咨询与建议

限定检索结果

文献类型

  • 8,056 篇 会议
  • 5,403 篇 期刊文献
  • 92 册 图书

馆藏范围

  • 13,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,948 篇 工学
    • 6,972 篇 计算机科学与技术...
    • 5,698 篇 软件工程
    • 1,819 篇 信息与通信工程
    • 1,118 篇 控制科学与工程
    • 927 篇 生物工程
    • 712 篇 电气工程
    • 630 篇 机械工程
    • 558 篇 电子科学与技术(可...
    • 524 篇 光学工程
    • 505 篇 生物医学工程(可授...
    • 343 篇 化学工程与技术
    • 301 篇 仪器科学与技术
    • 298 篇 安全科学与工程
    • 282 篇 动力工程及工程热...
    • 275 篇 网络空间安全
    • 266 篇 交通运输工程
    • 259 篇 建筑学
  • 4,182 篇 理学
    • 2,490 篇 数学
    • 1,003 篇 生物学
    • 831 篇 物理学
    • 723 篇 统计学(可授理学、...
    • 456 篇 系统科学
    • 373 篇 化学
  • 2,716 篇 管理学
    • 1,658 篇 管理科学与工程(可...
    • 1,185 篇 图书情报与档案管...
    • 604 篇 工商管理
  • 428 篇 医学
    • 370 篇 临床医学
    • 316 篇 基础医学(可授医学...
  • 383 篇 法学
    • 285 篇 社会学
  • 225 篇 经济学
    • 225 篇 应用经济学
  • 186 篇 教育学
  • 133 篇 农学
  • 55 篇 文学
  • 41 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 355 篇 computer science
  • 321 篇 feature extracti...
  • 309 篇 semantics
  • 295 篇 computational mo...
  • 283 篇 deep learning
  • 220 篇 data mining
  • 196 篇 optimization
  • 186 篇 software enginee...
  • 184 篇 educational inst...
  • 175 篇 training
  • 171 篇 machine learning
  • 159 篇 predictive model...
  • 158 篇 image segmentati...
  • 152 篇 neural networks
  • 138 篇 accuracy
  • 136 篇 wireless sensor ...
  • 134 篇 servers
  • 130 篇 support vector m...
  • 129 篇 internet of thin...
  • 125 篇 convolution

机构

  • 477 篇 school of comput...
  • 379 篇 state key labora...
  • 299 篇 school of softwa...
  • 293 篇 school of softwa...
  • 272 篇 school of inform...
  • 264 篇 department of co...
  • 264 篇 school of softwa...
  • 226 篇 college of compu...
  • 222 篇 school of comput...
  • 186 篇 school of softwa...
  • 165 篇 school of comput...
  • 157 篇 college of compu...
  • 142 篇 school of comput...
  • 137 篇 school of comput...
  • 129 篇 school of softwa...
  • 127 篇 school of comput...
  • 126 篇 school of comput...
  • 125 篇 school of comput...
  • 124 篇 school of comput...
  • 101 篇 school of comput...

作者

  • 51 篇 gao yang
  • 42 篇 jin wang
  • 41 篇 wang wei
  • 40 篇 liu yang
  • 39 篇 wang lei
  • 38 篇 qi lianyong
  • 35 篇 zhang wen
  • 34 篇 qi liu
  • 33 篇 tao dacheng
  • 32 篇 chen huajun
  • 31 篇 li li
  • 30 篇 liu qi
  • 30 篇 zhao jian
  • 29 篇 zhang zhao
  • 28 篇 sun xingming
  • 28 篇 shen furao
  • 27 篇 xiang-yang li
  • 27 篇 zhang qiang
  • 26 篇 cai shaowei
  • 26 篇 baowen xu

