咨询与建议

限定检索结果

文献类型

  • 909 篇 期刊文献
  • 777 篇 会议
  • 10 册 图书

馆藏范围

  • 1,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,159 篇 工学
    • 855 篇 计算机科学与技术...
    • 711 篇 软件工程
    • 249 篇 信息与通信工程
    • 153 篇 生物工程
    • 145 篇 控制科学与工程
    • 131 篇 电气工程
    • 106 篇 化学工程与技术
    • 88 篇 电子科学与技术(可...
    • 86 篇 机械工程
    • 85 篇 生物医学工程(可授...
    • 78 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 36 篇 网络空间安全
    • 35 篇 安全科学与工程
    • 30 篇 交通运输工程
    • 29 篇 建筑学
  • 544 篇 理学
    • 304 篇 数学
    • 168 篇 生物学
    • 101 篇 统计学(可授理学、...
    • 92 篇 物理学
    • 52 篇 系统科学
    • 45 篇 化学
  • 337 篇 管理学
    • 207 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 73 篇 医学
    • 63 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 47 篇 法学
    • 36 篇 社会学
  • 39 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 农学
  • 17 篇 教育学
  • 7 篇 军事学
  • 4 篇 艺术学
  • 3 篇 文学

主题

  • 53 篇 feature extracti...
  • 52 篇 semantics
  • 50 篇 deep learning
  • 48 篇 training
  • 33 篇 accuracy
  • 32 篇 data models
  • 28 篇 computational mo...
  • 28 篇 machine learning
  • 26 篇 optimization
  • 25 篇 predictive model...
  • 24 篇 convolution
  • 23 篇 internet of thin...
  • 23 篇 federated learni...
  • 22 篇 graph neural net...
  • 22 篇 convolutional ne...
  • 21 篇 conferences
  • 20 篇 blockchain
  • 19 篇 deep neural netw...
  • 18 篇 reinforcement le...
  • 18 篇 cloud computing

机构

  • 109 篇 school of big da...
  • 59 篇 college of compu...
  • 59 篇 school of big da...
  • 46 篇 national enginee...
  • 43 篇 school of inform...
  • 40 篇 state key labora...
  • 40 篇 shenzhen researc...
  • 39 篇 school of softwa...
  • 32 篇 school of softwa...
  • 31 篇 school of data a...
  • 30 篇 school of comput...
  • 29 篇 college of compu...
  • 29 篇 school of data s...
  • 25 篇 school of comput...
  • 25 篇 college of compu...
  • 24 篇 school of cyber ...
  • 23 篇 school of data s...
  • 22 篇 school of softwa...
  • 20 篇 school of comput...
  • 20 篇 school of softwa...

作者

  • 32 篇 shi qingjiang
  • 28 篇 shi yinghuan
  • 26 篇 gao yang
  • 24 篇 lan li
  • 23 篇 shen linlin
  • 21 篇 qi lei
  • 18 篇 qingjiang shi
  • 16 篇 hu shengshan
  • 16 篇 mahmood khalid
  • 16 篇 li minghui
  • 14 篇 xiuhua li
  • 14 篇 zhang hongyu
  • 14 篇 li xiuhua
  • 13 篇 tao dacheng
  • 13 篇 jin hai
  • 13 篇 linlin shen
  • 13 篇 hu chunqiang
  • 12 篇 xu xiaolong
  • 12 篇 zhou ziqi
  • 12 篇 shamshad salman

