咨询与建议

限定检索结果

文献类型

  • 5,917 篇 会议
  • 4,133 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 10,118 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,712 篇 工学
    • 5,179 篇 计算机科学与技术...
    • 4,289 篇 软件工程
    • 1,463 篇 信息与通信工程
    • 827 篇 控制科学与工程
    • 762 篇 生物工程
    • 584 篇 电气工程
    • 454 篇 机械工程
    • 421 篇 光学工程
    • 417 篇 电子科学与技术(可...
    • 401 篇 生物医学工程(可授...
    • 256 篇 化学工程与技术
    • 252 篇 动力工程及工程热...
    • 248 篇 安全科学与工程
    • 232 篇 仪器科学与技术
    • 206 篇 交通运输工程
    • 201 篇 网络空间安全
    • 180 篇 建筑学
  • 3,198 篇 理学
    • 1,844 篇 数学
    • 833 篇 生物学
    • 674 篇 物理学
    • 554 篇 统计学(可授理学、...
    • 363 篇 系统科学
    • 282 篇 化学
  • 2,037 篇 管理学
    • 1,261 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 471 篇 工商管理
  • 357 篇 医学
    • 309 篇 临床医学
    • 269 篇 基础医学(可授医学...
  • 304 篇 法学
    • 222 篇 社会学
  • 174 篇 经济学
    • 173 篇 应用经济学
  • 144 篇 教育学
  • 105 篇 农学
  • 31 篇 军事学
  • 28 篇 艺术学
  • 27 篇 文学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 255 篇 feature extracti...
  • 228 篇 semantics
  • 225 篇 computational mo...
  • 223 篇 computer science
  • 220 篇 deep learning
  • 181 篇 software enginee...
  • 170 篇 training
  • 159 篇 machine learning
  • 156 篇 data mining
  • 155 篇 optimization
  • 140 篇 educational inst...
  • 140 篇 predictive model...
  • 121 篇 cloud computing
  • 119 篇 internet of thin...
  • 118 篇 neural networks
  • 109 篇 accuracy
  • 106 篇 image segmentati...
  • 102 篇 servers
  • 102 篇 wireless sensor ...
  • 102 篇 software

机构

  • 271 篇 state key labora...
  • 266 篇 school of comput...
  • 260 篇 school of inform...
  • 219 篇 school of comput...
  • 209 篇 college of compu...
  • 188 篇 school of softwa...
  • 163 篇 school of softwa...
  • 146 篇 school of comput...
  • 139 篇 school of comput...
  • 105 篇 school of comput...
  • 102 篇 college of compu...
  • 100 篇 school of comput...
  • 79 篇 school of inform...
  • 78 篇 school of comput...
  • 75 篇 school of comput...
  • 73 篇 school of softwa...
  • 71 篇 school of softwa...
  • 68 篇 college of compu...
  • 67 篇 school of softwa...
  • 64 篇 department of co...

作者

  • 44 篇 jingsha he
  • 39 篇 yunhao liu
  • 39 篇 junping du
  • 36 篇 gao yang
  • 35 篇 tao dacheng
  • 34 篇 wang wei
  • 33 篇 qi lianyong
  • 30 篇 liu yang
  • 30 篇 zhao jian
  • 29 篇 xu xiaolong
  • 27 篇 shen furao
  • 26 篇 wang lei
  • 26 篇 sun xingming
  • 26 篇 zheng zibin
  • 25 篇 niyato dusit
  • 25 篇 wang chao
  • 23 篇 qi liu
  • 23 篇 yang yang
  • 23 篇 zhang zhao
  • 23 篇 jin wang

