咨询与建议

限定检索结果

文献类型

  • 7,928 篇 会议
  • 5,360 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 13,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,825 篇 工学
    • 6,870 篇 计算机科学与技术...
    • 5,648 篇 软件工程
    • 1,805 篇 信息与通信工程
    • 1,082 篇 控制科学与工程
    • 926 篇 生物工程
    • 698 篇 电气工程
    • 628 篇 机械工程
    • 552 篇 电子科学与技术(可...
    • 512 篇 光学工程
    • 499 篇 生物医学工程(可授...
    • 344 篇 化学工程与技术
    • 298 篇 仪器科学与技术
    • 295 篇 安全科学与工程
    • 280 篇 动力工程及工程热...
    • 267 篇 网络空间安全
    • 260 篇 交通运输工程
    • 245 篇 建筑学
  • 4,172 篇 理学
    • 2,482 篇 数学
    • 1,003 篇 生物学
    • 826 篇 物理学
    • 718 篇 统计学(可授理学、...
    • 454 篇 系统科学
    • 374 篇 化学
  • 2,698 篇 管理学
    • 1,647 篇 管理科学与工程(可...
    • 1,178 篇 图书情报与档案管...
    • 595 篇 工商管理
  • 424 篇 医学
    • 365 篇 临床医学
    • 312 篇 基础医学(可授医学...
  • 380 篇 法学
    • 284 篇 社会学
  • 221 篇 经济学
    • 220 篇 应用经济学
  • 181 篇 教育学
  • 134 篇 农学
  • 56 篇 文学
  • 40 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 353 篇 computer science
  • 321 篇 feature extracti...
  • 318 篇 semantics
  • 289 篇 computational mo...
  • 279 篇 deep learning
  • 218 篇 data mining
  • 196 篇 optimization
  • 184 篇 educational inst...
  • 181 篇 software enginee...
  • 178 篇 training
  • 166 篇 machine learning
  • 158 篇 predictive model...
  • 156 篇 image segmentati...
  • 151 篇 neural networks
  • 135 篇 wireless sensor ...
  • 135 篇 accuracy
  • 132 篇 servers
  • 129 篇 internet of thin...
  • 128 篇 support vector m...
  • 126 篇 convolution

机构

  • 474 篇 school of comput...
  • 373 篇 state key labora...
  • 295 篇 school of softwa...
  • 275 篇 school of softwa...
  • 265 篇 school of softwa...
  • 262 篇 department of co...
  • 260 篇 school of inform...
  • 218 篇 school of comput...
  • 210 篇 college of compu...
  • 176 篇 school of softwa...
  • 161 篇 school of comput...
  • 160 篇 college of compu...
  • 139 篇 school of comput...
  • 138 篇 school of comput...
  • 127 篇 school of comput...
  • 127 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of softwa...
  • 116 篇 school of comput...
  • 101 篇 school of comput...

作者

  • 50 篇 gao yang
  • 43 篇 jin wang
  • 41 篇 liu yang
  • 41 篇 qi lianyong
  • 38 篇 wang lei
  • 38 篇 wang wei
  • 34 篇 chen huajun
  • 33 篇 qi liu
  • 33 篇 zhang wen
  • 33 篇 tao dacheng
  • 31 篇 zhao jian
  • 30 篇 li li
  • 30 篇 liu qi
  • 29 篇 junping du
  • 28 篇 sun xingming
  • 28 篇 shen furao
  • 27 篇 xiang-yang li
  • 27 篇 zhang zhao
  • 27 篇 zhang qiang
  • 26 篇 lei wang

语言

  • 12,593 篇 英文
  • 545 篇 其他
  • 257 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Technology"
13379 条 记 录,以下是201-210 订阅
排序:
A Comprehensive Review on Deep Learning System Testing  24th
A Comprehensive Review on Deep Learning System Testing
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Ying Shan, Chun Liu, Zhen Liao, Shuyan Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Computer School Beijing Information Science and Technology University Beijing China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China
Deep learning(DL) systems exhibit multiple behavioral characteristics such as correctness, robustness, and fairness. Ensuring that these behavioral characteristics function properly is crucial for maintaining the accu... 详细信息
来源: 评论
In silico prediction methods of self-interacting proteins:an empirical and academic survey
收藏 引用
Frontiers of computer science 2023年 第3期17卷 199-216页
作者: Zhanheng CHEN Zhuhong YOU Qinhu ZHANG Zhenhao GUO Siguo WANG Yanbin WANG College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China School of Computer Science Northwestern Polytechnical UniversityXi’an 710129China Institute of Machine Learning and Systems Biology School of Electronics and Information EngineeringTongji UniversityShanghai 201804China School of Cyber Science and Technology Zhejiang UniversityHangzhou 310058China
In silico prediction of self-interacting proteins(SIPs)has become an important part of *** is an urgent need to develop effective and reliable prediction methods to overcome the disadvantage of high cost and labor int... 详细信息
来源: 评论
Ordered Momentum for Asynchronous SGD  38
Ordered Momentum for Asynchronous SGD
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Shi, Chang-Wei Yang, Yi-Rui Li, Wu-Jun National Key Laboratory for Novel Software Technology School of Computer Science Nanjing University Nanjing China
Distributed learning is essential for training large-scale deep models. Asynchronous SGD (ASGD) and its variants are commonly used distributed learning methods, particularly in scenarios where the computing capabiliti...
来源: 评论
Container-Aware Service Function Chains Placement and Optimization in Vehicular Edge Computing  22
Container-Aware Service Function Chains Placement and Optimi...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhang, Kaixin Hu, Shihong Qu, Zhihao Ye, Baoliu Hohai University School of Computer Science and Software Engineering China Nanjing University National Key Laboratory for Novel Software Technology China
In the domain of Vehicular Edge Computing (VEC), this paper addresses the complex problem of Service Function Chain (SFC) placement, which is crucial for the efficient deployment of cloud applications in vehicular env... 详细信息
来源: 评论
SUFT: Sparse and Uncertain Fusion Transformers for Multi-Atlas Brain Network Analysis
SUFT: Sparse and Uncertain Fusion Transformers for Multi-Atl...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Su, Zhan Huang, Jiashuang Jiang, Shu Wang, Mingliang Ding, Weiping School of Artificial Intelligence and Computer Science Nantong University Nantong China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
The existing multi-atlas brain network analysis methods rely on some simple fusion methods (i.e., add and concatenation) and do not consider the information redundancy caused by increased brain regions. To improve upo... 详细信息
来源: 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application with Blockchain-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1370-1379页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Illinois Institute of Technology Information Technology and Management ChicagoIL60616 United States
The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of electric power transmission. However, the current deploym... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论