咨询与建议

限定检索结果

文献类型

  • 116,749 篇 会议
  • 80,644 篇 期刊文献
  • 1,140 册 图书
  • 1 篇 学位论文

馆藏范围

  • 198,534 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 124,165 篇 工学
    • 75,417 篇 计算机科学与技术...
    • 61,417 篇 软件工程
    • 26,407 篇 信息与通信工程
    • 17,649 篇 控制科学与工程
    • 15,691 篇 电气工程
    • 15,297 篇 电子科学与技术(可...
    • 12,067 篇 生物工程
    • 10,242 篇 机械工程
    • 10,241 篇 化学工程与技术
    • 9,087 篇 光学工程
    • 8,071 篇 生物医学工程(可授...
    • 7,344 篇 材料科学与工程(可...
    • 6,781 篇 仪器科学与技术
    • 6,680 篇 动力工程及工程热...
    • 4,112 篇 交通运输工程
    • 3,911 篇 网络空间安全
    • 3,756 篇 安全科学与工程
    • 3,709 篇 土木工程
  • 73,449 篇 理学
    • 35,019 篇 数学
    • 24,248 篇 物理学
    • 13,954 篇 生物学
    • 10,960 篇 统计学(可授理学、...
    • 10,049 篇 化学
    • 6,755 篇 系统科学
  • 31,167 篇 管理学
    • 19,463 篇 管理科学与工程(可...
    • 12,721 篇 图书情报与档案管...
    • 7,661 篇 工商管理
  • 8,219 篇 医学
    • 6,492 篇 临床医学
    • 5,386 篇 基础医学(可授医学...
  • 4,584 篇 法学
    • 3,717 篇 社会学
  • 3,456 篇 经济学
  • 2,661 篇 农学
  • 1,932 篇 教育学
  • 846 篇 文学
  • 720 篇 军事学
  • 418 篇 艺术学
  • 37 篇 历史学
  • 34 篇 哲学

主题

  • 4,713 篇 feature extracti...
  • 4,634 篇 computer science
  • 3,936 篇 accuracy
  • 3,860 篇 training
  • 3,741 篇 computational mo...
  • 3,517 篇 deep learning
  • 2,884 篇 semantics
  • 2,772 篇 machine learning
  • 2,549 篇 optimization
  • 2,304 篇 data mining
  • 2,153 篇 predictive model...
  • 2,104 篇 data models
  • 1,901 篇 neural networks
  • 1,833 篇 educational inst...
  • 1,731 篇 support vector m...
  • 1,676 篇 image segmentati...
  • 1,563 篇 algorithm design...
  • 1,524 篇 robustness
  • 1,515 篇 internet of thin...
  • 1,504 篇 real-time system...

机构

  • 2,438 篇 school of comput...
  • 1,987 篇 school of mechan...
  • 1,898 篇 university of ch...
  • 1,630 篇 cavendish labora...
  • 1,538 篇 school of comput...
  • 1,497 篇 school of automa...
  • 1,429 篇 school of comput...
  • 1,270 篇 school of comput...
  • 1,247 篇 school of comput...
  • 1,167 篇 school of comput...
  • 1,101 篇 school of electr...
  • 1,051 篇 department of co...
  • 1,041 篇 school of comput...
  • 1,026 篇 school of comput...
  • 990 篇 college of compu...
  • 907 篇 department of ph...
  • 887 篇 department of ph...
  • 879 篇 department for p...
  • 863 篇 school of comput...
  • 857 篇 institute of phy...

作者

  • 457 篇 annovi a.
  • 446 篇 bachacou h.
  • 425 篇 aad g.
  • 420 篇 akimov a.v.
  • 415 篇 alonso f.
  • 410 篇 amidei d.
  • 404 篇 alexopoulos t.
  • 402 篇 arnaez o.
  • 402 篇 alimonti g.
  • 397 篇 alexa c.
  • 395 篇 argyropoulos s.
  • 392 篇 azuelos g.
  • 391 篇 anastopoulos c.
  • 391 篇 adelman j.
  • 389 篇 abulaiti y.
  • 387 篇 aloisio a.
  • 387 篇 amelung c.
  • 385 篇 abidi s.h.
  • 383 篇 augsten k.
  • 381 篇 arce a.t.h.

