咨询与建议

限定检索结果

文献类型

  • 10,211 篇 会议
  • 5,995 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,620 篇 工学
    • 8,292 篇 计算机科学与技术...
    • 6,862 篇 软件工程
    • 2,190 篇 信息与通信工程
    • 1,299 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 870 篇 电气工程
    • 732 篇 机械工程
    • 651 篇 电子科学与技术(可...
    • 610 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 390 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 353 篇 安全科学与工程
    • 320 篇 动力工程及工程热...
    • 319 篇 交通运输工程
    • 301 篇 网络空间安全
    • 280 篇 建筑学
  • 4,824 篇 理学
    • 2,815 篇 数学
    • 1,233 篇 生物学
    • 957 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,075 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,338 篇 图书情报与档案管...
    • 755 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 443 篇 法学
    • 331 篇 社会学
  • 279 篇 经济学
    • 278 篇 应用经济学
  • 240 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 341 篇 semantics
  • 320 篇 computational mo...
  • 319 篇 feature extracti...
  • 302 篇 deep learning
  • 265 篇 training
  • 225 篇 data mining
  • 215 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 153 篇 internet of thin...
  • 143 篇 authentication
  • 135 篇 convolution
  • 135 篇 quality of servi...

机构

  • 427 篇 college of compu...
  • 358 篇 school of comput...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 189 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 110 篇 school of comput...
  • 107 篇 school of softwa...
  • 101 篇 school of softwa...
  • 101 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of comput...
  • 93 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 liu yang
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 29 篇 bo du
  • 28 篇 niyato dusit
  • 28 篇 shen furao
  • 28 篇 wang wei

