咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 451 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 496 篇 软件工程
    • 178 篇 信息与通信工程
    • 152 篇 控制科学与工程
    • 90 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 28 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 school of comput...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,221 篇 英文
  • 54 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1298 条 记 录,以下是271-280 订阅
排序:
Hierarchical Crowdsourcing for Data Labeling with Heterogeneous Crowd
Hierarchical Crowdsourcing for Data Labeling with Heterogene...
收藏 引用
International Conference on Data engineering
作者: Haodi Zhang Wenxi Huang Zhenhan Su Junyang Chen Di Jiang Lixin Fan Chen Zhang Defu Lian Kaishun Wu College of Computer Science and Software Engineering Shenzhen University Department of Computing Hong Kong Polytechnic University WeBank Institute of Financial Technology Shenzhen University Webank Co. Ltd. School of Data Science University of Science and Technology of China
With the rapid and continuous development of data-driven technologies such as supervised learning, high-quality labeled data sets are commonly required by many applications. Due to the easiness of crowdsourcing small ...
来源: 评论
CNS-Net: Conservative Novelty Synthesizing Network for Malware Recognition in an Open-set Scenario
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Jingcai Guo, Song Ma, Shiheng Sun, Yuxia Xu, Yuanyuan The Department of Computing The Hong Kong Polytechnic University Hong Kong The Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200030 China The Department of Computer Science Jinan University Guangzhou510632 China The School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
We study the challenging task of malware recognition on both known and novel unknown malware families, called malware open-set recognition (MOSR). Previous works usually assume the malware families are known to the cl... 详细信息
来源: 评论
DISTDET: a cost-effective distributed cyber threat detection system  23
DISTDET: a cost-effective distributed cyber threat detection...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Feng Dong Liu Wang Xu Nie Fei Shao Haoyu Wang Ding Li Xiapu Luo Xusheng Xiao School of Cyber Science and Engineering Huazhong University of Science and Technology and Sangfor Technologies Inc Beijing University of Posts and Telecommunications Case Western Reserve University School of Cyber Science and Engineering Huazhong University of Science and Technology Key Laboratory of High-Confidence Software Technologies (MOE) School of Computer Science Peking University The Hong Kong Polytechnic University Arizona State University
Building provenance graph that considers causal relationships among software behaviors can better provide contextual information of cyber attacks, especially for advanced attacks such as Advanced Persistent Threat (AP...
来源: 评论
Deep Learning-Based Approach for Identification of Potato Leaf Diseases Using Wrapper Feature Selection and Feature Concatenation
arXiv
收藏 引用
arXiv 2025年
作者: Naeem, Muhammad Ahtsam Saleem, Muhammad Asim Sharif, Muhammad Imran Akber, Shahzad Saleem, Sajjad Akhtar, Zahid Siddique, Kamran School of Information and Software Engineering University of Electronic Science and Technology of China China Faculty of Computing Riphah International University Faisalabad Campus Pakistan Department of Computer Science COMSATS University Islamabad Wah Campus Pakistan Department of Information and Technology Washington University of Science and Technology AlexandriaVA United States Department of Network and Computer Security State University of New York Polytechnic Institute United States Department of Computer Science and Engineering University of Alaska Anchorage Anchorage United States
The potato is a widely grown crop in many regions of the world. In recent decades, potato farming has gained incredible traction in the world. Potatoes are susceptible to several illnesses that stunt their development... 详细信息
来源: 评论
Microstructure and wear resistance of CoCrNbNiW high-entropy alloy coating prepared by laser melting deposition
收藏 引用
Rare Metals 2019年 第12期38卷 1153-1159页
作者: Yan-Jun Jia Han-Ning Chen Xiao-Dan Liang School of Mechanical Engineering Tianjin Polytechnic UniversityTianjin 300387China School of Computer Science and Technology Tianjin Polytechnic UniversityTianjin 300387China
The defect-free CoCrNbNiW high-entropy alloy coating was successfully prepared by laser melting deposition,and its microstructure and wear resistance were *** results showed that the microstructure of CoCrNbNiW high-e... 详细信息
来源: 评论
Llm-Based Automated Modeling in Symbolic Execution for Securing Medical software
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Jingxue Deng, Liangjun Qiu, Yao Zhao, Pengbiao Lei, Hang Song, Jingcheng Wang, Xiaopei School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu610054 China Institute of Building Information Modeling Ningbo Polytechnic College Zhejiang Ningbo315800 China College of Information Science and Engineering Linyi University Shandong Linyi276000 China Department of Computer Science and Engineering University of California RiversideCA92521 United States
There are lots of sensitive information in medical consumer devices. Since Consumer electronics products in the healthcare mainly focus on health monitoring and personal health management, such as wearable ECG monitor...
来源: 评论
An End-to-End Conformer-Based Speech Recognition Model for Mandarin Radiotelephony Communications in Civil Aviation  16th
An End-to-End Conformer-Based Speech Recognition Model for M...
收藏 引用
16th Chinese Conference on Biometric Recognition, CCBR 2022
作者: Shi, Yihua Ma, Guanglin Ren, Jin Zhang, Haigang Yang, Jinfeng Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area Shenzhen Polytechnic Shenzhen518055 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
In civil aviation radiotelephony communications, misunderstandings between air traffic controllers and flight crews can result in serious aviation accidents. Automatic semantic verification is a promising assistant so... 详细信息
来源: 评论
Co-occurrence order-preserving pattern mining
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Youxi Wang, Zhen Li, Yan Guo, Yingchun Jiang, He Zhu, Xingquan Wu, Xindong School of Artificial Intelligence Hebei University of Technology Tianjin300401 China ShiJiaZhuang Posts and Telecommunications Technical College Shijiazhuang050021 China School of Economics and Management Hebei University of Technology Tianjin300401 China School of Software Dalian University of Technology Dalian116023 China Department of Computer & Electrical Engineering and Computer Science Florida Atlantic University FL33431 United States Hefei University of Technology Hefei230009 China
Recently, order-preserving pattern (OPP) mining has been proposed to discover some patterns, which can be seen as trend changes in time series. Although existing OPP mining algorithms have achieved satisfactory perfor... 详细信息
来源: 评论
An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET
An Efficient Blockchain-based Privacy-Preserving Authenticat...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Shiyuan Xu Xue Chen Weimin Kong Yibo Cao Yunhua He Ke Xiao School of Information Engineering North China University of Technology Beijing China Department of Computer Science The University of Hong Kong Pok Fu Lam Hong Kong Department of Computing The Hong Kong Polytechnic University Hung Hom Hong Kong College of Software Tianjin Normal University Tianjin China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
With emerging technology, the blockchain-based Vehicle Ad-hoc Network (VANET) can alleviate traffic congestion and optimize resource management to improve the transportation system's efficiency significantly. Howe...
来源: 评论
FGRL-Net: Fine-Grained Personalized Patient Representation Learning for Clinical Risk Prediction Based on EHRs
FGRL-Net: Fine-Grained Personalized Patient Representation L...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: KaKit Chio Wenhao Zhu Lihua He Dian Zhang Xu Yang Wuman Luo Faculty of Applied Sciences Macao Polytechnic University Macao S.A.R China School of Information and Communication Engineering University of Electronic Science and Technology of China Sichuan Province China Department of Computer Science and Software Engineering Shenzhen University Shenzhen China
Personalized patient representation learning (PPRL) is a critical element in clinical risk prediction. It aims to obtain a complete portrait of each patient based on Electronic Health Records (EHR). Although existing ...
来源: 评论