咨询与建议

限定检索结果

文献类型

  • 10,098 篇 会议
  • 5,913 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,448 篇 工学
    • 8,164 篇 计算机科学与技术...
    • 6,769 篇 软件工程
    • 2,168 篇 信息与通信工程
    • 1,249 篇 控制科学与工程
    • 1,120 篇 生物工程
    • 837 篇 电气工程
    • 720 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 597 篇 光学工程
    • 386 篇 化学工程与技术
    • 356 篇 仪器科学与技术
    • 349 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 312 篇 交通运输工程
    • 293 篇 网络空间安全
    • 265 篇 建筑学
  • 4,790 篇 理学
    • 2,794 篇 数学
    • 1,230 篇 生物学
    • 946 篇 物理学
    • 813 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 409 篇 化学
  • 3,039 篇 管理学
    • 1,841 篇 管理科学与工程(可...
    • 1,320 篇 图书情报与档案管...
    • 744 篇 工商管理
  • 516 篇 医学
    • 444 篇 临床医学
    • 386 篇 基础医学(可授医学...
  • 437 篇 法学
    • 328 篇 社会学
  • 277 篇 经济学
    • 276 篇 应用经济学
  • 234 篇 教育学
  • 153 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 38 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 619 篇 computer science
  • 478 篇 software enginee...
  • 338 篇 semantics
  • 316 篇 computational mo...
  • 314 篇 feature extracti...
  • 297 篇 deep learning
  • 260 篇 training
  • 219 篇 data mining
  • 216 篇 educational inst...
  • 214 篇 optimization
  • 172 篇 predictive model...
  • 171 篇 neural networks
  • 170 篇 application soft...
  • 165 篇 image segmentati...
  • 158 篇 machine learning
  • 155 篇 computer archite...
  • 154 篇 internet of thin...
  • 142 篇 authentication
  • 136 篇 convolution
  • 136 篇 servers

机构

  • 409 篇 college of compu...
  • 354 篇 school of comput...
  • 263 篇 school of comput...
  • 259 篇 school of inform...
  • 218 篇 school of comput...
  • 215 篇 school of comput...
  • 188 篇 state key labora...
  • 150 篇 school of softwa...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 120 篇 national enginee...
  • 111 篇 school of comput...
  • 111 篇 school of softwa...
  • 104 篇 state key labora...
  • 98 篇 college of compu...
  • 98 篇 college of compu...
  • 97 篇 school of softwa...
  • 93 篇 school of softwa...
  • 92 篇 school of comput...
  • 87 篇 school of softwa...

作者

  • 67 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 47 篇 zheng zibin
  • 39 篇 wang ping
  • 36 篇 hu ruimin
  • 35 篇 gao yang
  • 34 篇 limin xiao
  • 34 篇 huang di
  • 32 篇 wang yasha
  • 32 篇 mian ajmal
  • 31 篇 wang lei
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 bo du
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 28 篇 xiao limin

语言

  • 15,319 篇 英文
  • 579 篇 其他
  • 263 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Software Engineering and Computer Science"
16151 条 记 录,以下是111-120 订阅
排序:
Adversarial Training for Supervised Relation Extraction
收藏 引用
Tsinghua science and Technology 2022年 第3期27卷 610-618页
作者: Yanhua Yu Kanghao He Jie Li School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing 100876China
Most supervised methods for relation extraction(RE) involve time-consuming human annotation. Distant supervision for RE is an efficient method to obtain large corpora that contains thousands of instances and various r... 详细信息
来源: 评论
A Trust-Based Hierarchical Consensus Mechanism for Consortium Blockchain in Smart Grid
收藏 引用
Tsinghua science and Technology 2023年 第1期28卷 69-81页
作者: Xingguo Jiang Aidong Sun Yan Sun Hong Luo Mohsen Guizani School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing 100876China Institute of Food safety and Nutrition Jiangsu Academy of Agricultural SciencesNanjing 210000China Computer Science and Engineering Department Qatar UniversityDoha 2713Qatar
As the smart grid develops rapidly,abundant connected devices offer various trading *** raises higher requirements for secure and effective data *** centralized data management does not meet the above ***,smart grid w... 详细信息
来源: 评论
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2287-2308页
作者: Shiyan Zhang Ruohan Xu Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing100876China College of Computer Science and Technology Tianjin UniversityTianjin300072China Institute of Artificial Intelligence Nankai UniversityTianjin300071China College of Information Science and Engineering East China University of Science and TechnologyShanghai200237China
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 评论
Camouflaged Variational Graph AutoEncoder against Attribute Inference Attacks for Cross-Domain Recommendation
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第07期37卷 3916-3932页
作者: Xiong, Yudi Guo, Yongxin Pan, Weike Yang, Qiang Ming, Zhong Zhang, Xiaojin Yu, Han Lin, Tao Tang, Xiaoying Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China School of Science and Engineering Shenzhen518172 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong WeBank Shenzhen China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan430074 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Westlake University School of Engineering Hangzhou China
Cross-domain recommendation (CDR) aims to alleviate the data sparsity problem by leveraging the benefits of modeling two domains. However, existing research often focuses on the recommendation performance while ignore... 详细信息
来源: 评论
Bias analysis of AI models for undergraduate student admissions
收藏 引用
Neural Computing and Applications 2025年 第12期37卷 7785-7795页
作者: Van Busum, Kelly Fang, Shiaofen Department of Computer Science and Software Engineering Butler University IndianapolisIN United States Computing and Engineering Indiana University Luddy School of Informatics Indiana University Indianapolis IndianapolisIN United States
Bias detection and mitigation is an active area of research in machine learning. This work extends previous research done by the authors Van Busum and Fang (Proceedings of the 38th ACM/SIGAPP Symposium on Applied Comp... 详细信息
来源: 评论
ViF-SD2E: a robust weakly-supervised framework for neural decoding
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6645-6661页
作者: Feng, Jingyi Luo, Yong Song, Shuang Hu, Han National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China School of Information and Electronics Beijing Institute of Technology Beijing100081 China
Neural decoding plays a vital role in the interaction between the brain and the outside world. Our task in this paper is to decode the movement track of a finger directly based on the neural data. Existing neural deco... 详细信息
来源: 评论
In silico prediction methods of self-interacting proteins:an empirical and academic survey
收藏 引用
Frontiers of computer science 2023年 第3期17卷 199-216页
作者: Zhanheng CHEN Zhuhong YOU Qinhu ZHANG Zhenhao GUO Siguo WANG Yanbin WANG College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China School of Computer Science Northwestern Polytechnical UniversityXi’an 710129China Institute of Machine Learning and Systems Biology School of Electronics and Information EngineeringTongji UniversityShanghai 201804China School of Cyber Science and Technology Zhejiang UniversityHangzhou 310058China
In silico prediction of self-interacting proteins(SIPs)has become an important part of *** is an urgent need to develop effective and reliable prediction methods to overcome the disadvantage of high cost and labor int... 详细信息
来源: 评论