咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 451 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 496 篇 软件工程
    • 178 篇 信息与通信工程
    • 152 篇 控制科学与工程
    • 90 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 28 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 image segmentati...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 deep learning
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 school of comput...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,221 篇 英文
  • 54 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1298 条 记 录,以下是421-430 订阅
排序:
BG-GAN: Generative AI Enable Representing Brain Structure-Function Connections for Alzheimer’s Disease
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Tong Ding, Chen Jing, Changhong Liu, Feng Hung, Kevin Pham, Hieu Mahmud, Mufti Lyu, Zhihan Qiao, Sibo Wang, Shuqiang Tsang, Kim-Fung The Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China University of Chinese Academy of Sciences Beijing100864 China The Department of Systems and Enterprises Stevens Institute of Technology United States School of Science and Technology Hong Kong Metropolitan University Hong Kong College of Engineering and Computer Science VinUni-Illinois Smart Health Center VinUniversity Viet Nam Department of Information and Computer Science SDAIA-KFUPM Joint Research Center for AI Interdisciplinary Research Center for Biosystems and Machines King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Department of Game Design Faculty of Arts Uppsala University Sweden The School of Software Tiangong University Tianjin300387 China
The relationship between brain structure and function is critical for revealing the pathogenesis of brain disorders, including Alzheimer’s disease (AD). However, mapping brain structure to function connections is a v... 详细信息
来源: 评论
UAV-enabled social internet of vehicles: Roles, security issues and use cases  6th
UAV-enabled social internet of vehicles: Roles, security iss...
收藏 引用
6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020
作者: Tang, Chaogang Wei, Xianglin Liu, Chong Jiang, Haifeng Wu, Huaming Li, Qing School of Computer Science and Technology China University of Mining and Technology Xuzhou221116 China National University of Defense Technology Changsha410073 China The School of Engineering and Applied Science The George Washington University WashingtonDC20052 United States Center for Applied Mathematics Tianjin University Tianjin300072 China Department of Computing The Hong Kong Polytechnic University Hong Kong
Social internet of vehicle (SIoV), also termed vehicular social network (VSN), endeavors to integrate social networking related concepts into IoV, with an aim to make vehicles capable of social communication and low-c... 详细信息
来源: 评论
IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation
IoT-ID: Robust IoT Device Identification Based on Feature Dr...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Qi Chen Yubo Song Brendan Jennings Fan Zhang Bin Xiao Shang Gao Key Laboratory of Computer Network Technology of Jiangsu Province School of Cyber Science and Engineering Southeast University Purple Mountain Laboratories Telecommunications Software & Systems Group Waterford Institute of Technology The Hong Kong Polytechnic University
Internet of Things (IoT) devices deployed in publicly accessible locations increasingly encounter security threats from device replacement and impersonation attacks. Unfortunately, the limited memory and poor computin... 详细信息
来源: 评论
Intrusion Detection Mechanism Based On Modular Neural Network
Intrusion Detection Mechanism Based On Modular Neural Networ...
收藏 引用
International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
作者: Hongyu Luo Kai Shi Fuqiang Qiao Yinghao Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China College of Software and Communications Tianjin Sino-German University of Applied Sciences Tianjin China
Nowadays, the complexity and diversity of network security issues have caused intrusion detection to become an important research topic. Aiming at the problems of traditional intrusion detection mechanisms, the modula... 详细信息
来源: 评论
Iterative pseudo-labeling based adaptive copy-paste supervision for semi-supervised tumor segmentation
收藏 引用
Knowledge-Based Systems 2025年 324卷
作者: Qiangguo Jin Hui Cui Junbo Wang Changming Sun Yimiao He Ping Xuan Linlin Wang Cong Cong Leyi Wei Ran Su School of Software Northwestern Polytechnical University Shaanxi China Yangtze River Delta Research Institute of Northwestern Polytechnical University Taicang China Department of Computer Science and Information Technology La Trobe University Melbourne Australia CSIRO Data61 Sydney Australia Department of Computer Science School of Engineering Shantou University Guangdong China Shandong Cancer Hospital and Institute Shandong First Medical University and Shandong Academy of Medical Sciences Shandong China Australian Institute of Health Innovation (AIHI) Macquarie University Australia School of Software Shandong University Shandong China Centre for Artificial Intelligence driven Drug Discovery Faculty of Applied Science Macao Polytechnic University Macao Special Administrative Region of China School of Computer Software College of Intelligence and Computing Tianjin University Tianjin China
Semi-supervised learning (SSL) has attracted considerable attention in medical image processing. The latest SSL methods use a combination of consistency regularization and pseudo-labeling to achieve remarkable success...
