咨询与建议

限定检索结果

文献类型

  • 2,109 篇 期刊文献
  • 1,692 篇 会议
  • 17 册 图书

馆藏范围

  • 3,818 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,532 篇 工学
    • 1,856 篇 计算机科学与技术...
    • 1,574 篇 软件工程
    • 603 篇 信息与通信工程
    • 400 篇 电气工程
    • 384 篇 生物工程
    • 311 篇 控制科学与工程
    • 243 篇 生物医学工程(可授...
    • 234 篇 电子科学与技术(可...
    • 232 篇 光学工程
    • 150 篇 机械工程
    • 124 篇 化学工程与技术
    • 116 篇 交通运输工程
    • 104 篇 动力工程及工程热...
    • 98 篇 仪器科学与技术
    • 98 篇 网络空间安全
    • 89 篇 安全科学与工程
  • 1,414 篇 理学
    • 727 篇 数学
    • 437 篇 生物学
    • 347 篇 物理学
    • 256 篇 统计学(可授理学、...
    • 135 篇 化学
    • 134 篇 系统科学
  • 733 篇 管理学
    • 458 篇 管理科学与工程(可...
    • 315 篇 图书情报与档案管...
    • 220 篇 工商管理
  • 254 篇 医学
    • 216 篇 临床医学
    • 190 篇 基础医学(可授医学...
    • 117 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 117 篇 法学
    • 98 篇 社会学
  • 77 篇 经济学
  • 51 篇 农学
  • 37 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 122 篇 deep learning
  • 115 篇 accuracy
  • 107 篇 machine learning
  • 98 篇 feature extracti...
  • 92 篇 semantics
  • 92 篇 training
  • 83 篇 computational mo...
  • 74 篇 data models
  • 67 篇 internet of thin...
  • 64 篇 real-time system...
  • 63 篇 predictive model...
  • 61 篇 convolutional ne...
  • 56 篇 federated learni...
  • 50 篇 reinforcement le...
  • 44 篇 artificial intel...
  • 43 篇 deep neural netw...
  • 42 篇 graph neural net...
  • 41 篇 data mining
  • 40 篇 optimization
  • 39 篇 convolution

机构

  • 146 篇 college of compu...
  • 105 篇 national enginee...
  • 100 篇 beijing advanced...
  • 76 篇 nanyang technolo...
  • 66 篇 school of comput...
  • 55 篇 national enginee...
  • 47 篇 school of big da...
  • 47 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 school of cyber ...
  • 36 篇 national enginee...
  • 34 篇 university of ch...
  • 32 篇 college of intel...
  • 32 篇 school of comput...
  • 30 篇 school of data a...
  • 30 篇 hubei engineerin...
  • 29 篇 college of compu...
  • 29 篇 services computi...
  • 29 篇 the college of c...
  • 28 篇 school of data s...

作者

  • 144 篇 niyato dusit
  • 108 篇 hai jin
  • 104 篇 jin hai
  • 31 篇 xiaofei liao
  • 31 篇 kang jiawen
  • 25 篇 li jianxin
  • 25 篇 shen linlin
  • 24 篇 rajeswari d.
  • 23 篇 tao dacheng
  • 23 篇 hu shengshan
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 21 篇 du hongyang
  • 20 篇 sun geng
  • 20 篇 li tianrui
  • 20 篇 wang jiacheng
  • 19 篇 haikun liu
  • 19 篇 dusit niyato
  • 19 篇 xiwang dong
  • 19 篇 liao xiaofei

