咨询与建议

限定检索结果

文献类型

  • 8,037 篇 会议
  • 5,458 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 13,586 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,015 篇 工学
    • 7,021 篇 计算机科学与技术...
    • 5,710 篇 软件工程
    • 1,839 篇 信息与通信工程
    • 1,184 篇 控制科学与工程
    • 931 篇 生物工程
    • 727 篇 电气工程
    • 637 篇 机械工程
    • 567 篇 电子科学与技术(可...
    • 518 篇 光学工程
    • 504 篇 生物医学工程(可授...
    • 346 篇 化学工程与技术
    • 301 篇 安全科学与工程
    • 300 篇 仪器科学与技术
    • 283 篇 动力工程及工程热...
    • 279 篇 网络空间安全
    • 269 篇 交通运输工程
    • 256 篇 建筑学
  • 4,200 篇 理学
    • 2,497 篇 数学
    • 1,007 篇 生物学
    • 834 篇 物理学
    • 722 篇 统计学(可授理学、...
    • 454 篇 系统科学
    • 378 篇 化学
  • 2,719 篇 管理学
    • 1,658 篇 管理科学与工程(可...
    • 1,187 篇 图书情报与档案管...
    • 599 篇 工商管理
  • 432 篇 医学
    • 373 篇 临床医学
    • 317 篇 基础医学(可授医学...
  • 384 篇 法学
    • 284 篇 社会学
  • 221 篇 经济学
    • 220 篇 应用经济学
  • 182 篇 教育学
  • 135 篇 农学
  • 56 篇 文学
  • 40 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 354 篇 computer science
  • 322 篇 feature extracti...
  • 317 篇 semantics
  • 290 篇 computational mo...
  • 286 篇 deep learning
  • 222 篇 data mining
  • 197 篇 optimization
  • 185 篇 training
  • 184 篇 educational inst...
  • 182 篇 software enginee...
  • 164 篇 machine learning
  • 160 篇 predictive model...
  • 157 篇 image segmentati...
  • 152 篇 neural networks
  • 139 篇 accuracy
  • 133 篇 wireless sensor ...
  • 131 篇 servers
  • 129 篇 internet of thin...
  • 129 篇 support vector m...
  • 126 篇 convolution

机构

  • 475 篇 school of comput...
  • 380 篇 state key labora...
  • 297 篇 school of softwa...
  • 292 篇 school of softwa...
  • 268 篇 school of inform...
  • 263 篇 department of co...
  • 263 篇 school of softwa...
  • 226 篇 college of compu...
  • 221 篇 school of comput...
  • 183 篇 school of softwa...
  • 163 篇 college of compu...
  • 161 篇 school of comput...
  • 142 篇 school of comput...
  • 140 篇 school of comput...
  • 127 篇 school of comput...
  • 126 篇 school of comput...
  • 122 篇 school of comput...
  • 119 篇 school of comput...
  • 118 篇 school of softwa...
  • 101 篇 school of comput...

作者

  • 51 篇 gao yang
  • 43 篇 jin wang
  • 42 篇 qi lianyong
  • 41 篇 liu yang
  • 40 篇 wang wei
  • 39 篇 wang lei
  • 36 篇 chen huajun
  • 35 篇 zhang wen
  • 33 篇 qi liu
  • 33 篇 tao dacheng
  • 31 篇 li li
  • 31 篇 zhao jian
  • 30 篇 liu qi
  • 28 篇 sun xingming
  • 28 篇 shen furao
  • 28 篇 junping du
  • 27 篇 xiang-yang li
  • 27 篇 zhang zhao
  • 27 篇 zhang qiang
  • 26 篇 lei wang

