咨询与建议

限定检索结果

文献类型

  • 10,098 篇 会议
  • 5,913 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,448 篇 工学
    • 8,164 篇 计算机科学与技术...
    • 6,769 篇 软件工程
    • 2,168 篇 信息与通信工程
    • 1,249 篇 控制科学与工程
    • 1,120 篇 生物工程
    • 837 篇 电气工程
    • 720 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 597 篇 光学工程
    • 386 篇 化学工程与技术
    • 356 篇 仪器科学与技术
    • 349 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 312 篇 交通运输工程
    • 293 篇 网络空间安全
    • 265 篇 建筑学
  • 4,790 篇 理学
    • 2,794 篇 数学
    • 1,230 篇 生物学
    • 946 篇 物理学
    • 813 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 409 篇 化学
  • 3,039 篇 管理学
    • 1,841 篇 管理科学与工程(可...
    • 1,320 篇 图书情报与档案管...
    • 744 篇 工商管理
  • 516 篇 医学
    • 444 篇 临床医学
    • 386 篇 基础医学(可授医学...
  • 437 篇 法学
    • 328 篇 社会学
  • 277 篇 经济学
    • 276 篇 应用经济学
  • 234 篇 教育学
  • 153 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 619 篇 computer science
  • 478 篇 software enginee...
  • 338 篇 semantics
  • 316 篇 computational mo...
  • 314 篇 feature extracti...
  • 297 篇 deep learning
  • 260 篇 training
  • 219 篇 data mining
  • 216 篇 educational inst...
  • 214 篇 optimization
  • 172 篇 predictive model...
  • 171 篇 neural networks
  • 170 篇 application soft...
  • 165 篇 image segmentati...
  • 158 篇 machine learning
  • 155 篇 computer archite...
  • 154 篇 internet of thin...
  • 142 篇 authentication
  • 136 篇 convolution
  • 136 篇 servers

机构

  • 409 篇 college of compu...
  • 354 篇 school of comput...
  • 263 篇 school of comput...
  • 259 篇 school of inform...
  • 218 篇 school of comput...
  • 215 篇 school of comput...
  • 188 篇 state key labora...
  • 150 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 120 篇 national enginee...
  • 111 篇 school of comput...
  • 111 篇 school of softwa...
  • 104 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 87 篇 school of softwa...

作者

  • 67 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 47 篇 zheng zibin
  • 39 篇 wang ping
  • 36 篇 hu ruimin
  • 35 篇 gao yang
  • 34 篇 limin xiao
  • 34 篇 huang di
  • 32 篇 wang yasha
  • 32 篇 mian ajmal
  • 31 篇 wang lei
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 bo du
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 28 篇 xiao limin