语言

  • 9,526 篇 英文
  • 437 篇 其他
  • 167 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=School of Computer Technology and Software Engineering"
10118 条 记 录,以下是361-370 订阅
排序:
Efficient COVID-19 detection using data mining algorithms: a comparison of basic and hybrid approaches
收藏 引用
Soft Computing 2025年 第3期29卷 1437-1451页
作者: Saidi, Mohammad Gheibi, Mohammad Ghazikhani, Adel Lotfata, Aynaz Chahkandi, Benyamin Familsamavati, Sajad Behzadian, Kourosh Department of Computer Science Imam Reza International University Mashhad Iran MS of Software Engineering Information and Communication Technology Unit Mashhad Municipality Fire and Safety Services Organization Mashhad Iran Big Data Lab Imam Reza International University Mashhad Iran Institute for Nanomaterials Advanced Technologies and Innovation Technical University of Liberec Liberec46117 Czech Republic Tallinn10615 Estonia Department of Pathology Microbiology and Immunology School of Veterinary Medicine University of California Davis95616 United States Department of Urban and Regional Planning San Jose State University San Jose95192 United States Faculty of Civil and Environmental Engineering Gdansk University of Technology Narutowicza Street 11/12 80-233 Gdansk Poland Tecnologico de Monterrey Escuela de Ingeniería y Ciencias Monterrey Mexico School of Computing and Engineering University of West London London United Kingdom
Accurate and efficient diagnosis of COVID-19 remains a significant challenge due to the limitations of current detection methods, such as blood tests and chest scans, which can be time-consuming and error-prone. This ... 详细信息
来源: 评论
Automated information mining in hazardous chemical accident reporting: An improved deep learning approach
收藏 引用
Journal of Loss Prevention in the Process Industries 2025年 97卷
作者: Zhao, Kai Wan, Lining Lu, Xilei Zhao, Jun Chen, Fei He, Miao Gao, Jinhao Wang, Qibo Zhang, Linlin Zhang, Li School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Uygur Autonomous Region Academy of Safety Science and Technology Urumqi830011 China Xinjiang Yihua Chemical Co. Changji Hui Autonomous Prefecture 831100 China School of Chemical Engineering and Technology Xinjiang University Urumqi830017 China School of Software Xinjiang University Urumqi830000 China
Mining and accumulating lessons learned from incident reports, accurately identifying and extracting accident knowledge, can help managers recognize patterns, analyze common attributes, and thus prevent the recurrence... 详细信息
来源: 评论
2M3DF: Advancing 3D Industrial Defect Detection with Multi Perspective Multimodal Fusion Network
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Asad, Mujtaba Azeem, Waqar Jiang, He Mustafa, Hafiz Tayyab Yang, Jie Liu, Wei Shanghai Jiao Tong University Institute of Image Processing and Pattern Recognition Department of Automation Shanghai200240 China Lahore Garrison University Department of Software Engineering Lahore54000 Pakistan China University of Mining and Technology School of Information and Control Engineering Jiangsu Xuzhou221116 China Zhejiang Normal University School of Computer Science and Technology Jinhua321004 China
In the context of Industrial Anomaly Detection (IAD), ensuring the quality of manufactured products is critical. Traditional 2D based methods often fail to capture anomalies present in complex 3D shapes. For effective... 详细信息
来源: 评论
Encryption Traffic Classification Based on Mining Traffic Context and Transport Relationship
Encryption Traffic Classification Based on Mining Traffic Co...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Weilin Gai Runqing Zhang Huiyuan Zhang Yu Guo Jun Yin Peng Zhang TCA Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response TechnicalTeam/Coordination Center of China Beijing China School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China
This paper proposes a novel ETC-MTCTR, which is designed to enable more accurate, versatile and efficient traffic classification in the context of multi-scenario, low-resource encrypted traffic. Through three modules ... 详细信息
来源: 评论
Attribute-Based Policy-Hiding Redactable Blockchain With Authorizable Verification for Energy Internet
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xue, Jingting Liu, Liang Li, Fagen Jing, Ximin Zhang, Wenzheng Zhang, Xiaojun Zhou, Yu Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute of Southwestern Communication Science and Technology on Communication Security Laboratory Chengdu610041 China
The goal of the energy internet is to enable communication between distributed energy endpoints to facilitate information exchange and trading matching. Blockchain, which ensures content consistency, bridges the gaps ... 详细信息
来源: 评论
Highly Accurate Crow Search Optimized CNN Classifier for Cyclone Prediction
Highly Accurate Crow Search Optimized CNN Classifier for Cyc...
收藏 引用
Data Science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: R. Ramya Kavin K. S R. Anuja A. T. R. Krishna Priya D. Karthikeyan Kiruba Thangam Raja Department of Electronics and Communication Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences (SIMATS) Tamilnadu India Department of Electrical and Electronics Engineering Government College of Engineering Tirunelveli Tamilnadu India Department of Computer Science and Engineering Rohini College of Engineering and Technology Kanyakumari Tamilnadu India Department of Electrical and Electronics Engineering SRM Institute of Science and Technology Chennai India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) VIT University Vellore
Accurate and timely prediction of cyclone events is essential for effective disaster management and risk mitigation. This study introduces a highly precise cyclone prediction model that combines Convolutional Neural N... 详细信息
来源: 评论
BoxPolypSAM: Leveraging SAM in Box-Supervised Polyp Segmentation
BoxPolypSAM: Leveraging SAM in Box-Supervised Polyp Segmenta...
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Yinqi Cai De-jun Fan Feng Gao Mingzhi Mao Weijun Sun Guanbin Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China The Sixth Affiliated Hospital Sun Yat-sen University Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China Guangdong University of Technology Guangzhou China
Automatic polyp segmentation from colonoscopy images is crucial for colon cancer diagnosis. Nonetheless, training fully supervised polyp segmentation models requires timeconsuming pixel-level annotations. Instead, box... 详细信息
来源: 评论
Corporate Fraud Detection in Rich-yet-Noisy Financial Graph
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Shiqi Zhang, Zhibo Fang, Libing Nguyen, Cam-Tu Li, Wenzhon School of Artificial Intelligence Nanjing University Jiangsu Nanjing China School of Computer Science and Technology Nanjing University Jiangsu Nanjing China School of Management and Engineering Nanjing University Jiangsu Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China
Corporate fraud detection aims to automatically recognize companies that conduct wrongful activities such as fraudulent financial statements or illegal insider trading. Previous learning-based methods fail to effectiv... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yujun Zhang Yanqu Chen Jiakai Wang Jin Hu Renshuai Tao Xianglong Liu State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Listwise ranking predictor for evolutionary neural architecture search
收藏 引用
Swarm and Evolutionary Computation 2025年 96卷
作者: Li, Nan Ma, Lianbo Wang, Rui Cheng, Shi Sun, Yanan Xue, Bing Zhang, Mengjie College of Software Northeastern University Liaoning Shenyang110819 China Centre for Data Science and Artificial Intelligence & School of Engineering and Computer Science Victoria University of Wellington Wellington 6140 New Zealand Foshan Graduate School of Innovation Guangdong Foshan528000 China College of System Engineering National University of Defense Technology Hunan Changsha410073 China School of Computer Science Shaanxi Normal University Shaanxi Xian710119 China School of Computer Science Sichuan University Sichuan Chengdu610000 China
In evolutionary neural architecture search (ENAS), the accuracy predictors (i.e., regression models) have been successfully applied to save computational costs for the evaluation of network architectures. However, the... 详细信息
来源: 评论