咨询与建议

限定检索结果

文献类型

  • 10,222 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,668 篇 工学
    • 8,337 篇 计算机科学与技术...
    • 6,831 篇 软件工程
    • 2,205 篇 信息与通信工程
    • 1,369 篇 控制科学与工程
    • 1,125 篇 生物工程
    • 875 篇 电气工程
    • 734 篇 机械工程
    • 658 篇 电子科学与技术(可...
    • 606 篇 生物医学工程(可授...
    • 605 篇 光学工程
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 277 篇 建筑学
  • 4,829 篇 理学
    • 2,817 篇 数学
    • 1,234 篇 生物学
    • 957 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,064 篇 管理学
    • 1,854 篇 管理科学与工程(可...
    • 1,331 篇 图书情报与档案管...
    • 749 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 442 篇 法学
    • 329 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 620 篇 computer science
  • 480 篇 software enginee...
  • 338 篇 semantics
  • 317 篇 computational mo...
  • 311 篇 feature extracti...
  • 306 篇 deep learning
  • 270 篇 training
  • 223 篇 data mining
  • 216 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 156 篇 computer archite...
  • 156 篇 machine learning
  • 154 篇 internet of thin...
  • 143 篇 authentication
  • 136 篇 convolution
  • 135 篇 servers

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 263 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 188 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 107 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 68 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,160 篇 英文
  • 976 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science&Software Engineering"
16393 条 记 录,以下是671-680 订阅
排序:
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
RPPFL: Robust and Privacy-Preserving Federated Learning via Trusted Execution Environments
RPPFL: Robust and Privacy-Preserving Federated Learning via ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Xiaolei Chen, Zhaoyu Chen, Guangpu Feng, Xinyu Shen, Qingni Wu, Zhonghai School of Computer Science Peking University China School of Software and Microelectronics Peking University China National Engineering Research Center for Software Engineering Peking University China PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University China
Federated Learning (FL) is a distributed framework that enables multi-participant collaborative model training without the need for data sharing. Despite its advantages, FL is vulnerable to poisoning and inference att... 详细信息
来源: 评论
FAS-reid: Fair Architecture Search for Person Re-IDentification  3
FAS-reid: Fair Architecture Search for Person Re-IDentificat...
收藏 引用
3rd IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Chen, Shengbo Chen, Shijie Lei, Zhou Shanghai University School of Computer Engineering and Science Shanghai200444 China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai201112 China
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the ... 详细信息
来源: 评论
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks
收藏 引用
IEEE Access 2025年 13卷 31472-31484页
作者: Kamal, Mian Muhammad Zain Ul Abideen, Syed Al-Khasawneh, M.A. Alabrah, Amerah Sohail Ahmed Larik, Raja Irfan Marwat, Muhammad Southeast University School of Electronic Science and Engineering Jiangning Jiangsu Nanjing211189 China Qingdao University College of Computer Science and Technology Qingdao266071 China Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19111 Jordan Skyline University College School of Computing University City Sharjah Sharjah United Arab Emirates King Saud University College of Computer and Information Science Department of Information Systems Riyadh11543 Saudi Arabia Ilma University Department of Computer Science Sindh Karachi75190 Pakistan University of Science and Technology Bannu Department of Software Engineering Bannu28100 Pakistan
The rapid evolution of wireless communication technologies and the increasing demand for multi-functional systems have led to the emergence of integrated sensing and communication (ISAC) as a key enabler for future 6G... 详细信息
来源: 评论
RT-Swap: Addressing GPU Memory Bottlenecks for Real-Time Multi-DNN Inference  30
RT-Swap: Addressing GPU Memory Bottlenecks for Real-Time Mul...
收藏 引用
30th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2024
作者: Kang, Woosung Lee, Jinkyu Lee, Youngmoon Oh, Sangeun Lee, Kilho Chwa, Hoon Sung DGIST Dept. of Electrical Engineering and Computer Science Korea Republic of Dept. of Computer Science and Engineering Korea Republic of Hanyang University Dept. of Robotics Korea Republic of Ajou University Department of Software and Computer Engineering Korea Republic of School of AI Convergence Soongsil University Korea Republic of
The increasing complexity and memory demands of Deep Neural Networks (DNNs) for real-Time systems pose new significant challenges, one of which is the GPU memory capacity bottleneck, where the limited physical memory ... 详细信息
来源: 评论
ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning  4
ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via C...
收藏 引用
4th Asia Service sciences and software engineering Conference, ASSE 2023
作者: Wu, Jiajing Liu, Jieli Chen, Jinze Chen, Ting Li, Jingwei Song, Shuwei He, Jiahao School of Software Engineering Sun Yat-sen University China School of Computer Science and Engineering Sun Yat-sen University China School of Cyber Security University of Electronic Science and Technology of China China
In recent years, blockchain technology has witnessed rapid development and received considerable attention. However, its decentralized and pseudonymous nature has also attracted many criminal activities. Among them, P... 详细信息
来源: 评论
Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
收藏 引用
computer Systems science & engineering 2022年 第5期41卷 479-492页
作者: A.S.Anakath R.Kannadasan Niju P.Joseph P.Boominathan G.R.Sreekanth School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002TamilnaduIndia Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science CHRIST(Deemed to be University)Bengaluru560029India Department of Information Security School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science and Engineering Kongu Engineering CollegeErode638060TamilnaduIndia
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor... 详细信息
来源: 评论
RGA-Reid: Neural Architecture Search Based on Relation-Aware Global Attention for Person Re-Identification  11
RGA-Reid: Neural Architecture Search Based on Relation-Aware...
收藏 引用
11th Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2023
作者: Chen, Shijie Chen, Shengbo Lei, Zhou School of Computer Engineering and Science Shanghai University Shanghai200444 China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai201112 China
With the continuous development of deep learning, reid has been continually improved. However, the network backbones of reid are mostly manually designed. This paper proposes RGA-Reid based on auto-reid. NASBR-Reid ob... 详细信息
来源: 评论
Slice-Level Label Attention with Global-Guided Attention Regularization for Multi-Label Classification in Knee MRI Sequences
Slice-Level Label Attention with Global-Guided Attention Reg...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Yang, Jingzhi Shen, Hua Liu, Ziyu Wu, Weilong Wu, Ji Ni, Ming Yuan, Huishu Fu, Xiangling Li, Miao National Pilot Software Engineering School Bupt School of Computer Science Beijing China Tsinghua University College of Ai Department of Electronic Engineering Beijing China Peking University Third Hospital Beijing China
Magnetic Resonance Imaging (MRI) is crucial for diagnosing various knee-related diseases, and developing automatic diagnostic models based on knee MRI data is highly valuable. However, this task presents significant c... 详细信息
来源: 评论