咨询与建议

限定检索结果

文献类型

  • 10,281 篇 会议
  • 6,032 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,676 篇 工学
    • 8,343 篇 计算机科学与技术...
    • 6,861 篇 软件工程
    • 2,219 篇 信息与通信工程
    • 1,344 篇 控制科学与工程
    • 1,129 篇 生物工程
    • 904 篇 电气工程
    • 734 篇 机械工程
    • 657 篇 电子科学与技术(可...
    • 616 篇 光学工程
    • 612 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 371 篇 安全科学与工程
    • 365 篇 仪器科学与技术
    • 339 篇 交通运输工程
    • 325 篇 动力工程及工程热...
    • 322 篇 网络空间安全
    • 282 篇 建筑学
  • 4,834 篇 理学
    • 2,814 篇 数学
    • 1,232 篇 生物学
    • 961 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 522 篇 系统科学
    • 418 篇 化学
  • 3,112 篇 管理学
    • 1,885 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 753 篇 工商管理
  • 529 篇 医学
    • 453 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 444 篇 法学
    • 333 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 239 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 487 篇 software enginee...
  • 339 篇 semantics
  • 326 篇 computational mo...
  • 323 篇 feature extracti...
  • 310 篇 deep learning
  • 262 篇 training
  • 223 篇 data mining
  • 212 篇 optimization
  • 211 篇 educational inst...
  • 177 篇 neural networks
  • 175 篇 predictive model...
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 163 篇 machine learning
  • 159 篇 computer archite...
  • 155 篇 internet of thin...
  • 143 篇 authentication
  • 137 篇 servers
  • 136 篇 accuracy

机构

  • 435 篇 college of compu...
  • 359 篇 school of comput...
  • 271 篇 school of inform...
  • 263 篇 school of comput...
  • 222 篇 school of comput...
  • 219 篇 school of comput...
  • 186 篇 state key labora...
  • 155 篇 school of softwa...
  • 135 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 108 篇 school of softwa...
  • 107 篇 school of comput...
  • 102 篇 school of softwa...
  • 101 篇 state key labora...
  • 100 篇 college of compu...
  • 98 篇 school of softwa...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...

作者

  • 68 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 gao yang
  • 34 篇 wang yasha
  • 33 篇 huang di
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 28 篇 niyato dusit
  • 28 篇 cui lizhen
  • 28 篇 shen furao

