咨询与建议

限定检索结果

文献类型

  • 2,274 篇 会议
  • 1,443 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,367 篇 工学
    • 1,858 篇 计算机科学与技术...
    • 1,532 篇 软件工程
    • 507 篇 信息与通信工程
    • 304 篇 控制科学与工程
    • 289 篇 生物工程
    • 238 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 154 篇 电子科学与技术(可...
    • 144 篇 机械工程
    • 141 篇 光学工程
    • 91 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 84 篇 安全科学与工程
    • 83 篇 网络空间安全
    • 77 篇 交通运输工程
  • 1,093 篇 理学
    • 606 篇 数学
    • 310 篇 生物学
    • 245 篇 物理学
    • 193 篇 统计学(可授理学、...
    • 116 篇 系统科学
    • 100 篇 化学
  • 725 篇 管理学
    • 447 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 161 篇 医学
    • 144 篇 临床医学
    • 127 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
  • 95 篇 法学
  • 74 篇 教育学
    • 71 篇 教育学
  • 73 篇 经济学
    • 72 篇 应用经济学
  • 29 篇 农学
  • 12 篇 艺术学
  • 11 篇 军事学
  • 7 篇 文学
  • 1 篇 哲学

主题

  • 121 篇 software enginee...
  • 99 篇 training
  • 93 篇 semantics
  • 90 篇 feature extracti...
  • 89 篇 computational mo...
  • 77 篇 deep learning
  • 67 篇 machine learning
  • 65 篇 data models
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 data mining
  • 55 篇 cloud computing
  • 51 篇 computer science
  • 50 篇 predictive model...
  • 48 篇 optimization
  • 48 篇 security
  • 46 篇 computer archite...
  • 46 篇 visualization
  • 45 篇 internet of thin...
  • 43 篇 federated learni...

机构

  • 98 篇 college of compu...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 52 篇 institute of com...
  • 50 篇 school of softwa...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 42 篇 national enginee...
  • 40 篇 state key labora...
  • 38 篇 school of comput...
  • 38 篇 school of softwa...
  • 35 篇 college of intel...
  • 35 篇 school of softwa...
  • 34 篇 department of co...
  • 33 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of softwa...
  • 30 篇 school of softwa...
  • 30 篇 school of softwa...
  • 30 篇 state key labora...

作者

  • 33 篇 hung chih-cheng
  • 30 篇 xu yuanping
  • 29 篇 shen linlin
  • 24 篇 yuanping xu
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 21 篇 chaolong zhang
  • 21 篇 xiaofei wang
  • 21 篇 buyya rajkumar
  • 20 篇 chih-cheng hung
  • 19 篇 qi liu
  • 19 篇 xiaodong liu
  • 18 篇 xiuhua li
  • 18 篇 luo haiyong
  • 18 篇 zhijie xu
  • 18 篇 liu jianxun
  • 18 篇 zhang chaolong
  • 17 篇 tao dacheng
  • 17 篇 li tukun
  • 17 篇 muhammad adnan k...

语言

  • 3,600 篇 英文
  • 142 篇 其他
  • 34 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=School of Computing and Software Engineering"
3771 条 记 录,以下是61-70 订阅
排序:
Dynamic Communications Network Linking Prediction by Disseminating Event Embedding
Dynamic Communications Network Linking Prediction by Dissemi...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Cheng, Han Li, Qian Cui, Zhihong Liu, Shijun Pan, Li Shandong University School of Software Jinan China Curtin University School of Electrical Engineering Computing and Mathematical Sciences Perth Australia
Communication networks represent communication between entities like social networks and microservice call graphs of microservice systems. Link prediction is useful in various communication network service systems suc... 详细信息
来源: 评论
FBI-Net: Frequency Band Integration Network for Infrared Small Target Segmentation
FBI-Net: Frequency Band Integration Network for Infrared Sma...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Xin, Biqiao Li, Qiang Mao, Qianchen Wang, Jinbao Wang, Bingshu School of Software Northwestern Polytechnical University Xi'an China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Small targets in infrared imagery exhibit challenging characteristics due to their minimal semantic information and the extremely imbalanced distribution between the targets and the background. In this paper, we propo... 详细信息
来源: 评论
Image Tampering Detection With Frequency-Aware Attention and Multiview Fusion
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 614-625页
作者: Xu, Xu Chen, Junxin Lv, Wenrui Wang, Wei Zhang, Yushu Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China
Manipulated images are flooding our daily lives, which poses a threat to social security. Recently, many studies have focused on image tampering detection. However, they have poor performance on independent validation... 详细信息
来源: 评论
Enhancing Topic Interpretability for Neural Topic Modeling Through Topic-Wise Contrastive Learning  40
Enhancing Topic Interpretability for Neural Topic Modeling T...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Gao, Xin Lin, Yang Li, Ruiqing Wang, Yasha Chu, Xu Ma, Xinyu Yu, Hailong Software Engineering Institution School of Computer Science Peking University Beijing China Key Lab of High Confidence Software Technologies Ministry of Education Beijing China Peking University National Engineering Research Center of Software Engineering Beijing China School of Computer Science Center on Frontiers of Computing Studies Peking University China
Data mining and knowledge discovery are essential aspects of extracting valuable insights from vast datasets. Neural topic models (NTMs) have emerged as a valuable unsupervised tool in this field. However, the predomi... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
SyNet:Medical image anomaly detection with noise synthesis network  10
SyNet:Medical image anomaly detection with noise synthesis n...
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Liu, Jingnian Liang, Wei Chen, Yuxiang Jin, Kai Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtang China
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv... 详细信息
来源: 评论
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4243-4262页
作者: Youseef Alotaibi B.Rajasekar R.Jayalakshmi Surendran Rajendran Department of Software Engineering College of ComputingUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Electronics and Communication Engineering Sathyabama Institute of Science and TechnologyChennai600119India Department of Computer Science and Engineering Panimalar Engineering CollegeChennai600123India Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical ScienceChennai602105India
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experie... 详细信息
来源: 评论
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of Computer Science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15545-15557页
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论
Designing an Automatic Sentence based Parsing for Ge'ez Sentences
Designing an Automatic Sentence based Parsing for Ge'ez Sent...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Getahun, Mebit Kefale Yayeh Munaye, Yirga Admass, Wasyihun Asmare, Habtamu Shiferaw Faculty of Computing Mekdela Amba University Mekdela Ethiopia College of Computing Injibara University Injibara Ethiopia School of Software Engineering University of Science and Technology of China Hefei China College of Computing Mekdela Amba University Mekdela Ethiopia
This study addresses the need for parsing tools in Ge'ez natural language processing (NLP) systems. Parsing breaks down sentences into their component parts (words and phrases) and assigns grammatical roles. This ... 详细信息
来源: 评论