咨询与建议

限定检索结果

文献类型

  • 68,577 篇 会议
  • 39,989 篇 期刊文献
  • 806 册 图书

馆藏范围

  • 109,372 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 67,370 篇 工学
    • 45,092 篇 计算机科学与技术...
    • 37,198 篇 软件工程
    • 16,844 篇 信息与通信工程
    • 10,904 篇 控制科学与工程
    • 8,914 篇 电气工程
    • 8,226 篇 电子科学与技术(可...
    • 7,914 篇 生物工程
    • 5,637 篇 光学工程
    • 5,467 篇 生物医学工程(可授...
    • 5,404 篇 机械工程
    • 3,877 篇 化学工程与技术
    • 3,821 篇 仪器科学与技术
    • 3,535 篇 动力工程及工程热...
    • 2,730 篇 网络空间安全
    • 2,658 篇 交通运输工程
    • 2,604 篇 材料科学与工程(可...
    • 2,533 篇 安全科学与工程
  • 37,585 篇 理学
    • 18,937 篇 数学
    • 11,656 篇 物理学
    • 8,856 篇 生物学
    • 6,329 篇 统计学(可授理学、...
    • 4,163 篇 化学
    • 4,026 篇 系统科学
  • 18,139 篇 管理学
    • 11,535 篇 管理科学与工程(可...
    • 7,345 篇 图书情报与档案管...
    • 4,674 篇 工商管理
  • 5,233 篇 医学
    • 4,281 篇 临床医学
    • 3,868 篇 基础医学(可授医学...
    • 2,372 篇 药学(可授医学、理...
  • 2,923 篇 法学
    • 2,386 篇 社会学
  • 1,857 篇 经济学
  • 1,406 篇 农学
  • 990 篇 教育学
  • 464 篇 文学
  • 254 篇 军事学
  • 208 篇 艺术学
  • 8 篇 哲学
  • 7 篇 历史学

主题

  • 2,994 篇 accuracy
  • 2,954 篇 feature extracti...
  • 2,678 篇 deep learning
  • 2,570 篇 training
  • 2,356 篇 computational mo...
  • 2,135 篇 computer science
  • 1,979 篇 machine learning
  • 1,581 篇 optimization
  • 1,505 篇 predictive model...
  • 1,420 篇 semantics
  • 1,341 篇 internet of thin...
  • 1,292 篇 convolutional ne...
  • 1,278 篇 support vector m...
  • 1,272 篇 real-time system...
  • 1,252 篇 data models
  • 1,188 篇 data mining
  • 1,181 篇 neural networks
  • 999 篇 image segmentati...
  • 961 篇 artificial intel...
  • 917 篇 security

机构

  • 2,434 篇 school of comput...
  • 1,522 篇 school of comput...
  • 1,352 篇 school of comput...
  • 1,089 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 977 篇 school of comput...
  • 948 篇 physikalisches i...
  • 947 篇 oliver lodge lab...
  • 812 篇 university of ch...
  • 687 篇 school of comput...
  • 536 篇 fakultät physik ...
  • 535 篇 horia hulubei na...
  • 533 篇 school of physic...
  • 530 篇 school of physic...
  • 529 篇 school of comput...
  • 523 篇 department of ph...
  • 517 篇 imperial college...
  • 513 篇 h.h. wills physi...
  • 507 篇 stfc rutherford ...
  • 491 篇 chitkara univers...

作者

  • 272 篇 niyato dusit
  • 268 篇 a. gomes
  • 263 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 246 篇 g. bella
  • 246 篇 c. amelung
  • 245 篇 j. strandberg
  • 245 篇 d. calvet
  • 238 篇 beiter a.
  • 233 篇 blake t.
  • 233 篇 s. chen
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 220 篇 boettcher t.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 217 篇 g. spigo

