咨询与建议

限定检索结果

文献类型

  • 10,238 篇 会议
  • 5,963 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 16,342 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,571 篇 工学
    • 8,251 篇 计算机科学与技术...
    • 6,812 篇 软件工程
    • 2,172 篇 信息与通信工程
    • 1,287 篇 控制科学与工程
    • 1,122 篇 生物工程
    • 848 篇 电气工程
    • 727 篇 机械工程
    • 643 篇 电子科学与技术(可...
    • 612 篇 光学工程
    • 604 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 350 篇 安全科学与工程
    • 321 篇 动力工程及工程热...
    • 317 篇 交通运输工程
    • 300 篇 网络空间安全
    • 279 篇 建筑学
  • 4,798 篇 理学
    • 2,807 篇 数学
    • 1,230 篇 生物学
    • 950 篇 物理学
    • 826 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 410 篇 化学
  • 3,061 篇 管理学
    • 1,850 篇 管理科学与工程(可...
    • 1,330 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 517 篇 医学
    • 446 篇 临床医学
    • 387 篇 基础医学(可授医学...
  • 439 篇 法学
    • 329 篇 社会学
  • 281 篇 经济学
    • 279 篇 应用经济学
  • 237 篇 教育学
  • 151 篇 农学
  • 43 篇 军事学
  • 43 篇 艺术学
  • 37 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 621 篇 computer science
  • 485 篇 software enginee...
  • 339 篇 semantics
  • 324 篇 computational mo...
  • 323 篇 feature extracti...
  • 304 篇 deep learning
  • 260 篇 training
  • 223 篇 data mining
  • 212 篇 educational inst...
  • 209 篇 optimization
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 169 篇 image segmentati...
  • 160 篇 machine learning
  • 155 篇 internet of thin...
  • 155 篇 computer archite...
  • 142 篇 authentication
  • 137 篇 servers
  • 133 篇 support vector m...

机构

  • 428 篇 college of compu...
  • 361 篇 school of comput...
  • 271 篇 school of inform...
  • 265 篇 school of comput...
  • 222 篇 school of comput...
  • 218 篇 school of comput...
  • 186 篇 state key labora...
  • 153 篇 school of softwa...
  • 134 篇 school of comput...
  • 128 篇 school of electr...
  • 125 篇 national enginee...
  • 108 篇 school of softwa...
  • 107 篇 school of comput...
  • 103 篇 state key labora...
  • 101 篇 school of softwa...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 98 篇 school of softwa...
  • 97 篇 school of comput...
  • 97 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 51 篇 chen zhong
  • 51 篇 zheng zibin
  • 50 篇 liu yang
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 limin xiao
  • 35 篇 huang di
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 ruimin hu
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 mian ajmal
  • 30 篇 jun zhang
  • 30 篇 qi lianyong
  • 29 篇 wang wei
  • 28 篇 niyato dusit
  • 27 篇 cui lizhen