语言

  • 14,017 篇 英文
  • 2,202 篇 其他
  • 270 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16454 条 记 录,以下是4301-4310 订阅
排序:
Theoretical Analyses of Integral-Type Zhang Neurodynamics with Disturbances Inhibited Handling Temporally-Varying Nonlinear System of Equations
Theoretical Analyses of Integral-Type Zhang Neurodynamics wi...
收藏 引用
Chinese Automation Congress (CAC)
作者: Mingzhi Mao Ji Lu Yang Shi Yunong Zhang School of Software Engineering Sun Yat-sen University Zhuhai P. R. China School of Computer Science and Engineering Sun Yat-sen University Guangzhou P. R. China
We design and present an integral-type Zhang neurodynamics (ITZN) model for handling temporally-varying nonlinear system of equations (TVNSE). To investigate the disturbances inhibition of the model, the general form ...
来源: 评论
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Che Zhang, Jiashuo Gao, Jianbo Xia, Libin Guan, Zhi Chen, Zhong School of Computer Science Peking University Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China
Smart contracts are susceptible to being exploited by attackers, especially when facing real-world vulnerabilities. To mitigate this risk, developers often rely on third-party audit services to identify potential vuln... 详细信息
来源: 评论
Financial Loan Overdue Risk Detection via Meta-path-based Graph Neural Network
Financial Loan Overdue Risk Detection via Meta-path-based Gr...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Jinze Chen Jieli Liu Zhiying Wu Shanhe Zhao Quanzhong Li Jiajing Wu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China Merchants Union Consumer Finance Company Limited Shenzhen China
Overdue risk detection of consumer loans is a critical issue faced by consumer finance companies. Unlike other types of loans, such as mortgage loans and guaranteed loans, consumer loans only regard personal credit as...
来源: 评论
One-to-Multiple Clean-Label Image Camouflage (Omclic) Based Backdoor Attack on Deep Learning
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Guohong Ma, Hua Gao, Yansong Abuadbba, Alsharif Zhang, Zhi Wei, Kang Al-Sarawi, Said F. Zhang, Gongxuan Abbott, Derek School of Cyber Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing China School of Electrical and Electronic Engineering The University of Adelaide Australia Department of Computer Science and Software Engineering The University of Western Australia Australia Data61 Commonwealth Scientific and Industrial Research Organisation CSIRO Australia
Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size o... 详细信息
来源: 评论
Explicit Analysis of Age of Synchronization in IoT Networks
Explicit Analysis of Age of Synchronization in IoT Networks
收藏 引用
IEEE International Conference on Information Communication and Signal Processing (ICICSP)
作者: Zhiwei Jin Siyuan Zhou Yunquan Dong Bin Tang Guoping Tan College of Information Science and Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing China
The Internet of Things (IoT) has the capability to support the synchronous transmission of dynamically sensed environmental status information to base stations. To improve transmission timeliness, previous studies hav... 详细信息
来源: 评论
Privacy-preserving cloud-fog–based traceable road condition monitoring in VANET
Privacy-preserving cloud-fog–based traceable road condition...
收藏 引用
作者: Wang, Wei Wu, Lei Qu, Wenlei Liu, Zhaoman Wang, Hao School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China Shandong Provincial Key Laboratory for Software Engineering Jinan China
With the development of intelligent vehicles, the research on road condition monitoring has attracted much attention in the vehicular ad hoc network (VANET). The combination of VANET, cloud computing, and fog computin... 详细信息
来源: 评论
A Crossover Algebra for Solving Minimum Spanning Tree in Network Design with Diameter Constraints
A Crossover Algebra for Solving Minimum Spanning Tree in Net...
收藏 引用
2021 International Conference on Cloud computer, IoT and Intelligence System, CCIIS 2021
作者: Wang, Ziyi Shi, Kai Qiao, Fuqiang Li, Huanran School of Computer Science and Engineering Tianjin University of Technology China College of Software and Communications Tianjin Sino-German University of Applied Sciences Tianjin China
The minimum spanning tree problem with diameter constraint is an important problem for many applications such as network design and reliability. The diameter constraint makes it be different from the common minimum sp... 详细信息
来源: 评论
A Video Surveillance System Based on Single-Mode Fiber for Energy and Signal Co-Transmission
A Video Surveillance System Based on Single-Mode Fiber for E...
收藏 引用
Chinese Automation Congress (CAC)
作者: Yuanle Su Xueliang Gu Zhiguo Zhang Xu Wang Haoyu Wu Jialin Wei Xiangning Song State Key Lab of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China
This paper introduces an innovative video surveillance system that utilizes single-mode fiber for the simultaneous transmission of energy and information. Traditional surveillance systems relying on electrical cables ... 详细信息
来源: 评论
computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Tailin Liang Zhaolin Yuan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Industrial and Systems Engineering Research Institute of Advanced Manufacturing The Hong Kong Polytechnic University Hong Kong China
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Zongyuan Duan, Tianyang Lin, Zheng Huang, Dong Fang, Zihan Sun, Zekai Xiong, Ling Liang, Hongbin Cui, Heming Cui, Yong Department of Computer Science The University of Hong Kong Hong Kong Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Department of Computer Science City University of Hong Kong Hong Kong School of Computer and Software Engineering Xihua University Chengdu610039 China National United Engineering Laboratory of Integrated and Intelligent Transportation The National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China Department of Computer Science and Technology Ts-inghua University Beijing100084 China
Recently, deep reinforcement learning (DRL) has emerged as a promising approach for robotic control. However, the deployment of DRL in real-world robots is hindered by its sensitivity to environmental perturbations. W... 详细信息
来源: 评论