咨询与建议

限定检索结果

文献类型

  • 2,274 篇 会议
  • 1,443 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,367 篇 工学
    • 1,858 篇 计算机科学与技术...
    • 1,532 篇 软件工程
    • 507 篇 信息与通信工程
    • 304 篇 控制科学与工程
    • 289 篇 生物工程
    • 238 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 154 篇 电子科学与技术(可...
    • 144 篇 机械工程
    • 141 篇 光学工程
    • 91 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 84 篇 安全科学与工程
    • 83 篇 网络空间安全
    • 77 篇 交通运输工程
  • 1,093 篇 理学
    • 606 篇 数学
    • 310 篇 生物学
    • 245 篇 物理学
    • 193 篇 统计学(可授理学、...
    • 116 篇 系统科学
    • 100 篇 化学
  • 725 篇 管理学
    • 447 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 161 篇 医学
    • 144 篇 临床医学
    • 127 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
  • 95 篇 法学
  • 74 篇 教育学
    • 71 篇 教育学
  • 73 篇 经济学
    • 72 篇 应用经济学
  • 29 篇 农学
  • 12 篇 艺术学
  • 11 篇 军事学
  • 7 篇 文学
  • 1 篇 哲学

主题

  • 121 篇 software enginee...
  • 99 篇 training
  • 93 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 computational mo...
  • 77 篇 deep learning
  • 67 篇 machine learning
  • 65 篇 data models
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 data mining
  • 55 篇 cloud computing
  • 51 篇 computer science
  • 50 篇 predictive model...
  • 48 篇 optimization
  • 48 篇 security
  • 46 篇 computer archite...
  • 46 篇 visualization
  • 45 篇 internet of thin...
  • 43 篇 federated learni...

机构

  • 98 篇 college of compu...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 52 篇 institute of com...
  • 50 篇 school of softwa...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 42 篇 national enginee...
  • 40 篇 state key labora...
  • 38 篇 school of comput...
  • 38 篇 school of softwa...
  • 35 篇 college of intel...
  • 35 篇 school of softwa...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of softwa...
  • 30 篇 school of softwa...
  • 30 篇 school of softwa...
  • 30 篇 state key labora...

作者

  • 33 篇 hung chih-cheng
  • 30 篇 xu yuanping
  • 29 篇 shen linlin
  • 24 篇 yuanping xu
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 21 篇 chaolong zhang
  • 21 篇 xiaofei wang
  • 21 篇 buyya rajkumar
  • 20 篇 chih-cheng hung
  • 19 篇 qi liu
  • 19 篇 xiaodong liu
  • 18 篇 xiuhua li
  • 18 篇 luo haiyong
  • 18 篇 zhijie xu
  • 18 篇 liu jianxun
  • 18 篇 zhang chaolong
  • 17 篇 tao dacheng
  • 17 篇 li tukun
  • 17 篇 muhammad adnan k...

