咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是4931-4940 订阅
排序:
UT-GAN: A Novel Unpaired Textual-Attention Generative Adversarial Network for Low-Light Text Image Enhancement
UT-GAN: A Novel Unpaired Textual-Attention Generative Advers...
收藏 引用
IEEE International Conference on Image Processing
作者: Minglong Xue Zhengyang He Yanyi He Peiqi Xie Xin Feng School of Computer Science and Engineering Chongqing University of Technology Chongqing P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing P.R. China
How to balance lighting and texture details to achieve the desired visual effect remains the bottleneck of existing low-light image enhancement methods. In this paper, we propose a novel Unpaired Textual-attention Gen...
来源: 评论
SemLog: A Semantics-based Approach for Anomaly Detection in Big Data System Logs
SemLog: A Semantics-based Approach for Anomaly Detection in ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xiaoman Tan Ningning Han Siyang Lu Wu Chen Dongdong Wang College of Computer and Information Science College of Software Southwest University Chongqing China School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Civil Environmental and Construction Engineering University of Central Florida Orlando FL US
Syslog-based anomaly detection is crucial for protecting the systems from malicious attacks or malfunctions. System logs are semi-structured text messages printed by logging statements to record the system’s run-time...
来源: 评论
Node Representation Learning in Graph via Node-to-Neighbourhood Mutual Information Maximization
arXiv
收藏 引用
arXiv 2022年
作者: Dong, Wei Wu, Junsheng Luo, Yi Ge, Zongyuan Wang, Peng School of Computer Science and Engineering Northwestern Polytechnical University China School of Software Northwestern Polytechnical University China Monash University Australia University of Wollongong Australia
The key towards learning informative node representations in graphs lies in how to gain contextual information from the neighbourhood. In this work, we present a simple-yet-effective self-supervised node representatio... 详细信息
来源: 评论
Embedding Representation of Academic Heterogeneous Information Networks Based on Federated Learning
Embedding Representation of Academic Heterogeneous Informati...
收藏 引用
IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)
作者: Junfu Wang Yawen Li Meiyu Liang Ang Li Beijing Key Laboratory of Intelligent Communication Software and Multimedia School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing School of Economics and Management Beijing University of Posts and Telecommunications Beijing
Existing studies for representation learning of homogeneous information networks cannot be applicable to academic heterogeneous information networks (HINs) with multi-type nodes and multi-relationships because of the ... 详细信息
来源: 评论
DDA: A Dynamic Difficulty-aware Data Augmenter for Image Super-resolution
DDA: A Dynamic Difficulty-aware Data Augmenter for Image Sup...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xinyi Zhang Tao Dai Bin Chen Shu-Tao Xia Tsinghua Shenzhen International Graduate School Tsinghua University College of Computer Science and Software Engineering Shenzhen University Harbin Institute of Technology Shenzhen Peng Cheng Laboratory Research Center of Artificial Intelligence
Deep neural networks (DNNs) have been recently widely used in image super-resolution (SR) and have achieved remarkable performance. However, most existing methods focus on elaborate network design, while rarely consid...
来源: 评论
Loss-tolerant authentication with digital signatures
收藏 引用
Security and Communication Networks 2020年 第11期7卷 2054-2062页
作者: Lv, Xixiang Mu, Yi Li, Hui National Key Laboratory of ISN Xidian University Xi'an710071 China School of Computer Science and Software Engineering University of Wollonggong NSW2522 Australia
Consider a signed file that cannot be verified because of some fraction loss or noise, which might not affect the business of users. It would be desirable for the verifier to locate the damaged fractions so that the a... 详细信息
来源: 评论
Design of a Lower Limb Exoskeleton Rehabilitation Robot System Based on Forward Dynamics Simulation
Design of a Lower Limb Exoskeleton Rehabilitation Robot Syst...
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Yudong Fang Yuefei Wang Liucun Zhu Zhen Liu Lei Shi Muxin Du Jianchu Lin School of Mechanical and Marine Engineering Beibu Gulf University Qinzhou China Sentinel Institute of Science and Technology Beibu Gulf University Qinzhou China Nagasaki Institute of Applied Science Nagasaki Japan Guangzhou Shiyuan Electronic Technology Company Limited Guangzhou China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an China
Lower limb exoskeleton rehabilitation robots can effectively improve the rehabilitation of stroke patients and can substantially reduce the workload of rehabilitation therapists and improve work efficiency. In this pa... 详细信息
来源: 评论
A Virtual Farm Tour for Public Education about Dairy Industry
A Virtual Farm Tour for Public Education about Dairy Industr...
收藏 引用
Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), IEEE Conference on
作者: Anh Nguyen Emma Windfeld Michael Francis Guillaume Lhermie Kangsoo Kim Department of Computer Science University of Calgary The Simpson Centre The School of Public Policy University of Calgary Department of Electrical and Software Engineering University of Calgary The Simpson Centre Faculty of Veterinary Medicine University of Calgary
In this paper, we present an immersive virtual farm simulation developed to provide realistic on-farm experiences to the public. Users could visit the virtual farm, walk through various sites where dairy cows are rais... 详细信息
来源: 评论
Adaptive Sparse Convolutional Networks with Global Context Enhancement for Faster Object Detection on Drone Images
Adaptive Sparse Convolutional Networks with Global Context E...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Bowei Du Yecheng Huang Jiaxin Chen Di Huang State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Hangzhou Innovation Institute Beihang University Hangzhou China
Object detection on drone images with low-latency is an important but challenging task on the resource-constrained unmanned aerial vehicle (UAV) platform. This paper investigates optimizing the detection head based on...
来源: 评论
SCALABLE EDGE BLOCKING ALGORITHMS FOR DEFENDING ACTIVE DIRECTORY STYLE ATTACK GRAPHS :A PREPRINT
arXiv
收藏 引用
arXiv 2022年
作者: Guo, Mingyu Ward, Max Neumann, Aneta Neumann, Frank Nguyen, Hung School of Computer Science University of Adelaide Australia School of Physics Maths and Computing Computer Science and Software Engineering University of Western Australia Australia Department of Molecular and Cellular Biology Harvard University CambridgeMA United States
Active Directory (AD) is the default security management system for Windows domain networks. An AD environment naturally describes an attack graph where nodes represent computers/accounts/security groups, and edges re... 详细信息
来源: 评论