咨询与建议

限定检索结果

文献类型

  • 10,211 篇 会议
  • 5,995 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,620 篇 工学
    • 8,292 篇 计算机科学与技术...
    • 6,862 篇 软件工程
    • 2,190 篇 信息与通信工程
    • 1,299 篇 控制科学与工程
    • 1,124 篇 生物工程
    • 870 篇 电气工程
    • 732 篇 机械工程
    • 651 篇 电子科学与技术(可...
    • 610 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 390 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 353 篇 安全科学与工程
    • 320 篇 动力工程及工程热...
    • 319 篇 交通运输工程
    • 301 篇 网络空间安全
    • 280 篇 建筑学
  • 4,824 篇 理学
    • 2,815 篇 数学
    • 1,233 篇 生物学
    • 957 篇 物理学
    • 820 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,075 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,338 篇 图书情报与档案管...
    • 755 篇 工商管理
  • 516 篇 医学
    • 445 篇 临床医学
    • 388 篇 基础医学(可授医学...
  • 443 篇 法学
    • 331 篇 社会学
  • 279 篇 经济学
    • 278 篇 应用经济学
  • 240 篇 教育学
  • 152 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 341 篇 semantics
  • 320 篇 computational mo...
  • 319 篇 feature extracti...
  • 302 篇 deep learning
  • 265 篇 training
  • 225 篇 data mining
  • 215 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 153 篇 internet of thin...
  • 143 篇 authentication
  • 135 篇 convolution
  • 135 篇 quality of servi...

机构

  • 427 篇 college of compu...
  • 358 篇 school of comput...
  • 265 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 189 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 110 篇 school of comput...
  • 107 篇 school of softwa...
  • 101 篇 school of softwa...
  • 101 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of comput...
  • 93 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 liu yang
  • 52 篇 zheng zibin
  • 51 篇 chen zhong
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 29 篇 bo du
  • 28 篇 niyato dusit
  • 28 篇 shen furao
  • 28 篇 wang wei

