咨询与建议

限定检索结果

文献类型

  • 105,334 篇 会议
  • 62,297 篇 期刊文献
  • 1,106 册 图书
  • 1 篇 学位论文

馆藏范围

  • 168,738 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 104,444 篇 工学
    • 69,825 篇 计算机科学与技术...
    • 56,960 篇 软件工程
    • 23,917 篇 信息与通信工程
    • 15,015 篇 控制科学与工程
    • 11,839 篇 电气工程
    • 11,654 篇 电子科学与技术(可...
    • 11,186 篇 生物工程
    • 8,233 篇 机械工程
    • 7,781 篇 光学工程
    • 7,399 篇 生物医学工程(可授...
    • 6,438 篇 化学工程与技术
    • 5,403 篇 仪器科学与技术
    • 4,868 篇 动力工程及工程热...
    • 4,317 篇 材料科学与工程(可...
    • 3,656 篇 交通运输工程
    • 3,579 篇 网络空间安全
    • 3,327 篇 安全科学与工程
  • 58,528 篇 理学
    • 30,114 篇 数学
    • 17,661 篇 物理学
    • 12,618 篇 生物学
    • 9,418 篇 统计学(可授理学、...
    • 6,715 篇 化学
    • 5,654 篇 系统科学
  • 28,234 篇 管理学
    • 17,329 篇 管理科学与工程(可...
    • 12,006 篇 图书情报与档案管...
    • 6,843 篇 工商管理
  • 6,979 篇 医学
    • 5,665 篇 临床医学
    • 4,925 篇 基础医学(可授医学...
    • 3,040 篇 药学(可授医学、理...
  • 4,297 篇 法学
    • 3,483 篇 社会学
  • 2,749 篇 经济学
  • 2,142 篇 农学
  • 1,804 篇 教育学
  • 734 篇 文学
  • 393 篇 军事学
  • 374 篇 艺术学
  • 29 篇 历史学
  • 25 篇 哲学

主题

  • 4,488 篇 feature extracti...
  • 4,418 篇 computer science
  • 3,734 篇 accuracy
  • 3,692 篇 training
  • 3,583 篇 computational mo...
  • 3,336 篇 deep learning
  • 2,779 篇 semantics
  • 2,624 篇 machine learning
  • 2,309 篇 optimization
  • 2,183 篇 data mining
  • 2,027 篇 predictive model...
  • 1,983 篇 data models
  • 1,793 篇 neural networks
  • 1,666 篇 educational inst...
  • 1,631 篇 support vector m...
  • 1,587 篇 image segmentati...
  • 1,490 篇 algorithm design...
  • 1,454 篇 internet of thin...
  • 1,440 篇 real-time system...
  • 1,385 篇 artificial intel...

机构

  • 2,450 篇 school of comput...
  • 1,589 篇 school of comput...
  • 1,509 篇 school of comput...
  • 1,322 篇 school of comput...
  • 1,296 篇 school of comput...
  • 1,252 篇 school of comput...
  • 1,246 篇 university of ch...
  • 1,180 篇 school of inform...
  • 1,114 篇 school of comput...
  • 1,107 篇 school of comput...
  • 1,096 篇 department of co...
  • 1,071 篇 cavendish labora...
  • 978 篇 department of ph...
  • 949 篇 school of comput...
  • 882 篇 oliver lodge lab...
  • 875 篇 physikalisches i...
  • 821 篇 school of comput...
  • 772 篇 school of comput...
  • 700 篇 school of comput...
  • 682 篇 school of comput...

