咨询与建议

限定检索结果

文献类型

  • 10,782 篇 会议
  • 6,527 篇 期刊文献
  • 99 册 图书

馆藏范围

  • 17,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,289 篇 工学
    • 8,265 篇 计算机科学与技术...
    • 6,825 篇 软件工程
    • 2,402 篇 信息与通信工程
    • 1,505 篇 控制科学与工程
    • 1,217 篇 生物工程
    • 1,020 篇 电气工程
    • 857 篇 机械工程
    • 832 篇 电子科学与技术(可...
    • 711 篇 光学工程
    • 676 篇 生物医学工程(可授...
    • 580 篇 化学工程与技术
    • 440 篇 仪器科学与技术
    • 440 篇 动力工程及工程热...
    • 387 篇 安全科学与工程
    • 366 篇 交通运输工程
    • 348 篇 材料科学与工程(可...
    • 323 篇 建筑学
  • 5,475 篇 理学
    • 3,095 篇 数学
    • 1,323 篇 生物学
    • 1,308 篇 物理学
    • 929 篇 统计学(可授理学、...
    • 556 篇 系统科学
    • 532 篇 化学
  • 3,268 篇 管理学
    • 2,055 篇 管理科学与工程(可...
    • 1,355 篇 图书情报与档案管...
    • 782 篇 工商管理
  • 594 篇 医学
    • 524 篇 临床医学
    • 440 篇 基础医学(可授医学...
  • 468 篇 法学
    • 348 篇 社会学
  • 323 篇 经济学
    • 322 篇 应用经济学
  • 262 篇 教育学
  • 161 篇 农学
  • 50 篇 军事学
  • 43 篇 艺术学
  • 42 篇 文学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 407 篇 feature extracti...
  • 377 篇 deep learning
  • 345 篇 training
  • 332 篇 computational mo...
  • 330 篇 software enginee...
  • 289 篇 semantics
  • 253 篇 data mining
  • 244 篇 optimization
  • 236 篇 computer science
  • 213 篇 neural networks
  • 187 篇 educational inst...
  • 185 篇 image segmentati...
  • 184 篇 machine learning
  • 183 篇 predictive model...
  • 175 篇 accuracy
  • 169 篇 convolution
  • 166 篇 internet of thin...
  • 164 篇 task analysis
  • 148 篇 conferences
  • 141 篇 support vector m...

机构

  • 813 篇 school of inform...
  • 469 篇 school of softwa...
  • 342 篇 school of softwa...
  • 287 篇 state key labora...
  • 259 篇 school of comput...
  • 237 篇 school of softwa...
  • 226 篇 college of compu...
  • 221 篇 school of comput...
  • 219 篇 school of softwa...
  • 146 篇 university of el...
  • 141 篇 school of comput...
  • 101 篇 school of comput...
  • 99 篇 school of comput...
  • 96 篇 school of softwa...
  • 93 篇 school of softwa...
  • 90 篇 school of softwa...
  • 90 篇 college of compu...
  • 88 篇 school of softwa...
  • 80 篇 school of big da...
  • 79 篇 school of softwa...

作者

  • 51 篇 wang lei
  • 46 篇 liu yang
  • 43 篇 gao yang
  • 38 篇 lei wang
  • 37 篇 xiong hu
  • 34 篇 shen furao
  • 33 篇 yang yang
  • 30 篇 liu jinyuan
  • 30 篇 tao dacheng
  • 29 篇 zhang tao
  • 29 篇 li li
  • 28 篇 baojian hua
  • 28 篇 yongbin yu
  • 27 篇 zheng zibin
  • 26 篇 sun xingming
  • 26 篇 jun zhang
  • 26 篇 wang jian
  • 25 篇 niyato dusit
  • 25 篇 chaolong zhang
  • 25 篇 qi liu

