咨询与建议

限定检索结果

文献类型

  • 2,143 篇 期刊文献
  • 1,786 篇 会议
  • 17 册 图书

馆藏范围

  • 3,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,606 篇 工学
    • 1,921 篇 计算机科学与技术...
    • 1,612 篇 软件工程
    • 628 篇 信息与通信工程
    • 391 篇 电气工程
    • 383 篇 生物工程
    • 334 篇 控制科学与工程
    • 245 篇 电子科学与技术(可...
    • 245 篇 生物医学工程(可授...
    • 241 篇 光学工程
    • 150 篇 机械工程
    • 122 篇 化学工程与技术
    • 117 篇 交通运输工程
    • 105 篇 网络空间安全
    • 103 篇 动力工程及工程热...
    • 97 篇 仪器科学与技术
    • 90 篇 安全科学与工程
  • 1,419 篇 理学
    • 726 篇 数学
    • 434 篇 生物学
    • 354 篇 物理学
    • 254 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 135 篇 化学
  • 747 篇 管理学
    • 467 篇 管理科学与工程(可...
    • 323 篇 图书情报与档案管...
    • 224 篇 工商管理
  • 257 篇 医学
    • 220 篇 临床医学
    • 193 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
    • 106 篇 药学(可授医学、理...
  • 123 篇 法学
    • 100 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 40 篇 教育学
  • 7 篇 文学
  • 6 篇 军事学
  • 2 篇 艺术学

主题

  • 130 篇 deep learning
  • 122 篇 accuracy
  • 105 篇 machine learning
  • 104 篇 feature extracti...
  • 93 篇 semantics
  • 93 篇 training
  • 91 篇 computational mo...
  • 77 篇 data models
  • 70 篇 real-time system...
  • 69 篇 internet of thin...
  • 68 篇 predictive model...
  • 60 篇 convolutional ne...
  • 57 篇 federated learni...
  • 54 篇 reinforcement le...
  • 50 篇 graph neural net...
  • 47 篇 deep neural netw...
  • 45 篇 data mining
  • 43 篇 optimization
  • 43 篇 artificial intel...
  • 40 篇 convolution

机构

  • 179 篇 college of compu...
  • 102 篇 national enginee...
  • 101 篇 beijing advanced...
  • 76 篇 nanyang technolo...
  • 69 篇 school of comput...
  • 63 篇 national enginee...
  • 50 篇 school of comput...
  • 49 篇 school of big da...
  • 46 篇 school of comput...
  • 44 篇 school of cyber ...
  • 39 篇 national enginee...
  • 35 篇 university of ch...
  • 33 篇 college of intel...
  • 33 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 services computi...
  • 32 篇 hubei engineerin...
  • 30 篇 school of data a...
  • 29 篇 school of comput...
  • 28 篇 hubei key labora...

作者

  • 161 篇 niyato dusit
  • 104 篇 hai jin
  • 94 篇 jin hai
  • 32 篇 kang jiawen
  • 31 篇 xiaofei liao
  • 27 篇 tao dacheng
  • 27 篇 shen linlin
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 sun geng
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 li tianrui
  • 21 篇 wang jiacheng
  • 20 篇 dusit niyato
  • 20 篇 du hongyang
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 18 篇 yang yang