语言

  • 15,204 篇 英文
  • 888 篇 其他
  • 272 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16347 条 记 录,以下是4801-4810 订阅
排序:
Free-space Continuous-variable Quantum Secret Sharing
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Fangli Chang, Liang Qiu, Daowen Pan, Minghua Xiong, Wanjun Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Free-space quantum cryptography has the potential to enable global quantum communication. However, most existing continuous-variable quantum secret sharing (CV-QSS) schemes rely on fiber channels. In this paper, we pr... 详细信息
来源: 评论
Data security and privacy computing in artificial intelligence
收藏 引用
Journal of Information and Intelligence 2024年 第2期2卷 99-101页
作者: Dengguo Feng Hui Li Rongxing Lu Zheli Liu Jianbing Ni Hui Zhu Institute of Software Academy of SciencesBeijing 100190China State Key Laboratory of Integrated Services Networks School of Cyber EngineeringXidian UniversityXi’an 710071China Faculty of Computer Science University of New BrunswickFredericton E3B 5A3Canada College of Computer Science Nankai UniversityTianjin 300071China Department of Electrical and Computer Engineering Queen’s UniversityKingston K7L 3N6Canada
Artificial intelligence(AI)is a field of computer science dedicated to creating systems and algorithms that can perform tasks typically requiring human intelligence,such as learning,problem-solving,language understand... 详细信息
来源: 评论
Explainable Semantic Federated Learning Enabled Industrial Edge Network for Fire Surveillance
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Li Peng, Yubo Jiang, Feibo Wang, Kezhi Yang, Kun School of Computer Science Hunan University of Technology and Business Changsha410205 China Xiangjiang Laboratory Changsha410205 China School of Intelligent Software and Engineering Nanjing University Suzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China Department of Computer Science Brunel University London United Kingdom
In fire surveillance, Industrial Internet of Things (IIoT) devices require transmitting large monitoring data frequently, which leads to huge consumption of spectrum resources. Hence, we propose an Industrial Edge Sem... 详细信息
来源: 评论
Pondering About Task Spatial Misalignment: Classification-Localization Equilibrated Object Detection
Pondering About Task Spatial Misalignment: Classification-Lo...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yudong Zhang Wei Lu Xu Wang Pengkun Wang Yang Wang School of Data Science USTC Hefei China Suzhou Institute for Advanced Research USTC Suzhou China School of Software Engineering USTC Hefei China Key Laboratory of Precision and Intelligent Chemistry University of Science and Technology of China (USTC) Hefei China School of Computer Science and Technology USTC Hefei China
Object detection is a fundamental task in computer vision, consisting of both classification and localization tasks. Previous works mostly perform classification and localization with shared feature extractor like Con... 详细信息
来源: 评论
Research on Decentralized Access Control in Big Data Environment  4
Research on Decentralized Access Control in Big Data Environ...
收藏 引用
2021 4th International Symposium on Big Data and Applied Statistics, ISBDAS 2021
作者: Liu, Nianzu Ma, Weichen Shen, Danjie Guo, Bing College of Computer Science Sichuan University Chengdu610065 China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
With the rapid increase of network data, there are many challenges of security about data sharing in big data environment. The traditional attribute-based access control model generally adopts the centralized method. ... 详细信息
来源: 评论
MTP: Advancing Remote Sensing Foundation Model via Multi-Task Pretraining
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Di Zhang, Jing Xu, Minqiang Liu, Lin Wang, Dongsheng Gao, Erzhong Han, Chengxi Guo, Haonan Du, Bo Tao, Dacheng Zhang, Liangpei School of Computer Science Wuhan University Wuhan430072 China Institute of Artificial Intelligence Wuhan University Wuhan430072 China National Engineering Research Center for Multimedia Software Wuhan University Wuhan430072 China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan430072 China School of Computer Science Faculty of Engineering The University of Sydney Australia iFlytek Co Ltd National Engineering Research Center of Speech and Language Information Processing Hefei230088 China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan430079 China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore
Foundation models have reshaped the landscape of Remote Sensing (RS) by enhancing various image interpretation tasks. Pretraining is an active research topic, encompassing supervised and self-supervised learning metho... 详细信息
来源: 评论
Freevc: Towards High-Quality Text-Free One-Shot Voice Conversion
Freevc: Towards High-Quality Text-Free One-Shot Voice Conver...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jingyi Li Weiping Tu Li Xiao National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China Hubei Luojia Laboratory China
Voice conversion (VC) can be achieved by first extracting source content information and target speaker information, and then reconstructing waveform with these information. However, current approaches normally either... 详细信息
来源: 评论
Unsupervised Visible-Infrared Person Re-Identification via Progressive Graph Matching and Alternate Learning
Unsupervised Visible-Infrared Person Re-Identification via P...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zesen Wu Mang Ye Hubei Key Laboratory of Multimedia and Network Communication Engineering National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China Hubei Luojia Laboratory Wuhan China
Unsupervised visible-infrared person re-identification is a challenging task due to the large modality gap and the unavailability of cross-modality correspondences. Cross-modality correspondences are very crucial to b...
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
Modelling IoT Application Requirements for Benchmarking IoT Middleware Platforms  2021
Modelling IoT Application Requirements for Benchmarking IoT ...
收藏 引用
23rd International Conference on Information Integration and Web Intelligence, iiWAS 2021
作者: Mondal, Shalmoly Hassani, Alireza Jayaraman, Prem Prakash Haghighi, Pari Delir Georgakopoulos, Dimitrios Faculty of Science Engineering and Technology Swinburne University of Technology Australia School of Info Technology Deakin University Australia Department of Computer Science and Software Engineering Swinburne University of Technology Australia Department of Human Centred Computing Monash University Australia
The significant advances in the Internet of Things (IoT) have led to IoT applications being widely used in various scenarios ranging from smart city, smart farming, to Industrial IoT (IIoT) solutions. With the explosi... 详细信息
来源: 评论