咨询与建议

限定检索结果

文献类型

  • 10,211 篇 会议
  • 5,995 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,620 篇 工学
    • 8,292 篇 计算机科学与技术...
    • 6,862 篇 软件工程
    • 2,190 篇 信息与通信工程
    • 1,299 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 870 篇 电气工程
    • 732 篇 机械工程
    • 651 篇 电子科学与技术(可...
    • 610 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 390 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 353 篇 安全科学与工程
    • 320 篇 动力工程及工程热...
    • 319 篇 交通运输工程
    • 301 篇 网络空间安全
    • 280 篇 建筑学
  • 4,824 篇 理学
    • 2,815 篇 数学
    • 1,233 篇 生物学
    • 957 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,075 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,338 篇 图书情报与档案管...
    • 755 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 443 篇 法学
    • 331 篇 社会学
  • 279 篇 经济学
    • 278 篇 应用经济学
  • 240 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 341 篇 semantics
  • 320 篇 computational mo...
  • 319 篇 feature extracti...
  • 302 篇 deep learning
  • 265 篇 training
  • 225 篇 data mining
  • 215 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 153 篇 internet of thin...
  • 143 篇 authentication
  • 135 篇 convolution
  • 135 篇 quality of servi...

机构

  • 427 篇 college of compu...
  • 358 篇 school of comput...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 189 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 110 篇 school of comput...
  • 107 篇 school of softwa...
  • 101 篇 school of softwa...
  • 101 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of comput...
  • 93 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 liu yang
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 29 篇 bo du
  • 28 篇 niyato dusit
  • 28 篇 shen furao
  • 28 篇 wang wei

语言

  • 15,204 篇 英文
  • 888 篇 其他
  • 272 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16347 条 记 录,以下是4781-4790 订阅
排序:
Importance-Aware Transformer: Addressing Intra-Class Heterogeneity in Weakly Supervised Brain Tumor Segmentation
Importance-Aware Transformer: Addressing Intra-Class Heterog...
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Yiheng Lyu Lian Xu Mohammed Bennamoun Farid Boussaid Girish Dwivedi Department of Computer Science and Software Engineering The University of Western Australia Perth Australia Harry Perkins Institute of Medical Research Perth Australia Department of Electrical Electronic and Computer Engineering The University of Western Australia Perth Australia Medical School The University of Western Australia Perth Australia Department of Cardiology Fiona Stanley Hospital Perth Australia
Weakly supervised brain tumor segmentation is a critical challenge in medical image analysis, characterized by inherent biological complexity and the scarcity of annotations. For segmentation on magnetic resonance ima... 详细信息
来源: 评论
How re-sampling helps for long-tail learning?  23
How re-sampling helps for long-tail learning?
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Jiang-Xin Shi Tong Wei Yuke Xiang Yu-Feng Li National Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Consumer BG Huawei Technologies Shenzhen China
Long-tail learning has received significant attention in recent years due to the challenge it poses with extremely imbalanced datasets. In these datasets, only a few classes (known as the head classes) have an adequat...
来源: 评论
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes
Understanding and Detecting Privacy Leakage Vulnerabilities ...
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: Ziming Chen Yue Li Jianbo Gao Jiashuo Zhang Ke Wang Jianbin Hu Zhi Guan Zhong Chen School of Computer Science Peking University Beijing China College of Computer Science and Technology Taiyuan University of Technology Taiyuan China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Peking University Chongqing Research Institute of Big Data Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
The application on a blockchain cannot maintain secrecy because its data is replicated across all peers in the network. To remedy this problem, Hyperledger Fabric introduces private data collection (PDC) into its smar... 详细信息
来源: 评论
Scribble-supervised semantic segmentation with prototype-based feature augmentation  24
Scribble-supervised semantic segmentation with prototype-bas...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Guiyang Chan Pengcheng Zhang Hai Dong Shunhui Ji Bainian Chen Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China and College of Computer Science and Software Engineering Hohai University Nanjing China School of Computing Technologies RMIT University Melbourne Australia
Scribble-supervised semantic segmentation presents a cost-effective training method that utilizes annotations generated through scribbling. It is valued in attaining high performance while minimizing annotation costs,...
来源: 评论
Capability-based IoT access control using blockchain
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 463-469页
作者: Yue Liu Qinghua Lu Shiping Chen Qiang Qu Hugo’Connor Kim-Kwang Raymond Choo He Zhang School of Computer Science and Engineering University of New South WalesAustralia Data61 CSIROAustralia Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesChina Department of Information Systems and Cyber Security University of Texas at San AntonioUSA Software Institute Nanjing UniversityChina
Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and ***,the existing IoT access control solutions are mainly based on conventional identi... 详细信息
来源: 评论
FGRL-Net: Fine-Grained Personalized Patient Representation Learning for Clinical Risk Prediction Based on EHRs
FGRL-Net: Fine-Grained Personalized Patient Representation L...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: KaKit Chio Wenhao Zhu Lihua He Dian Zhang Xu Yang Wuman Luo Faculty of Applied Sciences Macao Polytechnic University Macao S.A.R China School of Information and Communication Engineering University of Electronic Science and Technology of China Sichuan Province China Department of Computer Science and Software Engineering Shenzhen University Shenzhen China
Personalized patient representation learning (PPRL) is a critical element in clinical risk prediction. It aims to obtain a complete portrait of each patient based on Electronic Health Records (EHR). Although existing ...
来源: 评论
Research on Malware software Detection Technology Based on SVM on Cloud Platform for Mobile Terminal
Research on Malware Software Detection Technology Based on S...
收藏 引用
International Conference on Artificial Intelligence and computer Information Technology (AICIT)
作者: Liming Lin Ye Yao JiaYu Li Jia Yao Wending Chen Siyang Huang School of Software Northwestern Polytechnical University Xi'an City China School of Computer Science Northwestern Polytechnical University Xi'an City China Queen Mary University of London Engineering School NPU Northwestern Polytechnical University Xi'an City China
In recent years, the number of new malware samples has shown a trend of rapid growth. The increasing number of malware has resulted in a huge number of signature databases that the host needs to save, which is difficu...
来源: 评论
Boosting Adversarial Transferability across Model Genus by Deformation-Constrained Warping
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Qinliang Luo, Cheng Niu, Zenghao He, Xilin Xie, Weicheng Hou, Yuanbo Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China Guangdong Key Laboratory of Intelligent Information Processing China WAVES Research Group Ghent University Belgium University of Leicester United Kingdom
Adversarial examples generated by a surrogate model typically exhibit limited transferability to unknown target systems. To address this problem, many transferability enhancement approaches (e.g., input transformation... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series  19
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Xiong, Zhiying Fan, Qilin Wang, Kai Li, Xiuhua Zhang, Xu Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing China Chongqing University Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing China Harbin Institute of Technology School of Computer Science and Technology Weihai China Harbin Institute of Technology Research Institute of Cyberspace Security Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China University of Exeter Department of Computer Science Exeter United Kingdom
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ... 详细信息
来源: 评论
Analysis of vocational education dynamics evolution based on topic modeling
Analysis of vocational education dynamics evolution based on...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Xinhua Wang Xiaomei Yu Yunmeng Jiang Xiangwei Zheng Wei Li School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China Shandong Normal University Library Shandong Normal University Jinan China
Clarifying the focus of vocational education dynamics is crucial for understanding the current situation and future development trends. However, comprehensive exploration on vocational education dynamics is inadequate... 详细信息
来源: 评论