咨询与建议

限定检索结果

文献类型

  • 910 篇 期刊文献
  • 788 篇 会议
  • 10 册 图书

馆藏范围

  • 1,708 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,159 篇 工学
    • 860 篇 计算机科学与技术...
    • 726 篇 软件工程
    • 248 篇 信息与通信工程
    • 153 篇 生物工程
    • 137 篇 电气工程
    • 136 篇 控制科学与工程
    • 105 篇 化学工程与技术
    • 87 篇 电子科学与技术(可...
    • 86 篇 生物医学工程(可授...
    • 85 篇 机械工程
    • 79 篇 光学工程
    • 42 篇 动力工程及工程热...
    • 39 篇 安全科学与工程
    • 37 篇 网络空间安全
    • 32 篇 交通运输工程
    • 30 篇 建筑学
  • 540 篇 理学
    • 304 篇 数学
    • 167 篇 生物学
    • 101 篇 统计学(可授理学、...
    • 88 篇 物理学
    • 53 篇 系统科学
    • 46 篇 化学
  • 344 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 147 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 75 篇 医学
    • 64 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 35 篇 公共卫生与预防医...
  • 46 篇 法学
    • 35 篇 社会学
  • 39 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 农学
  • 21 篇 教育学
  • 6 篇 军事学
  • 4 篇 艺术学
  • 2 篇 文学

主题

  • 54 篇 deep learning
  • 52 篇 semantics
  • 52 篇 feature extracti...
  • 47 篇 training
  • 37 篇 accuracy
  • 34 篇 data models
  • 30 篇 machine learning
  • 28 篇 computational mo...
  • 28 篇 federated learni...
  • 25 篇 internet of thin...
  • 25 篇 predictive model...
  • 24 篇 convolution
  • 23 篇 optimization
  • 21 篇 conferences
  • 21 篇 graph neural net...
  • 21 篇 convolutional ne...
  • 20 篇 reinforcement le...
  • 20 篇 blockchain
  • 20 篇 adaptation model...
  • 19 篇 deep neural netw...

机构

  • 112 篇 school of big da...
  • 59 篇 college of compu...
  • 59 篇 school of big da...
  • 46 篇 school of inform...
  • 45 篇 national enginee...
  • 41 篇 state key labora...
  • 40 篇 school of softwa...
  • 39 篇 shenzhen researc...
  • 33 篇 school of softwa...
  • 31 篇 school of comput...
  • 31 篇 school of data a...
  • 29 篇 college of compu...
  • 29 篇 school of data s...
  • 26 篇 school of comput...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 24 篇 school of softwa...
  • 24 篇 school of cyber ...
  • 23 篇 school of data s...
  • 21 篇 school of comput...

作者

  • 31 篇 shi qingjiang
  • 29 篇 shi yinghuan
  • 28 篇 gao yang
  • 24 篇 shen linlin
  • 23 篇 lan li
  • 22 篇 qi lei
  • 18 篇 qingjiang shi
  • 16 篇 hu shengshan
  • 16 篇 li minghui
  • 15 篇 zhang hongyu
  • 15 篇 mahmood khalid
  • 14 篇 xiuhua li
  • 14 篇 li xiuhua
  • 14 篇 jin hai
  • 13 篇 tao dacheng
  • 13 篇 zhang jian
  • 13 篇 hu chunqiang
  • 12 篇 xu xiaolong
  • 12 篇 zhou ziqi
  • 12 篇 du bo

