咨询与建议

限定检索结果

文献类型

  • 266,225 篇 会议
  • 262,546 篇 期刊文献
  • 1,650 册 图书
  • 1 篇 学位论文

馆藏范围

  • 530,421 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 340,046 篇 工学
    • 144,131 篇 计算机科学与技术...
    • 115,611 篇 软件工程
    • 62,573 篇 化学工程与技术
    • 52,380 篇 信息与通信工程
    • 51,331 篇 电子科学与技术(可...
    • 50,414 篇 电气工程
    • 47,068 篇 材料科学与工程(可...
    • 39,651 篇 控制科学与工程
    • 29,722 篇 机械工程
    • 27,197 篇 动力工程及工程热...
    • 25,425 篇 光学工程
    • 24,874 篇 生物工程
    • 23,515 篇 冶金工程
    • 19,327 篇 仪器科学与技术
    • 18,549 篇 生物医学工程(可授...
    • 16,123 篇 力学(可授工学、理...
    • 13,823 篇 土木工程
    • 13,050 篇 环境科学与工程(可...
    • 11,470 篇 建筑学
  • 227,440 篇 理学
    • 95,830 篇 物理学
    • 87,576 篇 数学
    • 54,797 篇 化学
    • 32,718 篇 生物学
    • 26,690 篇 统计学(可授理学、...
    • 15,813 篇 系统科学
  • 65,442 篇 管理学
    • 43,285 篇 管理科学与工程(可...
    • 23,118 篇 图书情报与档案管...
    • 17,197 篇 工商管理
  • 22,602 篇 医学
    • 16,703 篇 临床医学
    • 12,178 篇 基础医学(可授医学...
  • 9,035 篇 经济学
  • 8,962 篇 法学
  • 8,695 篇 农学
  • 3,935 篇 教育学
  • 1,953 篇 文学
  • 1,299 篇 军事学
  • 789 篇 艺术学
  • 107 篇 哲学
  • 101 篇 历史学

主题

  • 8,805 篇 computer science
  • 8,710 篇 feature extracti...
  • 6,819 篇 training
  • 6,773 篇 computational mo...
  • 6,559 篇 accuracy
  • 5,339 篇 deep learning
  • 5,011 篇 semantics
  • 5,006 篇 optimization
  • 4,902 篇 educational inst...
  • 4,755 篇 data mining
  • 4,610 篇 machine learning
  • 4,166 篇 neural networks
  • 4,038 篇 predictive model...
  • 3,926 篇 data models
  • 3,654 篇 algorithm design...
  • 3,609 篇 mathematical mod...
  • 3,506 篇 robustness
  • 3,379 篇 simulation
  • 3,282 篇 image segmentati...
  • 3,234 篇 support vector m...

机构

  • 5,089 篇 university of ch...
  • 4,535 篇 department of co...
  • 2,644 篇 school of comput...
  • 2,396 篇 school of comput...
  • 2,167 篇 college of compu...
  • 2,148 篇 college of compu...
  • 1,999 篇 university of sc...
  • 1,854 篇 institute of hig...
  • 1,736 篇 school of inform...
  • 1,678 篇 cavendish labora...
  • 1,410 篇 school of comput...
  • 1,314 篇 school of comput...
  • 1,305 篇 school of mechan...
  • 1,245 篇 school of inform...
  • 1,146 篇 school of electr...
  • 1,145 篇 school of automa...
  • 1,134 篇 school of materi...
  • 1,114 篇 school of electr...
  • 1,094 篇 school of comput...
  • 1,091 篇 school of comput...

作者

  • 1,152 篇 wang wei
  • 936 篇 liu yang
  • 883 篇 yang yang
  • 846 篇 wei wang
  • 697 篇 li li
  • 662 篇 zhang wei
  • 593 篇 li wei
  • 582 篇 li yang
  • 570 篇 wei li
  • 543 篇 wang lei
  • 523 篇 wei zhang
  • 513 篇 wei chen
  • 508 篇 zhang lei
  • 505 篇 chen wei
  • 502 篇 liu wei
  • 487 篇 yang liu
  • 477 篇 lei wang
  • 459 篇 bachacou h.
  • 451 篇 annovi a.
  • 439 篇 yang li

