咨询与建议

限定检索结果

文献类型

  • 897 篇 期刊文献
  • 775 篇 会议
  • 10 册 图书

馆藏范围

  • 1,682 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,145 篇 工学
    • 843 篇 计算机科学与技术...
    • 715 篇 软件工程
    • 246 篇 信息与通信工程
    • 153 篇 生物工程
    • 130 篇 电气工程
    • 128 篇 控制科学与工程
    • 105 篇 化学工程与技术
    • 85 篇 机械工程
    • 85 篇 生物医学工程(可授...
    • 84 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 42 篇 动力工程及工程热...
    • 35 篇 网络空间安全
    • 34 篇 安全科学与工程
    • 30 篇 建筑学
    • 29 篇 交通运输工程
  • 539 篇 理学
    • 303 篇 数学
    • 165 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 90 篇 物理学
    • 52 篇 系统科学
    • 45 篇 化学
  • 336 篇 管理学
    • 206 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 69 篇 医学
    • 60 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 47 篇 法学
    • 36 篇 社会学
  • 39 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 农学
  • 19 篇 教育学
  • 7 篇 军事学
  • 4 篇 艺术学
  • 3 篇 文学

主题

  • 52 篇 semantics
  • 51 篇 feature extracti...
  • 50 篇 deep learning
  • 47 篇 training
  • 32 篇 accuracy
  • 32 篇 data models
  • 28 篇 computational mo...
  • 28 篇 machine learning
  • 25 篇 optimization
  • 25 篇 predictive model...
  • 24 篇 convolution
  • 23 篇 internet of thin...
  • 23 篇 federated learni...
  • 22 篇 graph neural net...
  • 22 篇 convolutional ne...
  • 21 篇 conferences
  • 20 篇 blockchain
  • 19 篇 reinforcement le...
  • 19 篇 deep neural netw...
  • 18 篇 cloud computing

机构

  • 108 篇 school of big da...
  • 58 篇 college of compu...
  • 58 篇 school of big da...
  • 45 篇 national enginee...
  • 43 篇 school of inform...
  • 40 篇 state key labora...
  • 40 篇 shenzhen researc...
  • 39 篇 school of softwa...
  • 32 篇 school of softwa...
  • 31 篇 school of data a...
  • 30 篇 school of comput...
  • 29 篇 school of data s...
  • 28 篇 college of compu...
  • 25 篇 school of comput...
  • 25 篇 college of compu...
  • 24 篇 school of cyber ...
  • 23 篇 school of data s...
  • 22 篇 school of softwa...
  • 20 篇 school of comput...
  • 20 篇 college of compu...

作者

  • 32 篇 shi qingjiang
  • 28 篇 shi yinghuan
  • 26 篇 gao yang
  • 23 篇 shen linlin
  • 23 篇 lan li
  • 21 篇 qi lei
  • 18 篇 qingjiang shi
  • 16 篇 hu shengshan
  • 16 篇 mahmood khalid
  • 16 篇 li minghui
  • 14 篇 xiuhua li
  • 14 篇 zhang hongyu
  • 14 篇 li xiuhua
  • 13 篇 tao dacheng
  • 13 篇 jin hai
  • 13 篇 hu chunqiang
  • 12 篇 xu xiaolong
  • 12 篇 zhou ziqi
  • 12 篇 shamshad salman
  • 12 篇 du bo

