咨询与建议

限定检索结果

文献类型

  • 149,420 篇 会议
  • 73,768 篇 期刊文献
  • 1,481 册 图书

馆藏范围

  • 224,668 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 136,454 篇 工学
    • 91,277 篇 计算机科学与技术...
    • 74,859 篇 软件工程
    • 32,416 篇 信息与通信工程
    • 21,175 篇 控制科学与工程
    • 16,653 篇 电气工程
    • 16,599 篇 电子科学与技术(可...
    • 15,571 篇 生物工程
    • 10,851 篇 生物医学工程(可授...
    • 10,584 篇 光学工程
    • 10,244 篇 机械工程
    • 7,505 篇 化学工程与技术
    • 7,208 篇 仪器科学与技术
    • 6,649 篇 动力工程及工程热...
    • 5,338 篇 材料科学与工程(可...
    • 4,764 篇 交通运输工程
    • 4,719 篇 安全科学与工程
    • 4,535 篇 网络空间安全
  • 74,131 篇 理学
    • 38,049 篇 数学
    • 22,251 篇 物理学
    • 17,399 篇 生物学
    • 12,485 篇 统计学(可授理学、...
    • 8,151 篇 系统科学
    • 7,897 篇 化学
  • 35,515 篇 管理学
    • 22,055 篇 管理科学与工程(可...
    • 14,831 篇 图书情报与档案管...
    • 9,566 篇 工商管理
  • 10,138 篇 医学
    • 8,337 篇 临床医学
    • 7,465 篇 基础医学(可授医学...
    • 4,609 篇 药学(可授医学、理...
  • 5,956 篇 法学
    • 4,941 篇 社会学
  • 3,661 篇 经济学
  • 2,620 篇 农学
  • 2,374 篇 教育学
  • 1,022 篇 文学
  • 498 篇 军事学
  • 383 篇 艺术学
  • 37 篇 哲学
  • 22 篇 历史学

主题

  • 6,400 篇 computer science
  • 5,597 篇 accuracy
  • 5,557 篇 feature extracti...
  • 4,990 篇 computational mo...
  • 4,953 篇 training
  • 4,888 篇 deep learning
  • 3,921 篇 machine learning
  • 3,173 篇 semantics
  • 3,129 篇 optimization
  • 3,077 篇 predictive model...
  • 2,817 篇 data models
  • 2,569 篇 data mining
  • 2,542 篇 real-time system...
  • 2,503 篇 neural networks
  • 2,441 篇 support vector m...
  • 2,314 篇 convolutional ne...
  • 2,135 篇 internet of thin...
  • 2,073 篇 educational inst...
  • 2,062 篇 artificial intel...
  • 2,029 篇 image segmentati...

机构

  • 2,471 篇 school of comput...
  • 2,215 篇 school of comput...
  • 2,088 篇 school of comput...
  • 1,810 篇 school of comput...
  • 1,520 篇 school of comput...
  • 1,480 篇 school of comput...
  • 1,355 篇 school of electr...
  • 1,330 篇 school of comput...
  • 1,238 篇 school of comput...
  • 1,056 篇 cavendish labora...
  • 1,029 篇 school of comput...
  • 974 篇 department of ph...
  • 970 篇 school of comput...
  • 967 篇 university of ch...
  • 911 篇 school of comput...
  • 855 篇 oliver lodge lab...
  • 854 篇 physikalisches i...
  • 615 篇 school of inform...
  • 565 篇 school of comput...
  • 538 篇 school of comput...

作者

  • 386 篇 niyato dusit
  • 269 篇 a. gomes
  • 261 篇 barter w.
  • 239 篇 c. alexa
  • 234 篇 s. chen
  • 232 篇 blake t.
  • 231 篇 j. m. izen
  • 227 篇 bowcock t.j.v.
  • 224 篇 bellee v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 217 篇 brundu d.
  • 215 篇 beiter a.
  • 212 篇 bencivenni g.
  • 205 篇 bay a.
  • 203 篇 g. bella
  • 203 篇 c. amelung
  • 202 篇 j. strandberg

