咨询与建议

限定检索结果

文献类型

  • 268,320 篇 会议
  • 261,621 篇 期刊文献
  • 1,669 册 图书
  • 1 篇 学位论文

馆藏范围

  • 531,610 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 339,676 篇 工学
    • 144,734 篇 计算机科学与技术...
    • 115,744 篇 软件工程
    • 61,671 篇 化学工程与技术
    • 52,152 篇 信息与通信工程
    • 50,868 篇 电子科学与技术(可...
    • 49,313 篇 电气工程
    • 46,450 篇 材料科学与工程(可...
    • 40,209 篇 控制科学与工程
    • 29,286 篇 机械工程
    • 26,837 篇 动力工程及工程热...
    • 25,160 篇 光学工程
    • 24,811 篇 生物工程
    • 23,121 篇 冶金工程
    • 19,105 篇 仪器科学与技术
    • 18,383 篇 生物医学工程(可授...
    • 15,817 篇 力学(可授工学、理...
    • 13,669 篇 土木工程
    • 12,765 篇 环境科学与工程(可...
    • 11,331 篇 建筑学
  • 225,900 篇 理学
    • 94,909 篇 物理学
    • 87,297 篇 数学
    • 53,763 篇 化学
    • 32,124 篇 生物学
    • 26,594 篇 统计学(可授理学、...
    • 15,749 篇 系统科学
  • 65,184 篇 管理学
    • 43,120 篇 管理科学与工程(可...
    • 23,020 篇 图书情报与档案管...
    • 17,124 篇 工商管理
  • 22,379 篇 医学
    • 16,626 篇 临床医学
    • 11,973 篇 基础医学(可授医学...
  • 8,941 篇 经济学
  • 8,931 篇 法学
  • 8,615 篇 农学
  • 3,883 篇 教育学
  • 1,941 篇 文学
  • 1,298 篇 军事学
  • 775 篇 艺术学
  • 99 篇 哲学
  • 90 篇 历史学

主题

  • 8,809 篇 computer science
  • 8,804 篇 feature extracti...
  • 6,900 篇 training
  • 6,829 篇 computational mo...
  • 6,694 篇 accuracy
  • 5,470 篇 deep learning
  • 5,074 篇 optimization
  • 5,022 篇 semantics
  • 4,897 篇 educational inst...
  • 4,753 篇 data mining
  • 4,644 篇 machine learning
  • 4,173 篇 neural networks
  • 4,086 篇 predictive model...
  • 3,997 篇 data models
  • 3,659 篇 algorithm design...
  • 3,610 篇 mathematical mod...
  • 3,568 篇 robustness
  • 3,409 篇 simulation
  • 3,316 篇 image segmentati...
  • 3,237 篇 support vector m...

机构

  • 5,080 篇 university of ch...
  • 4,573 篇 department of co...
  • 2,677 篇 school of comput...
  • 2,439 篇 school of comput...
  • 2,226 篇 college of compu...
  • 2,188 篇 college of compu...
  • 2,016 篇 university of sc...
  • 1,845 篇 institute of hig...
  • 1,748 篇 school of inform...
  • 1,678 篇 cavendish labora...
  • 1,409 篇 school of comput...
  • 1,347 篇 school of comput...
  • 1,325 篇 school of mechan...
  • 1,257 篇 school of inform...
  • 1,167 篇 school of automa...
  • 1,149 篇 school of electr...
  • 1,132 篇 school of comput...
  • 1,127 篇 school of materi...
  • 1,114 篇 school of electr...
  • 1,112 篇 school of comput...

作者

  • 1,112 篇 wang wei
  • 909 篇 liu yang
  • 867 篇 yang yang
  • 852 篇 wei wang
  • 706 篇 li li
  • 647 篇 zhang wei
  • 587 篇 wei li
  • 579 篇 li wei
  • 575 篇 li yang
  • 543 篇 wei zhang
  • 520 篇 wang lei
  • 518 篇 yang liu
  • 502 篇 wei chen
  • 494 篇 liu wei
  • 478 篇 lei wang
  • 478 篇 chen wei
  • 469 篇 zhang lei
  • 458 篇 bachacou h.
  • 456 篇 annovi a.
  • 421 篇 aloisio a.