语言

  • 1,519 篇 英文
  • 164 篇 其他
  • 19 篇 中文
检索条件"机构=School of Data Science and Software Engineering"
1696 条 记 录,以下是1131-1140 订阅
排序:
Vacancy-Type Defects in Thin HfO2 Layers Probed by Monoenergetic Positron Beams
Vacancy-Type Defects in Thin HfO2 Layers Probed by Monoenerg...
收藏 引用
Joint e-Manufacturing and Design Collaboration Symposium (eMDC) & International Symposium on Semiconductor Manufacturing (ISSM)
作者: Akira Uedono Kazuya Kawakami Tatsunori Kuribara Ryu Hasunuma Yosuke Harashima Yasuteru Shigeta Zeyuan Ni Ruolin Yan Hideo Nakamura Akira Notake Tsuyoshi Moriya Koji Michishio Shoji Ishibashi Faculty of Pure and Applied Science University of Tsukuba Tsukuba Ibaraki Japan Graduate School of Science and Technology Nara Institute of Science and Technology Ikoma Nara Japan S-Technology Development Center Tokyo Electron Technology Solutions Ltd. Nirasaki Yamanashi Japan Development Department 1 Tokyo Electron Technology Solutions Ltd. Nirasaki Yamanashi Japan Digital Design Center Tokyo Electron Ltd. Sapporo Hokkaido Japan Software and Data Engineering Division Tokyo Electron Technology Solutions Ltd. Nirasaki Yamanashi Japan Research Institute for Measurement and Analytical Instrumentation National Institute of Advanced Industrial Science and Technology Tsukuba Ibaraki Japan Research Center for Computational Design of Advanced Functional Materials National Institute of Advanced Industrial Science and Technology Tsukuba Ibaraki Japan
Behaviors of vacancies during the amorphous-to-crystalline transition of thin HfO 2 layers were studied by monoenergetic positron beams. The HfO 2 layers with 4‒30 nm thickness were fabricated on TiN/Si templates by a... 详细信息
来源: 评论
Dual-domain decoupled fusion network for semantic segmentation of remote sensing images
收藏 引用
Information Fusion 2025年 124卷
作者: Xin Li Feng Xu Jue Zhang Anzhu Yu Xin Lyu Hongmin Gao Jun Zhou College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Engineering and Built Environment Griffith University Nathan Australia School of Surveying and Mapping Information Engineering University Zhengzhou China School of Information and Communication Technology Griffith University Nathan Australia
Semantic segmentation of remote sensing images (RSIs) is a challenging task due to the complexity of spatial structures, diverse object scales, and heterogeneous land-cover patterns. Traditional approaches often strug... 详细信息
来源: 评论
OLinear: A Linear Model for Time Series Forecasting in Orthogonally Transformed Domain
arXiv
收藏 引用
arXiv 2025年
作者: Yue, Wenzhen Liu, Yong Li, Haoxuan Wang, Hao Ying, Xianghua Guo, Ruohao Xing, Bowei Shi, Ji State Key Laboratory of General AI Peking University Beijing100871 China Center for Data Science Peking University Beijing100871 China School of Software BNRist Tsinghua University Beijing100084 China Department of Control Science and Engineering Zhejiang University Hangzhou310058 China
This paper presents OLinear, a linear-based multivariate time series forecasting model that operates in an orthogonally transformed domain. Recent forecasting models typically adopt the temporal forecast (TF) paradigm... 详细信息
来源: 评论
Sentence Pair Similarity Modeling Based on Weighted Interaction of Multi-semantic Embedding Matrix
Sentence Pair Similarity Modeling Based on Weighted Interact...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Junyu Chen Xiaohong Zhu Jun Sang Lu Gong College of Computer Science Chongqing University Chongqing China School of Big Data & Software Engineering Chongqing University Chongqing China
In this paper, we focus on measuring the similarity of sentence pair. Noting that a single sentence vector may lose fine-grained semantic information which is important for sentence matching, we propose an embedding m... 详细信息
来源: 评论
Modeling Multiple Views via Implicitly Preserving Global Consistency and Local Complementarity
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jiangmeng Qiang, Wenwen Zheng, Changwen Su, Bing Razzak, Farid Wen, Ji-Rong Xiong, Hui The University of Chinese Academy of Sciences Beijing China The Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China The New York University Columbia University New York United States The Beijing Key Laboratory of Big Data Management and Analysis Methods Gaoling School of Artificial Intelligence Renmin University of China Beijing100872 China Guangzhou China Department of Computer Science & Engineering The Hong Kong University of Science and Technology Hong Kong
While self-supervised learning techniques are often used to mine hidden knowledge from unlabeled data via modeling multiple views, it is unclear how to perform effective representation learning in a complex and incons... 详细信息
来源: 评论
Text Cover Steganography Using Font Color of the Invisible Characters and Optimized Primary Color-intensities  19
Text Cover Steganography Using Font Color of the Invisible C...
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Rabevohitra, Feno Heriniaina Li, Yantao Chongqing University School of Big Data and Software Engineering Chongqing China Chongqing University College of Computer Science Chongqing China
Text cover steganography is concerned with using text support for hiding information. Despite its long and old history, the art of cover writing is still attracting the attention of researchers in the domain of inform... 详细信息
来源: 评论
Two-Stage Attention-Based Model for Code Search with Textual and Structural Features
Two-Stage Attention-Based Model for Code Search with Textual...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Ling Xu Huanhuan Yang Chao Liu Jianhang Shuai Meng Yan Yan Lei Zhou Xu Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Technology Zhejiang University Hangzhou China
Searching and reusing existing code from a large scale codebase can largely improve developers' programming efficiency. To support code reuse, early code search models leverage information retrieval (IR) technique... 详细信息
来源: 评论
Interpretation Area-Guided Detection of Adversarial Samples
Interpretation Area-Guided Detection of Adversarial Samples
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: JiaLi Wei Ming Fan Xi Xu Ang Jia Zhou Xu Lei Xue School of Cyber Science and Engineering Xi'an Jiaotong University China School of Big Data and Software Engineering Chongqing University China The Hong Kong Polytechnic University China
Deep learning systems are known to be vulnerable to adversarial samples, which are implemented to change the prediction results by adding small perturbations to benign samples. It is significant to defend against an a... 详细信息
来源: 评论
Graph Edit Distance Reward: Learning to Edit Scene Graph  16th
Graph Edit Distance Reward: Learning to Edit Scene Graph
收藏 引用
16th European Conference on Computer Vision, ECCV 2020
作者: Chen, Lichang Lin, Guosheng Wang, Shijie Wu, Qingyao Nanyang Technological University Singapore Singapore Zhejiang University Hangzhou China Huazhong University of Science and Technology Wuhan China School of Software Engineering South China University of Technology Guangzhou China Key Laboratory of Big Data and Intelligent Robot Ministry of Education Beijing China
Scene Graph, as a vital tool to bridge the gap between language domain and image domain, has been widely adopted in the cross-modality task like VQA. In this paper, we propose a new method to edit the scene graph acco... 详细信息
来源: 评论
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection
arXiv
收藏 引用
arXiv 2022年
作者: Masum, Mohammad Shahriar, Hossain Haddad, Hisham Faruk, Md Jobair Hossain Valero, Maria Khan, Md Abdullah Rahman, Mohammad A. Adnan, Muhaiminul I. Cuzzocrea, Alfredo Wu, Fan School of Data Science Kennesaw State University United States Department of Information Technology Kennesaw State University United States Department of Software Engineering and Game Development Kennesaw State University United States Department Computer Science Kennesaw State University United States Department of Electrical and Computer Engineering Florida International University United States Institute of Natural Sciences United International University United States IDEA Lab University of Calabria Rende Italy LORIA Nancy France Department of Computer Science Tuskegee University United States
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully... 详细信息
来源: 评论