咨询与建议

限定检索结果

文献类型

  • 2,156 篇 期刊文献
  • 1,718 篇 会议
  • 17 册 图书

馆藏范围

  • 3,891 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,583 篇 工学
    • 1,907 篇 计算机科学与技术...
    • 1,597 篇 软件工程
    • 630 篇 信息与通信工程
    • 423 篇 电气工程
    • 383 篇 生物工程
    • 331 篇 控制科学与工程
    • 250 篇 电子科学与技术(可...
    • 241 篇 生物医学工程(可授...
    • 234 篇 光学工程
    • 159 篇 机械工程
    • 127 篇 交通运输工程
    • 126 篇 化学工程与技术
    • 113 篇 网络空间安全
    • 105 篇 动力工程及工程热...
    • 96 篇 仪器科学与技术
    • 96 篇 安全科学与工程
  • 1,425 篇 理学
    • 737 篇 数学
    • 434 篇 生物学
    • 349 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 134 篇 化学
    • 134 篇 系统科学
  • 750 篇 管理学
    • 471 篇 管理科学与工程(可...
    • 326 篇 图书情报与档案管...
    • 225 篇 工商管理
  • 256 篇 医学
    • 217 篇 临床医学
    • 192 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 119 篇 法学
    • 99 篇 社会学
  • 76 篇 经济学
  • 51 篇 农学
  • 38 篇 教育学
  • 8 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 127 篇 deep learning
  • 123 篇 accuracy
  • 110 篇 machine learning
  • 101 篇 feature extracti...
  • 93 篇 semantics
  • 91 篇 training
  • 90 篇 computational mo...
  • 75 篇 data models
  • 68 篇 internet of thin...
  • 66 篇 real-time system...
  • 65 篇 predictive model...
  • 62 篇 convolutional ne...
  • 54 篇 federated learni...
  • 53 篇 reinforcement le...
  • 46 篇 artificial intel...
  • 45 篇 graph neural net...
  • 44 篇 deep neural netw...
  • 44 篇 data mining
  • 41 篇 optimization
  • 39 篇 convolution

机构

  • 155 篇 college of compu...
  • 102 篇 national enginee...
  • 100 篇 beijing advanced...
  • 76 篇 nanyang technolo...
  • 67 篇 school of comput...
  • 55 篇 national enginee...
  • 48 篇 school of comput...
  • 47 篇 school of big da...
  • 44 篇 school of comput...
  • 41 篇 school of cyber ...
  • 36 篇 national enginee...
  • 34 篇 university of ch...
  • 32 篇 college of intel...
  • 32 篇 school of comput...
  • 30 篇 school of data a...
  • 30 篇 hubei engineerin...
  • 29 篇 college of compu...
  • 29 篇 school of data s...
  • 29 篇 services computi...
  • 29 篇 the college of c...

作者

  • 155 篇 niyato dusit
  • 108 篇 hai jin
  • 103 篇 jin hai
  • 31 篇 xiaofei liao
  • 31 篇 kang jiawen
  • 25 篇 li jianxin
  • 25 篇 shen linlin
  • 24 篇 rajeswari d.
  • 23 篇 tao dacheng
  • 23 篇 hu shengshan
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 20 篇 sun geng
  • 19 篇 li tianrui
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 19 篇 liao xiaofei
  • 19 篇 du hongyang
  • 18 篇 dusit niyato
  • 18 篇 wang jiacheng