来源: 评论
Correction: HCLR-Net: Hybrid Contrastive Learning Regularization with Locally Randomized Perturbation for Underwater Image Enhancement
收藏 引用
International Journal of computer Vision 2024年 第11期132卷 5490-5490页
作者: Zhou, Jingchun Sun, Jiaming Li, Chongyi Jiang, Qiuping Zhou, Man Lam, Kin-Man Zhang, Weishi Fu, Xianping School of Information Science and Technology Dalian Maritime University Dalian Liaoning China College of Computer Science Nankai University Tianjin China School of Information Science and Engineering Ningbo University Ningbo China S-Lab Nanyang Technological University Singapore Singapore Department of Electrical and Electronic Engineering Hong Kong Polytechnic University Hong Kong China
来源: 评论
Deep Denoising Sparse Coding
Deep Denoising Sparse Coding
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yijie Wang Bo Yang School of Software Engineering Xi'an Jiaotong University Xi'an China School of Computer Science Xi'an Polytechnic University Xi'an China
Single-cell Ribonucleic Acid sequencing (scRNA-seq) has great potential to discover cell types, identify cell states, trace development lineages, and reconstruct the spatial organization of cells. Clustering transcrip... 详细信息
来源: 评论
Multi-modal data information alignment based SOH estimation for lithium-ion batteries using a local–global parallel CNN-Transformer Network
收藏 引用
Journal of Energy Storage 2025年 129卷
作者: Xuanang Gui Junrong Du Qianlong Wang Huan Zhao Yuheng Cheng Junhua Zhao School of Science and Engineering The Chinese University of Hong Kong Shenzhen 518172 China National Computer System Engineering Research Institute of China Beijing 100083 China Business School Nankai University Tianjin 300071 China Department of Building Environment and Energy Engineering The Hong Kong Polytechnic University Hong Kong China
Accurate State of Health (SOH) estimation of lithium-ion batteries is crucial for safe and reliable operation. However, real-world applications often lack comprehensive labeled data across diverse operating conditions...
来源: 评论
AI-based Fog and Edge Computing: A Systematic Review, Taxonomy and Future Directions
arXiv
收藏 引用
arXiv 2022年
作者: Iftikhar, Sundas Gill, Sukhpal Singh Song, Chenghao Xu, Minxian Aslanpour, Mohammad Sadegh Toosi, Adel N. Du, Junhui Wu, Huaming Ghosh, Shreya Chowdhury, Deepraj Golec, Muhammed Kumar, Mohit Abdelmoniem, Ahmed M. Cuadrado, Felix Varghese, Blesson Rana, Omer Dustdar, Schahram Uhlig, Steve School of Electronic Engineering and Computer Science Queen Mary University of London London United Kingdom University of Kotli Azad Jammu & Kashmir Azad Kashmir Kotli Pakistan Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Department of Software Systems and Cybersecurity Faculty of Information Technology Monash University Australia Csiro DATA61 Australia Center for Applied Mathematics Tianjin University Tianjin China The Pennsylvania State University PA United States Naya Raipur India Abdullah Gül University Kayseri Turkey Department of Information Technology National Institute of Technology Jalandhar India Spain School of Computer Science University of St Andrews United Kingdom School of Computer Science and Informatics Cardiff University Cardiff United Kingdom Distributed Systems Group Vienna University of Technology Vienna Austria
Resource management in computing is a very challenging problem that involves making sequential decisions. Resource limitations, resource heterogeneity, dynamic and diverse nature of workload, and the unpredictability ... 详细信息
来源: 评论
Dual Representation Learning for One-Step Clustering of Multi-View Data
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Wei Deng, Zhaohong Choi, Kup-Sze Wang, Jun Wang, Shitong The School of Artificial Intelligence and Computer Science Jiangnan University Jiangsu Key Laboratory of Media Design and Software Technology Wuxi214122 China The School of Artificial Intelligence and Computer Science Jiangnan University Wuxi214122 China ZJLab Shanghai200433 China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The Key laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai Institute for Advanced Communication and Data Science School of Communication and Information Engineering Shanghai University Shanghai200444 China
Multi-view data are commonly encountered in data mining applications. Effective extraction of information from multi-view data requires specific design of clustering methods to cater for data with multiple views, whic... 详细信息
来源: 评论