咨询与建议

限定检索结果

文献类型

  • 10,211 篇 会议
  • 5,995 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,620 篇 工学
    • 8,292 篇 计算机科学与技术...
    • 6,862 篇 软件工程
    • 2,190 篇 信息与通信工程
    • 1,299 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 870 篇 电气工程
    • 732 篇 机械工程
    • 651 篇 电子科学与技术(可...
    • 610 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 390 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 353 篇 安全科学与工程
    • 320 篇 动力工程及工程热...
    • 319 篇 交通运输工程
    • 301 篇 网络空间安全
    • 280 篇 建筑学
  • 4,824 篇 理学
    • 2,815 篇 数学
    • 1,233 篇 生物学
    • 957 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,075 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,338 篇 图书情报与档案管...
    • 755 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 443 篇 法学
    • 331 篇 社会学
  • 279 篇 经济学
    • 278 篇 应用经济学
  • 240 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 341 篇 semantics
  • 320 篇 computational mo...
  • 319 篇 feature extracti...
  • 302 篇 deep learning
  • 265 篇 training
  • 225 篇 data mining
  • 215 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 153 篇 internet of thin...
  • 143 篇 authentication
  • 135 篇 convolution
  • 135 篇 quality of servi...

机构

  • 427 篇 college of compu...
  • 358 篇 school of comput...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 189 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 110 篇 school of comput...
  • 107 篇 school of softwa...
  • 101 篇 school of softwa...
  • 101 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of comput...
  • 93 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 liu yang
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 29 篇 bo du
  • 28 篇 niyato dusit
  • 28 篇 shen furao
  • 28 篇 wang wei

语言

  • 15,204 篇 英文
  • 888 篇 其他
  • 272 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16347 条 记 录,以下是4761-4770 订阅
排序:
MEA-Defender: A Robust Watermark against Model Extraction Attack
MEA-Defender: A Robust Watermark against Model Extraction At...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Peizhuo Lv Hualong Ma Kai Chen Jiachen Zhou Shengzhi Zhang Ruigang Liang Shenchen Zhu Pan Li Yingjun Zhang Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science Metropolitan College Boston University USA Institute of Software Chinese Academy of Sciences China
Recently, numerous highly-valuable Deep Neural Networks (DNNs) have been trained using deep learning algorithms. To protect the Intellectual Property (IP) of the original owners over such DNN models, backdoor-based wa... 详细信息
来源: 评论
Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain  11th
Achieving Lightweight Image Steganalysis with Content-Adapti...
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Chen, Junfu Fu, Zhangjie Sun, Xingming Li, Enlu Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
Steganography is a technology that modifies complex regions of digital images to embed secret messages for the purpose of covert communication, while steganalysis is to detect whether secret messages are hidden in a d... 详细信息
来源: 评论
Interpretability Research of Variational Autoencoder Generation Process Based on Feature Disentanglement
Interpretability Research of Variational Autoencoder Generat...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Sicheng Xi Yanhui Peng Chongqing Key Laboratory of Computational Intelligence College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Chongqing Key Laboratory of Computational Intelligence School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China
Variational Autoencoder (VAE), as one of the main generative models, has a powerful representation learning capability. However, the hidden space representation learned by VAE is a high-dimensional and complex vector ... 详细信息
来源: 评论
How to Route CUBIC and BBR Packets in Space
How to Route CUBIC and BBR Packets in Space
收藏 引用
International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
作者: Shuo Huang Zhiyuan Wang Wenhao Lu Kai Shen Jiayi Zhang Shan Zhang Hongbin Luo School of Computer Science and Engineering Beihang University Beijing China Zhongguancun Laboratory Beijing China State Key Laboratory of Virtual Reality Technology and Systems Beijing China State Key Laboratory of Software Development Environment Beijing China
Low-earth-orbit satellite constellation (e.g., Starlink) is becoming the indispensable component of future Internet. Due to the mobility nature, ground-satellite links (GSLs) and inter-satellite links (ISLs) are not a... 详细信息
来源: 评论
Explainable Machine Learning for High Frequency Trading Dynamics Discovery
SSRN
收藏 引用
SSRN 2023年
作者: Han, Henry Forrest, Jeffrey Yi-Lin Wang, Jiacun Yuan, Shuining Fei, Han Li, Diane Department of Computer Science School of Engineering and Computer Science Baylor University WacoTX76798 United States Department of Accounting Economics and Finance Slippery Rock University Slippery RockPA16057 United States Department of Computer Science and Software Engineering Monmouth University West Long Branch NJ07764 United States Quantitative Finance The Gabelli School of Business Fordham University New YorkNY10023 United States College of Computer science Jiangsu University Jiangsu Zhenjiang212013 China School of Business and Technology
High-frequency trading (HFT) plays an essential role in the financial market. However, how to discover and reveal trading dynamics remains a challenge in Fintech. In this study, we propose a novel explainable machine ... 详细信息
来源: 评论
Automated Test Case Repair Using Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Yaraghi, Ahmadreza Saboor Holden, Darren Kahani, Nafiseh Briand, Lionel School of Electrical Engineering and Computer Science University of Ottawa OttawaONK1N 5N6 Canada Lero The Research Ireland Centre for Software University of Limerick Ireland Department of Systems and Computer Engineering Carleton University OttawaONK1S 5B6 Canada
Ensuring the quality of software systems through testing is essential, yet maintaining test cases poses significant challenges and costs. The need for frequent updates to align with the evolving system under test ofte... 详细信息
来源: 评论
Gradient-Guided Test Case Generation for Image Classification software
Gradient-Guided Test Case Generation for Image Classificatio...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Shunhui Ji Yunhe Li Hai Dong Mingxuan Xiao Pengcheng Zhang Mengyuan Zhang Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Computing Technologies RMIT University Melbourne Australia
The widespread use of deep neural networks (DNNs) in image classification sofwares underlines the importance of the robustness. Researchers have proposed sparse adversarial attack methods for generating test cases, wh... 详细信息
来源: 评论
Performance of OTFS-NOMA Scheme for Coordinated Direct and Relay Transmission Networks in High-Mobility Scenarios
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Yao Du, Zhen Yuan, Weijie Jia, Shaobo Leung, Victor C.M. School of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing210044 China The Department of Electronic and Electrical Engineering Southern University of Science and Technology Shenzhen518055 China The School of Information Engineering Zhengzhou University Zhengzhou450001 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
In this paper, an orthogonal time frequency space (OTFS) based non-orthogonal multiple access (NOMA) scheme is investigated for the coordinated direct and relay transmission system, where a source directly communicate...
来源: 评论
A unitary weights based one-iteration quantum perceptron algorithm for non-ideal training sets
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Gao, PeiPei Wang, Yuxiang Yu, Wenbin Zhang, Maojun Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In order to solve the problem of non-ideal training sets (i.e., the less-complete or over-complete sets) and implement one-iteration learning, a novel efficient quantum perceptron algorithm based on unitary weights is... 详细信息
来源: 评论
Audio Steganography Based Backdoor Attack for Speech Recognition software
Audio Steganography Based Backdoor Attack for Speech Recogni...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Mengyuan Zhang Shunhui Ji Hanbo Cai Hai Dong Pengcheng Zhang Yunhe Li Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China College of Computer Science and Software Engineering Hohai University Nanjing China School of Computing Technologies RMIT University Melbourne Australia
With the growing prevalence of deep learning in the speech area, speech recognition, voice control, and related applications have become integral parts of people's lives. However, the rise of malicious third-party... 详细信息
来源: 评论