语言

  • 1,522 篇 英文
  • 147 篇 其他
  • 19 篇 中文
检索条件"机构=School of Data Science Software Engineering"
1682 条 记 录,以下是41-50 订阅
排序:
PKEST: Public-Key Encryption With Similarity Test for Medical Consortia Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 680-693页
作者: Chen, Junsong Zeng, Shengke Han, Song Yin, Jin Chen, Peng Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China Sichuan University West China Biomedical Big Data Center West China Hospital Chengdu610041 China
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo... 详细信息
来源: 评论
Enhancing Weakly Supervised Medical Segmentation via Heterogeneous Co-training with Box-Wise Augmentation and Pseudo-Label Filtering  6th
Enhancing Weakly Supervised Medical Segmentation via Hetero...
收藏 引用
6th IFIP TC 12 International Conference on Intelligence science, ICIS 2024
作者: Wang, You Qi, Lei Yu, Qian Shi, Yinghuan Gao, Yang State Key Laboratory of Novel Software Technology National Insititute of Health-care Data Science Nanjing University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Data and Computer Science Shandong Woman’s University Jinan China
In this paper, we introduce an innovative approach to weakly supervised medical image segmentation with box annotations. Different from the previous methods which simply utilize a single conventional network with the ... 详细信息
来源: 评论
A Reduced State-Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia University College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
SEARCHING LOTTERY TICKETS IN GRAPH NEURAL NETWORKS: A DUAL PERSPECTIVE  11
SEARCHING LOTTERY TICKETS IN GRAPH NEURAL NETWORKS: A DUAL P...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Wang, Kun Liang, Yuxuan Wang, Pengkun Wang, Xu Gu, Pengfei Fang, Junfeng Wang, Yang Hefei China School of Software Engineering USTC China School of Data Science USTC China National University of Singapore Singapore
Graph Neural Networks (GNNs) have shown great promise in various graph learning tasks. However, the computational overheads of fitting GNNs to large-scale graphs grow rapidly, posing obstacles to GNNs from scaling up ... 详细信息
来源: 评论
A survey for light field super-resolution
收藏 引用
High-Confidence Computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in engineering & sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
Research on Low-Cost Deployment and Low Energy Consumption Auxiliary Communication Methods Based on Unmanned Aerial Vehicles  2
Research on Low-Cost Deployment and Low Energy Consumption A...
收藏 引用
2nd International Conference on Big data and Privacy Computing, BDPC 2024
作者: Zhao, Yan Yang, Xiongfei Digital Guangdong Network Construction Co. Ltd Guangzhou China School of Data Science and Software Engineering Wuzhou University Wuzhou China
Considering the limited communication of ground IoT devices in wide-area agricultural reclamation areas, this paper proposes a method of unmanned aerial vehicle (UAV) collaborative coverage to minimize the number of U... 详细信息
来源: 评论
Time Series data Cleaning under Expressive Constraints on Both Rows and Columns  40
Time Series Data Cleaning under Expressive Constraints on Bo...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Ding, Xiaoou Li, Genglong Wang, Hongzhi Wang, Chen Song, Yichen School of Computer Science and Technology Harbin Institute of Technology China Tsinghua University National Engineering Laboratory for Big Data Software EIRI China
Time series data generated by thousands of sensors are suffering data quality problems. Traditional constraint-based techniques have greatly contributed to data cleaning applications. However, cleaning methods that su... 详细信息
来源: 评论
Improving Event Coreference Resolution Using Prompt Learning and U-shaped Module  4
Improving Event Coreference Resolution Using Prompt Learning...
收藏 引用
4th International Conference on Computer science and Blockchain, CCSB 2024
作者: Zhang, Mengyao Long, Jun Huang, Wenti School of Software Xinjiang University Urumqi China Institute of Big Data Central South University Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Changsha China
Event Coreference Resolution (ECR) focuses on clustering event mentions that allude to identical actual events. Previous research primarily focuses on encoding event mentions without incorporating human interpretation... 详细信息
来源: 评论
FedTop:a constraint-loosed federated learning aggregation method against poisoning attack
收藏 引用
Frontiers of Computer science 2024年 第5期18卷 233-235页
作者: Che WANG Zhenhao WU Jianbo GAO Jiashuo ZHANG Junjie XIA Feng GAO Zhi GUAN Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China China Unicom Beijing 100033China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attac... 详细信息
来源: 评论