咨询与建议

限定检索结果

文献类型

  • 140,854 篇 会议
  • 71,067 篇 期刊文献
  • 1,474 册 图书
  • 1 篇 学位论文

馆藏范围

  • 213,395 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 129,319 篇 工学
    • 86,316 篇 计算机科学与技术...
    • 71,071 篇 软件工程
    • 31,287 篇 信息与通信工程
    • 20,083 篇 控制科学与工程
    • 16,560 篇 电气工程
    • 15,971 篇 电子科学与技术(可...
    • 15,089 篇 生物工程
    • 10,357 篇 生物医学工程(可授...
    • 10,281 篇 光学工程
    • 9,755 篇 机械工程
    • 7,165 篇 化学工程与技术
    • 7,001 篇 仪器科学与技术
    • 6,425 篇 动力工程及工程热...
    • 4,964 篇 材料科学与工程(可...
    • 4,648 篇 交通运输工程
    • 4,562 篇 安全科学与工程
    • 4,432 篇 网络空间安全
  • 71,159 篇 理学
    • 36,144 篇 数学
    • 21,576 篇 物理学
    • 16,868 篇 生物学
    • 11,914 篇 统计学(可授理学、...
    • 7,890 篇 系统科学
    • 7,621 篇 化学
  • 33,491 篇 管理学
    • 20,831 篇 管理科学与工程(可...
    • 13,951 篇 图书情报与档案管...
    • 9,095 篇 工商管理
  • 9,751 篇 医学
    • 7,986 篇 临床医学
    • 7,198 篇 基础医学(可授医学...
    • 4,472 篇 药学(可授医学、理...
  • 5,761 篇 法学
    • 4,761 篇 社会学
  • 3,530 篇 经济学
  • 2,506 篇 农学
  • 2,159 篇 教育学
  • 956 篇 文学
  • 494 篇 军事学
  • 362 篇 艺术学
  • 33 篇 哲学
  • 22 篇 历史学

主题

  • 6,150 篇 computer science
  • 5,195 篇 feature extracti...
  • 5,141 篇 accuracy
  • 4,678 篇 training
  • 4,618 篇 computational mo...
  • 4,493 篇 deep learning
  • 3,754 篇 machine learning
  • 2,923 篇 semantics
  • 2,902 篇 optimization
  • 2,860 篇 predictive model...
  • 2,586 篇 data models
  • 2,361 篇 neural networks
  • 2,341 篇 data mining
  • 2,318 篇 real-time system...
  • 2,288 篇 support vector m...
  • 2,117 篇 convolutional ne...
  • 2,106 篇 internet of thin...
  • 1,951 篇 artificial intel...
  • 1,889 篇 educational inst...
  • 1,861 篇 security

机构

  • 2,434 篇 school of comput...
  • 2,203 篇 school of comput...
  • 2,025 篇 school of comput...
  • 1,804 篇 school of comput...
  • 1,496 篇 school of comput...
  • 1,449 篇 school of comput...
  • 1,354 篇 school of electr...
  • 1,323 篇 school of comput...
  • 1,177 篇 school of comput...
  • 1,075 篇 cavendish labora...
  • 994 篇 school of comput...
  • 972 篇 department of ph...
  • 949 篇 school of comput...
  • 898 篇 school of comput...
  • 874 篇 physikalisches i...
  • 872 篇 oliver lodge lab...
  • 867 篇 university of ch...
  • 773 篇 school of cyber ...
  • 530 篇 school of comput...
  • 514 篇 horia hulubei na...

作者

  • 393 篇 niyato dusit
  • 266 篇 a. gomes
  • 258 篇 barter w.
  • 241 篇 c. alexa
  • 234 篇 j. m. izen
  • 233 篇 s. chen
  • 229 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 220 篇 bellee v.
  • 220 篇 boettcher t.
  • 217 篇 borsato m.
  • 213 篇 beiter a.
  • 213 篇 brundu d.
  • 212 篇 bencivenni g.
  • 210 篇 g. bella
  • 210 篇 bay a.
  • 207 篇 j. strandberg
  • 207 篇 c. amelung

