咨询与建议

限定检索结果

文献类型

  • 10,029 篇 会议
  • 5,953 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,122 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,478 篇 工学
    • 8,175 篇 计算机科学与技术...
    • 6,799 篇 软件工程
    • 2,167 篇 信息与通信工程
    • 1,239 篇 控制科学与工程
    • 1,121 篇 生物工程
    • 889 篇 电气工程
    • 724 篇 机械工程
    • 629 篇 电子科学与技术(可...
    • 605 篇 生物医学工程(可授...
    • 603 篇 光学工程
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 348 篇 安全科学与工程
    • 313 篇 动力工程及工程热...
    • 310 篇 交通运输工程
    • 292 篇 网络空间安全
    • 262 篇 建筑学
  • 4,790 篇 理学
    • 2,792 篇 数学
    • 1,232 篇 生物学
    • 946 篇 物理学
    • 814 篇 统计学(可授理学、...
    • 523 篇 系统科学
    • 411 篇 化学
  • 3,045 篇 管理学
    • 1,842 篇 管理科学与工程(可...
    • 1,327 篇 图书情报与档案管...
    • 740 篇 工商管理
  • 520 篇 医学
    • 447 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 437 篇 法学
    • 325 篇 社会学
  • 283 篇 经济学
    • 281 篇 应用经济学
  • 232 篇 教育学
  • 156 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 37 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 619 篇 computer science
  • 478 篇 software enginee...
  • 343 篇 semantics
  • 321 篇 computational mo...
  • 320 篇 feature extracti...
  • 283 篇 deep learning
  • 258 篇 training
  • 222 篇 data mining
  • 216 篇 educational inst...
  • 211 篇 optimization
  • 173 篇 neural networks
  • 170 篇 application soft...
  • 164 篇 image segmentati...
  • 164 篇 predictive model...
  • 156 篇 machine learning
  • 154 篇 computer archite...
  • 153 篇 internet of thin...
  • 141 篇 authentication
  • 140 篇 servers
  • 138 篇 quality of servi...

机构

  • 409 篇 college of compu...
  • 354 篇 school of comput...
  • 263 篇 school of comput...
  • 261 篇 school of inform...
  • 221 篇 school of comput...
  • 212 篇 school of comput...
  • 188 篇 state key labora...
  • 150 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 120 篇 national enginee...
  • 115 篇 school of comput...
  • 111 篇 school of softwa...
  • 104 篇 state key labora...
  • 100 篇 school of softwa...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 93 篇 school of softwa...
  • 91 篇 school of softwa...
  • 89 篇 school of comput...

作者

  • 70 篇 tao dacheng
  • 53 篇 chen zhong
  • 52 篇 liu yang
  • 51 篇 zheng zibin
  • 38 篇 wang ping
  • 37 篇 gao yang
  • 36 篇 hu ruimin
  • 34 篇 limin xiao
  • 34 篇 huang di
  • 33 篇 wang lei
  • 33 篇 mian ajmal
  • 32 篇 wang yasha
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 30 篇 jun zhang
  • 29 篇 zhang lei
  • 29 篇 wang wei
  • 28 篇 zhao jian
  • 28 篇 qi lianyong
  • 27 篇 niyato dusit