语言

  • 186,485 篇 英文
  • 7,336 篇 其他
  • 4,590 篇 中文
  • 101 篇 日文
  • 43 篇 法文
  • 36 篇 德文
  • 8 篇 朝鲜文
  • 6 篇 荷兰文
  • 5 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Technology Nanjing University of Science and Technology"
198534 条 记 录,以下是1-10 订阅
排序:
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost
收藏 引用
Frontiers of computer science 2025年 第2期19卷 1-10页
作者: Yanpeng SUN Zechao LI School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210014China
The pixel-wise dense prediction tasks based on weakly supervisions currently use Class Attention Maps(CAMs)to generate pseudo masks as ***,existing methods often incorporate trainable modules to expand the immature cl... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 49-63页
作者: Yuhang Qiu Gongming Zhao Hongli Xu Long Li He Huang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Suzhou Institute for Advanced Research University of Science and Technology of China School of Computer Science and Technology Soochow University
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
Hierarchical Motion-Enhanced Matching Framework for Few-Shot Action Recognition
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2450-2462页
作者: Gao, Hailiang Xie, Guo-Sen Yan, Rui Cui, Qiongjie Qu, Hongyu Shu, Xiangbo Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Nanjing University Department of Computer Science and Technology Nanjing210023 China
Few-Shot Action Recognition (FSAR) aims to recognize novel class action with limited annotated training data from the same class. Most FSAR methods subconsciously follow the few-shot image classification solutions by ... 详细信息
来源: 评论
Uncertainties of the standard quantum teleportation channel
收藏 引用
Chinese Physics B 2025年 第4期34卷 273-285页
作者: Zhihua Zhang Zehao Guo Zhipeng Qiu School of Cyber Science and Engineering Nanjing University of Science and TechnologyJiangyin 214443China School of Mathematics and Statistics Nanjing University of Science and TechnologyNanjing 210094China
From the perspective of state-channel interaction,standard quantum teleportation can be viewed as a communication process characterized by both input and output,functioning as a quantum depolarizing *** achieve a prec... 详细信息
来源: 评论
Enhanced Acceleration for Generalized Nonconvex Low-Rank Matrix Learning
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 98-113页
作者: Hengmin Zhang Jian Yang Wenli Du Bob Zhang Zhiyuan Zha Bihan Wen School of Electrical and Electronic Engineering Nanyang Technological University School of Computer Science and Engineering Nanjing University of Science and Technology School of Information Science and Engineering East China University of Science and Technology Department of Electrical and Computer Engineering University of Macau
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher... 详细信息
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(Information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Measuring discrete sensing capability for ISAC via task mutual information
收藏 引用
science China(Information sciences) 2025年 第5期68卷 287-288页
作者: Fei SHANG Haohua DU Panlong YANG Xin HE Jingjing WANG Xiang-Yang LI School of Computer Science and Technology University of Science and Technology of China School of Cyber Science and Technology Beihang University School of Computer Science Nanjing University of Information Science and Technology School of Computer and Information Anhui Normal University
Thanks to its ubiquity,using radio frequency (RF) signals for sensing has found widespread *** traditional integrated sensing and communication systems,such as joint radar-communication systems,common sensing tasks in...
来源: 评论
Efficient Quantum Secure Vector Dominance and Its Applications in Computational Geometry
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2129-2143页
作者: Liu, Wenjie Su, Bingmei Sun, Feiyang Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China
Secure vector dominance is a key cryptographic primitive in secure computational geometry (SCG), determining the dominance relationship of vectors between two participants without revealing their private information. ... 详细信息
来源: 评论