语言

  • 3,484 篇 英文
  • 310 篇 其他
  • 32 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3818 条 记 录,以下是1-10 订阅
排序:
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
Science China(Information Sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
EPCNN: Efficient and Practical Privacy-Preserving Convolutional Neural Network Inference
收藏 引用
IEEE Transactions on Network Science and engineering 2025年 第3期12卷 1567-1580页
作者: He, Gang Ren, Yanli Zhao, Jun Feng, Guorui Zhang, Xinpeng Shanghai University School of Communication and Information Engineering Shanghai200444 China Nanyang Technological University School of Computing and Data Science 639798 Singapore
Convolutional Neural Networks (CNNs), as a powerful tool for efficient inference, have rapidly developed into a Machine Learning as a Service paradigm facilitated by cloud computing. Nevertheless, this service model r... 详细信息
来源: 评论
LaserKey: Eavesdropping Keyboard Typing Leveraging Vibrational Emanations via Laser Sensing
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 4829-4844页
作者: Luo, Chengwen Xie, Zhuoqing Huang, Yuhan Chen, Gecheng Yao, Haiyi Zhang, Jin Cheng, Long Xu, Weitao Li, Jianqiang National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China School of Computing Clemson University United States City University of Hong Kong Hong Kong
Reconstructing keyboard input through side-channel attacks has posed significant threats to user security. While conventional keystroke eavesdropping attacks have demonstrated effectiveness using side channels such as... 详细信息
来源: 评论
Uncertainty-Calibrated Test-Time Model Adaptation without Forgetting
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 1-14页
作者: Tan, Mingkui Chen, Guohao Wu, Jiaxiang Zhang, Yifan Chen, Yaofo Zhao, Peilin Niu, Shuaicheng South China University of Technology School of Software Engineering China Pazhou Laboratory Guangzhou China XVERSE China National University of Singapore School of Computing Singapore Tencent AI Lab China Nanyang Technological University College of Computing and Data Science Singapore
Test-time adaptation (TTA) seeks to tackle potential distribution shifts between training and testing data by adapting a given model w.r.t. any testing sample. This task is particularly important when the test environ... 详细信息
来源: 评论
Detecting the symptoms of COVID-19 during pandemic environment using smart spectacle thermal images and deep capsule networks
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4475-4501页
作者: Dwarakanath, B. Pandimurugan, V. Mohandas, R. Sambath, M. Baiju, B.V. Chinnasamy, A. SRM Institute of Science and Technology Ramapuram Chennai India Networking and Communications School of Computing SRMIST kattankulathur Chennai India Computational Intelligence School of Computing SRMIST kattankulathur Chennai India Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India School of Computer Science and Engineering Vellore Institute of Technology Vellore India Department of Data Science and Business Systems School of Computing SRMIST kattankulathur Chennai India
The pandemic creates a more complicated providence of medical assistance and diagnosis procedures. In the world, Covid-19, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS Cov-2), and plague are widely known... 详细信息
来源: 评论
STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2666-2681页
作者: Liu, Renyang Lam, Kwok-Yan Zhou, Wei Wu, Sixing Zhao, Jun Hu, Dongting Gong, Mingming Yunnan University School of Information Science and Engineering Kunming650500 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Yunnan University School of Software Engineering Research Center of Cyberspace Kunming650500 China University of Melbourne Melbourne Centre for Data Science School of Mathematics and Statistics ParkvilleVIC3010 Australia
Extensive studies have revealed that deep neural networks (DNNs) are vulnerable to adversarial attacks, especially black-box ones, which can heavily threaten the DNNs deployed in the real world. Many attack techniques... 详细信息
来源: 评论
Cost-Effective Edge data Caching with Failure Tolerance and Popularity Awareness
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5357-5369页
作者: Luo, Ruikun Zhang, Zujia He, Qiang Xu, Mengxi Chen, Feifei Dai, Xiaohai Wu, Song Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology China Deakin University School of Information Technology GeelongVIC3125 Australia
In the mobile edge computing environment, caching data in edge storage systems can significantly reduce data retrieval latency for users while saving the costs incurred by cloud-edge data transmissions for app vendors... 详细信息
来源: 评论
A HIGH ORDER SCHEME FOR FRACTIONAL DIFFERENTIAL EQUATIONS WITH THE CAPUTO-HADAMARD DERIVATIVE
收藏 引用
Journal of Computational Mathematics 2025年 第3期43卷 615-640页
作者: Xingyang Ye Junying Cao Chuanju Xu School of Science Jimei UniversityXiamen 361021China School of Data Science and Information Engineering Guizhou Minzu UniversityGuiyang 550025China School of Mathematical Sciences and Fujian Provincial Key Laboratory of Mathematical Modeling and High Performance Scientific Computing Xiamen UniversityXiamen 361005China
In this paper,we consider numerical solutions of the fractional diffusion equation with theαorder time fractional derivative defined in the Caputo-Hadamard sense.A high order time-stepping scheme is constructed,analy... 详细信息
来源: 评论
Retrieval-Augmented Fine-Tuning for Improving Retrieve-and-Edit Based Assertion Generation
收藏 引用
IEEE Transactions on Software engineering 2025年 第05期51卷 1591-1614页
作者: Li, Hongyan Sun, Weifeng Yan, Meng Xu, Ling Li, Qiang Zhang, Xiaohong Zhang, Hongyu Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education Chongqing400044 China School of Big Data and Software Engineering Chongqing University Chongqing400044 China
Unit Testing is crucial in software development and maintenance, aiming to verify that the implemented functionality is consistent with the expected functionality. A unit test is composed of two parts: a test prefix, ... 详细信息
来源: 评论
Reasoning with Trees: Faithful Question Answering over Knowledge Graph  31
Reasoning with Trees: Faithful Question Answering over Knowl...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Shen, Tiesunlong Wang, Jin Zhang, Xuejie Cambria, Erik School of Information Science and Engineering Yunnan University Kunming China College of Computing and Data Science Nanyang Technological University Singapore
Recent advancements in large language models (LLMs) have shown remarkable progress in reasoning capabilities, yet they still face challenges in complex, multi-step reasoning tasks. This study introduces Reasoning with... 详细信息
来源: 评论