咨询与建议

限定检索结果

文献类型

  • 106,322 篇 会议
  • 62,483 篇 期刊文献
  • 1,111 册 图书
  • 1 篇 学位论文

馆藏范围

  • 169,917 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 105,535 篇 工学
    • 70,586 篇 计算机科学与技术...
    • 57,533 篇 软件工程
    • 24,080 篇 信息与通信工程
    • 15,338 篇 控制科学与工程
    • 11,912 篇 电气工程
    • 11,737 篇 电子科学与技术(可...
    • 11,223 篇 生物工程
    • 8,282 篇 机械工程
    • 7,895 篇 光学工程
    • 7,479 篇 生物医学工程(可授...
    • 6,459 篇 化学工程与技术
    • 5,442 篇 仪器科学与技术
    • 4,870 篇 动力工程及工程热...
    • 4,350 篇 材料科学与工程(可...
    • 3,673 篇 交通运输工程
    • 3,619 篇 网络空间安全
    • 3,345 篇 安全科学与工程
  • 58,846 篇 理学
    • 30,273 篇 数学
    • 17,757 篇 物理学
    • 12,656 篇 生物学
    • 9,482 篇 统计学(可授理学、...
    • 6,732 篇 化学
    • 5,655 篇 系统科学
  • 28,400 篇 管理学
    • 17,424 篇 管理科学与工程(可...
    • 12,081 篇 图书情报与档案管...
    • 6,899 篇 工商管理
  • 7,034 篇 医学
    • 5,725 篇 临床医学
    • 4,970 篇 基础医学(可授医学...
    • 3,039 篇 药学(可授医学、理...
  • 4,319 篇 法学
    • 3,500 篇 社会学
  • 2,753 篇 经济学
  • 2,165 篇 农学
  • 1,839 篇 教育学
  • 732 篇 文学
  • 394 篇 军事学
  • 374 篇 艺术学
  • 29 篇 历史学
  • 24 篇 哲学

主题

  • 4,515 篇 feature extracti...
  • 4,420 篇 computer science
  • 3,777 篇 accuracy
  • 3,693 篇 training
  • 3,601 篇 computational mo...
  • 3,391 篇 deep learning
  • 2,779 篇 semantics
  • 2,627 篇 machine learning
  • 2,319 篇 optimization
  • 2,195 篇 data mining
  • 2,050 篇 predictive model...
  • 1,982 篇 data models
  • 1,793 篇 neural networks
  • 1,666 篇 educational inst...
  • 1,643 篇 support vector m...
  • 1,620 篇 image segmentati...
  • 1,490 篇 algorithm design...
  • 1,457 篇 real-time system...
  • 1,441 篇 internet of thin...
  • 1,411 篇 convolutional ne...

机构

  • 2,477 篇 school of comput...
  • 1,589 篇 school of comput...
  • 1,524 篇 school of comput...
  • 1,355 篇 school of comput...
  • 1,314 篇 school of comput...
  • 1,272 篇 university of ch...
  • 1,271 篇 school of comput...
  • 1,176 篇 school of inform...
  • 1,132 篇 school of comput...
  • 1,125 篇 school of comput...
  • 1,104 篇 department of co...
  • 1,073 篇 cavendish labora...
  • 979 篇 department of ph...
  • 961 篇 school of comput...
  • 882 篇 oliver lodge lab...
  • 868 篇 physikalisches i...
  • 831 篇 school of comput...
  • 809 篇 school of comput...
  • 698 篇 school of comput...
  • 696 篇 college of compu...

作者

  • 267 篇 niyato dusit
  • 256 篇 barter w.
  • 248 篇 a. gomes
  • 229 篇 blake t.
  • 227 篇 c. alexa
  • 226 篇 bowcock t.j.v.
  • 223 篇 j. m. izen
  • 223 篇 bellee v.
  • 221 篇 betancourt c.
  • 221 篇 amato s.
  • 221 篇 s. chen
  • 219 篇 brundu d.
  • 217 篇 borsato m.
  • 215 篇 boettcher t.
  • 213 篇 beiter a.
  • 210 篇 bencivenni g.
  • 205 篇 bay a.
  • 203 篇 g. bella
  • 202 篇 j. strandberg
  • 202 篇 c. amelung