作者

  • 264 篇 niyato dusit
  • 256 篇 barter w.
  • 250 篇 a. gomes
  • 229 篇 blake t.
  • 228 篇 c. alexa
  • 226 篇 bowcock t.j.v.
  • 223 篇 bellee v.
  • 223 篇 s. chen
  • 222 篇 j. m. izen
  • 221 篇 betancourt c.
  • 221 篇 amato s.
  • 219 篇 brundu d.
  • 217 篇 borsato m.
  • 215 篇 boettcher t.
  • 213 篇 beiter a.
  • 210 篇 bencivenni g.
  • 205 篇 bay a.
  • 204 篇 g. bella
  • 202 篇 j. strandberg
  • 202 篇 c. amelung

语言

  • 159,107 篇 英文
  • 6,198 篇 其他
  • 3,428 篇 中文
  • 100 篇 日文
  • 24 篇 法文
  • 21 篇 德文
  • 8 篇 朝鲜文
  • 5 篇 荷兰文
  • 5 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Science and Technology Southwest University of Science and Technology"
168738 条 记 录,以下是1-10 订阅
排序:
A Distributed Adaptive Second-Order Latent Factor Analysis Model
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2343-2345页
作者: Jialiang Wang Weiling Li Xin Luo the School of Computer Science and Technology Dongguan University of Technology the College of Computer and Information Science Southwest University
Dear Editor,This letter presents a distributed adaptive second-order latent factor(DAS) model for addressing the issue of high-dimensional and incomplete data representation. Compared with first-order optimizers, a se... 详细信息
来源: 评论
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 49-63页
作者: Yuhang Qiu Gongming Zhao Hongli Xu Long Li He Huang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Suzhou Institute for Advanced Research University of Science and Technology of China School of Computer Science and Technology Soochow University
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
Neural network study of the nuclear ground-state spin distribution within a random interaction ensemble
收藏 引用
Nuclear science and Techniques 2024年 第3期35卷 216-227页
作者: Deng Liu Alam Noor A Zhen-Zhen Qin Yang Lei School of Mathematics and Physics Southwest University of Science and TechnologyMianyang 621010China School of Nuclear Science and Technology Southwest University of Science and TechnologyMianyang 621010China
The distribution of the nuclear ground-state spin in a two-body random ensemble(TBRE)was studied using a general classification neural network(NN)model with two-body interaction matrix elements as input features and t... 详细信息
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(Information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Detecting the core of a network by the centralities of the nodes
收藏 引用
Chinese Physics B 2024年 第8期33卷 615-621页
作者: 马佩杰 任学藻 朱军芳 蒋艳群 School of Mathematics and Science Southwest University of Science and TechnologyMianyang 621010China
Many networks exhibit the core/periphery ***/periphery structure is a type of meso-scale structure that consists of densely connected core nodes and sparsely connected peripheral *** nodes tend to be well-connected,bo... 详细信息
来源: 评论
Labeling-based centrality approaches for identifying critical edges on temporal graphs
收藏 引用
Frontiers of computer science 2025年 第2期19卷 89-104页
作者: Tianming ZHANG Jie ZHAO Cibo YU Lu CHEN Yunjun GAO Bin CAO Jing FAN Ge YU School of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310023China School of Computer Science and Technology Zhejiang UniversityHangzhou 310013China Department of Computer Science Northeastern UniversityShenyang 110819China
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte... 详细信息
来源: 评论
Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 979-988页
作者: Yunyi ZHOU Haichang GAO Jianping HE Shudong ZHANG Zihui WU School of Computer Science and Technology Xidian University
Adversarial examples(AEs) are an additive amalgamation of clean examples and artificially malicious perturbations. Attackers often leverage random noise and multiple random restarts to initialize perturbation starting... 详细信息
来源: 评论
Robust video question answering via contrastive cross-modality representation learning
收藏 引用
science China(Information sciences) 2024年 第10期67卷 211-226页
作者: Xun YANG Jianming ZENG Dan GUO Shanshan WANG Jianfeng DONG Meng WANG School of Information Science and Technology University of Science and Technology of China Institute of Artificial Intelligence Hefei Comprehensive National Science Center School of Computer Science and Information Engineering Hefei University of Technology Institutes of Physical Science and Information Technology Anhui University School of Computer Science and Technology Zhejiang Gongshang University
Video question answering(VideoQA) is a challenging yet important task that requires a joint understanding of low-level video content and high-level textual semantics. Despite the promising progress of existing efforts... 详细信息
来源: 评论