咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是551-560 订阅
排序:
Enhancing Weakly Supervised Medical Segmentation via Heterogeneous Co-training with Box-Wise Augmentation and Pseudo-Label Filtering  6th
Enhancing Weakly Supervised Medical Segmentation via Hetero...
收藏 引用
6th IFIP TC 12 International Conference on Intelligence science, ICIS 2024
作者: Wang, You Qi, Lei Yu, Qian Shi, Yinghuan Gao, Yang State Key Laboratory of Novel Software Technology National Insititute of Health-care Data Science Nanjing University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Data and Computer Science Shandong Woman’s University Jinan China
In this paper, we introduce an innovative approach to weakly supervised medical image segmentation with box annotations. Different from the previous methods which simply utilize a single conventional network with the ... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc Networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论
Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 903-922页
作者: Guangxia Xu Lei Liu Jingnan Dong Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Software Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China
In recent years,with the great success of pre-trained language models,the pre-trained BERT model has been gradually applied to the field of source code ***,the time cost of training a language model from zero is very ... 详细信息
来源: 评论
Predicting the Unseen: A Novel Dataset for Hidden Intention Localization in Pre-abnormal Analysis  24
Predicting the Unseen: A Novel Dataset for Hidden Intention ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Qi, Zehao Zhang, Ruixu Hu, Xinyi Liu, Wenxuan Wang, Zheng National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan China School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan China
Our paper introduces a novel video dataset specifically for Temporal Intention Localization (TIL), aimed at identifying hidden abnormal intention in densely populated and complex environments. Traditional Temporal Act... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
A Transformer-based method for non-contact heart rate estimation from facial videos recorded in realistic environment  3
A Transformer-based method for non-contact heart rate estima...
收藏 引用
3rd Vision-Based Remote Physiological Signal Sensing Challenge and Workshop, RePSS 2024
作者: Hu, Yi Liu, Xuenan Rao, Xinlong Li, Bojing School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230601 China School of Software Hefei University of Technology Anhui Hefei230601 China
The Video Photoplethysmography (VPPG) technique, while increasingly popular due to its convenience and cost-effectiveness, faces challenges in handling continuous head movements and vigorous motion interferences encou... 详细信息
来源: 评论
Quantum search algorithm for continuous domains
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第6期68卷 211-211页
作者: Lvzhou Li Institute of Quantum Computing and Software School of Computer Science and EngineeringSun Yat-sen UniversityGuangzhou 510006China
The paper“Fixed-point quantum continuous search algorithm with optimal query complexity”[1]presents another interesting application of quantum search algorithms by addressing one of the long-standing challenges in q... 详细信息
来源: 评论
Deep Residual Fourier and Self-Attention for Arbitrary Scale MRI Super-Resolution
Deep Residual Fourier and Self-Attention for Arbitrary Scale...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Xiaojie Xia, Jing Gao, Shanshan Hao, Xingwei Zhou, Yuanfeng School of Software Shandong University Jinan China Nanyang Technological University School of Computer Science and Engineering Singapore Singapore Shandong University of Finance and Economics School of Computer Science and Technology Jinan China
The excellent inherent contrast between biological tissues afforded by MR imaging is one of the foremost characteristics of this technique, but it depends on the scan time and hardware devices. Recent studies have sho... 详细信息
来源: 评论
UAV Enabled Sustainable IoT Network with OTPDRL  26
UAV Enabled Sustainable IoT Network with OTPDRL
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Tiantian Liu, Lei Sun, Hongbo Hu, Jia Shandong University School of Software Jinan China YanTai University School of Computer and Control Engineering YanTai China Exeter University Computer Science United Kingdom
Integrating large-scale sensors into the network has become a research hotspot for its promising flexibility in monitoring vitally critical wild areas. However, the existing Internet of Things (IoT) systems are limite... 详细信息
来源: 评论
FedTop:a constraint-loosed federated learning aggregation method against poisoning attack
收藏 引用
Frontiers of computer science 2024年 第5期18卷 233-235页
作者: Che WANG Zhenhao WU Jianbo GAO Jiashuo ZHANG Junjie XIA Feng GAO Zhi GUAN Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China China Unicom Beijing 100033China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attac... 详细信息
来源: 评论