语言

  • 487,548 篇 英文
  • 22,775 篇 其他
  • 20,602 篇 中文
  • 210 篇 法文
  • 197 篇 德文
  • 135 篇 日文
  • 13 篇 荷兰文
  • 12 篇 朝鲜文
  • 12 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 8 篇 意大利文
  • 5 篇 俄文
  • 4 篇 阿拉伯文
  • 3 篇 葡萄牙文
检索条件"机构=School of Computer Science and Technology at University of Science and Technology of China"
531611 条 记 录,以下是131-140 订阅
排序:
Endogenous Security Formal Definition,Innovation Mechanisms,and Experiment Research in Industrial Internet
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 492-505页
作者: Hongsong Chen Xintong Han Yiying Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism withou... 详细信息
来源: 评论
An efficient schedulability analysis based on worst-case interference time for real-time systems
收藏 引用
science china(Information sciences) 2024年 第9期67卷 88-104页
作者: Hongbiao LIU Mengfei YANG Lei QIAO Xi CHEN Jian GONG School of Computer Science and Technology Xidian University China Academy of Space Technology Beijing Institute of Control Engineering
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-ti... 详细信息
来源: 评论
Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4091-4107页
作者: Qinyue Wu Hui Xu Mengran Liu School of Computer Science Hubei University of TechnologyWuhan430068China
Network traffic identification is critical for maintaining network security and further meeting various demands of network ***,network traffic data typically possesses high dimensionality and complexity,leading to pra... 详细信息
来源: 评论
Code context-based reviewer recommendation
收藏 引用
Frontiers of computer science 2025年 第1期19卷 97-108页
作者: Dawei YUAN Xiao PENG Zijie CHEN Tao ZHANG Ruijia LEI School of Computer Science and Engineering Macao University of Science and TechnologyMacao 999078China Faculty of Science University of AmsterdamAmsterdam WB 1018Netherlands
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scru... 详细信息
来源: 评论
Modifying Lyapunov exponent of chaotic map by self-cascading
收藏 引用
science china(Technological sciences) 2024年 第7期67卷 2203-2214页
作者: YI ChenLong LI ChunBiao LI YongXin XIA Ming HUA ZhongYun School of Electronic and Information Engineering Nanjing University of Information Science&TechnologyNanjing 210044China School of Artificial Intelligence Nanjing University of Information Science&TechnologyNanjing 210044China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate SchoolShenzhen 518055China
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t... 详细信息
来源: 评论
Secure vehicular data communication in Named Data Networking
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 203-210页
作者: Xiaonan Wang Xilan Chen Xingwei Wang School of Computer Science and Engineering Changshu Institute of TechnologyChangshu215500China School of Computer Science and Technology Northeastern UniversityShenyang110169China
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).I... 详细信息
来源: 评论
Expert Recommendation in Community Question Answering via Heterogeneous Content Network Embedding
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1687-1709页
作者: Hong Li Jianjun Li Guohui Li Rong Gao Lingyu Yan School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China College of Computer Science and Technology Hubei University of TechnologyWuhan 430068China
ExpertRecommendation(ER)aims to identify domain experts with high expertise and willingness to provide answers to questions in Community Question Answering(CQA)web *** to model questions and users in the heterogeneous... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science china(Information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论
Face Anti-Spoofing with Unknown Attacks:A Comprehensive Feature Extraction and Representation Perspective
收藏 引用
Journal of computer science & technology 2024年 第4期39卷 827-840页
作者: Li-Min Li Bin-Wu Wang Xu Wang Peng-Kun Wang Yu-Dong Zhang Yang Wang School of Software Engineering University of Science and Technology of ChinaHefei 230000China School of Data Science University of Science and Technology of ChinaHefei 23000China Suzhou Institute for Advanced Research University of Science and Technology of ChinaSuzhou 215000China
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(... 详细信息
来源: 评论
Coordinate Descent K-means Algorithm Based on Split-Merge
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4875-4893页
作者: Fuheng Qu Yuhang Shi Yong Yang Yating Hu Yuyao Liu College of Computer Science and Technology Changchun University of Science and TechnologyChangchun130022China College of Computer Science and Technology Jilin Agricultural UniversityChangchun130118China
The Coordinate Descent Method for K-means(CDKM)is an improved algorithm of *** identifies better locally optimal solutions than the original K-means *** is,it achieves solutions that yield smaller objective function v... 详细信息
来源: 评论