语言

  • 202,645 篇 英文
  • 7,626 篇 其他
  • 3,101 篇 中文
  • 188 篇 日文
  • 57 篇 法文
  • 52 篇 德文
  • 38 篇 朝鲜文
  • 14 篇 荷兰文
  • 6 篇 西班牙文
  • 4 篇 斯洛文尼亚文
  • 3 篇 俄文
  • 2 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=School of Cyber Science and Engineering and School of Computer Science"
213396 条 记 录,以下是11-20 订阅
排序:
SSA: semantic structure aware inference on CNN networks for weakly pixel-wise dense predictions without cost
收藏 引用
Frontiers of computer science 2025年 第2期19卷 1-10页
作者: Yanpeng SUN Zechao LI School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210014China
The pixel-wise dense prediction tasks based on weakly supervisions currently use Class Attention Maps(CAMs)to generate pseudo masks as ***,existing methods often incorporate trainable modules to expand the immature cl... 详细信息
来源: 评论
Layered Temporal Spatial Graph Attention Reinforcement Learning for Multiplex Networked Industrial Chains Energy Management
收藏 引用
Tsinghua science and Technology 2025年 第2期30卷 528-542页
作者: Yuanshuang Jiang Kai Di Xingyu Wu Zhongjian Hu Fulin Chen Pan Li Yichuan Jiang School of Computer Science and Engineering Southeast UniversityNanjing 211189China School of Software Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristic... 详细信息
来源: 评论
Aligning enhanced feature representation for generalized zero-shot learning
收藏 引用
science China(Information sciences) 2025年 第2期68卷 74-88页
作者: Zhiyu FANG Xiaobin ZHU Chun YANG Hongyang ZHOU Jingyan QIN Xu-Cheng YIN School of Computer & Communication Engineering University of Science and Technology Beijing
Constructing an effective common latent embedding by aligning the latent spaces of cross-modal variational autoencoders(VAEs) is a popular strategy for generalized zero-shot learning(GZSL). However, due to the lac... 详细信息
来源: 评论
Multi-hop quantum teleportation based on HSES via GHZ-like states
收藏 引用
Chinese Physics B 2025年 第1期34卷 60-70页
作者: She-Xiang Jiang Xiao-Long Wei Jin-Huan Li Shuai-Shuai Li School of Computer Science and Engineering Anhui University of Science and TechnologyHuainan 232001China
Implementing quantum wireless multi-hop network communication is essential to improve the global quantum network system. In this paper, we employ eight-level GHZ states as quantum channels to realize multi-hop quantum... 详细信息
来源: 评论
TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2985-3004页
作者: Ming Liu Qichao Yang Wenqing Wang Shengli Liu School of Cyber Science and Technology Information Engineering UniversityZhengzhou450001China
The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable chall... 详细信息
来源: 评论
Quantifying Bytes:Understanding Practical Value of Data Assets in Federated Learning
收藏 引用
Tsinghua science and Technology 2025年 第1期30卷 135-147页
作者: Minghao Yao Saiyu Qi Zhen Tian Qian Li Yong Han Haihong Li Yong Qi School of Computer Science and Technology Xi’an Jiaotong UniversityXi’an 710049China School of Cyber Science and Engineering Xi’an Jiaotong UniversityXi’an 710049China
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive infor... 详细信息
来源: 评论
A metadata-aware detection model for fake restaurant reviews based on multimodal fusion
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 475-498页
作者: Jian, Yifei Chen, Xinyu Wang, Xiaoda Liu, Ying Chen, Xingshu Lan, Xiao Wang, Wenxian Wang, Haizhou School of Cyber Science and Engineering Sichuan University Chengdu China College of Computer Science Sichuan University Chengdu China Cyber Science Research Institute Sichuan University Chengdu China
Nowadays, online reviews have a significant impact on customers who purchase products or evaluate services, as well as merchants who do business. Unfortunately, there are a lot of fake reviews included in them, which ... 详细信息
来源: 评论
CRT and PUF-based Self/Mutual-healing Key Distribution Protocol with Collusion Resistance and Revocation Capability
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4607-4622页
作者: Othman, Wajdy Hong, Zhong Fuyou, Miao Xue, Kaiping Hawbani, Ammar Amin, Ruhul Zhao, Liang Li, Tao Nankai University Haihe Lab of ITAI College of Cyber Science Tianjin China Anhui University School of Computer Science and Technology China University of Science and Technology of China School of Computer Science and Technology School of Information Science and Technology Anhui Hefei China Shenyang Aerospace University School of Computer Science Shenyang110136 China Department of Computer Science & Engineering IIIT-NR China Nankai University Haihe Lab of ITAI College of Cyber Science China
Self-healing group key distribution (SGKD) protocols guarantee the security of group communications by allowing authorized users to independently recover missed previous session keys from the current broadcast without... 详细信息
来源: 评论
Loop-Back Mechanism Based Physical-Layer Secret Key Generation in FDD System under Hardware Impairments
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4694-4709页
作者: Yang, Xuan Li, Dongming Southeast University School of Cyber Science and Engineering Nanjing211189 China
In physical-layer secret key generation, key generation performance is susceptible to hardware impairments (HIs), which can degrade channel reciprocity. Additionally, the security of loop-back mechanism based schemes ... 详细信息
来源: 评论
Privacy-Preserving Statistical Analysis With Low Redundancy Over Task-Relevant Microdata
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4382-4395页
作者: Zhao, Jingcheng Xue, Kaiping Xue, Yingjie Li, Meng Zhu, Bin Yuan, Shaoxian University of Science and Technology of China School of Cyber Science and Technology Anhui Hefei230027 China Hefei University of Technology School of Computer Science and Information Engineering Anhui Hefei230601 China
Privacy-preserving statistical analysis enables the data center to analyze datasets from multiple data owners, extracting valuable insights while safeguarding privacy. However, the observation of microdata involvement... 详细信息
来源: 评论