语言

  • 15,204 篇 英文
  • 888 篇 其他
  • 272 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16347 条 记 录,以下是4581-4590 订阅
排序:
Assessing the Robustness of LLM-based NLP software via Automated Testing
arXiv
收藏 引用
arXiv 2024年
作者: Xiao, Mingxuan Xiao, Yan Ji, Shunhui Cai, Hanbo Xue, Lei Zhang, Pengcheng Key Laboratory of Water Big Data Technology Ministry of Water Resources College of Computer Science and Software Engineering Hohai University Nanjing211100 China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen518107 China
Benefiting from the advancements in LLMs, NLP software has undergone rapid development. Such software is widely employed in various safety-critical tasks, such as financial sentiment analysis, toxic content moderation... 详细信息
来源: 评论
RaftFed: A Lightweight Federated Learning Framework for Vehicular Crowd Intelligence
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Changan Chen, Yaxing Zhang, Yao Cui, Helei Yu, Zhiwen Guo, Bin Yan, Zheng Yang, Zijiang School of Software Northwestern Polytechnical University Xi’an China School of Computer Science Northwestern Polytechnical University Xi’an China School of Cyber Engineering Xidian University Xi’an China Turing Research Center for Interdisciplinary Information Science Xi'an Jiaotong University Xi’an China
Vehicular crowd intelligence (VCI) is an emerging research field. Facilitated by state-of-the-art vehicular ad-hoc networks and artificial intelligence, various VCI applications come to place, e.g., collaborative sens... 详细信息
来源: 评论
WMAJL: Watcher-Mediated Attention Joint Learning Model for Multimodal Relation Extraction
WMAJL: Watcher-Mediated Attention Joint Learning Model for M...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yunrui Dong Guiduo Duan Tianxi Huang Yunhao Li School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu China Chengdu Textile College College of Humanities and General Education Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
In the domain of Multimodal Relation Extraction (MRE), we present the $\color{Red}{\text{W}}$atcher-$\color{Red}{\text{M}}$ediated $\color{Red}{\text{A}}$ttention $\color{Red}{\text{J}}$oint $\color{Red}{\text{L}}$ear... 详细信息
来源: 评论
Split and Merge: Component Based Segmentation Network for Text Detection  1
收藏 引用
2nd International Conference on Pattern Recognition and Artificial Intelligence, ICPRAI 2020
作者: Gao, Pan Wan, Qi Shen, Linlin Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China
This paper presents a novel component-based detector to locate scene texts with arbitrary orientations, shapes and lengths. Our approach detects text by predicting four components like text region (TR), text skeleton ... 详细信息
来源: 评论
TAD-Bench: A Comprehensive Benchmark for Embedding-Based Text Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Cao, Yang Yang, Sikun Li, Chen Xiang, Haolong Qi, Lianyong Liu, Bo Li, Rongsheng Liu, Ming School of Computing and Information Technology Great Bay University China Great Bay Institute for Advanced Study Great Bay University China Graduate School of Informatics Nagoya University Japan School of Software Nanjing University of Information Science and Technology China College of Computer Science and Technology China University of Petroleum [East China China College of Cyberspace Security Zhengzhou University China School of Computer Harbin Engineering University China School of IT Deakin University Australia
Text anomaly detection is crucial for identifying spam, misinformation, and offensive language in natural language processing tasks. Despite the growing adoption of embedding-based methods, their effectiveness and gen... 详细信息
来源: 评论
DISTDET: a cost-effective distributed cyber threat detection system  23
DISTDET: a cost-effective distributed cyber threat detection...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Feng Dong Liu Wang Xu Nie Fei Shao Haoyu Wang Ding Li Xiapu Luo Xusheng Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology and Sangfor Technologies Inc Beijing University of Posts and Telecommunications Case Western Reserve University School of Cyber Science and Engineering Huazhong University of Science and Technology Key Laboratory of High-Confidence Software Technologies (MOE) School of Computer Science Peking University The Hong Kong Polytechnic University Arizona State University
Building provenance graph that considers causal relationships among software behaviors can better provide contextual information of cyber attacks, especially for advanced attacks such as Advanced Persistent Threat (AP...
来源: 评论
Detecting Memory-Related Bugs by Tracking Heap Memory Management of C++ Smart Pointers  36
Detecting Memory-Related Bugs by Tracking Heap Memory Manage...
收藏 引用
36th IEEE/ACM International Conference on Automated software engineering, ASE 2021
作者: Ma, Xutong Yan, Jiwei Wang, Wei Yan, Jun Zhang, Jian Qiu, Zongyan Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences China University of Chinese Academy of Sciences China Peking University School of Mathematical Sciences China
The smart pointer mechanism, which is improved in the continuous versions of the C++ standards over the last decade, is designed to prevent memory-leak bugs by automatically deallocating the managed memory blocks. How... 详细信息
来源: 评论
Composite Virtual Spatial Modulation and Its Diversity Enhancement
Composite Virtual Spatial Modulation and Its Diversity Enhan...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Zahid Iqbal Fei Ji Jun Li Qiang Li Adil Nawaz Xue-Qin Jiang Jia Hou School of Electronic and Information Engineering South China University of Technology Guangzhou China School of Electronics and Communication Engineering Guangzhou University Guangzhou China College of Information Science and Technology Jinan University Guangzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Information Science and Technology Donghua University Shanghai China School of Electronic and Information Engineering Soochow University Suzhou China
Virtual spatial modulation (VSM) has arisen as a promising technique for improving the energy efficiency (EE) of multiple-input multiple-output (MIMO) systems. However, due to utilizing only a subset of virtual parall...
来源: 评论
Near-Field Full Dimensional Beam Codebook Design for XL-MIMO Communications
Near-Field Full Dimensional Beam Codebook Design for XL-MIMO...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Wei Huang Cuiling Li Yong Zeng Caihong Kai Shiwen He School of Comnuting Science and Information Hefei University of Technology Hefei China National Mobile Communications Research Laboratory Southeast University Nanjing China School of Computer Science and Engineering Central South University Changsha China School of Software Xinjiang University Urumqi China
Extremely large-scale multiple-input multiple-output (XL-MIMO) communication system with extremely large-scale antenna arrays can achieve ultra-high spectral efficiency. However, the conventional far-field beam codebo...
来源: 评论
Analytic Correlation Penalty with Variable Window in Multi-task Learning Disease Progression Model
Analytic Correlation Penalty with Variable Window in Multi-t...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xiangchao Chang Menghui Zhou Fengtao Nan Yun Yang Po Yang School of Software Yunnan University Kunming China School of Information Science and Engineering Yunnan University Kunming China Department of Computer Science University of Sheffield Sheffield UK
Alzheimer's Disease (AD) is the most common reason of dementia that causes serious problems in patients' congnitive functions. Multi-task learning (MTL) has performed well in studies of longitudinal processes ... 详细信息
来源: 评论