语言

  • 195,063 篇 英文
  • 26,274 篇 其他
  • 3,443 篇 中文
  • 185 篇 日文
  • 40 篇 朝鲜文
  • 30 篇 德文
  • 26 篇 法文
  • 12 篇 斯洛文尼亚文
  • 6 篇 西班牙文
  • 3 篇 荷兰文
  • 3 篇 土耳其文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 2 篇 俄文
检索条件"机构=School of Computer Science and Engineering/School of Software"
224669 条 记 录,以下是191-200 订阅
排序:
BATON: symphony of random testing and concolic testing through machine learning and taint analysis
收藏 引用
science China(Information sciences) 2023年 第3期66卷 97-117页
作者: Bihuan CHEN Yang LIU Xin PENG Yijian WU Shengchao QIN School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Fudan University School of Computer Science and Engineering Nanyang Technological University School of Computing Teesside University
Random testing is scalable but often fails to hit corner program behaviors,while systematic testing (e.g.,concolic execution) is promising to cover corner program behaviors but is not scalable to explore all program... 详细信息
来源: 评论
Semantic Communications for Digital Signals via Carrier Images
收藏 引用
IEEE Wireless Communications Letters 2025年 第6期14卷 1816-1820页
作者: Yan, Zhigang Li, Dong Macau University of Science and Technology School of Computer Science and Engineering China
Most of current semantic communication (SemCom) frameworks focus on the image transmission, which, however, do not address the problem on how to deliver digital signals without any semantic features. This paper propos... 详细信息
来源: 评论
Personalized trajectory data perturbation algorithm based on quadtree indexing
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第4期31卷 17-27页
作者: Liu Kun Jin Junhui Wang Hui Shen Zihao Liu Peiqian School of Software Henan Polytechnic UniversityJiaozuo 454000China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454000China
To solve the privacy leakage problem of truck trajectories in intelligent logistics,this paper proposes a quadtreebased personalized joint location perturbation(QPJLP)algorithm using location generalization and local ... 详细信息
来源: 评论
IIN-FFD:Intra-Inter Network for Face Forgery Detection
收藏 引用
Tsinghua science and Technology 2024年 第6期29卷 1839-1850页
作者: Qihua Zhou Zhili Zhou Zhipeng Bao Weina Niu Yuling Liu School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Institute of Artificial Intelligence Guangzhou UniversityGuangzhou 510006China School of Computer Science University of Electronic Science and Technology of ChinaChengdu 611731SichuanChina School of Computer Science Hunan UniversityChangsha 410082HunanChina
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurat... 详细信息
来源: 评论
Federated Class-Incremental Learning via Weighted Aggregation and Distillation
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 22489-22503页
作者: Wu, Feng Tan, Alysa Ziying Feng, Siwei Yu, Han Deng, Tao Zhao, Libang Chen, Yuanlu Soochow University School of Computer Science and Technology Suzhou215000 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore
Federated Class-Incremental Learning (FCIL) aims to design privacy-preserving collaborative training methods to continuously learn new classes from distributed datasets. In these scenarios, federated clients face the ... 详细信息
来源: 评论
Loop Subgraph-Level Greedy Mapping Algorithm for Grid Coarse-Grained Reconfigurable Array
收藏 引用
Tsinghua science and Technology 2023年 第2期28卷 330-343页
作者: Naijin Chen Fei Cheng Chenghao Han Jianhui Jiang Xiaoqing Wen School of Computer and Information Science Anhui Polytechnic UniversityWuhu 241000China School of Software Engineering Tongji UniversityShanghai 201804China Department of Computer Science and Networks Kyushu Institute of TechnologyFukuoka 820-8502Japan
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the... 详细信息
来源: 评论
Efficient Quantum Secure Vector Dominance and Its Applications in Computational Geometry
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2129-2143页
作者: Liu, Wenjie Su, Bingmei Sun, Feiyang Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China
Secure vector dominance is a key cryptographic primitive in secure computational geometry (SCG), determining the dominance relationship of vectors between two participants without revealing their private information. ... 详细信息
来源: 评论
A PPO-based Channel Hopping Sequence Framework for Time Slot Channel Hopping  24
A PPO-based Channel Hopping Sequence Framework for Time Slot...
收藏 引用
12th International Conference on Communications and Broadband Networking, ICCBN 2024
作者: He, Zhihang Niu, Xianhua Qi, Chao Wang, Yaoxuan Zhou, Enzhi Zeng, Bosen School of Computer and Software Engineering Xihua University China School of Computer Science Chengdu Normal University China
As a key communication technology in IEEE 802.15.4, Time Slot Channel Hopping (TSCH) enhances transmission reliability and interference immunity by scheduling of time slots and channel assignments. This paper presents... 详细信息
来源: 评论
Research on Network Traffic Classification Based on Graph Neural Network
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第12期51卷 2043-2050页
作者: Han, Yue Dai, Hong University of Science and Technology Liaoning Liaoning Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning Anshan China
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user expe... 详细信息
来源: 评论
Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming
收藏 引用
science China(Information sciences) 2022年 第1期65卷 234-246页
作者: Xiaozhen LU Jingfang JIE Zihan LIN Liang XIAO Jin LI Yanyong ZHANG Department of Information and Communication Engineering Xiamen University School of Computer Science and Educational Software Guangzhou University School of Computer Science and Technology University of Science and Technology of China
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhau... 详细信息
来源: 评论