语言

  • 3,525 篇 英文
  • 341 篇 其他
  • 33 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3891 条 记 录,以下是11-20 订阅
排序:
Reasoning with Trees: Faithful Question Answering over Knowledge Graph  31
Reasoning with Trees: Faithful Question Answering over Knowl...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Shen, Tiesunlong Wang, Jin Zhang, Xuejie Cambria, Erik School of Information Science and Engineering Yunnan University Kunming China College of Computing and Data Science Nanyang Technological University Singapore
Recent advancements in large language models (LLMs) have shown remarkable progress in reasoning capabilities, yet they still face challenges in complex, multi-step reasoning tasks. This study introduces Reasoning with... 详细信息
来源: 评论
Feature Contrast Difference and Enhanced Network for RGB-D Indoor Scene Classification in Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17610-17621页
作者: Zhou, Wujie Jian, Bitao Liu, Yuanyuan Zhejiang University of Science and Technology School of Information and Electronic Engineering Hangzhou310023 China China University of Geosciences School of Computer Science and Technology Wuhan430074 China Nanyang Technological University College of Computing and Data Science 308232 Singapore
The era of smart connectivity spawned by the Internet of Things (IoT) has made the need to achieve environmental perception and understanding of different scenarios increasingly urgent. Among the many scenarios, indoo... 详细信息
来源: 评论
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
A Comprehensive Survey of Floor Plan Image Analysis and Related Applications
收藏 引用
International Journal on Document Analysis and Recognition 2025年 1-19页
作者: Khade, Rasika Jariwala, Krupa Chattopadhyay, Chiranjoy Department of Computer Science and Engineering Sardar Vallabhbhai National Institute of Technology Surat Surat India School of Computing and Data Sciences FLAME University Pune India
This paper presents an in-depth exploration of architectural floor plan analysis through computational statistics, addressing the layout optimization and performance enhancement of buildings. Floor plans, which includ... 详细信息
来源: 评论
Machine learning empowered UAV-based beamforming design in ISAC systems
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 285-286页
作者: Xiangyang DUAN Xiaoqi ZHANG Shuqiang XIA Zhongbin WANG Yihua MA Weijie YUAN State Key Laboratory of Mobile Network and Mobile Multimedia Technology Wireless and Computing Research InstituteZTE Corporation School of Electrical and Data Engineering University of Technology Sydney School of Automation and Intelligent Manufacturing Southern University of Science and Technology
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
来源: 评论
Successive Interference Cancellation-Enabled Timely Status Update in Linear Multi-Hop Wireless Networks
收藏 引用
IEEE Transactions on Mobile computing 2025年 第6期24卷 5298-5311页
作者: Han, Xinhui Pan, Haoyuan Wang, Zhaorui Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Future Network of Intelligence Institute School of Science and Engineering Shenzhen518172 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology College of Computer Science and Software Engineering Shenzhen518060 China
We investigate the timely status update in linear multi-hop wireless networks, where a source tries to deliver status update packets to a destination through a sequence of half-duplex relays. Timeliness is measured by... 详细信息
来源: 评论
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation  29
The Evolution of Zero Trust Architecture (ZTA) from Concept ...
收藏 引用
29th International Conference on Information Technology, IT 2025
作者: Nasiruzzaman, Md Ali, Maaruf Salam, Iftekhar Miraz, Mahdi H. Xiamen University Malaysia School of Computing and Data Science Malaysia Universiteti Metropolitan Tirana Faculty of Computer Science and IT Albania The Doctoral College United Kingdom Xiamen University Malaysia Mahdi H. Miraz Is with the School of Computing and Data Science Malaysia Wrexham University School of Computing Faculty of Arts Science and Technology United Kingdom University of South Wales Faculty of Computing Engineering and Science United Kingdom
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases...
来源: 评论
Adaptive sail fish optimizer based optimized region selection for robust video steganography
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第4期17卷 2417-2427页
作者: Babu, J. Suresh Niranjana, G. Ramana, Kadiyala Department of Computing Science & Engineering School of Computing College of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur Chengalpattu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Chengalpattu India Department of Artificial Intelligence and Data Science Chaitanya Bharathi Institute of Technology (Autonomous) Hyderabad India
Securing data transmission in a digital era is a difficult one due to the broad application of the Internet, personal computers, and mobile phones for communication. Traditional video steganography techniques sometime... 详细信息
来源: 评论
Correction to: Consistent Prompt Tuning for Generalized Category Discovery (International Journal of Computer Vision, (2025), 10.1007/s11263-024-02343-w)
收藏 引用
International Journal of Computer Vision 2025年 1-10页
作者: Yang, Muli Yin, Jie Gu, Yanan Deng, Cheng Zhang, Hanwang Zhu, Hongyuan Singapore Singapore School of Electronic Engineering Xidian University Xi’an China Norinco Group Testing and Research Institute Xi’an China College of Computing and Data Science Nanyang Technological University Singapore Singapore
The original publication of this article was published with several errors and has been corrected as follows. In the Section 4.3.1, the hyperlink for the Section 5 citation was missing and has been included. In Table ...
来源: 评论
Artificial intelligence algorithms for object detection and recognition in video and images
收藏 引用
Multimedia Tools and Applications 2025年 1-18页
作者: Dakshinamoorthy, Prabakar Rajaram, Gnanajeyaraman garg, Shruti Murugan, Prabhu Manimaran, A. Sundar, Ramesh Department of Data Science and Business System School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur Chennai India Department of Computer Science Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Chennai India Birla Institute of Technology Mesra Ranchi India Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai602105 India Department of Computer Science Engineering Saveetha School Of EngineeringSaveetha Institute of Medical and Technical Sciences Chennai6021055 India Department of Netwoking and Communication School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur Chennai India
The usage of machine learning and deep learning algorithms have necessitated Artificial Intelligence'. AI is aimed at automating things by limiting human interference. It is widely used in IT, healthcare, finance,... 详细信息
来源: 评论