
VMeta: A QoS Dataset for Metaverse Services  6th
VMeta: A QoS Dataset for Metaverse Services
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Ge, Zhiyuan Jin, Huiying Dong, Hai Ji, Shunhui Li, Jiajia Yang, Shuhan Wang, Qi Zhang, Pengcheng Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing210000 China College of Computer Science and Software Engineering Hohai University Nanjing210000 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210000 China School of Computing Technologies RMIT University Melbourne3000 Australia
The metaverse is undergoing repaid evolution with metaverse services emerging as a significant focal point of research across virtual reality, augmented reality, and metaverse social networking. However, a key challen... 详细信息
来源: 评论
An Empirical Study of Parameter Efficient Fine-tuning on Vision-Language Pre-train Model
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Yuxin Yang, Mouxin Li, Yunfan Liu, Dayiheng Ren, Xingzhang Peng, Xi Lv, Jiancheng College of Computer Science Sichuan University Chengdu China School of Software and Microelectronics Peking University Beijing China Engineering Research Center of Machine Learning and Industry Intelligence Ministry of Education Chengdu China
Recent studies applied Parameter Efficient Fine-Tuning techniques (PEFTs) to efficiently narrow the performance gap between pre-training and downstream. There are two important factors for various PEFTs, namely, the a... 详细信息
来源: 评论
Sara: Controllable Makeup Transfer with Semantic-Guided Alignment and Region-Adaptive Normalization
SSRN
收藏 引用
SSRN 2024年
作者: Zhong, Xiaojing Huang, Xinyi Wu, Zhonghua Lin, Guosheng Wu, Qingyao School of Software Engineering South China University of Technology China School of Computer Science and Engineering Nanyang Technological University Singapore Key Laboratory of Big Data and Intelligent Robot Ministry of Education China Peng Cheng Laboratory China SenseTime Research Hong Kong
Makeup transfer is a process of transferring the makeup style from a reference image to the source image, while preserving the source image's identity. In addition to achieving fine-grained control over the makeup... 详细信息
来源: 评论
SCAF-DG: A Multi-site Medical Image Denoising With A Domain-Generalized Spatial-Channel Attention Fusion
SCAF-DG: A Multi-site Medical Image Denoising With A Domain-...
收藏 引用
Pattern Recognition and Artificial Intelligence (PRAI), International Conference on
作者: Linda Delali Fiasam Yunbo Rao Collins Sey Benjamin Klugah-Brown Obed Nartey Tettey Esther Stacy E.B. Aggrey Isaac Osei Agyemang Isaac Adjei-Mensah Yang Yang School of Information and Software Engineering University of Electronic Science Technology of China Chengdu China School of Life Science and Technology University of Electronic Science Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science Technology of China Chengdu China Sichuan Institute of Computer Sciences Chengdu China
Images from multiple medical sites usually contain varying noise levels that can affect the generalization performance of the denoising models. Domain generalization (DG), which seeks to learn a model that can general...
来源: 评论
Hierarchical Graph Interaction Transformer with Dynamic Token Clustering for Camouflaged Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Siyuan Sun, Hao Xiang, Tian-Zhu Wang, Xiao Cao, Xiaochun School of Computer Science National Pilot Software Engineering School Beijing University of Posts and Telecommunications Beijing100876 China Inception Institute of Artificial Intelligence G42 Bayanat Abu Dhabi United Arab Emirates School of Software Beihang University Beijing100083 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Shenzhen518107 China
Camouflaged object detection (COD) aims to identify the objects that seamlessly blend into the surrounding backgrounds. Due to the intrinsic similarity between the camouflaged objects and the background region, it is ... 详细信息
来源: 评论
Multi-scale Attention-Based Feature Pyramid Networks for Object Detection  11th
Multi-scale Attention-Based Feature Pyramid Networks for Obj...
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Zhao, Xiaodong Chen, Junliang Liu, Minmin Ye, Kai Shen, Linlin Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
Feature pyramid network (FPN) is widely used for multi-scale object detection. While lots of FPN based methods have been proposed to improve detection performance, there exists semantic difference between cross-scale ... 详细信息
来源: 评论
Galliot: Path Merging Based Betweenness Centrality Algorithm on GPU  42
Galliot: Path Merging Based Betweenness Centrality Algorithm...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Zheng, Zhigao Zhao, Chen Xie, Peichen Dum, Bo School of Computer Science Wuhan University Wuhan 430072 China National Engineering Research Center for Multimedia Software Wuhan University Wuhan 430072 Chin. Institute of Artificial Intelligence Wuhan University Wuhan 430072 Chin. Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan 430072 China Hubei Luojia Laboratory Wuhan 430072 China
Betweenness centrality (BC) is widely used to measure a vertex's significance by using the frequency of a vertex appearing in the shortest path between other vertices. However, most recent algorithms in BC computa... 详细信息
来源: 评论
A method to generate context information sets from analysis results with a unified abstraction model based on an extension of data enrichment scheme
A method to generate context information sets from analysis ...
收藏 引用
作者: Park, Yoosang Mun, Jonghyeok Choi, Jongsun Choi, Jaeyoung Kim, Hoda School of Computer Science and Engineering Soongsil University Seoul Korea Republic of National Program of Excellence in Software center Chosun University Gwangju Korea Republic of
Context-awareness techniques generally deal with steps for processing information that can be gathered from perspectives of objects in real-world scenes in accordance with resolving heterogeneous devices and providing... 详细信息
来源: 评论