语言

  • 15,320 篇 英文
  • 554 篇 其他
  • 260 篇 中文
  • 4 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and software Engineering"
16122 条 记 录,以下是121-130 订阅
排序:
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline  18th
Profinder: Towards Professionals Recognition on Mobile Devi...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Wang, Yong Xiong, Yi Yang, Tianyu Shen, Yiran College of Computer Science and Technology Harbin Engineering University Harbin China Modeling and Emulation in E-Government National Engineering Laboratory Harbin China School of Software Shandong University Jinan China
As the global population continues to age, there is a concurrent rise in the number of individuals experiencing cognitive impairment and dementia, underscoring the critical necessity to address their hospice needs and... 详细信息
来源: 评论
RPPFL: Robust and Privacy-Preserving Federated Learning via Trusted Execution Environments
RPPFL: Robust and Privacy-Preserving Federated Learning via ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Xiaolei Chen, Zhaoyu Chen, Guangpu Feng, Xinyu Shen, Qingni Wu, Zhonghai School of Computer Science Peking University China School of Software and Microelectronics Peking University China National Engineering Research Center for Software Engineering Peking University China PKU-OCTA Laboratory for Blockchain and Privacy Computing Peking University China
Federated Learning (FL) is a distributed framework that enables multi-participant collaborative model training without the need for data sharing. Despite its advantages, FL is vulnerable to poisoning and inference att... 详细信息
来源: 评论
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks
收藏 引用
IEEE Access 2025年 13卷 31472-31484页
作者: Kamal, Mian Muhammad Zain Ul Abideen, Syed Al-Khasawneh, M.A. Alabrah, Amerah Sohail Ahmed Larik, Raja Irfan Marwat, Muhammad Southeast University School of Electronic Science and Engineering Jiangning Jiangsu Nanjing211189 China Qingdao University College of Computer Science and Technology Qingdao266071 China Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19111 Jordan Skyline University College School of Computing University City Sharjah Sharjah United Arab Emirates King Saud University College of Computer and Information Science Department of Information Systems Riyadh11543 Saudi Arabia Ilma University Department of Computer Science Sindh Karachi75190 Pakistan University of Science and Technology Bannu Department of Software Engineering Bannu28100 Pakistan
The rapid evolution of wireless communication technologies and the increasing demand for multi-functional systems have led to the emergence of integrated sensing and communication (ISAC) as a key enabler for future 6G... 详细信息
来源: 评论
SemConf: A System for Multiparty Semantic Video Conferencing
SemConf: A System for Multiparty Semantic Video Conferencing
收藏 引用
35th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV 2025
作者: Duan, Xize Jin, Yili Zhang, Lei Wang, Fangxin Shenzhen Future Network of Intelligence Institute China School of Science and Engineering The Chinese University of HongKong Shenzhen China School of Computer Science McGill University Canada College of Computer Science and Software Engineering Shenzhen University China The Guangdong Provincial Key Laboratory of Future Networks of Intelligence China
Multi-party real-Time video conferencing has become an indispensable service in industrial production and daily life. However, the current dynamic and limited network resources can no longer meet the growing service d... 详细信息
来源: 评论
Comparison of Standard Ant Colony Optimization, Dijkstra and A∗ Algorithms for Path Planning of Robot in an Indoor Environment
Comparison of Standard Ant Colony Optimization, Dijkstra and...
收藏 引用
9th International Conference on Mechanical engineering and Robotics Research, ICMERR 2025
作者: Sharan, Sudeep Ngoc Minh, Anh Tong Dominguez-Jimenez, Juan Jose Nauth, Peter Frankfurt University of Applied Sciences Faculty of Computer Science and Engineering Frankfurt am Main Germany UCASE Software Engineering Group School of Engineering University of Cádiz Cadiz Spain
The research topic of Path planning is extremely challenging area of concentration within the field of mobile robots. However, path planning algorithms for mobile robot tasks are contingent upon the environment and it... 详细信息
来源: 评论
Deep Learning and IoT-Enabled Accident Detection and Reporting for Smart Cities Domain
收藏 引用
KSII Transactions on Internet and Information Systems 2025年 第4期19卷 1140-1166页
作者: Javed, Rawal Mazhar, Tehseen Aoun, Muhammad Shahzad, Tariq Al-AlShaikh, Halah A. Ghadi, Yazeed Yasin Saudagar, Abdul Khader Jilani Khan, Muhammad Amir School of Automation Central South University Changsha China School of Computer Science National College of Business Administration and Economics Lahore54000 Pakistan Department of Computer Science and Information Technology School Education Department Government of Punjab Layyah31200 Pakistan Department of CS IT Ghazi University Punjab Dera Ghazi Khan Pakistan School of Electrical Engineering Dept. of Electrical and Electronic Eng. Science University of Johannesburg Johannesburg2006 South Africa Riyadh11432 Saudi Arabia Department of Computer Science and Software Engineering Al Ain University Abu Dhabi12555 United Arab Emirates School of Computing Sciences College of Computing Informatics and Mathematics University Technology MARA Selangor Shah Alam40450 Malaysia
Even though numerous ICT-based solutions have been put forth for the detection of accidents and rescue missions, they often suffer from compatibility issues with different vehicles and are accompanied by high costs. T... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Self-powered tactile sensor for real-time recognition of Morse code based on machine learning
收藏 引用
Nano Research 2025年 第2期18卷 760-768页
作者: Shenxing Tan Yang Jiang Xujiang Chao Fei Liang Ripeng Li Tao Jiang Hai-Dong Yu Zhong Lin Wang Guangzhou Institute of Blue Energy Guangzhou 510555China Frontiers Science Center for Flexible Electronics Xi'an Institute of Flexible Electronics(IFE)and Xi'an Institute of Biomedical Materials&EngineeringNorthwestern Polytechnical UniversityXi'an 710072China Beijing Key Laboratory of Micro-Nano Energy and Sensor Center for High-Entropy Energy and SystemsBeijing Institute of Nanoenergy and NanosystemsChinese Academy of SciencesBeijing 101400China School of Nanoscience and Engineering University of Chinese Academy of SciencesBeijing 100049China School of Mechanical Engineering Northwestern Polytechnical UniversityXi’an 710072China School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing 100876China
Developing lightweight,green,and flexible wearable electronics with high sensitivity and multifunctional sensing capabilities is of important significance in the field of outdoor sports,such as mountaineering,animal t... 详细信息
来源: 评论
Research on Entity Recognition Method for Quality Standards of Concrete Prefabricated Components  1
Research on Entity Recognition Method for Quality Standards ...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Zhang, Tingshu Tu, Ming Wang, Gefan Chen, Bingyong Zhao, Yishi Shang, Jianga School of Computer Science China University of Geosciences Wuhang China Intelligent Construction System Research Institute China Construction Third Engineering Buerau Group Co.L Wuhang China Engineering Research Center of Natural Resource Information Management and Digital Twin Engineering Software Ministry of Education School of Computer Science China University of Geosciences Wuhang China
In recent years, the country has released a large number of standard documents related to prefabricated concrete components. Due to the dispersion and complexity of these standards, it is difficult for industry manage... 详细信息
来源: 评论
Decentralized Authentication Scheme Incorporating Reputation and Attribute Signature for Cross-Web3 Applications
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14526-14537页
作者: Song, Xiaoling Xu, Guangxia Huang, Yongfei Liu, Yong Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou510006 China Peng Cheng Laboratory Department of New Networks Shenzhen518000 China Chongqing University of Posts and Telecommunications School of Software Engineering Chongqing400065 China
Driven by Web 3.0, the number of decentralized applications (DAPPs) continues to increase, and the need for decentralized authentication across applications becomes more and more significant. In addition, multi-dimens... 详细信息
来源: 评论