咨询与建议

限定检索结果

文献类型

  • 5,937 篇 会议
  • 4,160 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 10,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,734 篇 工学
    • 5,193 篇 计算机科学与技术...
    • 4,289 篇 软件工程
    • 1,463 篇 信息与通信工程
    • 828 篇 控制科学与工程
    • 762 篇 生物工程
    • 588 篇 电气工程
    • 455 篇 机械工程
    • 421 篇 光学工程
    • 418 篇 电子科学与技术(可...
    • 401 篇 生物医学工程(可授...
    • 256 篇 化学工程与技术
    • 253 篇 动力工程及工程热...
    • 248 篇 安全科学与工程
    • 232 篇 仪器科学与技术
    • 206 篇 交通运输工程
    • 201 篇 网络空间安全
    • 180 篇 建筑学
  • 3,199 篇 理学
    • 1,845 篇 数学
    • 835 篇 生物学
    • 673 篇 物理学
    • 555 篇 统计学(可授理学、...
    • 363 篇 系统科学
    • 282 篇 化学
  • 2,038 篇 管理学
    • 1,262 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 471 篇 工商管理
  • 358 篇 医学
    • 310 篇 临床医学
    • 270 篇 基础医学(可授医学...
  • 305 篇 法学
    • 223 篇 社会学
  • 174 篇 经济学
    • 173 篇 应用经济学
  • 145 篇 教育学
  • 105 篇 农学
  • 31 篇 军事学
  • 28 篇 艺术学
  • 27 篇 文学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 257 篇 feature extracti...
  • 229 篇 semantics
  • 225 篇 deep learning
  • 225 篇 computational mo...
  • 223 篇 computer science
  • 181 篇 software enginee...
  • 175 篇 training
  • 159 篇 optimization
  • 159 篇 machine learning
  • 157 篇 data mining
  • 143 篇 predictive model...
  • 140 篇 educational inst...
  • 119 篇 internet of thin...
  • 119 篇 neural networks
  • 119 篇 cloud computing
  • 111 篇 accuracy
  • 108 篇 image segmentati...
  • 102 篇 convolution
  • 102 篇 servers
  • 102 篇 wireless sensor ...

机构

  • 271 篇 state key labora...
  • 266 篇 school of comput...
  • 263 篇 school of inform...
  • 219 篇 school of comput...
  • 211 篇 college of compu...
  • 189 篇 school of softwa...
  • 163 篇 school of softwa...
  • 145 篇 school of comput...
  • 139 篇 school of comput...
  • 104 篇 school of comput...
  • 102 篇 college of compu...
  • 101 篇 school of comput...
  • 79 篇 school of comput...
  • 79 篇 school of inform...
  • 76 篇 school of comput...
  • 72 篇 school of softwa...
  • 72 篇 school of softwa...
  • 70 篇 school of softwa...
  • 69 篇 college of compu...
  • 66 篇 school of comput...

作者

  • 43 篇 jingsha he
  • 40 篇 junping du
  • 38 篇 yunhao liu
  • 36 篇 gao yang
  • 35 篇 tao dacheng
  • 33 篇 qi lianyong
  • 33 篇 wang wei
  • 30 篇 liu yang
  • 30 篇 zhao jian
  • 29 篇 xu xiaolong
  • 27 篇 shen furao
  • 26 篇 wang lei
  • 26 篇 sun xingming
  • 26 篇 zheng zibin
  • 25 篇 niyato dusit
  • 25 篇 wang chao
  • 24 篇 jin wang
  • 23 篇 qi liu
  • 23 篇 yang yang
  • 23 篇 zhang zhao

