咨询与建议

限定检索结果

文献类型

  • 6,177 篇 会议
  • 5,177 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,400 篇 工学
    • 5,325 篇 计算机科学与技术...
    • 4,384 篇 软件工程
    • 1,744 篇 信息与通信工程
    • 1,063 篇 控制科学与工程
    • 900 篇 生物工程
    • 868 篇 电气工程
    • 679 篇 电子科学与技术(可...
    • 600 篇 生物医学工程(可授...
    • 551 篇 光学工程
    • 538 篇 机械工程
    • 366 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 318 篇 动力工程及工程热...
    • 314 篇 网络空间安全
    • 264 篇 交通运输工程
    • 249 篇 安全科学与工程
  • 4,098 篇 理学
    • 2,037 篇 数学
    • 1,293 篇 物理学
    • 1,008 篇 生物学
    • 683 篇 统计学(可授理学、...
    • 415 篇 系统科学
    • 376 篇 化学
  • 2,055 篇 管理学
    • 1,213 篇 管理科学与工程(可...
    • 920 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 610 篇 医学
    • 526 篇 临床医学
    • 463 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 392 篇 法学
    • 306 篇 社会学
  • 188 篇 经济学
  • 155 篇 教育学
  • 141 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 303 篇 deep learning
  • 266 篇 feature extracti...
  • 261 篇 machine learning
  • 224 篇 computational mo...
  • 213 篇 accuracy
  • 190 篇 semantics
  • 175 篇 predictive model...
  • 174 篇 internet of thin...
  • 167 篇 training
  • 150 篇 real-time system...
  • 117 篇 data mining
  • 115 篇 artificial intel...
  • 114 篇 support vector m...
  • 113 篇 neural networks
  • 113 篇 optimization
  • 113 篇 security
  • 106 篇 computer science
  • 96 篇 visualization
  • 93 篇 cloud computing
  • 92 篇 federated learni...

机构

  • 172 篇 university of ch...
  • 123 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 96 篇 hebei normal uni...
  • 96 篇 school of comput...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 88 篇 school of comput...
  • 87 篇 department of ph...
  • 77 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 school of inform...
  • 55 篇 school of comput...
  • 55 篇 school of physic...
  • 54 篇 institute for nu...
  • 53 篇 school of comput...
  • 52 篇 college of compu...
  • 52 篇 college of intel...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 bastieri d.
  • 74 篇 jiang k.
  • 69 篇 kuleshov d.
  • 68 篇 li xin
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 li cheng
  • 64 篇 liu b.
  • 62 篇 guo y.q.
  • 60 篇 min z.
  • 60 篇 bao y.w.
  • 60 篇 hu h.b.
  • 58 篇 liu h.d.