语言

  • 11,845 篇 英文
  • 1,471 篇 其他
  • 263 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Software Technology"
13551 条 记 录,以下是4651-4660 订阅
排序:
Multi-Class Classification of Alzheimer’s Disease Using Frontal Cortex Non-invasive fNIRS  8th
Multi-Class Classification of Alzheimer’s Disease Using Fro...
收藏 引用
8th International Conference on the Development of Biomedical Engineering, BME8 2020
作者: Ho, Thi Kieu Khanh Kim, Minhee Garg, Harish Kim, Byeong C. Lee, Jang Jae Choi, Kyu Yeong Kim, Jae Gwan Lee, Kun Ho Song, Jong-In Gwak, Jeonghwan School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technology Gwangju61005 Korea Republic of Department of Biomedical Science and Engineering Institute of Science and Technology Gwangju61005 Korea Republic of School of Mathematics Thapar Institute of Engineering and Technology Deemed University Patiala Punjab147004 India Department of Neurology Chonnam National University Medical School Gwangju61469 Korea Republic of Cohort Research Center Chosun University Gwangju61452 Korea Republic of Department of Biomedical Science Chosun University Gwangju61452 Korea Republic of Aging Neuroscience Research Group Korea Brain Research Institute Daegu41062 Korea Republic of Department of Software Korea National University of Transportation Chungju27469 Korea Republic of
Early and accurate diagnosis of Alzheimer’s disease (AD) is especially important for neurodegenerative disorders allowing patients, who exhibit different patterns of severity and progression risks, to take prevention... 详细信息
来源: 评论
Machine Learning Algorithms for Intrusion Detection Performance Evaluation and Comparative Analysis
Machine Learning Algorithms for Intrusion Detection Performa...
收藏 引用
Smart Electronics and Communication (ICOSEC), International Conference on
作者: B. Md. Irfan V. Poornima S Mohana Kumar Upendra Singh Aswal N. Krishnamoorthy Ramya Maranan Department of Information Technology Nalsar University of Law Hyderabad Telengana India Department of Computer Science VISTASPallavaram Chennai Department of Computer Science and Engineering Ramaiah Institute of Technology Bengaluru Karnataka India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Software Systems and Engineering Vellore Institute of Technology Vellore Campus Vellore Tamilnadu Department of Research and Innovation Saveetha School of Engineering SIMATS Chennai Tamil Nadu India
The security of computer networks is increasingly difficult to maintain due to the rising complexity and frequency of cyber-attacks. Important tools for finding and neutralizing these dangers are intrusion detection s...
来源: 评论
Efficient reversible data hiding via two layers of double-peak embedding
arXiv
收藏 引用
arXiv 2022年
作者: Wu, Fuhu Sun, Jian Zhang, Shun Chen, Zhili School of Computer Science and Technology Anhui University Hefei230601 China Software Engineering Institute East China Normal University Shanghai200062 China
Reversible data hiding continues to attract significant attention in recent years. In particular, an increasing number of authors focus on the higher significant bit (HSB) plane of an image which can yield more redund... 详细信息
来源: 评论
B-AUT: A Universal Architecture for Batch RFID Tags Authentication
B-AUT: A Universal Architecture for Batch RFID Tags Authenti...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yinan Zhu Chunhui Duan Xuan Ding Zheng Yang School of Software and BNRist Tsinghua University China School of Computer Science and Technology Beijing Institute of Technology China
RFID tags authentication is always a critical but challenging problem because only checking the EPC is vulnerable to counterfeiting attacks. Past works explore the unique backscat-ter signal features induced by tags&#... 详细信息
来源: 评论
Learning Signed Hyper Surfaces for Oriented Point Cloud Normal Estimation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Qing Feng, Huifang Shi, Kanle Gao, Yue Fang, Yi Liu, Yu-Shen Han, Zhizhong School of Software Tsinghua University Beijing China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Xihua University Chengdu China Kuaishou Technology Beijing China Center for Artificial Intelligence and Robotics New York University Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wayne State University Detroit United States
