咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 3,600 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,114 篇 工学
    • 4,785 篇 计算机科学与技术...
    • 3,974 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 720 篇 控制科学与工程
    • 689 篇 生物工程
    • 543 篇 电气工程
    • 419 篇 机械工程
    • 402 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 203 篇 安全科学与工程
    • 200 篇 仪器科学与技术
    • 198 篇 网络空间安全
    • 172 篇 建筑学
  • 2,795 篇 理学
    • 1,567 篇 数学
    • 758 篇 生物学
    • 615 篇 物理学
    • 469 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 221 篇 化学
  • 1,896 篇 管理学
    • 1,166 篇 管理科学与工程(可...
    • 799 篇 图书情报与档案管...
    • 515 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 321 篇 法学
    • 243 篇 社会学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 173 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 239 篇 software enginee...
  • 197 篇 deep learning
  • 196 篇 feature extracti...
  • 185 篇 computational mo...
  • 182 篇 machine learning
  • 162 篇 data mining
  • 149 篇 semantics
  • 145 篇 training
  • 136 篇 cloud computing
  • 130 篇 software
  • 127 篇 accuracy
  • 125 篇 internet of thin...
  • 121 篇 optimization
  • 119 篇 authentication
  • 116 篇 predictive model...
  • 107 篇 artificial intel...
  • 104 篇 security
  • 101 篇 educational inst...
  • 100 篇 servers

机构

  • 297 篇 college of compu...
  • 267 篇 school of comput...
  • 266 篇 school of inform...
  • 143 篇 school of comput...
  • 117 篇 state key labora...
  • 87 篇 school of softwa...
  • 84 篇 school of inform...
  • 55 篇 school of comput...
  • 52 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 42 篇 sri lanka instit...
  • 42 篇 shandong provinc...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of comput...

作者

  • 51 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 29 篇 susilo willy
  • 28 篇 huang min
  • 25 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 liu yang
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 21 篇 wang wei
  • 20 篇 lu dianjie
  • 20 篇 mahmood khalid