语言

  • 9,607 篇 英文
  • 1,742 篇 其他
  • 130 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11479 条 记 录,以下是831-840 订阅
排序:
EPIMR:Prediction of Enhancer-Promoter Interactions by Multi-Scale ResNet on Image Representation
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 668-681页
作者: Qiaozhen Meng Yinuo Lyu Xiaoqing Peng Junhai Xu Jijun Tang Fei Guo School of Computer Science and Technology College of Intelligence and ComputingTianjin UniversityTianjin 300350China Aeronautical Information Service Center of the Civil Aviation Administration of China(AISC.ATMB.CAAC) Beijing 100015China Center for Medical Genetics&Hunan Key Laboratory of Medical Genetics School of Life SciencesCentral South UniversityChangsha 410038China Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518000China School of Computer Science and Engineering Central South UniversityChangsha 410083China
Prediction of enhancer-promoter interactions(EPIs)is key to regulating gene expression and diagnosing genetic *** to limited resolution,biological experiments perform not as well as expected while precisely identifyin... 详细信息
来源: 评论
Lattice-based group encryptions with only one trapdoor
收藏 引用
science China(information sciences) 2022年 第5期65卷 205-222页
作者: Jing PAN Jiang ZHANG Fangguo ZHANG Xiaofeng CHEN Willy SUSILO State Key Laboratory of Integrated Service Networks(ISN) Xidian University State Key Laboratory of Cryptology School of Computer Science and Engineering Sun Yat-sen University Guangdong Key Laboratory of Information Security Institute of Cybersecurity and Cryptology School of Computing and Information TechnologyUniversity of Wollongong
Group encryption(GE), the encryption analog of group signatures, is a fundamental primitive that offers a privacy-preserving service for a specific receiver concealed within a group of certified *** other cryptographi... 详细信息
来源: 评论
A survey on deep learning for polyp segmentation: techniques, challenges and future trends
收藏 引用
Visual Intelligence 2025年 第1期3卷 1-20页
作者: Mei, Jiaxin Zhou, Tao Huang, Kaiwen Zhang, Yizhe Zhou, Yi Wu, Ye Fu, Huazhu PCA Lab Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Institute of High Performance Computing A*STAR Singapore Singapore
Early detection and assessment of polyps play a crucial role in the prevention and treatment of colorectal cancer (CRC). Polyp segmentation provides an effective solution to assist clinicians in accurately locating an... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
MACRO: Incentivizing Multi-Leader Game-Based Pareto-Efficient Crowdsourcing for Video Analytics  40
MACRO: Incentivizing Multi-Leader Game-Based Pareto-Efficien...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Chen, Yu Zhang, Sheng Zhou, Ziying Wang, Xiaokun Liang, Yu Chen, Ning Yan, Yuting Xiao, Mingjun Wu, Jie Qian, Zhuzhong Xu, Harry Nanjing University State Key Lab. for Novel Software Technology China School of Systems Science Beijing Normal University China School of Computer and Electronic Information School of Artificial Intelligence Nanjing Normal University China School of Computer Science and Technology University of Science and Technology of China China Temple University Center for Networked Computing United States Samueli School of Engineering University of California Computer Science Department Los Angeles United States
In recent years, many crowdsourcing platforms have emerged, using the resources of recruited workers to perform diverse outsourcing tasks, where the video analytics attracts much attention due to its practical implica... 详细信息
来源: 评论
A Modified Feature Selection Algorithm for Intrusion Detection System Based on Student Psychology-Based Optimization with Explainable AI
A Modified Feature Selection Algorithm for Intrusion Detecti...
收藏 引用
2023 IEEE Asia-Pacific Conference on Computer science and Data Engineering, CSDE 2023
作者: Evan, Md. Raisul Islam Motiur Rahman, Mohammad Tanzir Mehedi, Sk. Nazib, Abdullah Islam, Rafiqul Rahman, Ziaur Mawlana Bhashani Science and Technology University Computer Science and Engineering Tangail1902 Bangladesh Mawlana Bhashani Science and Technology University Information and Communication Technology Tangail1902 Bangladesh School of Electrical Engineering and Robotics Queensland University of Technology BrisbaneQLD Australia School of Computing Mathematics and Engineering Charles Sturt University Bathurst Australia School of Computer Science Queensland University of Technology BrisbaneQLD Australia
Intrusion Detection Systems (IDS) play a vital role in safeguarding network security by monitoring and identifying both normal and intrusive activities. However, constructing an effective IDS from extensive datasets p... 详细信息
来源: 评论
Face Identification Method Using Scale Invariant Feature Transform Method for Criminal Management System  4
Face Identification Method Using Scale Invariant Feature Tra...
收藏 引用
4th International Conference on Smart Electronics and Communication, ICOSEC 2023
作者: Maragatharajan, M. Sudhan, M.B. Sathishkumar, L. Suprakash, S. Balakannan, S.P. School of Computing Science and Engineering Vit Bhopal University Madhya Pradesh Kothrikalan India Srm Institute of Science and Technology Chennai India Kalasalingam Academy of Research and Education Department of Information Technology Tamilnadu Krishnankoil India
Due to growing crime rates in India, big data for criminal records has increased more than ever. The increased database has resulted in slower detection and identification of pre-existing criminals for related crimes.... 详细信息
来源: 评论
Retrievable Image Encryption Based on Adaptive Block Compressed Sensing
Retrievable Image Encryption Based on Adaptive Block Compres...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2023
作者: Fang, Jiuchuan Zhao, Hui Zheng, Mingwen Wang, Zijian Niu, Sijie Gao, Xizhan Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan250022 China School of Mathematics and Statistics Shandong University of Technology Zibo255000 China
The increasing popularity of the internet and mobile devices, cloud storage has emerged as a popular storage method. However, because data carries a lot of information, untrustworthy servers can access users’ private... 详细信息
来源: 评论
Air Quality Prediction Using Adaboost
Air Quality Prediction Using Adaboost
收藏 引用
2023 Intelligent computing and Control for Engineering and Business Systems, ICCEBS 2023
作者: Thamizhselvi, D. Kasi, Baskar Kamalakkannan, K. Bharath, S. Gowtham, S. Kishore, M.A. Sri Sairam Engineering College Department of Information Technology Chennai India School of Computing Science and Engineering Galgotias University Greater Noida India Srm Institute of Science and Technology Department of Automobile Engineering Chennai India
The survival of human beings is contingent upon the presence of air. The detrimental impact of contemporary culture on air quality is seen in nearly all regions. Pollution of the environment is caused by activities in... 详细信息
来源: 评论
A Web 3.0 Integrated Blockchain Enabled Access System Augmented by Meta-Heuristic Cognitive Learning Framework for Mitigating Threats in IoT Enabled Consumer Electronic Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1201-1210页
作者: Aruna, Etikala Sahayadhas, Arun Kalpana, Ponugoti Khan, Surbhi B. Quasim, Tabrez Almusharrf, Ahlam VELS Institute of Science Technology and Advanced Studies Department of Computer Science and Engineering Pallavaram Chennai India AVN Institute of Engineering and Technology Department of Computer Science and Engineering Hyderabad501510 India University of Salford School of Science Engineering and Environment SalfordM5 4WT United Kingdom Chandigarh University University Centre for Research and Development Mohali India Chitkara University Centre for Research Impact and Outcome India University of Bisha College of Computing and Information Technology Department of Computer Science and Artificial Intelligence Bisha Saudi Arabia King Khalid Univeersity Saudi Arabia
Consumer Electronic Devices have become an open network model because of the infusion of the Internet of Things (IoT) and other communication technologies such as 5G/6G. Though these devices have provided the high-end... 详细信息
来源: 评论