语言

  • 3,425 篇 英文
  • 493 篇 其他
  • 33 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3946 条 记 录,以下是1191-1200 订阅
排序:
APSeg: Auto-Prompt Network for Cross-Domain Few-Shot Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: He, Weizhao Zhang, Yang Zhuo, Wei Shen, Linlin Yang, Jiaqi Deng, Songhe Sun, Liang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China School of Computer Science University of Nottingham China
Few-shot semantic segmentation (FSS) endeavors to segment unseen classes with only a few labeled samples. Current FSS methods are commonly built on the assumption that their training and application scenarios share si... 详细信息
来源: 评论
Towards Robust Cross-Domain Recommendation with Joint Identifiability of User Preference
arXiv
收藏 引用
arXiv 2024年
作者: Du, Jing Ye, Zesheng Guo, Bin Yu, Zhiwen Wu, Jia Yang, Jian Sheng, Michael Yao, Lina School of Computing Macquarie University SydneyNSW2109 Australia School of Computing and Information Systems University of Melbourne MelbourneVIC3052 Australia School of Computer Science Northwestern Polytechnical University Shaanxi Xi’an China Data 61 CSIRO SydneyNSW2122 Australia School of Computer Science and Engineering University of New South Wales SydneyNSW2015 Australia
Recent cross-domain recommendation (CDR) studies assume that disentangled domain-shared and domain-specific user representations can mitigate domain gaps and facilitate effective knowledge transfer. However, achieving... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
A Novel Multi-layered Minutiae Extractor Based on OCT Fingerprints  16th
A Novel Multi-layered Minutiae Extractor Based on OCT Finge...
收藏 引用
16th Chinese Conference on Biometric Recognition, CCBR 2022
作者: Zeng, Wenfeng Zhang, Wentian Liu, Feng Tan, Xu Li, Qin College of Computer Science and Software Engineering Shenzhen University Shenzhen China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Senzhen China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Software Engineering Shenzhen Institute of Information Technology Shenzhen China
Fingerprints of Optical Coherence Tomography (OCT) imaging provide 3D volume data which have the nature property of multi-layered tissue structure. This paper, for the first time, attempts to extract minutiae for OCT-... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
A General Optimization Framework for Tackling Distance Constraints in Movable Antenna-Aided Systems
arXiv
收藏 引用
arXiv 2025年
作者: Jin, Yichen Lin, Qingfeng Li, Yang Zhu, Hancheng Cheng, Bingyang Wu, Yik-Chung Zhang, Rui Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Shenzhen Research Institute of Big Data Shenzhen518172 China School of Computing and Information Technology Great Bay University Dongguan523000 China School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Guangdong Shenzhen518172 China Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore
The recently emerged movable antenna (MA) shows great promise in leveraging spatial degrees of freedom to enhance the performance of wireless systems. However, resource allocation in MA-aided systems faces challenges ... 详细信息
来源: 评论
Cooperative Channel Assignment for VANETs Based on Dual Reinforcement Learning
收藏 引用
Computers, Materials & Continua 2021年 第2期66卷 2127-2140页
作者: Xuting Duan Yuanhao Zhao Kunxian Zheng Daxin Tian Jianshan Zhou Jian Gao Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing100191China School of Transportation Science and Engineering Beihang UniversityBeijing100191China Department of Engineering and Design University of SussexBrightonBN19RHUK Research Institute of Highway Ministry of Transport Beijing100088China
Dynamic channel assignment(DCA)is significant for extending vehicular ad hoc network(VANET)capacity and mitigating ***,the un-known global state information and the lack of centralized control make channel assignment ... 详细信息
来源: 评论
X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System
arXiv
收藏 引用
arXiv 2024年
作者: Kaya, Kiymet Ak, Elif Bas, Sumeyye Canberk, Berk Oguducu, Sule Gunduz Istanbul Technical University Department of Computer Engineering Istanbul Turkey Istanbul Technical University Department of Artificial Intelligence and Data Engineering Istanbul Turkey BTS Group Istanbul Turkey School of Computing Engineering and Built Environment Edinburgh Napier University Edinburgh United Kingdom
The effectiveness of Intrusion Detection Systems (IDS) is critical in an era where cyber threats are becoming increasingly complex. Machine learning (ML) and deep learning (DL) models provide an efficient and accurate... 详细信息
来源: 评论
Routing over Best Links is not necessarily Better in Wireless Multi-hop Networks
Routing over Best Links is not necessarily Better in Wireles...
收藏 引用
International Workshop on Quality of Service
作者: Shutao Lu Wuyungerile Li Yintu Bao Alvin C. Valera Winston K.G. Seah Baoqi Huang Inner Mongolia Key Lab. of Wireless Networking & Mobile Computing Engineering Research Center of Ecological Big Data Ministry of Education School of Computer Science Inner Mongolia University Hohhot China School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
The conventional approach of choosing the best route to carry network traffic in wireless multi-hop networks does not maximize the overall network throughput and can lead to short-term instabilities in network state w... 详细信息
来源: 评论
A3-CodGen: A Repository-Level Code Generation Framework for Code Reuse with Local-Aware, Global-Aware, and Third-Party-Library-Aware
arXiv
收藏 引用
arXiv 2023年
作者: Liao, Dianshu Pan, Shidong Sun, Xiaoyu Ren, Xiaoxue Huang, Qing Xing, Zhenchang Jin, Huan Li, Qinying School of Computing Australian National University Australia School of Computer Information Engineering Jiangxi Normal University China CSIRO’s Data61 Australia State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China Jiangxi University of Technology China
LLM-based code generation tools are essential to help developers in the software development process. Existing tools often disconnect with the working context, i.e., the code repository, causing the generated code to ... 详细信息
来源: 评论