语言

  • 16,112 篇 英文
  • 1,008 篇 其他
  • 306 篇 中文
  • 5 篇 日文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Software Engineering and Technology"
17408 条 记 录,以下是4991-5000 订阅
排序:
VIKOR decision making method based on multi-granularity hesitant fuzzy linguistic term sets
VIKOR decision making method based on multi-granularity hesi...
收藏 引用
Cyber-Physical Social Intelligence (ICCSI), International Conference on
作者: Jin Qian Wei Jin Xuanyuan Wang Ying Yu Mingchen Zheng Duoqian Miao School of Software East China Jiaotong University Nanchang Jiangxi School of Transportation Engineering East China Jiaotong University Nanchang Jiangxi Department Computer Science and Technology Tongji University Shanghai China
In the existing multi-attribute decision making researches, most of the hesitant fuzzy linguistic multi-attribute decision making methods assume the decision makers use the linguistic term set under the same granulari...
来源: 评论
Semi-Asynchronous Hierarchical Federated Deep Learning for Intrusion Detection in Ami Networks
SSRN
收藏 引用
SSRN 2023年
作者: Xia, Zhuoqun Zhou, Hongmei Hu, Zhenzhen Jiang, Qisheng Zhou, Kaixin School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer Science and Software University of South China Hengyang421001 China
The emergence of smart grid brings great convenience to users and power companies, but also brings many new problems, among which the most prominent one is network attack security. Although federated learning works we... 详细信息
来源: 评论
Exploring and Lifting the Robustness of LLM-powered Automated Program Repair with Metamorphic Testing
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Pengyu Wu, Linhao Yang, Zhen Li, Xinyi Yu, Zhongxing Jin, Zhi Li, Ge Xiao, Yan Wu, Jingwen The School of Computer Science and Technology Shandong University Qingdao China The Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education China The School of Computer Science Peking University Beijing China The School of Electrical and Electronic Engineering Nanyang Technological University Singapore The School of Cyber Science and Technology Sun Yat-sen University Shenzhen China
In recent years, Large language model-powered Automated Program Repair (LAPR) techniques have achieved state-of-the-art bug-fixing performance and have been pervasively applied and studied in both industry and academi... 详细信息
来源: 评论
AutoDebloater: Automated Android App Debloating
AutoDebloater: Automated Android App Debloating
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Jiakun Liu Xing Hu Ferdian Thung Shahar Maoz Eran Toch Debin Gao David Lo School of Computing and Information Systems Singapore Management University Singapore School of Software Technology Zhejiang University China School of Computer Science Tel Aviv University Israel Department of Industrial Engineering Tel Aviv University Israel
Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary features can increase the attack surface and cost additional ...
来源: 评论
Patient-Level Anatomy Meets Scanning-Level Physics: Personalized Federated Low-Dose CT Denoising Empowered by Large Language Model
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Ziyuan Chen, Yingyu Wang, Zhiwen Shan, Hongming Chen, Yang Zhang, Yi College of Computer Science Sichuan University China Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University China School of Cyber Science and Engineering Sichuan University China School of Computer Science and Software Engineering Southwest Petroleum University China Institute of Science and Technology for Brain-inspired Intelligence Fudan University China School of Computer Science and Engineering Southeast University China
Reducing radiation doses benefits patients, however, the resultant low-dose computed tomography (LDCT) images often suffer from clinically unacceptable noise and artifacts. While deep learning (DL) shows promise in LD... 详细信息
来源: 评论
ALFLAT: Chinese NER Using ALBERT, Flat-Lattice Transformer, Word Segmentation and Entity Dictionary  2nd
ALFLAT: Chinese NER Using ALBERT, Flat-Lattice Transformer, ...
收藏 引用
2nd EAI International Conference on Applied Cryptography in Computer and Communications, AC3 2022
作者: Lv, Haifeng Ding, Yong School of Data Science and Software Engineering Wuzhou University Wuzhou China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University Wuzhou China
Recently, the character-word lattice structure has been proved to be effective for Chinese named entity recognition (NER) by incorporating the word information. However, one hand, since the lattice structure is dynami... 详细信息
来源: 评论
MPR-Net:Multi-Scale Pattern Reproduction Guided Universality Time Series Interpretable Forecasting
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Tianlong Ma, Xiang Li, Xuemei Zhang, Caiming School of Software Shandong University China Shandong Provincial Laboratory of Future Intelligence and Financial Engineering China Digital Media Technology Key Lab of Shandong Province China
Time series forecasting has received wide interest from existing research due to its broad applications and inherent challenging. The research challenge lies in identifying effective patterns in historical series and ... 详细信息
来源: 评论
Log Anomaly Detection Based on Bi-LSTM Feature Extraction  5
Log Anomaly Detection Based on Bi-LSTM Feature Extraction
收藏 引用
5th International Conference on Data Science and Information technology, DSIT 2022
作者: Zhang, Yue Zhang, Dong Guo, Feng Wang, Xiaotong Duan, Yihai Zhang, Xiaonan School of Electrical and Information Engineering Zhengzhou University Zhengzhou China Inspur Electronic Information Industry Co. Ltd. System Software R&D Dept. Jinan China Inspur Electronic Information Industry Co. Ltd. System Software R&D Dept. Zhengzhou China Compute Science and Technology Harbin Institute of Technology Weihai Weihai China
With the development of the Internet and the digital age continues to advance, traditional operation and maintenance methods can no longer meet the maintenance of large-scale distributed systems, AIOps emerges as the ... 详细信息
来源: 评论
Survey on Lie Group Machine Learning
收藏 引用
Big Data Mining and Analytics 2020年 第4期3卷 235-258页
作者: Mei Lu Fanzhang Li the School of Software Engineering Jinling Institute of TechnologyNanjing 211169China the School of Computer Science and Technology Jiangsu Normal UniversityXuzhou 221000China the School of Computer Science and Technology Soochow UniversitySuzhou 215006China
Lie group machine learning is recognized as the theoretical basis of brain intelligence,brain learning,higher machine learning,and higher artificial *** sets of Lie group matrices are widely available in practical ***... 详细信息
来源: 评论
A New Identity-Based Encryption Scheme with Accountable Authority Based on SM9  11
A New Identity-Based Encryption Scheme with Accountable Auth...
收藏 引用
11th International Conference on Electronics, Communications and Networks, CECNet 2021
作者: Wang, Ke Zhao, Yuan Luo, Song Guan, Zhi MoE Beijing China Department of Computer Science and Technology EECS Peking University Beijing China School of Computer Science and Engineering Chongqing University of Technology Chongqing China National Engineering Research Center for Software Engineering Peking University Beijing China
Accountable authority identity-based encryption (A-IBE) is an extension of identity-based encryption (IBE) in which private key's source can be traced, i.e., whether the key comes from a private key generator or a... 详细信息
来源: 评论