咨询与建议

限定检索结果

文献类型

  • 896 篇 期刊文献
  • 781 篇 会议
  • 10 册 图书

馆藏范围

  • 1,687 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,143 篇 工学
    • 841 篇 计算机科学与技术...
    • 713 篇 软件工程
    • 245 篇 信息与通信工程
    • 153 篇 生物工程
    • 128 篇 电气工程
    • 128 篇 控制科学与工程
    • 104 篇 化学工程与技术
    • 85 篇 生物医学工程(可授...
    • 84 篇 机械工程
    • 84 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 41 篇 动力工程及工程热...
    • 35 篇 网络空间安全
    • 34 篇 安全科学与工程
    • 30 篇 建筑学
  • 534 篇 理学
    • 302 篇 数学
    • 165 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 89 篇 物理学
    • 53 篇 系统科学
    • 44 篇 化学
  • 336 篇 管理学
    • 206 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 72 篇 医学
    • 62 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 34 篇 公共卫生与预防医...
    • 28 篇 药学(可授医学、理...
  • 46 篇 法学
    • 35 篇 社会学
  • 39 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 农学
  • 20 篇 教育学
  • 6 篇 军事学
  • 4 篇 艺术学
  • 2 篇 文学

主题

  • 52 篇 deep learning
  • 51 篇 semantics
  • 50 篇 feature extracti...
  • 46 篇 training
  • 35 篇 accuracy
  • 33 篇 data models
  • 28 篇 computational mo...
  • 28 篇 machine learning
  • 25 篇 internet of thin...
  • 25 篇 predictive model...
  • 25 篇 federated learni...
  • 24 篇 convolution
  • 23 篇 optimization
  • 21 篇 conferences
  • 21 篇 convolutional ne...
  • 20 篇 graph neural net...
  • 20 篇 blockchain
  • 19 篇 reinforcement le...
  • 19 篇 deep neural netw...
  • 19 篇 security

机构

  • 109 篇 school of big da...
  • 58 篇 school of big da...
  • 57 篇 college of compu...
  • 44 篇 school of inform...
  • 44 篇 national enginee...
  • 41 篇 state key labora...
  • 39 篇 school of softwa...
  • 39 篇 shenzhen researc...
  • 32 篇 school of softwa...
  • 31 篇 school of data a...
  • 30 篇 school of comput...
  • 29 篇 school of data s...
  • 28 篇 college of compu...
  • 26 篇 school of comput...
  • 25 篇 college of compu...
  • 24 篇 school of softwa...
  • 24 篇 school of cyber ...
  • 23 篇 school of data s...
  • 22 篇 college of compu...
  • 20 篇 school of comput...

作者

  • 31 篇 shi qingjiang
  • 28 篇 shi yinghuan
  • 27 篇 gao yang
  • 24 篇 shen linlin
  • 23 篇 lan li
  • 21 篇 qi lei
  • 18 篇 qingjiang shi
  • 16 篇 hu shengshan
  • 16 篇 li minghui
  • 15 篇 mahmood khalid
  • 14 篇 xiuhua li
  • 14 篇 zhang hongyu
  • 14 篇 li xiuhua
  • 13 篇 tao dacheng
  • 13 篇 jin hai
  • 13 篇 hu chunqiang
  • 12 篇 xu xiaolong
  • 12 篇 zhou ziqi
  • 12 篇 du bo
  • 12 篇 linlin shen

