咨询与建议

限定检索结果

文献类型

  • 10,725 篇 会议
  • 7,233 篇 期刊文献
  • 191 册 图书

馆藏范围

  • 18,149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,653 篇 工学
    • 9,030 篇 计算机科学与技术...
    • 7,473 篇 软件工程
    • 2,754 篇 信息与通信工程
    • 1,592 篇 控制科学与工程
    • 1,514 篇 生物工程
    • 1,321 篇 电气工程
    • 1,012 篇 生物医学工程(可授...
    • 904 篇 电子科学与技术(可...
    • 891 篇 光学工程
    • 702 篇 机械工程
    • 540 篇 网络空间安全
    • 503 篇 化学工程与技术
    • 490 篇 仪器科学与技术
    • 483 篇 动力工程及工程热...
    • 427 篇 安全科学与工程
    • 407 篇 交通运输工程
  • 5,965 篇 理学
    • 3,122 篇 数学
    • 1,665 篇 生物学
    • 1,517 篇 物理学
    • 992 篇 统计学(可授理学、...
    • 607 篇 系统科学
    • 575 篇 化学
  • 3,444 篇 管理学
    • 2,053 篇 管理科学与工程(可...
    • 1,549 篇 图书情报与档案管...
    • 886 篇 工商管理
  • 1,000 篇 医学
    • 849 篇 临床医学
    • 755 篇 基础医学(可授医学...
    • 454 篇 公共卫生与预防医...
    • 441 篇 药学(可授医学、理...
  • 610 篇 法学
    • 486 篇 社会学
  • 308 篇 经济学
  • 275 篇 农学
  • 213 篇 教育学
  • 57 篇 文学
  • 51 篇 艺术学
  • 30 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 536 篇 deep learning
  • 409 篇 computer science
  • 409 篇 feature extracti...
  • 391 篇 accuracy
  • 378 篇 computational mo...
  • 317 篇 machine learning
  • 300 篇 training
  • 273 篇 internet of thin...
  • 253 篇 predictive model...
  • 252 篇 semantics
  • 220 篇 optimization
  • 207 篇 data mining
  • 200 篇 support vector m...
  • 180 篇 real-time system...
  • 170 篇 image segmentati...
  • 165 篇 neural networks
  • 158 篇 data models
  • 151 篇 scalability
  • 150 篇 educational inst...
  • 138 篇 computer archite...

机构

  • 216 篇 institute of com...
  • 176 篇 school of comput...
  • 173 篇 school of comput...
  • 132 篇 school of comput...
  • 120 篇 department of co...
  • 114 篇 department of co...
  • 109 篇 school of comput...
  • 105 篇 national enginee...
  • 102 篇 school of comput...
  • 98 篇 key laboratory o...
  • 98 篇 school of comput...
  • 86 篇 north-west unive...
  • 86 篇 institut univers...
  • 85 篇 university of ch...
  • 83 篇 national centre ...
  • 82 篇 school of comput...
  • 80 篇 infn sezione di ...
  • 79 篇 infn sezione di ...
  • 79 篇 chitkara univers...
  • 75 篇 tno technical sc...

作者

  • 136 篇 hai jin
  • 129 篇 jin hai
  • 94 篇 niyato dusit
  • 90 篇 ferrara g.
  • 90 篇 ardid m.
  • 89 篇 calvo d.
  • 86 篇 chen a.
  • 81 篇 gal t.
  • 81 篇 bozza c.
  • 81 篇 boumaaza j.
  • 80 篇 díaz a.f.
  • 80 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 78 篇 dallier r.
  • 74 篇 kalekin o.
  • 69 篇 anguita m.
  • 66 篇 boettcher m.
  • 63 篇 enzenhöfer a.
  • 62 篇 huang f.
  • 61 篇 aly z.