语言

  • 9,573 篇 英文
  • 437 篇 其他
  • 167 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=School of Computer Technology and Software Engineering"
10165 条 记 录,以下是351-360 订阅
排序:
Group Recommendation Method Based on Graph Neural Network
Group Recommendation Method Based on Graph Neural Network
收藏 引用
2024 International Conference on Cyber-Physical Social Intelligence, ICCSI 2024
作者: Lu, Mengye Zhu, Peng Miao, Chun Wang, Youjian Wang, Jiacun Nanjing University of Science and Technology School of Economics and Management Nanjing China Monmouth University Department of Computer Science and Software Engineering NJ United States
Group activities are becoming more and more common on the Internet in the big data environment. Which makes many scholars focus on how to recommend items or activities to a group. However, conventional recommendation ... 详细信息
来源: 评论
Detection of Deepfakes: Protecting Images and Vedios Against Deepfake  21
Detection of Deepfakes: Protecting Images and Vedios Against...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: Tian, Ying Zhou, Wang Haq, Amin Ul Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province LuZhou China School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
Continuous Contrastive Learning for Long-Tailed Semi-Supervised Recognition  38
Continuous Contrastive Learning for Long-Tailed Semi-Supervi...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Zi-Hao Fang, Siyuan Zhou, Zi-Jing Wei, Tong Wan, Yuanyu Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Ministry of Education China Xiaomi Inc. China School of Software Technology Zhejiang University Ningbo China
Long-tailed semi-supervised learning poses a significant challenge in training models with limited labeled data exhibiting a long-tailed label distribution. Current state-of-the-art LTSSL approaches heavily rely on hi...
来源: 评论
A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84275-84297页
作者: Feng, Sijia Zhao, Maochang Liu, Zhaobin Li, Yuanyu Tianjin public emergency early warning information release center Tianjin Meteorology Information Center Tianjin300074 China School of Information Science & amp Technology Dalian Maritime University Dalian116026 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro... 详细信息
来源: 评论
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain
收藏 引用
IEEE Internet of Things Journal 2024年 第6期11卷 10325-10335页
作者: Yang, Ching-Nung Li, Peng Cheng, Hsiang-Han Kuo, Hsin-Chuan Lu, Ming-Chan Xiong, Lizhi National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan North China Electric Power University Department of Mathematics and Physics Hebei Key Laboratory of Physics and Energy Technology Baoding071003 China Nanjing University of Information Science and Technology School of Computer and Software Nanjing210044 China
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr... 详细信息
来源: 评论
Boosting the Prediction of Brain Tumor Using Two Stage BiGait Architecture  25
Boosting the Prediction of Brain Tumor Using Two Stage BiGai...
收藏 引用
25th International Conference on Digital Image Computing: Techniques and Applications, DICTA 2024
作者: Khan, Saif-Ur-Rehman Khan, Zia Hossain, Md Zakir Mayumu, Nicanor Yasmin, Farhana Aziz, Younas School of Computer Science and Engineering Central South University Changsha China Curtin University Perth Australia Nanjing University of information Science and Technology Department of Computer and Software Nanjing China
Deep learning (DL) techniques hold immense promise for revolutionizing medical diagnostics, including brain tumor detection. Detecting malignancies in the brain is fraught with challenges that carry critical implicati... 详细信息
来源: 评论
Explainable AI: A Way to Achieve Trustworthy AI  10
Explainable AI: A Way to Achieve Trustworthy AI
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Li, Yanlu Xiao, Yufeng Gong, Yinyan Zhang, Ronglin Huo, Yingzi Wu, Yanbing Hunan Key Laboratory for Service Computing Novel Software Technology Xiangtan411201 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and... 详细信息
来源: 评论
Mathematical Modeling and Analysis of Patterns in Structured Collections of Big Data  13
Mathematical Modeling and Analysis of Patterns in Structured...
收藏 引用
13th International Conference on Advanced computer Information Technologies, ACIT 2023
作者: Syrotkina, Olena Kobti, Ziad Aleksieiev, Mykhailo Moroz, Borys Udovyk, Iryna Shvachych, Hennadii University of Windsor School of Computer Science Windsor Canada Dnipro University of Technology Department of Software Engineering Dnipro Ukraine
This paper addresses the issue of creating and applying mathematical models and methods for finding generalized solutions when working with structured collections of 'big data'. We reviewed the modern methodol... 详细信息
来源: 评论
A Zero-Knowledge Set Membership Proof Scheme Based on the SM2 Algorithm  24
A Zero-Knowledge Set Membership Proof Scheme Based on the SM...
收藏 引用
2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence, DEAI 2024
作者: Zhou, Yin Dai, Bingrong Li, Chao School of Computer and Information Engineering Shanghai Polytechnic University My Street Shanghai201209 China Department of Computing Shanghai Development Center of Computer SoftWare Technology Shanghai201102 China
With the widespread application of blockchain technology, various range proof protocols based on zero-knowledge proofs have been proposed. However, existing range proof protocols suffer from issues such as high commun... 详细信息
来源: 评论