语言

  • 1,414 篇 英文
  • 261 篇 其他
  • 21 篇 中文
检索条件"机构=School of Data Science Software Engineering"
1687 条 记 录,以下是51-60 订阅
排序:
Effort-aware cross-project just-in-time defect prediction framework for mobile apps
收藏 引用
Frontiers of Computer science 2022年 第6期16卷 15-29页
作者: Tian CHENG Kunsong ZHAO Song SUN Muhammad MATEEN Junhao WEN School of Big Data and Software Engineering Chongqing UniversityChongqing401331China School of Computer Science Wuhan UniversityWuhan430072China Department of Computer Science Air University Multan CampusMultan60000Pakistan
As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new ***-in-Time(JIT)defec... 详细信息
来源: 评论
Secret Sharing Based Key Agreement Protocol for Body Area Networks  18th
Secret Sharing Based Key Agreement Protocol for Body Area N...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Sheng, Weihong Cai, Bin Hu, Chunqiang Li, Ruinian School of Big Data and Software Engineering Chongqing University Chongqing China Computer Science Department Bowling Green State University Bowling Green United States
In order to provide more comprehensive medical services and personalized health monitoring according to individual needs, Body Area Networks (BANs) have been extensively studied by many researchers. As BANs involve th... 详细信息
来源: 评论
LECF: recommendation via learnable edge collaborative filtering
收藏 引用
science China(Information sciences) 2022年 第1期65卷 116-130页
作者: Shitao XIAO Yingxia SHAO Yawen LI Hongzhi YIN Yanyan SHEN Bin CUI School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing Key Lab of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications School of Information Technology and Electrical Engineering The University of Queensland Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Computer Science and Technology Peking University National Engineering Laboratory for Big Data Analysis and Applications Peking University
The core of recommendation models is estimating the probability that a user will like an item based on historical interactions. Existing collaborative filtering(CF) algorithms compute the likelihood by utilizing simpl... 详细信息
来源: 评论
A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 3573-3581页
作者: Mahmood, Khalid Tariq, Tayyaba Sangaiah, Arun Kumar Ghaffar, Zahid Saleem, Muhammad Asad Shamshad, Salman National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology International Graduate School of AI Douliu64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102 2801 Lebanon University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China The University of Lahore Department of Software Engineering Lahore54590 Pakistan
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra... 详细信息
来源: 评论
Efficient Relaxed Functional Dependency Discovery with Minimal Set Cover  40
Efficient Relaxed Functional Dependency Discovery with Minim...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Ding, Xiaoou Liu, Yida Wang, Hongzhi Wang, Chen Song, Yichen Yang, Donghua Wang, Jianmin School of Computer Science and Technology Harbin Institute of Technology China National Engineering Research Center for Big Data Software EIRI Tsinghua University China
Assessing data quality through Functional Depen-dencies (FDs) is a crucial aspect of data governance. However, with the diverse range of data sources and the exponential growth in data volume, exact FDs can sometimes ... 详细信息
来源: 评论
TSDDISCOVER: Discovering data Dependency for Time Series data  40
TSDDISCOVER: Discovering Data Dependency for Time Series Dat...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Ding, Xiaoou Li, Yingze Wang, Hongzhi Wang, Chen Liu, Yida Wang, Jianmin School of Computer Science and Technology Harbin Institute of Technology China Tsinghua University National Engineering Research Center for Big Data Software EIRI China
Intelligent devices often produce time series data that suffer from significant data quality issues. While the utilization of data dependency in error detection and data repair has been somewhat beneficial, it remains... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
Using analytic hierarchy process to evaluate deep learning for infrared target recognition
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86229-86245页
作者: Xu, Laixiang Cao, Bingxu Wei, Xinhong Li, Bei Su, Jingfeng Ning, Shiyuan Zhao, Junmin School of Computer and Data Science Henan University of Urban Construction Pingdingshan467036 China School of Information Engineering Luohe Vocational Technology College Henan University of Technology Luohe Institute of Technology Luohe462000 China School of Computer and Data Science Innovation Laboratory of Smart Traffic and Big Data Development of Hainan Province Pingdingshan467036 China School of Computer and Data Science Research Center of Smart City and Big Data Engineering of Henan Province Henan University of Urban Construction Pingdingshan467036 China Department of Software Information China Electronics Technology Group Corporation 36-th Research Institute Jiaxing314033 China School of Computer and Data Science Research Center of Smart City and Big Data Engineering of Henan Province Research Center of Intelligent Campus Application Engineering of Henan Province Innovation Laboratory of Smart Traffic and Big Data Development of Hainan Province Henan University of Urban Construction Pingdingshan467036 China
In order to promote the evaluation performance of deep learning infrared automatic target recognition (ATR) algorithms in the complex environment of air-to-air missile research, we proposed an analytic hierarchy proce... 详细信息
来源: 评论
Plausible Heterogeneous Graph k-Anonymization for Social Networks
收藏 引用
Tsinghua science and Technology 2022年 第6期27卷 912-924页
作者: Kaiyang Li Ling Tian Xu Zheng Bei Hui School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu 610000China
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra... 详细信息
来源: 评论
IPM-LSTM: A Learning-Based Interior Point Method for Solving Nonlinear Programs  38
IPM-LSTM: A Learning-Based Interior Point Method for Solving...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Gao, Xi Xiong, Jinxin Wang, Akang Duan, Qihong Xue, Jiang Shi, Qingjiang School of Mathematics and Statistics Xi'an Jiaotong University Xi'an China Shenzhen Research Institute of Big Data China School of Data Science The Chinese University of Hong Kong Shenzhen China School of Software Engineering Tongji University Shanghai China
Solving constrained nonlinear programs (NLPs) is of great importance in various domains such as power systems, robotics, and wireless communication networks. One widely used approach for addressing NLPs is the interio...
来源: 评论