We propose a novel method called SHS-Net for point cloud normal estimation by learning signed hyper surfaces, which can accurately predict normals with global consistent orientation from various point clouds. Almost a... 详细信息
来源: 评论
CM-MLP: Cascade Multi-scale MLP with Axial Context Relation Encoder for Edge Segmentation of Medical Image
CM-MLP: Cascade Multi-scale MLP with Axial Context Relation ...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Lv, Jinkai Hu, Yuyong Fu, Quanshui Zhang, Zhiwang Hu, Yuqiang Lv, Lin Yang, Guoqing Li, Jinpeng Zhao, Yi Henan Institute of Advanced Technology Zhengzhou University Zhengzhou China The Research Center for Ubiquitous Computing Systems Institute of Computing Technology Chinese Academy of Sciences Beijing China Suining Central Hospital Suining China Hwa Mei Hospital University of Chinese Academy of Sciences Ningbo China School of Electrical and Information Engineering The University of Sydney Sydney Australia School of Mathematics and Computer Sciences NanChang University Nanchang China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
The convolutional-based methods provide good segmentation performance in the medical image segmentation task. However, those methods have the following challenges when dealing with the edges of the medical images: (1)... 详细信息
来源: 评论
Anomaly Detection Based on Discriminative Generative Adversarial Network
收藏 引用
International Journal of Network Security 2021年 第4期23卷 718-724页
作者: Appiah, Benjamin Qin, Zhiguang Nartey, Obed Tettey Agemang, Brighter Kanpogninge, Ansuura JohnBosco Aristotle School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Computer Science and Software Engineering University of Electronic Science and Technology of China China
Generative adversarial network (GAN) has recently achieved remarkable success in anomaly detection. The GAN structure consists of a generator as an attacker and a discriminator as a classifier, all competing against e... 详细信息
来源: 评论
Unveiling the Black Box of PLMs with Semantic Anchors: Towards Interpretable Neural Semantic Parsing
arXiv
收藏 引用
arXiv 2022年
作者: Nie, Lunyiu Sun, Jiuding Wang, Yanlin Du, Lun Hou, Lei Li, Juanzi Han, Shi Zhang, Dongmei Zhai, Jidong Department of Computer Science and Technology Tsinghua University China School of Software Engineering Sun Yat-Sen University China Microsoft Research Asia China
The recent prevalence of pretrained language models (PLMs) has dramatically shifted the paradigm of semantic parsing, where the mapping from natural language utterances to structured logical forms is now formulated as... 详细信息
来源: 评论
ROBUST CROSS-SCENE FOREGROUND SEGMENTATION IN SURVEILLANCE VIDEO
ROBUST CROSS-SCENE FOREGROUND SEGMENTATION IN SURVEILLANCE V...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Liang, Dong Wei, Zongqi Sun, Han Zhou, Huiyu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Collaborative Innovation Center of Novel Software Technology and Industrialization China School of Informatics University of Leicester United Kingdom
Training only one deep model for large-scale cross-scene video foreground segmentation is challenging due to the off-the-shelf deep learning based segmentor relies on scene-specific structural information. This result... 详细信息
来源: 评论
Federated Learning for Recognizing Private Handwritten Numbers
Federated Learning for Recognizing Private Handwritten Numbe...
收藏 引用
2021 IEEE International Conference on Data science and computer Application, ICDSCA 2021
作者: Wang, Di Jiang, Yuchen Zhao, Yibo Chen, Panyang Li, Ang Pan, Kun Institution of Information Engineering Chinese Academy of Sciences State Key Laboratory of Information Security Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Computer Science and Technology College of Computer Science Chongqing University Chongqing China Zibo Shiyan High School International Division Zibo Shandong China Computer Science Department of Computer Science and Software Engineering Auburn University Auburn United States Shanghai Shangde Experimental School Shanghai China School of Computing University of Leeds Leeds United Kingdom
Federated learning (FL) is a new technology in the field of machine learning, which trains an algorithm across multiple decentralized edge devices or servers holding data samples, without exchanging their data samples... 详细信息
来源: 评论