语言

  • 14,465 篇 英文
  • 1,641 篇 其他
  • 265 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Software Engineering and Computer Science"
16342 条 记 录,以下是781-790 订阅
排序:
Improving Generalization for Hyperspectral Image Classification:The Impact of Disjoint Sampling on Deep Models
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 503-532页
作者: Muhammad Ahmad Manuel Mazzara Salvatore Distefano Adil Mehmood Khan Hamad Ahmed Altuwaijri Department of Computer Science National University of Computer and Emerging SciencesChiniot35400Pakistan Institute of Software Development and Engineering Innopolis UniversityInnopolis420500Russia Dipartimento di Matematica e Informatica—MIFT University of MessinaMessina98121Italy School of Computer Science University of HullHullHU67RXUK Department of Geography College of Humanities and Social SciencesKing Saud UniversityRiyadh11451Saudi Arabia
Disjoint sampling is critical for rigorous and unbiased evaluation of state-of-the-art(SOTA)models e.g.,Attention Graph and Vision *** training,validation,and test sets overlap or share data,it introduces a bias that ... 详细信息
来源: 评论
MASKED DISTILLATION WITH RECEPTIVE TOKENS  11
MASKED DISTILLATION WITH RECEPTIVE TOKENS
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Huang, Tao Zhang, Yuan You, Shan Wang, Fei Qian, Chen Cao, Jian Xu, Chang School of Computer Science Faculty of Engineering The University of Sydney Australia SenseTime Research China School of Software and Microelectronics Peking University China University of Science and Technology of China China
Distilling from the feature maps can be fairly effective for dense prediction tasks since both the feature discriminability and localization priors can be well ***, not every pixel contributes equally to the performan... 详细信息
来源: 评论
PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET
收藏 引用
IEEE Transactions on Vehicular Technology 2024年 第5期73卷 6727-6739页
作者: Awais, Syed Muhammad Yucheng, Wu Mahmood, Khalid Akram, Muhammad Wahid Hussain, Shafiq Das, Ashok Kumar Park, Youngho Chongqing University School of Microelectronics and Communication Engineering Chongqing400044 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin64002 Taiwan University of Lahore Department of Software Engineering Punjab Lahore54590 Pakistan University of Sahiwal Department of Computer Science Punjab Sahiwal57000 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Telangana Hyderabad500032 India Kyungpook National University School of Electronics Engineering Daegu41566 Korea Republic of
The intellectual and immense attainment of a smart city and auto-mobile vehicles are gradually growing. This growth drives Vehicular Ad-Hoc Network (VANET), a broadly operated complex network for inter-vehicular trans... 详细信息
来源: 评论
Privacy-Enhanced Data Sharing in Multi-Institutional Healthcare
Privacy-Enhanced Data Sharing in Multi-Institutional Healthc...
收藏 引用
IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
作者: Jixiang Xiao Shengke Zeng Tiantian Zhou Yawen Feng School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China School of Computer and Software Engineering Xihua University Chengdu China
In multi-institutional patient data sharing scenarios, maintaining fine-grained access control while safeguarding privacy and adapting to real-world environments is crucial. Traditional attribute-based encryption (ABE... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd International Conference on Blockchain Technology and Information Security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
CIFD: A Distance for Complex Intuitionistic Fuzzy Set  4th
CIFD: A Distance for Complex Intuitionistic Fuzzy Set
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Zhao, Yangyang Xiao, Fuyuan School of Computer and Information Science Southwest University Chongqing400715 China School of Big Data and Software Engineering Chongqing University Chongqing401331 China
Intuitionistic fuzzy set (IFS) has attracted much attention because it can deal with fuzziness and uncertainty more flexibly than traditional fuzzy set. Complex intuitionistic fuzzy set (CIFS) extends intuitionistic f... 详细信息
来源: 评论
Crack Detection Method for Asphalt Pavement Combining Multi-scale Features and Attention Mechanism  4
Crack Detection Method for Asphalt Pavement Combining Multi-...
收藏 引用
4th International Conference on Advances in Electrical engineering and computer Applications, AEECA 2023
作者: Xu, Zijian Wang, Lili Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing China Chongqing University of Posts and Telecommunications School of Software Engineering Chongqing China
Crack, as one of the common diseases of asphalt pavements, seriously affects the health of asphalt pavements. To cope with the demand of crack detection in the context of complex pavements, an improved network model w... 详细信息
来源: 评论
Deep Autoencoding One-Class time Series Anomaly Detection  48
Deep Autoencoding One-Class time Series Anomaly Detection
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Mou, Xudong Wang, Rui Wang, Tiejun Sun, Jie Li, Bo Wo, Tianyu Liu, Xudong Beihang University School of Computer Science and Engineering Beijing China Zhongguancun Laboratory Beijing China Beihang University Sklsde School of Software Beijing China
Time-series Anomaly Detection(AD) is widely used in monitoring and security applications in various industries and has become a hot spot in the field of deep learning. Normality-representation-based methods perform we... 详细信息
来源: 评论
Tencent pretrain: A scalable and flexible toolkit for pre-Training models of different modalities  61
Tencent pretrain: A scalable and flexible toolkit for pre-Tr...
收藏 引用
61st Annual Meeting of the Association for Computational Linguistics, ACL 2023
作者: Zhao, Zhe Li, Yudong Hou, Cheng Zhao, Jing Tian, Rong Liu, Weijie Chen, Yiren Sun, Ningyuan Liu, Haoyan Mao, Weiquan Guo, Han Guo, Weigang Wu, Taiqiang Zhu, Tao Shi, Wenhang Chen, Chen Huang, Shan Chen, Sihong Liu, Liqun Li, Feifei Chen, Xiaoshuai Sun, Xingwu Kang, Zhanhui Du, Xiaoyong Shen, Linlin Yan, Kimmo Tencent AI Lab School of Computer Science and Software Engineering Shenzhen University China School of Information and DEKE MOE Renmin University of China China
Recently, the success of pre-Training in text domain has been fully extended to vision, audio, and cross-modal scenarios. The proposed pre-Training models of different modalities are showing a rising trend of homogene... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论