咨询与建议

限定检索结果

文献类型

  • 140,031 篇 会议
  • 70,074 篇 期刊文献
  • 1,418 册 图书
  • 1 篇 学位论文

馆藏范围

  • 211,523 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 128,468 篇 工学
    • 85,637 篇 计算机科学与技术...
    • 69,909 篇 软件工程
    • 30,978 篇 信息与通信工程
    • 20,610 篇 控制科学与工程
    • 16,139 篇 电气工程
    • 15,924 篇 电子科学与技术(可...
    • 14,808 篇 生物工程
    • 10,402 篇 生物医学工程(可授...
    • 10,288 篇 光学工程
    • 9,623 篇 机械工程
    • 7,053 篇 化学工程与技术
    • 6,895 篇 仪器科学与技术
    • 6,396 篇 动力工程及工程热...
    • 4,976 篇 材料科学与工程(可...
    • 4,595 篇 交通运输工程
    • 4,512 篇 安全科学与工程
    • 4,382 篇 网络空间安全
  • 70,402 篇 理学
    • 35,725 篇 数学
    • 21,482 篇 物理学
    • 16,559 篇 生物学
    • 11,745 篇 统计学(可授理学、...
    • 7,744 篇 系统科学
    • 7,587 篇 化学
  • 33,151 篇 管理学
    • 20,619 篇 管理科学与工程(可...
    • 13,776 篇 图书情报与档案管...
    • 9,044 篇 工商管理
  • 9,857 篇 医学
    • 8,080 篇 临床医学
    • 7,214 篇 基础医学(可授医学...
    • 4,430 篇 药学(可授医学、理...
  • 5,623 篇 法学
    • 4,678 篇 社会学
  • 3,460 篇 经济学
  • 2,510 篇 农学
  • 2,166 篇 教育学
  • 951 篇 文学
  • 459 篇 军事学
  • 350 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,148 篇 computer science
  • 5,244 篇 accuracy
  • 5,128 篇 feature extracti...
  • 4,633 篇 deep learning
  • 4,624 篇 computational mo...
  • 4,611 篇 training
  • 3,748 篇 machine learning
  • 2,939 篇 optimization
  • 2,879 篇 predictive model...
  • 2,826 篇 semantics
  • 2,576 篇 data models
  • 2,363 篇 real-time system...
  • 2,330 篇 neural networks
  • 2,318 篇 support vector m...
  • 2,305 篇 data mining
  • 2,227 篇 convolutional ne...
  • 2,047 篇 internet of thin...
  • 1,975 篇 artificial intel...
  • 1,893 篇 educational inst...
  • 1,852 篇 image segmentati...

机构

  • 2,477 篇 school of comput...
  • 2,219 篇 school of comput...
  • 2,075 篇 school of comput...
  • 1,814 篇 school of comput...
  • 1,527 篇 school of comput...
  • 1,505 篇 school of comput...
  • 1,365 篇 school of comput...
  • 1,364 篇 school of electr...
  • 1,237 篇 school of comput...
  • 1,074 篇 cavendish labora...
  • 1,011 篇 school of comput...
  • 971 篇 department of ph...
  • 959 篇 school of comput...
  • 911 篇 school of comput...
  • 875 篇 university of ch...
  • 875 篇 oliver lodge lab...
  • 872 篇 physikalisches i...
  • 541 篇 school of comput...
  • 534 篇 school of comput...
  • 530 篇 school of comput...

作者

  • 398 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 241 篇 c. alexa
  • 235 篇 j. m. izen
  • 233 篇 s. chen
  • 227 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 borsato m.
  • 215 篇 brundu d.
  • 212 篇 beiter a.
  • 211 篇 g. bella
  • 210 篇 bencivenni g.
  • 209 篇 j. strandberg
  • 208 篇 c. amelung
  • 208 篇 bay a.