语言

  • 8,749 篇 英文
  • 494 篇 其他
  • 146 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9375 条 记 录,以下是351-360 订阅
排序:
Improving Code Coverage for Structural Testing by using Parametric Inter-procedural Slicing
Improving Code Coverage for Structural Testing by using Para...
收藏 引用
2023 IEEE Conference on computer Applications, ICCA 2023
作者: Aung, Myint Myitzu Win, Kay Thi University of Computer Studies Software Engineering Lab Mandalay Mandalay Myanmar University of Computer Studies Faculty of Information Science Mandalay Mandalay Myanmar
Structural testing is one of the testing techniques in software testing. It is the testing process of internal structure in the given source code by comparing the expected result and real results and finding out fault... 详细信息
来源: 评论
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 6141-6158页
作者: Bander Alzahrani Ahmed Barnawi Azeem Irshad Areej Alhothali Reem Alotaibi Muhammad Shafiq Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Software Engineering International Islamic University IslamabadPakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial *** example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider air footprint ... 详细信息
来源: 评论
Semantic-Aware Pseudo-Labeling for Unsupervised Meta-Learning
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5475-5488页
作者: Ouyang, Tianran Dong, Xingping Ye, Mang Du, Bo Shao, Ling Shen, Jianbing Wuhan University School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan430072 China University of Chinese Academy of Sciences UCAS-Terminus AI Lab Beijing101408 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 314100 China
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho... 详细信息
来源: 评论
A Prediction Method of Consumer Buying Behavior Based on Attention Mechanism and CNN-BiLSTM
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第2期7卷 375-385页
作者: Wang, Jian-Nan Cui, Jian-Feng Chen, Chin-Ling College of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China College of Software Engineering Xiamen University of Technology Xiamen361024 China School of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China School of Information Engineering Changchun Sci-Tech University Changchun130600 China Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung41349 Taiwan
A prediction method of consumer buying behavior based on attention mechanism and CNN-BiLSTM is proposed, to fully extract the effective features of the behavior and make its prediction more accurate and stable. In thi... 详细信息
来源: 评论
Human Gait Recognition Algorithm Based on MobileNetV1 with Attention Mechanism  3
Human Gait Recognition Algorithm Based on MobileNetV1 with A...
收藏 引用
3rd International Conference on Artificial Intelligence and computer engineering, ICAICE 2022
作者: Zhang, Jinsha Zhang, Xuedong School of Computer and Software Engineering University of Science and Technology Liaoning Anshan114051 China School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan114051 China
For embedded modern equipment, the current gait recognition algorithm model is difficult to deploy on it due to a large amount of gait frame image data, slow network processing speed, complex structure and low computa... 详细信息
来源: 评论
Deploying a Sustainable Deep Learning Pipeline for Poison Ivy Image Classification  1
Deploying a Sustainable Deep Learning Pipeline for Poison Iv...
收藏 引用
1st IEEE International Conference on Artificial Intelligence for Medicine, Health and Care, AIMHC 2024
作者: Park, Wonjun Kim, Subin Cho, Sumin Lee, Jiyeon Mahedy, Jack Gebresalssie, Nebey Lee, Minji Computer Science and Engineering Konkuk University Seoul Korea Republic of Computer Software Engineering Soonchunhyang University Asan Korea Republic of Human Centered Artificial Intelligence Sangmyung University Seoul Korea Republic of Computer Science and Engineering Kyonggi University Suwon Korea Republic of Computer and Information Technology Purdue University West LafayetteIN United States
Poison ivy, causing irritated skin in humans due to the urushiol oil it contains, is a well-known plant mainly distinguishable by the traits of its leaves. Nevertheless, according to the statistical data, a significan... 详细信息
来源: 评论
Secure Energy Efficiency for ARIS Networks With Deep Learning: Active Beamforming and Position Optimization
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 5282-5296页
作者: Wang, Dawei Wang, Zijun Zhao, Hongbo Zhou, Fuhui Alfarraj, Osama Yang, Weichao Mumtaz, Shahid Leung, Victor C. M. Northwestern Polytechnical University School of Electronics and Information Shaanxi Xi’an710072 China Beihang University School of Electronic and Information Engineering Beijing100191 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China King Saud University Community College Computer Science Department Riyadh11437 Saudi Arabia Nottingham Trent University Department of Computer Science NottinghamNG1 4FQ United Kingdom Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen528060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Incorporating an active reconfigurable intelligent surface on an autonomous aerial vehicles (AAVs), denoted as an aerial reconfigurable intelligent surface (ARIS), introduces a novel dimension for secure transmissions... 详细信息
来源: 评论
CPDZ: A Credibility-Aware and Privacy-Preserving Data Collection Scheme with Zero-Trust in Next-Generation Crowdsensing Networks
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2183-2199页
作者: Tang, Jianheng Fan, Kejia Yang, Shihao Liu, Anfeng Xiong, Neal N. Song, Houbing Herbert Leung, Victor C. M. Central South University School of Computer Science and Engineering Changsha410083 China Peking University School of Computer Science Beijing100871 China Sul Ross State University Department of Computer Mathematical and Physical Sciences AlpineTX79830 United States Department of Information Systems BaltimoreMD21250 United States Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Next-Generation Crowdsensing Networks (NGCNs) have become increasingly critical for smart cities, where data privacy and quality are pivotal concerns. Traditional trust mechanisms in crowdsensing mainly rely on static... 详细信息
来源: 评论
Region-adaptive Concept Aggregation for Few-shot Visual Recognition
收藏 引用
Machine Intelligence Research 2023年 第4期20卷 554-568页
作者: Mengya Han Yibing Zhan Baosheng Yu Yong Luo Han Hu Bo Du Yonggang Wen Dacheng Tao School of Computer Science National Engineering Research Center for Multimedia SoftwareWuhan UniversityWuhan430072China Hubei Luojia Laboratory Wuhan430072China School of Computer Science The University of SydneySydney2006Australia JD Explore Academy Beijing101116China School of Information and Electronics Beijing Institute of TechnologyBeijing100081China School of Computer Science and Engineering Nanyang Technological UniversitySingapore639798Singapore
Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking robustness in concept learning. Specifically, existing FSL methods usually ig... 详细信息
来源: 评论
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2023年 第12期24卷 14536-14545页
作者: Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Ghaffar, Zahid Khan, Muhammad Khurram Das, Ashok Kumar National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan King Saud University Center of Excellence in Information Assurance Riyadh11653 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud-centric framework to fulfil the applicati... 详细信息
来源: 评论