语言

  • 15,319 篇 英文
  • 579 篇 其他
  • 263 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and software Engineering"
16151 条 记 录,以下是241-250 订阅
排序:
A Novel Data Mining Framework for Discovering Association Rules in Multivariate Time Series  7
A Novel Data Mining Framework for Discovering Association Ru...
收藏 引用
7th International Conference on Advanced Algorithms and Control engineering, ICAACE 2024
作者: Wang, Shengwei Lyu, Jianhua Zhang, Baili School Of Software Southeast University Nanjing China College Of Computer Science And Engineering Southeast University Nanjing China
As a significant field within data mining, association rule mining plays a pivotal role in unveiling relationships between items within a dataset. Existing approaches in multivariate time series (MTS) association rule... 详细信息
来源: 评论
Motivating Users to Atend to Privacy: A Theory-Driven Design Study
Motivating Users to Atend to Privacy: A Theory-Driven Design...
收藏 引用
2024 ACM Designing Interactive Systems Conference, DIS 2024
作者: Shiri, Varun Xiong, Maggie Cheng, Jinghui Guo, Jin L.C. Department of Computer and Software Engineering Polytechnique Montreal MontrealQC Canada School of Computer Science McGill University MontrealQC Canada
In modern technology environments, raising users’ privacy awareness is crucial. Existing eforts largely focused on privacy policy presentation and failed to systematically address a radical challenge of user motivati... 详细信息
来源: 评论
A survey for light field super-resolution
收藏 引用
High-Confidence Computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论
Group Signature with Time-Bound Keys for Secure E-health Record Sharing
Group Signature with Time-Bound Keys for Secure E-health Rec...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lu, Junze Hu, Chunqiang Ruan, Conghao Cai, Bin Xiang, Tao Chongqing University School of Big Data & Software Engineering China Chongqing University College of Computer Science China
With the advent of various mobile IoT devices, a large amount of e-health record (EHR) data has been generated. This data has great potential to improve medical research. However, there are many challenges regarding t... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Enhancing Topic Interpretability for Neural Topic Modeling Through Topic-Wise Contrastive Learning  40
Enhancing Topic Interpretability for Neural Topic Modeling T...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Gao, Xin Lin, Yang Li, Ruiqing Wang, Yasha Chu, Xu Ma, Xinyu Yu, Hailong Software Engineering Institution School of Computer Science Peking University Beijing China Key Lab of High Confidence Software Technologies Ministry of Education Beijing China Peking University National Engineering Research Center of Software Engineering Beijing China School of Computer Science Center on Frontiers of Computing Studies Peking University China
Data mining and knowledge discovery are essential aspects of extracting valuable insights from vast datasets. Neural topic models (NTMs) have emerged as a valuable unsupervised tool in this field. However, the predomi... 详细信息
来源: 评论
Similar Locality Based Transfer Evolutionary Optimization for Minimalistic Attacks  13
Similar Locality Based Transfer Evolutionary Optimization fo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Ma, Wenqiang Hau, Yaqing Yu, Hua Tong, Xiangrong Zhu, Zexuan Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian116024 China School of Computer and Control Engineering Yantai University Yantai264005 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Deep neural networks are powerful and popular learning models;however, recent studies have shown that deep neural network-based policies are susceptible to deception by adversarial attacks. A minimalistic attack is a ... 详细信息
来源: 评论
Multi-Optimiser Training for GANs Based on Evolutionary Computation  13
Multi-Optimiser Training for GANs Based on Evolutionary Comp...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Zhang, Yixia Xue, Yu Neri, Ferrante School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Electronic Engineering University of Surrey Guildford United Kingdom
Generative adversarial networks (GANs) are widely recognized for their impressive ability to generate realistic data. Despite the popularity of GANs, training them poses challenges such as mode collapse and instabilit... 详细信息
来源: 评论
Region-adaptive Concept Aggregation for Few-shot Visual Recognition
收藏 引用
Machine Intelligence Research 2023年 第4期20卷 554-568页
作者: Mengya Han Yibing Zhan Baosheng Yu Yong Luo Han Hu Bo Du Yonggang Wen Dacheng Tao School of Computer Science National Engineering Research Center for Multimedia SoftwareWuhan UniversityWuhan430072China Hubei Luojia Laboratory Wuhan430072China School of Computer Science The University of SydneySydney2006Australia JD Explore Academy Beijing101116China School of Information and Electronics Beijing Institute of TechnologyBeijing100081China School of Computer Science and Engineering Nanyang Technological UniversitySingapore639798Singapore
Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking robustness in concept learning. Specifically, existing FSL methods usually ig... 详细信息
来源: 评论
Applying blockchain-based method to smart contract classification for CPS applications
收藏 引用
Digital Communications and Networks 2022年 第6期8卷 964-975页
作者: Zigui Jiang Kai Chen Hailin Wen Zibin Zheng School of Software Engineering Sun Yat-Sen UniversityChina School of Mathematics Sun Yat-Sen UniversityChina School of Computer Science and Engineering Sun Yat-Sen UniversityChina
Smart contract has been the core of blockchain systems and other blockchain-based systems since Blockchain *** operations on blockchain are performed through the invocation and execution of smart *** leads to extensiv... 详细信息
来源: 评论