语言

  • 1,335 篇 英文
  • 362 篇 其他
  • 21 篇 中文
检索条件"机构=School of Data Science and Software Engineering"
1708 条 记 录,以下是951-960 订阅
排序:
Systematic Analysis of Deep Learning Model for Vulnerable Code Detection
Systematic Analysis of Deep Learning Model for Vulnerable Co...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Mohammad Taneem Bin Nazim Md Jobair Hossain Faruk Hossain Shahriar Md Abdullah Khan Mohammad Masum Nazmus Sakib Fan Wu Department Computer Science Kennesaw State University USA Department of Software Engineering and Game Development Kennesaw State University USA Department of Information Technology Kennesaw State University USA School of Data Science Kennesaw State University USA Department of Computer Science Tuskegee University USA
software vulnerabilities have become a serious problem with the emergence of new applications that contain potentially vulnerable or malicious code that can compromise the system. The growing volume and complexity of ... 详细信息
来源: 评论
QoE Maximization for Multiple-UAV-Assisted Multi-Access Edge Computing: An Online Joint Optimization Approach
arXiv
收藏 引用
arXiv 2024年
作者: He, Long Sun, Geng Sun, Zemin Wu, Qingqing Kang, Jiawen Niyato, Dusit Han, Zhu Leung, Victor C.M. The College of Computer Science and Technology Jilin University Changchun130012 China The College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China The School of Automation Guangdong University of Technology Guangzhou510006 China The University of Houston HoustonTX77004 United States The Department of Computer Science and Engineering Kyung Hee University Seoul446701 Korea Republic of The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
In disaster scenarios, conventional terrestrial multi-access edge computing (MEC) paradigms, which rely on fixed infrastructure, may become unavailable due to infrastructure damage. With high-probability line-of-sight... 详细信息
来源: 评论
Usage: Uncertain Flow Graph and Spatio-Temporal Graph Network-Based Saturation Attack Detection Method
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Kaixi Cui, Yunhe Qian, Qing Chen, Yi Guo, Chun Shen, Guowei Engineering Research Center of Text Computing & Cognitive Intelligence Guizhou University China State Key Laboratory of Public Big Data Guizhou University China Guizhou Provincial Characteristic Key Laboratory of Software Engineering and Information Security Guizhou University China College of Computer Science and Technology Guizhou University China School of Information Guizhou University of Finance and Economics China
With the development of software-Defined Networking (SDN), its security problems have become important research content. Among these security problems, saturation attack is one of the most destructive problems. Satura... 详细信息
来源: 评论
DG-Trans: Automatic Code Summarization via Dynamic Graph Attention-based Transformer
DG-Trans: Automatic Code Summarization via Dynamic Graph Att...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security (QRS)
作者: Jianwei Zeng Tao Zhang Zhou Xu Faculty of Information Technology Macau University of Science and Technology Macau China School of Big Data and Software Engineering Chongqing University Chongqing China
Automatic code summarization is an important topic in the software engineering field, which aims to automatically generate the description for the source code. Based on Graph Neural Networks (GNN), most existing metho... 详细信息
来源: 评论
IoT-Enhanced local attention dual networks for pathological image restoration in healthcare
收藏 引用
Measurement: Sensors 2024年 33卷
作者: Hassan, Abdelwahab Said Thakare, Anuradha Bhende, Manisha Prasad, K.D.V. Singh, Pavitar Parkash Byeon, Haewon Department of Mathematics Faculty of Science Suez Canal University Egypt Department of Computer Engineering Pimpri Chinchwad College of Engineering Pune411044 India Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Tathawade Pune India Hyderabad Pune India Department of Management Lovely Professional University India Department of AI and Software Inje University Gimhae50834 Korea Republic of Inje University Medical Big Data Research Center Gimhae50834 Korea Republic of
High-resolution pathological images play a pivotal role in accurate disease diagnosis and are important in precision medicine. However, obtaining real-time high-resolution images faces challenges due to hardware limit... 详细信息
来源: 评论
Faster OreFSDet: A Lightweight and Effective Few-shot Object Detector for Ore Images
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yang Cheng, Le Peng, Yuting Xu, Chengming Fu, Yanwei Wu, Bo Sun, Guodong School of Mechanical Engineering Hubei University of Technology Wuhan430068 China Hubei Key Laboratory of Modern Manufacturing Quality Engineering Hubei University of Technology Wuhan430068 China National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Data Science Fudan University Shanghai200433 China Shanghai Advanced Research Institute Chinese Academy of Sciences Shanghai201210 China
For the ore particle size detection, obtaining a sizable amount of high-quality ore labeled data is time-consuming and expensive. General object detection methods often suffer from severe over-fitting with scarce labe... 详细信息
来源: 评论
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks
A Certificateless and Privacy-Preserving Authentication with...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Yang Zhao Guohang Dan Ankang Ruan Jicheng Huang Hu Xiong Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
The vehicular sensor network has been developed to improve traffic, enhance the driving experience and so on, and is an inevitable technology trend. In vehicular sensor network, large amounts of data generated by vehi... 详细信息
来源: 评论
Multi-objective Optimization for Multi-UAV-assisted Mobile Edge Computing
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Geng Wang, Yixian Sun, Zemin Wu, Qingqing Kang, Jiawen Niyato, Dusit Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China School of Automation Guangdong University of Technology Guangzhou510006 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
Recent developments in unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) have provided users with flexible and resilient computing services. However, meeting the computing-intensive and latency-sensitive... 详细信息
来源: 评论
Exploring data and knowledge combined anomaly explanation of multivariate industrial data
arXiv
收藏 引用
arXiv 2021年
作者: Ding, Xiaoou Wang, Hongzhi Wang, Chen Li, Zijue Liang, Zheng School of Computer Science and Technology Harbin Institute of Technology China National Engineering Laboratory for Big Data Software EIRI Tsinghua University China
—The demand for high-performance anomaly detection techniques of IoT data becomes urgent, especially in industry field. The anomaly identification and explanation in time series data is one essential task in IoT data... 详细信息
来源: 评论
A two-stage learning approach for wind power prediction using dynamic graph convolution network hybrid model  8
A two-stage learning approach for wind power prediction usin...
收藏 引用
8th IEEE Conference on Energy Internet and Energy System Integration, EI2 2024
作者: Li, Hailong Wang, Yongsheng Guan, Shijie Wang, Xuehui Bao, Daorina Liu, Xiaojun Chen, Haotian Inner Mongolia University of Technology College of Data Science and Application Huhhot010080 China China Agricultural University College of Information and Electrical Engineering Beijing100083 China Inner Mongolia University of Technology College of Energy and Power Engineering Hohhot010080 China Inner Mongolia Wuchuan County Water Affairs Bureau Hohhot011799 China Dalian University of Technology School of International Information and Software Dalian116024 China
This paper proposes an effective two-stage learning method to improve the accuracy of wind power prediction. The complex time dependency relationship between meteorological data variables is modelled using a dynamic g... 详细信息
来源: 评论