语言

  • 12,462 篇 英文
  • 881 篇 其他
  • 265 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Technology and Software"
13586 条 记 录,以下是4841-4850 订阅
排序:
GCD-Sampling: A General Cross-scale Decoupled Sampling for Point Cloud  39
GCD-Sampling: A General Cross-scale Decoupled Sampling for P...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Dai, Tao Wang, Yanzi Xiong, Jianyu Zha, Yaohua Xia, Shu-Tao Zhu, Zexuan College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Tsinghua Shenzhen International Graduate School Tsinghua University China Shenzhen City Key Laboratory of Embedded System Design Shenzhen China
Sampling strategy (e.g., fixed farthest point sampling) of point cloud has been an essential step for developing practical solutions in 3D computer vision tasks. Previous fixed sampling is simple, but suffer from subo... 详细信息
来源: 评论
Falling for Phishing: An empirical investigation into people's email response behaviors
arXiv
收藏 引用
arXiv 2021年
作者: Jayatilaka, Asangi Gamagedara Arachchilage, Nalin Asanka Babar, Muhammad Ali CREST Centre for Research on Engineering Software Technologies School of Computer Science The University of Adelaide Australia School of Computer Science The University of Auckland New Zealand CREST Centre for Research on Engineering Software Technology School of Computer Science The University of Adelaide Australia
Despite sophisticated phishing email detection systems, and training and awareness programs, humans continue to be tricked by phishing emails. In an attempt to better understand why phishing email attacks still workan... 详细信息
来源: 评论
Research of Sampling Method For Cybercrime Black Industry Chain
Research of Sampling Method For Cybercrime Black Industry Ch...
收藏 引用
IEEE International Conference on Electronic Information and Communication technology (ICEICT)
作者: Ying’An Cui Xue Li Yande Wu Department of Computer Science and Engineering Xi’an University of Technology Xi’an China School of International Business Shaanxi Normal University Xi’an China Software R&D Department 2 China Unicom Western Innovation Research Institute Co. Ltd Xi’an China
In modern organization theories, the social network established by cyber criminals is termed the crime cyber black industry chain. Under the current technical level, treating a crime cyber black industry chain as a wh... 详细信息
来源: 评论
FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Zhenhua Xing, Wenpeng Wang, Zhebo Hu, Chang Jie, Chen Han, Meng School of Software Technology Zhejiang University Hangzhou China Binjiang Institute of Zhejiang University Zhejiang University Hangzhou China School of Communication Engineering Hangzhou Dianzi University Hangzhou China Department of Computer Science Hong Kong Baptist University Hong Kong GenTel.io Zhejiang University Hangzhou China
Training Large Language Models (LLMs) requires immense computational power and vast amounts of data. As a result, protecting the intellectual property of these models through fingerprinting is essential for ownership ... 详细信息
来源: 评论
Emergency Vehicle Navigation in Connected Autonomous Systems Using Enhanced Traffic Management System
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20670-20677页
作者: Raja, Gunasekaran Anbalagan, Sudha Gurumoorthy, Sugeerthi Jegathesan, Darshini Girivel, Niveditha Subramanian Sundaram, Varsha Mani Shanmuga Khowaja, Sunder Ali Dev, Kapal Anna University NGNLab Department of Computer Technology MIT Campus Chennai600044 India Vellore Institute of Technology Chennai Centre for Smart Grid Technologies School of Computer Science and Engineering Chennai600127 India Citicorp Services Private Ltd Software Development Chennai600113 India Dublin City University School of Computing Faculty of Engineering and Computing Glasnevin Campus DublinD09 V209 Ireland Munster Technological University Department of Computer Science Bishopstown CorkT12 P928 Ireland University of Johannesburg Department of Institute of Intelligent Systems Johannesburg2006 South Africa Chitkara University Institute of Engineering and Technology Centre for Research Impact Outcome Chitkara University Punjab Rajpura140401 India
Autonomous Vehicle (AV) usage has become predominant in the rapidly evolving landscape of urban transportation. Integrating AVs and non-AVs in the existing traffic infrastructure has significantly increased the comple... 详细信息
来源: 评论
Recommender System Combining Popularity and Novelty Based on One-Mode Projection of Weighted Bipartite Network
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 489-507页
作者: Yong Yu Yongjun Luo Tong Li Shudong Li Xiaobo Wu Jinzhuo Liu Yu Jiang School of Software Key Laboratory in Software Engineering of Yunnan ProvinceYunnan UniversityKunming650091China School of Big Data Yunnan Agricultural UniversityKunming650201China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China
Personalized recommendation algorithms,which are effective means to solve information overload,are popular topics in current *** this paper,a recommender system combining popularity and novelty(RSCPN)based on one-mode... 详细信息
来源: 评论
CHIEF: Clustering with Higher-order Motifs in Big Networks
arXiv
收藏 引用
arXiv 2022年
作者: Xia, Feng Yu, Shuo Liu, Chengfei Li, Jianxin Lee, Ivan School of Engineering IT and Physical Sciences Federation University Australia Ballarat Australia School of Software Dalian University of Technology Dalian China Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia School of IT Deakin University Melbourne Australia STEM University of South Australia Adelaide Australia
Clustering a group of vertices in networks facilitates applications across different domains, such as social computing and Internet of Things. However, challenges arises for clustering networks with increased scale. T... 详细信息
来源: 评论
Learning Hierarchical Graph Representation for Image Manipulation Detection
arXiv
收藏 引用
arXiv 2022年
作者: Pan, Wenyan Zhou, Zhili Ling, Miaogen Geng, Xin Wu, Q.M. Jonathan School of Computer and Software & Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Computer Science and Engineering Southeast University Nanjing China Department of Electrical and Computer Engineering University of Windsor WindsorON Canada
The objective of image manipulation detection is to identify and locate the manipulated regions in the images. Recent approaches mostly adopt the sophisticated Convolutional Neural Networks (CNNs) to capture the tampe... 详细信息
来源: 评论
Enhancing trading strategies by combining incremental reinforcement learning and self-supervised prediction
收藏 引用
Expert Systems with Applications 2025年 289卷
作者: Chujin Zhou Yuling Huang Yuting Kong Xiaoping Lu School of Computer Science and Engineering Macau University of Science and Technology Macao China School of Computer Science and Software Zhaoqing University Zhaoqing Guangdong China School of Computers Guangdong University of Science and Technology Dongguan Guangdong China
Incremental learning provides critical adaptability in dynamic environments, enabling models to continuously adjust with new data to improve prediction accuracy. This adaptability is especially valuable in volatile fi... 详细信息
来源: 评论
Generalizable Metric Network for Cross-domain Person Re-identification
arXiv
收藏 引用
arXiv 2023年
作者: Qi, Lei Liu, Ziang Shi, Yinghuan Geng, Xin School of Computer Science and Engineering Southeast University Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education 211189 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
Person Re-identification (Re-ID) is a crucial technique for public security and has made significant progress in supervised settings. However, the cross-domain (i.e., domain generalization) scene presents a challenge ... 详细信息
来源: 评论