语言

  • 195,362 篇 英文
  • 12,961 篇 其他
  • 3,183 篇 中文
  • 182 篇 日文
  • 39 篇 朝鲜文
  • 21 篇 德文
  • 15 篇 法文
  • 7 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Computer Engineering"
211524 条 记 录,以下是31-40 订阅
排序:
Deep learning for code generation: a survey
收藏 引用
science China(Information sciences) 2024年 第9期67卷 5-40页
作者: Huangzhao ZHANG Kechi ZHANG Zhuo LI Jia LI Jia LI Yongmin LI Yunfei ZHAO Yuqi ZHU Fang LIU Ge LI Zhi JIN Key Lab of High Confidence Software Technologies (Peking University) Ministry of Education School of Computer Science Peking University School of Computer Science and Engineering Beihang University
In the past decade, thanks to the powerfulness of deep-learning techniques, we have witnessed a whole new era of automated code generation. To sort out developments, we have conducted a comprehensive review of solutio... 详细信息
来源: 评论
BAD-FM:Backdoor Attacks Against Factorization-Machine Based Neural Network for Tabular Data Prediction
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 1077-1092页
作者: Lingshuo MENG Xueluan GONG Yanjiao CHEN College of Electrical Engineering Zhejiang University School of Computer Science Wuhan University
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world a... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
Disentangling Dynamics: Advanced, Scalable and Explainable Imputation for Multivariate Time Series
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 4010-4022页
作者: Liu, Shuai Li, Xiucheng Chen, Yile Jiang, Yue Cong, Gao Nanyang Technological University School of Computer Science and Engineering 639798 Singapore School of Computer Science and Technology Guangdong 518055 China
Missing values pose a formidable obstacle in multivariate time series analysis. Existing imputation methods rely on entangled representations that struggle to simultaneously capture multiple orthogonal time-series pat... 详细信息
来源: 评论
A Global-Local Parallel Dual-Branch Deep Learning Model with Attention-Enhanced Feature Fusion for Brain Tumor MRI Classification
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 739-760页
作者: Zhiyong Li Xinlian Zhou School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411100China
Brain tumor classification is crucial for personalized treatment *** deep learning-based Artificial Intelligence(AI)models can automatically analyze tumor images,fine details of small tumor regions may be overlooked d... 详细信息
来源: 评论
Analyzing topics in social media for improving digital twinning based product development
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 273-281页
作者: Wenyi Tang Ling Tian Xu Zheng Ke Yan School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
Digital twinning enables manufacturers to create digital representations of physical entities,thus implementing virtual simulations for product *** efforts of digital twinning neglect the decisive consumer feedback in... 详细信息
来源: 评论
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4129-4152页
作者: Xia Li Zhanyou Ma Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He School of Computer Science and Engineering North Minzu UniversityYinchuan750000China School of Computer Science FoSEThe University of HullHullUK
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property *** there is an extensive literature on qualitative properties such as safety and liveness,t... 详细信息
来源: 评论
Moodle plugin for real-time face recognition in online exams for Systems engineering and computer science students at Universidad Continental, Huancayo, Peru  5
Moodle plugin for real-time face recognition in online exams...
收藏 引用
5th International Conference on Robotics and computer Vision, ICRCV 2023
作者: Vargas, Miguel Torres Valle, Luis Fernando Rojas Vera, Diego Porras Moreno, Daniel Gamarra School of System Engineering and Computer Science Universidad Continental Huancayo Peru
Facial recognition systems on learning platforms like Moodle enable fast and efficient evaluation, automating the detection of impersonation in online exams. This project implements a Moodle plugin that performs facia... 详细信息
来源: 评论
Quantum speedup and limitations on matroid property problems
收藏 引用
Frontiers of computer science 2024年 第4期18卷 189-196页
作者: Xiaowei HUANG Jingquan LUO Lvzhou LI Institute of Quantum Computing and Computer Theory School of Computer Science and EngineeringSun Yat-sen UniversityGuangzhou 510006China
Matroid theory has been developed to be a mature branch of mathematics and has extensive applications in combinatorial optimization,algorithm design and so *** the other hand,quantum computing has attracted much atten... 详细信息
来源: 评论
A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 361-387页
作者: Hong Huang Yunfei Wang Guotao Yuan Xin Li School of Computer Science and Engineering Sichuan University of Science&EngineeringYibin644000China
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoo... 详细信息
来源: 评论