语言

  • 17,055 篇 英文
  • 937 篇 其他
  • 175 篇 中文
  • 8 篇 法文
  • 7 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
检索条件"机构=School of Computer Science and Technology Computing"
18149 条 记 录,以下是81-90 订阅
排序:
Textual Data De-Privatization Scheme Based on Generative Adversarial Networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
AFuNet: an attention-based fusion network to classify texts in a resource-constrained language
收藏 引用
Neural computing and Applications 2025年 第9期37卷 6725-6748页
作者: Hossain, Md. Rajib Hoque, Mohammed Moshiul Dewan, M. Ali Akber Hoque, Enamul Siddique, Nazmul Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada School of Information Technology York University TorontoONM3J 1P3 Canada School of Computing Engineering and Intelligent Systems Ulster University Coleraine United Kingdom
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec... 详细信息
来源: 评论
Language Models over Large-Scale Knowledge Base: on Capacity, Flexibility and Reasoning for New Facts  31
Language Models over Large-Scale Knowledge Base: on Capacity...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: He, Qiyuan Wang, Yizhong Yu, Jianfei Wang, Wenya College of Computing and Data Science Nanyang Technological University Singapore Paul G. Allen School of Computer Science & Engineering University of Washington United States School of Computer Science and Engineering Nanjing University of Science and Technology China
Advancements in language models (LMs) have sparked interest in exploring their potential as knowledge bases (KBs) due to their high capability for storing huge amounts of factual knowledge and semantic understanding. ... 详细信息
来源: 评论
Comprehensive Framework for Analyzing Grammar Error Correction with GPT -3.5
Comprehensive Framework for Analyzing Grammar Error Correcti...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Munda, Rajni Kant Kumar, Abhishek Burman, Ravi Kumar Kumar, Biresh Alam, Md. Shoaib Sinha, Anurag Jharkhand University of Technology Computer Science and Engineering Ranchi India Amity University Computer Science and Engineering Jharkhand Ranchi India Ignou School of Computing and Information Science New Delhi India
This investigate assesses the viability and exactness of an error-correction approach utilizing GPT-3.5 compared to routine instruments. Letter set rectification plays a vital part in making strides the quality of and... 详细信息
来源: 评论
MLDA-Net: Multi-Level Deep Aggregation Network for 3D Nuclei Instance Segmentation
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第5期29卷 3516-3525页
作者: Hu, Bin Ye, Zhiwei Wei, Zimei Snezhko, Eduard Kovalev, Vassili Ye, Mang Hubei University of Technology School of Computer Wuhan China Hubei Provincial Key Laboratory of Green Intelligent Computing Power Network Wuhan China United Institute of Informatics Problems of the National Academy of Sciences of Belarus Belarus Wuhan University School of Computer Science Wuhan China
Segmentation of cell nuclei from three-dimensional (3D) volumetric fluorescence microscopy images is crucial for biological and clinical analyses. In recent years, convolutional neural networks have become the reliabl... 详细信息
来源: 评论
DCTCS stack classifier-an integrated framework leveraging discrete cosine transformation, cuckoo search algorithm and stacked machine learning models for EEG-based eye state classification
收藏 引用
International Journal of Information technology (Singapore) 2025年 第4期17卷 2015-2033页
作者: Chandralekha, M. Jayadurga, N. Priyadharshini Chen, Thomas M. Sathiyanarayanan, Mithileysh Department of Computer Science and Engineering Amrita School of Computing AmritaVishwaVidyapeetham Chennai India School of Science & Technology University of London London United Kingdom Research & Innovation MIT Square London United Kingdom
Accurate classification of eye state using Electroencephalogram (EEG) data reflects the high dimensionality and intricacy associated with the nature of the EEG signals. This state-of-the-art technique applies Discrete... 详细信息
来源: 评论
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论
A survey on textual emotion cause extraction in social networks
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 524-536页
作者: Peng, Sancheng Cao, Lihong Wang, Guojun Ouyang, Zhouhao Zhou, Yongmei Yu, Shui Laboratory of Language Engineering and Computing Center for Linguistics and Applied Linguistics Guangdong University of Foreign Studies Guangzhou510006 China School of English Education Guangdong University of Foreign Studies Guangzhou510006 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China South China University of Technology Guangzhou510006 China School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou510006 China School of Computer Science University of Technology Sydney SydneyNSW2007 Australia
With the rapid development of web technology, Social Networks (SNs) have become one of the most popular platforms for users to exchange views and to express their emotions. More and more people are used to commenting ... 详细信息
来源: 评论
Telugu Language Analysis with XLM-RoBERTa: Enhancing Parts of Speech Tagging for Effective Natural Language Processing
收藏 引用
SN computer science 2025年 第2期6卷 1-13页
作者: Bharathi Mohan, G. Prasanna Kumar, R. Krishna Jayanth, K. Doss, Srinath Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Faculty of Engineering and Technology Botho University Gaborone Botswana
This research investigates the efficacy of XLM-RoBERTa, a potent deep learning architecture rooted in transformer networks, for Part-of-Speech (POS) tagging—a foundational task in Natural Language Processing (NLP). T... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification with Multi-Vendors and Multi-Servers in Mobile Edge computing
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang The School of Information Technology Deakin University GeelongVIC3220 Australia The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论