语言

  • 103,236 篇 英文
  • 4,362 篇 其他
  • 1,760 篇 中文
  • 130 篇 日文
  • 34 篇 法文
  • 31 篇 德文
  • 10 篇 朝鲜文
  • 7 篇 荷兰文
  • 4 篇 斯洛文尼亚文
  • 2 篇 西班牙文
检索条件"机构=School of Computer Science Engineering and Technology"
109372 条 记 录,以下是4931-4940 订阅
排序:
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
收藏 引用
Artificial Intelligence Review 2025年 第8期58卷 1-39页
作者: Uddin, Mueen Irshad, Muhammad Saad Kandhro, Irfan Ali Alanazi, Fuhid Ahmed, Fahad Maaz, Muhammad Hussain, Saddam Ullah, Syed Sajid College of Computing and IT University of Doha for Science and Technology Doha24449 Qatar Department of Software Engineering Sindh Madressatul Islam University Karachi Pakistan Department of Computer Science Sindh Madressatul Islam University Karachi Pakistan Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351 Saudi Arabia School of Digital Science Universiti Brunei Darussalam Jalan Tungku LinkBE1410 Brunei GrimstadN-4898 Norway
Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) tec... 详细信息
来源: 评论
Identifying Trustworthiness Challenges in Deep Learning Models for Continental-Scale Water Quality Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Xia, Xiaobo Liu, Xiaofeng Liu, Jiale Fang, Kuai Lu, Lu Oymak, Samet Currie, William S. Liu, Tongliang School of Computer Science University of Sydney Australia Department of Statistics and Data Science Yale University United States Michigan Institute for Data and AI in Society University of Michigan United States School for Environment and Sustainability University of Michigan United States College of Information Science and Technology Penn State University United States Department of Earth System Science Stanford University United States Department of Electrical Engineering and Computer Science University of Michigan United States
Water quality is foundational to environmental sustainability, ecosystem resilience, and public health. Deep learning models, particularly Long Short-Term Memory (LSTM) networks, offer trans-formative potential for la... 详细信息
来源: 评论
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guangjin Wang Bao Wang Fuyong Xu Zhenfang Zhu Peipei Wang Ru Wang Peiyu Liu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model’s &... 详细信息
来源: 评论
Learning Counterfactual Outcomes Under Rank Preservation
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Peng Li, Haoxuan Zheng, Chunyuan Zeng, Yan Chen, Jiawei Liu, Yang Guo, Ruocheng Zhang, Kun School of Mathematics and Statistics Beijing Technology and Business University China Center for Data Science Peking University China School of Mathematical Sciences Peking University China College of Computer Science and Technology Zhejiang University China Computer Science and Engineering University of California Santa Cruz Bolivia ByteDance Research China Department of Philosophy Carnegie Mellon University United States Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates
Counterfactual inference aims to estimate the counterfactual outcome at the individual level given knowledge of an observed treatment and the factual outcome, with broad applications in fields such as epidemiology, ec... 详细信息
来源: 评论
A Switched Neural Process for Long-term Postprandial Glucose Trajectory Prediction based on Insulin Sensitivity Estimation
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Chen, Jing Shi, Dawei Cai, Deheng Liu, Wei Ji, Linong Shi, Ling Beijing Institute of Technology MIIT Key Laboratory of Servo Motion System Drive and Control School of Automation Beijing China Peking University People’s Hospital Department of Endocrine and Metabolism Beijing China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong
Advanced sensing technology has enabled the real-time monitoring of blood glucose (BG), making it possible to explore the BG prediction problem based on continuous observations. In this work, we propose a novel switch... 详细信息
来源: 评论
Recognition of carrier-based aircraft flight deck operations based on dynamic graph
收藏 引用
Chinese Journal of Aeronautics 2025年 第03期 478-494页
作者: Xingyu GUO Jiaxin LI Hua WANG Junnan LIU Yafei LI Mingliang XU School of Computer Science and Artificial Intelligence Zhengzhou University Engineering Research Center of Intelligent Swarm Systems Ministry of Education National Supercomputing Center in Zhengzhou School of Geo-Science & Technology Zhengzhou University
Accurate recognition of flight deck operations for carrier-based aircraft, based on operation trajectories, is critical for optimizing carrier-based aircraft performance. This recognition involves understanding short-...
来源: 评论
GPT-Based Automated Induction: Vulnerability Detection in Medical Software
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Deng, Liangjun Lei, Hang Khan, Fazlullah Srivastava, Gautam Chen, Jingxue Haque, Mainul University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China University of Nottingham Ningbo China School of Computer Science and the Next-Generation Internet of Everything Laboratory Faculty of Science and Engineering Zhejiang Ningbo315104 China Lovely Professional University Division of Research and Development Phagwara India Chandigarh University University Centre of Research and Development Mohali India Brandon University Department of Math and Computer Science BrandonMBR7A 6A9 Canada China Medical University Research Centre for Interneural Computing Taichung40402 Taiwan Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact & Outcome Punjab Rajpura140401 India University of Nottingham Ningbo China Department of Mathematics Faculty of Science and Engineering Zhejiang Ningbo315104 China
Integrating Natural Language Processing (NLP) with Generative Pre-trained Transformer (GPT) models plays a pivotal role in enhancing the accuracy and efficiency of healthcare software, which is essential for patient s... 详细信息
来源: 评论
Robust Indoor Person Re-Identification with Multimodal Training
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Su, Can Xue, Xinlei Ma, Lei Zhang, Xiaolong Yan, Wei Bian, Kaigui Peking University School of Computer Science AI Innovation Center National Engineering Laboratory for Big Data Analysis and Applications Beijing100871 China Peking University School of Computer Science Beijing100871 China Peking University Beijing Academy of Artificial Intelligence National Biomedical Imaging Center College of Future Technology National Key Laboratory for Multimedia Information Processing Beijing100871 China Beihang University Beijing100191 China
Existing person re-identification (ReID) methods mainly rely on images and videos to match persons across cameras, yet visual data captured by cameras are vulnerable to environmental interferences (e.g. illumination a... 详细信息
来源: 评论
Real-Time Student Behavior Analysis via YOLOv5 with Coordinate Attention  9th
Real-Time Student Behavior Analysis via YOLOv5 with Coordina...
收藏 引用
9th International Symposium on Artificial Intelligence and Robotics, ISAIR 2024
作者: Ma, Shuai Chang, Heyou Yang, Xinru Chen, Quan Han, Jian Key Laboratory of Intelligent Information Processing Nanjing XiaoZhuang University Nanjing China School of Information and Engineering Nanjing XiaoZhuang University Nanjing China School of Computer Science Nanjing University of Information Science and Technology Nanjing China Jiangsu Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing China
The detection and recognition of student behavior play a pivotal role in the context of smart classrooms. However, conventional methods often encounter performance degradation due to challenges such as occlusion, data... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Siddiqi, Hafied Nur Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Department of Information Technology PO Box 84428 Riyadh11671 Saudi Arabia Shenzhen University College of Computer Science & Software Engineering Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Prince Sultan University EIAS Data Science and Blockchain Laboratory CCIS Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论