语言

  • 494,132 篇 英文
  • 20,121 篇 中文
  • 15,065 篇 其他
  • 135 篇 法文
  • 135 篇 日文
  • 127 篇 德文
  • 23 篇 荷兰文
  • 12 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 5 篇 意大利文
  • 4 篇 阿拉伯文
  • 3 篇 葡萄牙文
  • 3 篇 俄文
检索条件"机构=School of Computer Science and Technology University of Science and Technology of China"
530422 条 记 录,以下是61-70 订阅
排序:
Mobile robot path planning based on an improved ACO algorithm and path optimization
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10899-10922页
作者: Zhou, Tianfeng Wei, Wenhong School of Computer Science and Technology Dongguan University of Technology Dongguan523808 China
This paper will improve the fundamental ant colony optimization algorithm in the context of mobile robot path planning in response to its flaws, which include easy descent into a local optimum, a large number of infle... 详细信息
来源: 评论
Energy Consumption Minimization for Delay-Sensitive Data Collection in AAV-Assisted WSN
收藏 引用
IEEE Sensors Journal 2025年 第10期25卷 18394-18408页
作者: Liu, Xiaoying Zhou, Biao Tian, Xianzhong Gong, Weihua Zheng, Kechen Zhejiang University of Technology School of Computer Science and Technology Hangzhou310023 China
To address the issue of delay-sensitive data collection in wireless sensor networks (WSNs), autonomous aerial vehicles (AAVs) offer a promising solution due to their flexibility and maneuverability. We investigate the... 详细信息
来源: 评论
Multi-label, Classification-based Prediction of Breast Cancer Metastasis Directions
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 1-10页
作者: Wang, Tingting Fan, Qi Tan, Liang Zhang, Beier School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ... 详细信息
来源: 评论
ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU
收藏 引用
IEEE Access 2025年 13卷 73297-73318页
作者: Wang, Shaoqiang Cheng, Jiahui Wang, Yizhe Li, Shutong Kang, Lei Dai, Yinfei Changchun University School of Computer Science and Technology Changchun130022 China Jilin University College of Computer Science and Technology Changchun130012 China
The rapid proliferation of connected vehicles has significantly expanded the attack surface of the Internet of Vehicles (IoV), introducing severe security risks. In such resource-constrained environments, developing l... 详细信息
来源: 评论
B+-Tree-Quantization-Based Shared Secret Key Extraction Scheme From Atmospheric Optical Wireless Channel
收藏 引用
IEEE Transactions on Communications 2025年 第5期73卷 3394-3408页
作者: Pan, Gang Chen, Chunyi Changchun University of Science and Technology School of Computer Science and Technology Changchun130022 China Changchun University of Science and Technology School of Computer Science and Technology Key Laboratory of Photoelectric Measurement & Control and Optical Information Transfer Technology Changchun130022 China Chongqing Research Institute Changchun University of Science and Technology Chongqing401135 China
To reduce key disagreement rate and increase key generation rate, this paper proposes a lightweight and robust shared secret key extraction scheme from atmospheric optical wireless channel. A conception of grouping sa... 详细信息
来源: 评论
Privacy-Preserving Statistical Analysis With Low Redundancy Over Task-Relevant Microdata
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4382-4395页
作者: Zhao, Jingcheng Xue, Kaiping Xue, Yingjie Li, Meng Zhu, Bin Yuan, Shaoxian University of Science and Technology of China School of Cyber Science and Technology Anhui Hefei230027 China Hefei University of Technology School of Computer Science and Information Engineering Anhui Hefei230601 China
Privacy-preserving statistical analysis enables the data center to analyze datasets from multiple data owners, extracting valuable insights while safeguarding privacy. However, the observation of microdata involvement... 详细信息
来源: 评论
Uncertainties of the standard quantum teleportation channel
收藏 引用
Chinese Physics B 2025年 第4期34卷 273-285页
作者: Zhihua Zhang Zehao Guo Zhipeng Qiu School of Cyber Science and Engineering Nanjing University of Science and TechnologyJiangyin 214443China School of Mathematics and Statistics Nanjing University of Science and TechnologyNanjing 210094China
From the perspective of state-channel interaction,standard quantum teleportation can be viewed as a communication process characterized by both input and output,functioning as a quantum depolarizing *** achieve a prec... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
RVAM16:a low-cost multiple-ISA processor based on RISC-V and ARM Thumb
收藏 引用
Frontiers of computer science 2025年 第1期19卷 41-51页
作者: Libo HUANG Jing ZHANG Ling YANG Sheng MA Yongwen WANG Yuanhu CHENG College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China
The rapid development of ISAs has brought the issue of software compatibility to the forefront in the embedded *** address this challenge,one of the promising solutions is the adoption of a multiple-ISA processor that... 详细信息
来源: 评论
Code context-based reviewer recommendation
收藏 引用
Frontiers of computer science 2025年 第1期19卷 97-108页
作者: Dawei YUAN Xiao PENG Zijie CHEN Tao ZHANG Ruijia LEI School of Computer Science and Engineering Macao University of Science and TechnologyMacao 999078China Faculty of Science University of AmsterdamAmsterdam WB 1018Netherlands
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scru... 详细信息
来源: 评论