咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 451 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 496 篇 软件工程
    • 178 篇 信息与通信工程
    • 152 篇 控制科学与工程
    • 90 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 28 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 school of comput...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,221 篇 英文
  • 54 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1298 条 记 录,以下是151-160 订阅
排序:
Learning-Based Directional Improvement Prediction for Dynamic Multiobjective Optimization
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Ye, Yulong Liu, Songbai Zhou, Junwei Lin, Qiuzhen Jiang, Min Tan, Kay Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan China School of Informatics Xiamen University Fujian China Department of Computing The Hong Kong Polytechnic University Hong Kong China
In recent years, dynamic multiobjective evolutionary algorithms (DMOEAs) using the prediction strategy have shown promising performance for solving dynamic multiobjective optimization problems (DMOPs), as they can pre... 详细信息
来源: 评论
MemSAM: Taming Segment Anything Model for Echocardiography Video Segmentation
MemSAM: Taming Segment Anything Model for Echocardiography V...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaolong Deng Huisi Wu Runhao Zeng Jing Qin College of Computer Science and Software Engineering Shenzhen University College of Mechatronics and Control Engineering Shenzhen University Centre for Smart Health School of Nursing The Hong Kong Polytechnic University
We propose a novel echocardiographical video segmentation model by adapting SAM to medical videos to address some long-standing challenges in ultrasound video segmentation, including (1) massive speckle noise and arti... 详细信息
来源: 评论
Semi-Asynchronous Federated Learning with Trajectory Prediction for Vehicular Edge Computing
Semi-Asynchronous Federated Learning with Trajectory Predict...
收藏 引用
International Workshop on Quality of Service
作者: Yuxuan Deng Xiuhua Li Chuan Sun Qilin Fan Xiaofei Wang Victor C. M. Leung School of Big Data & Software Engineering Chongqing University Chongqing China School of Computer Science and Engineering Nanyang Technological University Singapore TKLAN College of Intelligence & Computing Tianjin University Tianjin China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen China College of Computer Science & Software Engineering Shenzhen University Shenzhen China Department of Electrical & Computer Engineering The University of British Columbia Vancouver Canada
Federated learning, as a distributed machine learning paradigm, offers promising solutions for vehicular edge computing (VEC) networks. However, federated learning in VEC with classification tasks still faces two key ... 详细信息
来源: 评论
Network Intrusion Detection System Using Deep Learning Method with KDD Cup'99 Dataset  15
Network Intrusion Detection System Using Deep Learning Metho...
收藏 引用
15th IEEE International Symposium on Embedded Multicore/Many-Core Systems-on-Chip, MCSoC 2022
作者: Tanimu, Jesse Jeremiah Hamada, Mohamed Robert, Patience Mahendran, Anand Bayero University Kano Dept. of Computer Science Kano Nigeria University of Aizu Software Engineering Lab. Aizu Japan Federal Polytechnic Bali Department of Computer Science Bali Nigeria Higher School of Economics Theoretical Computer Science Lab. Moscow Russia
This work is a deep sparse autoencoder network intrusion detection system which addresses the issue of interpretability of L2 regularization technique used in other works. The proposed model was trained using a mini-b... 详细信息
来源: 评论
TSEML: A task-specific embedding-based method for few-shot classification of cancer molecular subtypes
arXiv
收藏 引用
arXiv 2024年
作者: Su, Ran Shi, Rui Cui, Hui Xuan, Ping Fang, Chengyan Feng, Xikang Jin, Qiangguo School of Computer Software College of Intelligence and Computing Tianjin University Tianjin China School of Software Northwestern Polytechnical University Shaanxi China Department of Computer Science and Information Technology La Trobe University Melbourne Australia Department of Computer Science School of Engineering Shantou University Guangdong China Yangtze River Delta Research Institute of Northwestern Polytechnical University Taicang China
Molecular subtyping of cancer is recognized as a critical and challenging upstream task for personalized therapy. Existing deep learning methods have achieved significant performance in this domain when abundant data ... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
Blockchain Technology and Information Security (ICBCTIS), International Conference on
作者: Xu Wang Shimin Sun Li Han School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys...
来源: 评论
SMART: towards pre-trained missing-aware model for patient health status prediction  24
SMART: towards pre-trained missing-aware model for patient h...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Zhihao Yu Xu Chu Yujie Jin Yasha Wang Junfeng Zhao School of Computer Science Peking University and National Research and Engineering Center of Software Engineering Peking University School of Computer Science Peking University and Center on Frontiers of Computing Studies Peking University Beijing China and Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China and Peking University Information Technology Institute (Tianjin Binhai) National Research and Engineering Center of Software Engineering Peking University and Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China and Peking University Information Technology Institute (Tianjin Binhai) School of Computer Science Peking University and National Research and Engineering Center of Software Engineering Peking University and Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China and Nanhu Laboratory Jiaxing China
Electronic health record (EHR) data has emerged as a valuable resource for analyzing patient health status. However, the prevalence of missing data in EHR poses significant challenges to existing methods, leading to s...
来源: 评论
TSEML: A task-specific embedding-based method for few-shot classification of cancer molecular subtypes
TSEML: A task-specific embedding-based method for few-shot c...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Ran Su Rui Shi Hui Cui Ping Xuan Chengyan Fang Xikang Feng Qiangguo Jin School of Computer Software College of Intelligence and Computing Tianjin University Tianjin China School of Software Northwestern Polytechnical University Shaanxi China Department of Computer Science and Information Technology La Trobe University Melbourne Australia Department of Computer Science School of Engineering Shantou University Guangdong China Yangtze River Delta Research Institute of Northwestern Polytechnical University Taicang China
Molecular subtyping of cancer is recognized as a critical and challenging upstream task for personalized therapy. Existing deep learning methods have achieved significant performance in this domain when abundant data ... 详细信息
来源: 评论
A Node Confidence Determination Based Moving Target Defense Strategy for SDN
A Node Confidence Determination Based Moving Target Defense ...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shimin Sun Guowei Xu Li Han Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
With the rapid development of Internet technology, network assets have become an indispensable part of modern society. Especially in the face of high-value network assets, the attacker is faced with paying a greater c...
来源: 评论
Towards Detecting Comment-Code Inconsistency in Smart Contract via Pre-Training Techniques
Towards Detecting Comment-Code Inconsistency in Smart Contra...
收藏 引用
2024 IEEE International Conference on Security, Privacy, Anonymity in Computation and Communication and Storage (SpaCCS)
作者: Xiaohui Liu Sicheng Hao Lei Yang Xiaohong Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China School of Information Engineering Guangzhou Panyu Polytechnic Guangzhou China
Smart contracts are programs deployed on the blockchain. The security issues of smart contracts have become the focus in recent years. Comments have been widely used to improve the readability of programs. Nevertheles...
来源: 评论