语言

  • 3,600 篇 英文
  • 142 篇 其他
  • 34 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Software Engineering"
3771 条 记 录,以下是21-30 订阅
排序:
MACLSTM: A Weather Attributes Enabled Recurrent Approach to Appliance-Level Energy Consumption Forecasting
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 2969-2984页
作者: Ruoxin Li Shaoxiong Wu Fengping Deng Zhongli Tian Hua Cai Xiang Li Xu Xu Qi Liu NARI-TECH Nanjing Control System Co. Ltd.Nanjing211106China School of Software Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044China
Studies to enhance the management of electrical energy have gained considerable momentum in recent years. The question of how much energy will be needed in households is a pressing issue as it allows the management pl... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Semantic Similarity-Based Graph Contrastive Learning for Recommender System  25th
Semantic Similarity-Based Graph Contrastive Learning for Re...
收藏 引用
25th International Conference on Web Information Systems engineering, WISE 2024
作者: Tu, Longchuan Meng, Shunmei Liu, Xiao Liu, Guanfeng Beheshti, Amin Zhang, Xuyun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjin China State Key Laboratory for Novel Software Technology Nanjing University Nanjin China School of Computing Macquarie University Sydney Australia
Recently, graph neural networks(GNNs) have played a key crucial in many recommendation situations. In particular, contrastive learning-based hypergraph neural networks (HGNNs) are gradually becoming a research focus f... 详细信息
来源: 评论
An examination of critical factors influencing consumers' behavior in live streaming e-commerce  24
An examination of critical factors influencing consumers' be...
收藏 引用
5th International Conference on Computer Science and Management Technology, ICCSMT 2024
作者: Chen, Jian Sun, Wenying Zhao, Wenjin School of Software Engineering Chengdu University of Information Technology Sichuan Chengdu China Cox School of Business Southern Methodist University Dallas United States School of Computing and Artificial Intelligence Southwestern University of Finance and Economics Sichuan Chengdu China
The rapid development of live streaming e-commerce calls for a deeper understanding of the factors influencing consumer *** paper uses web crawling to gather data, combining Latent Dirichlet Allocation (LDA) and word ... 详细信息
来源: 评论
MLPFormer: MLP-integrated transformer for colorectal histopathology whole slide image segmentation
收藏 引用
Neural computing and Applications 2025年 第6期37卷 4651-4661页
作者: Wang, Yuxuan Li, Dan Li, Xuechen Guo, Yan Zuo, Yanfei Shen, Linlin Department of Computer Science Wenzhou-Kean University Wenzhou China School of Electronics and Information Engineering Wuyi University Jiangmen China Department of Histo Pathology Shanghai Histo Pathology Diagnostic Center Shanghai China College of Computer Sicence and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif... 详细信息
来源: 评论
Differential-Trust-Mechanism Based Trade-off Method Between Privacy and Accuracy in Recommender Systems
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5054-5068页
作者: Xu, Guangquan Feng, Shicheng Xi, Hao Yan, Qingyang Li, Wenshan Wang, Cong Wang, Wei Liu, Shaoying Tian, Zhihong Zheng, Xi Qingdao Huanghai University School of Big Data Qingdao China Tianjin University College of Intelligence and Computing Tianjin300350 China KLISS and School of Software Beijing100084 China Sichuan University School of Cyber Science and Engineering Chengdu610207 China Xi’an Jiaotong University School of Cyber Science and Engineering Xi’an710049 China East China Normal University Shanghai200062 China Hiroshima University School of Informatics and Data Science Higashihiroshima739-8511 Japan Guangzhou University Cyberspace Institute of Advanced Technology Guangdong Key Laboratory of Industrial Control System Security Huangpu Research School of Guangzhou University China Macquarie University School of Computing SydneyNSW2109 Australia
In the era where Web3.0 values data security and privacy, adopting groundbreaking methods to enhance privacy in recommender systems is crucial. Recommender systems need to balance privacy and accuracy, while also havi... 详细信息
来源: 评论
The Impact of Transformer Models and Regression Algorithms on Automated Short Answer Grading  5
The Impact of Transformer Models and Regression Algorithms o...
收藏 引用
5th IEEE International Conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Nampoothiri, Abhijith. N. Thushara, M.G. Pradeesh, N. Anand Krishna, K.R. Santhosh, Abhai Abhijith Kumar, S. Kumar, Suryan Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Applications Amritapuri India Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India Omnex Software Solutions Pvt. Ltd Thoraipakkam Chennai India
Grading short answer questions in higher education often poses significant challenges due to its subjective nature and time-consuming process. As educational institutions expand, the need for efficient and objective g... 详细信息
来源: 评论
Metamorphic Relation Patterns for Metamorphic Testing, Exploration and Robustness
Metamorphic Relation Patterns for Metamorphic Testing, Explo...
收藏 引用
作者: Ying, Zhihao Towey, Dave Bellotti, Anthony Chua, Caslon Quan Zhou, Zhi School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Department of Computer Science and Software Engineering Swinburne University of Technology HawthornVIC Australia School of Computing and Information Technology University of Wollongong WollongongNSW Australia
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论