语言

  • 156,543 篇 英文
  • 9,864 篇 其他
  • 3,524 篇 中文
  • 100 篇 日文
  • 27 篇 德文
  • 26 篇 法文
  • 8 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Technology Southwest University of Science and Technology"
169917 条 记 录,以下是361-370 订阅
排序:
DedupChain: A secure Blockchain-enabled Storage System with Deduplication for Zero-Trust Network
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2070-2086页
作者: Qi, Saiyu Wang, Qiuhao Wei, Wei Yang, Xu Zhao, Hongguang Liu, Yuhao Yang, Xu Qi, Yong Xi'an Jiaotong University School of Computer Science and Technology China Xi'an University of Technology School of Computer Science and Engineering China Alibaba Group China Northwestern Polytechnical University School of Electronics and Information China
Permissioned blockchain is a promising methodology to build zero-trust storage foundation with trusted data storage and sharing for the zero-trust network. However, the inherent full-backup feature of the permissioned... 详细信息
来源: 评论
AtomGAN:unsupervised deep learning for fast and accurate defect detection of 2D materials at the atomic scale
收藏 引用
science China(Information sciences) 2023年 第6期66卷 102-114页
作者: Danpeng CHENG Wuxin SHA Zuo XU Shide LI Zhigao YIN Yuling LANG Shun TANG Yuan-Cheng CAO State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronic EngineeringHuazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology CITIC Dicastal Co. Ltd.
The extraction of atomic-level material features from electron microscope images is crucial for studying structure-property relationships and discovering new materials. However, traditional electron microscope analyse... 详细信息
来源: 评论
Faster AMEDA-A Hybrid Mesoscale Eddy Detection Algorithm
收藏 引用
computer Modeling in Engineering & sciences 2024年 第11期141卷 1827-1846页
作者: Xinchang Zhang Xiaokang Pan Rongjie Zhu Runda Guan Zhongfeng Qiu Biao Song Organization Department Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Teacher Education Nanjing University of Information Science and TechnologyNanjing210044China School of Electronics&Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China School of Software Nanjing University of Information Science and TechnologyNanjing210044China
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate ... 详细信息
来源: 评论
The Application of Adversarial Training Based on Gradient Constraint Optimization Method to Sentiment Analysis
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第1期9卷 587-598页
作者: Xie, Zhichun Liu, Jianhua Hu, Renyuan Wang, Jiacan Wang, Xiaofeng School of Data and Computer Science Xiamen Institute of Technology Xiamen361021 China School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China
The previous adversarial training models failed to pay attention to the influence of the changing gradient of the loss function in the current training on the model. The perturbation injected into the model is only pr... 详细信息
来源: 评论
Single Image Deraining Using Dual Branch Network Based on Attention Mechanism for IoT
收藏 引用
computer Modeling in Engineering & sciences 2023年 第11期137卷 1989-2000页
作者: Di Wang Bingcai Wei Liye Zhang School of Computer Science and Technology Shandong University of TechnologyZibo255000China
Extracting useful details from images is essential for the Internet of Things ***,in real life,various external environments,such as badweather conditions,will cause the occlusion of key target information and image d... 详细信息
来源: 评论
Research on lightweight pavement disease detection model based on YOLOv7
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 10573-10589页
作者: Wang, Chishe Li, Jun Wang, Jie Zhao, Weikang School of Computer Science and Engineering Anhui University of Science and Technology Huainan China Jinling Institute of Technology Nanjing China
Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road di... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Many-Objective Optimization-Based Task Scheduling in Hybrid Cloud Environments
收藏 引用
computer Modeling in Engineering & sciences 2023年 第9期136卷 2425-2450页
作者: Mengkai Zhao Zhixia Zhang Tian Fan Wanwan Guo Zhihua Cui The School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan030024China The School of Electronic Information Engineering Taiyuan University of Science and TechnologyTaiyuan030024China
Due to the security and scalability features of hybrid cloud architecture,it can bettermeet the diverse requirements of users for cloud *** a reasonable resource allocation solution is the key to adequately utilize th... 详细信息
来源: 评论
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2207-2220页
作者: Dawei Xu Fan Huang Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao School of Computer Science Changchun UniversityChangchun130012China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100081China School of InformationManagement for Law China University of Political Science and LawBeijing102249China
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly *** and smart contract technologies,with their decentralized nature,provide strong security g... 详细信息
来源: 评论
A Novel CAPTCHA Recognition System Based on Refined Visual Attention
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 115-136页
作者: Zaid Derea Beiji Zou Xiaoyan Kui Monir Abdullah Alaa Thobhani Amr Abdussalam School of Computer Science and Engineering Central South UniversityChangsha410083China College of Computer Science and Information Technology Wasit UniversityWasit52001Iraq Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha67714Saudi Arabia Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma... 详细信息
来源: 评论