咨询与建议

限定检索结果

文献类型

  • 8,815 篇 会议
  • 6,034 篇 期刊文献
  • 114 册 图书

馆藏范围

  • 14,963 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,000 篇 工学
    • 7,783 篇 计算机科学与技术...
    • 6,350 篇 软件工程
    • 2,384 篇 信息与通信工程
    • 1,197 篇 控制科学与工程
    • 1,021 篇 生物工程
    • 938 篇 电气工程
    • 702 篇 电子科学与技术(可...
    • 638 篇 机械工程
    • 561 篇 网络空间安全
    • 510 篇 光学工程
    • 489 篇 生物医学工程(可授...
    • 375 篇 安全科学与工程
    • 336 篇 化学工程与技术
    • 329 篇 动力工程及工程热...
    • 321 篇 仪器科学与技术
    • 269 篇 建筑学
    • 266 篇 交通运输工程
  • 4,526 篇 理学
    • 2,619 篇 数学
    • 1,113 篇 生物学
    • 990 篇 物理学
    • 722 篇 统计学(可授理学、...
    • 451 篇 系统科学
    • 357 篇 化学
  • 2,802 篇 管理学
    • 1,655 篇 管理科学与工程(可...
    • 1,269 篇 图书情报与档案管...
    • 633 篇 工商管理
  • 519 篇 法学
    • 339 篇 社会学
  • 456 篇 医学
    • 382 篇 临床医学
    • 347 篇 基础医学(可授医学...
  • 248 篇 经济学
    • 247 篇 应用经济学
  • 194 篇 教育学
  • 146 篇 农学
  • 101 篇 军事学
  • 71 篇 文学
  • 43 篇 艺术学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 380 篇 feature extracti...
  • 312 篇 deep learning
  • 304 篇 semantics
  • 292 篇 computational mo...
  • 264 篇 authentication
  • 216 篇 computer science
  • 205 篇 data mining
  • 196 篇 training
  • 191 篇 security
  • 190 篇 internet of thin...
  • 177 篇 optimization
  • 174 篇 information secu...
  • 174 篇 machine learning
  • 163 篇 accuracy
  • 159 篇 servers
  • 151 篇 neural networks
  • 144 篇 predictive model...
  • 143 篇 cryptography
  • 138 篇 software enginee...
  • 132 篇 wireless sensor ...

机构

  • 470 篇 school of comput...
  • 285 篇 school of inform...
  • 229 篇 school of cyber ...
  • 215 篇 institute of inf...
  • 202 篇 school of comput...
  • 156 篇 school of comput...
  • 140 篇 school of softwa...
  • 138 篇 college of compu...
  • 135 篇 school of softwa...
  • 114 篇 department of co...
  • 86 篇 state key labora...
  • 85 篇 school of comput...
  • 74 篇 guilin universit...
  • 71 篇 school of inform...
  • 69 篇 school of comput...
  • 68 篇 tsinghua nationa...
  • 67 篇 school of softwa...
  • 60 篇 school of softwa...
  • 60 篇 school of comput...
  • 59 篇 school of comput...

作者

  • 73 篇 luo xiaonan
  • 48 篇 ding yong
  • 43 篇 yang yang
  • 41 篇 zheng wei-shi
  • 40 篇 li li
  • 40 篇 qi lianyong
  • 38 篇 wang wei
  • 33 篇 qi liu
  • 33 篇 liu yang
  • 33 篇 tao dacheng
  • 31 篇 ma jianfeng
  • 30 篇 wang lei
  • 29 篇 liu qi
  • 28 篇 li ji
  • 28 篇 xiaochun cao
  • 28 篇 sun xingming
  • 28 篇 jin wang
  • 28 篇 yang jian
  • 27 篇 wang guojun
  • 26 篇 wei li

语言

  • 13,794 篇 英文
  • 856 篇 其他
  • 334 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Information Security/School of Software"
14963 条 记 录,以下是11-20 订阅
排序:
DIEONet:Domain-Invariant information Extraction and Optimization Network for Visual Place Recognition
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5019-5033页
作者: Shaoqi Hou Zebang Qin Chenyu Wu Guangqiang Yin Xinzhong Wang Zhiguo Wang School of Computer Science and Technology Xinjiang UniversityUrumqi830046China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR ... 详细信息
来源: 评论
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
收藏 引用
Defence Technology(防务技术) 2025年 第1期43卷 80-93页
作者: Kangning Yin Xinhui Ji Yan Wang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Federated learning(FL)is a distributed machine learning paradigm for edge cloud *** can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenge... 详细信息
来源: 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1383-1398页
作者: Xueqing YAN Yongming LI Sanjiang LI School of Computer Science Shaanxi Normal University School of Mathematics and Statistics Shaanxi Normal University Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
A Hybrid Algorithm based on Autoencoder and Text Convolutional Network for Integrating scATAC-seq and scRNA-seq Data
A Hybrid Algorithm based on Autoencoder and Text Convolution...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhu, Xiaoshu Liu, Jiahui Lan, Wei Teng, Fei Guilin University of Electronic Technology School of Computer Science and Information Security School of Software Engineering Guilin China Guangxi University School of Computer Electronics and Information Nanning China
Integrating single-cell RNA-seq (scRNA-seq) data and single-cell ATAC-seq (scATAC-seq) data provides a more comprehensive view of cellular heterogeneity. However, the high sparsity in scATAC-seq data presents signific... 详细信息
来源: 评论
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3001-3019页
作者: Nannan Wu Xianyi Chen James Msughter Adeke Junjie Zhao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform... 详细信息
来源: 评论
Efficient and secure confidential transaction scheme based on commitment and aggregated zero-knowledge proofs
收藏 引用
Journal of Cyber security Technology 2024年 第4期8卷 312-332页
作者: Yong, Wang Lijie, Chen Yifan, Wu Qiancheng, Wan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Cryptography and Information Security Guilin China
As a distributed ledger technology, blockchain has broad applications in many areas such as finance, agriculture, and contract signing due to its advantages of being tamperproof and difficult to forge. However, the op... 详细信息
来源: 评论
Deep learning-based open API recommendation for Mashup development
收藏 引用
Science China(information Sciences) 2023年 第7期66卷 94-111页
作者: Ye WANG Junwu CHEN Qiao HUANG Xin XIA Bo JIANG School of Computer and Information Engineering Zhejiang Gongshang University Software Engineering Application Technology Lab
Mashup developers often need to find open application programming interfaces(APIs) for their composition application development. Although most enterprises and service organizations have encapsulated their businesses ... 详细信息
来源: 评论
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4491-4512页
作者: Chunhui Li Hua Jiang School of Computer and Electronic Information Guangxi UniversityNanning530000China Cyber Security and Information Center Guangxi UniversityNanning530000China
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of *** systems spanning various sectors of enterprises geographically dispersed,the necessit... 详细信息
来源: 评论
Network traffic identification in packet sampling environment
收藏 引用
Digital Communications and Networks 2023年 第4期9卷 957-970页
作者: Shi Dong Yuanjun Xia School of Computer Science and Technology Zhoukou Normal UniversityZhoukou466001China School of Computer and Information Security Guilin University of Electronic TechnologyGuilin 541004China
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and *** recent years,packet sampling has been widely used in most network management *** thi... 详细信息
来源: 评论