咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,582 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,371 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,082 篇 工学
    • 4,759 篇 计算机科学与技术...
    • 3,947 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 714 篇 控制科学与工程
    • 689 篇 生物工程
    • 531 篇 电气工程
    • 416 篇 机械工程
    • 398 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 196 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,886 篇 管理学
    • 1,159 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 391 篇 医学
    • 332 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 196 篇 经济学
    • 196 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 240 篇 software enginee...
  • 200 篇 feature extracti...
  • 198 篇 deep learning
  • 189 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 145 篇 training
  • 140 篇 cloud computing
  • 134 篇 software
  • 127 篇 internet of thin...
  • 127 篇 accuracy
  • 122 篇 authentication
  • 120 篇 optimization
  • 118 篇 predictive model...
  • 106 篇 security
  • 105 篇 artificial intel...
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 113 篇 state key labora...
  • 91 篇 school of inform...
  • 88 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 46 篇 school of softwa...
  • 44 篇 sri lanka instit...
  • 42 篇 college of compu...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 37 篇 state key labora...
  • 37 篇 school of comput...

作者

  • 47 篇 shen linlin
  • 35 篇 sun xingming
  • 35 篇 mohammad s. obai...
  • 35 篇 xu xiaolong
  • 33 篇 qi lianyong
  • 33 篇 ismail leila
  • 32 篇 susilo willy
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 27 篇 huang min
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 21 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,315 篇 英文
  • 929 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9371 条 记 录,以下是361-370 订阅
排序:
Semantic-Aware Pseudo-Labeling for Unsupervised Meta-Learning
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5475-5488页
作者: Ouyang, Tianran Dong, Xingping Ye, Mang Du, Bo Shao, Ling Shen, Jianbing Wuhan University School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan430072 China University of Chinese Academy of Sciences UCAS-Terminus AI Lab Beijing101408 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 314100 China
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho... 详细信息
来源: 评论
A Prediction Method of Consumer Buying Behavior Based on Attention Mechanism and CNN-BiLSTM
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第2期7卷 375-385页
作者: Wang, Jian-Nan Cui, Jian-Feng Chen, Chin-Ling College of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China College of Software Engineering Xiamen University of Technology Xiamen361024 China School of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China School of Information Engineering Changchun Sci-Tech University Changchun130600 China Department of Computer Science and Information Engineering Chaoyang University of Technology Taichung41349 Taiwan
A prediction method of consumer buying behavior based on attention mechanism and CNN-BiLSTM is proposed, to fully extract the effective features of the behavior and make its prediction more accurate and stable. In thi... 详细信息
来源: 评论
Secure Energy Efficiency for ARIS Networks With Deep Learning: Active Beamforming and Position Optimization
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 5282-5296页
作者: Wang, Dawei Wang, Zijun Zhao, Hongbo Zhou, Fuhui Alfarraj, Osama Yang, Weichao Mumtaz, Shahid Leung, Victor C. M. Northwestern Polytechnical University School of Electronics and Information Shaanxi Xi’an710072 China Beihang University School of Electronic and Information Engineering Beijing100191 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China King Saud University Community College Computer Science Department Riyadh11437 Saudi Arabia Nottingham Trent University Department of Computer Science NottinghamNG1 4FQ United Kingdom Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen528060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Incorporating an active reconfigurable intelligent surface on an autonomous aerial vehicles (AAVs), denoted as an aerial reconfigurable intelligent surface (ARIS), introduces a novel dimension for secure transmissions... 详细信息
来源: 评论
Human Gait Recognition Algorithm Based on MobileNetV1 with Attention Mechanism  3
Human Gait Recognition Algorithm Based on MobileNetV1 with A...
收藏 引用
3rd International Conference on Artificial Intelligence and computer engineering, ICAICE 2022
作者: Zhang, Jinsha Zhang, Xuedong School of Computer and Software Engineering University of Science and Technology Liaoning Anshan114051 China School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan114051 China
For embedded modern equipment, the current gait recognition algorithm model is difficult to deploy on it due to a large amount of gait frame image data, slow network processing speed, complex structure and low computa... 详细信息
来源: 评论
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews
Can end-user feedback in social media be trusted for softwar...
收藏 引用
作者: Khan, Javed Ali Ullah, Tahir Khan, Arif Ali Yasin, Affan Akbar, Muhammad Azeem Aurangzeb, Khursheed Department of Computer Science Faculty of Physics Engineering and Computer Science University of Hertfordshire Hatfield United Kingdom School of Computer & Technology Beijing Institute of Technology Beijing China M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland School of Software Northwestern Polytechnical University Shaanxi Xian China Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland Department of Computer Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
End-user feedback in social media platforms, particularly in the app stores, is increasing exponentially with each passing day. software researchers and vendors started to mine end-user feedback by proposing text anal... 详细信息
来源: 评论
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2023年 第12期24卷 14536-14545页
作者: Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Ghaffar, Zahid Khan, Muhammad Khurram Das, Ashok Kumar National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan King Saud University Center of Excellence in Information Assurance Riyadh11653 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud-centric framework to fulfil the applicati... 详细信息
来源: 评论
Region-adaptive Concept Aggregation for Few-shot Visual Recognition
收藏 引用
Machine Intelligence Research 2023年 第4期20卷 554-568页
作者: Mengya Han Yibing Zhan Baosheng Yu Yong Luo Han Hu Bo Du Yonggang Wen Dacheng Tao School of Computer Science National Engineering Research Center for Multimedia SoftwareWuhan UniversityWuhan430072China Hubei Luojia Laboratory Wuhan430072China School of Computer Science The University of SydneySydney2006Australia JD Explore Academy Beijing101116China School of Information and Electronics Beijing Institute of TechnologyBeijing100081China School of Computer Science and Engineering Nanyang Technological UniversitySingapore639798Singapore
Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking robustness in concept learning. Specifically, existing FSL methods usually ig... 详细信息
来源: 评论
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论
Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4695-4711页
作者: Mohammed Altaf Ahmed Sara A Althubiti Dronamraju Nageswara Rao ELaxmi Lydia Woong Cho Gyanendra Prasad Joshi Sung Won Kim Department of Computer Engineering College of Computer Engineering&SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science and Engineering Chitkara University Institute of Engineering and TechnologyChitkara UniversityPunjab140401India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Software Convergence Daegu Catholic UniversityGyeongsan38430Korea Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-siGyeongbuk-do38541Korea
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet... 详细信息
来源: 评论
Remote Sensing Based Advance Image Captioning Improved Feature Attention  7
Remote Sensing Based Advance Image Captioning Improved Featu...
收藏 引用
7th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2024
作者: Sattar, Ammara Assam, Muhammad Alahmadi, Tahani Jaser Bhatti, Uzair Aslam Tang, Hao Aamir, Muhammad Harbin Engineering University Harbin China University of Science and Technology Department of Software Engineering KPK Bannu Pakistan College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia School of Information and Communication Engineering Hainan University Haikou China College of Computer Science Huanggang Normal University Huanggang China
In the domain of image description generation, the focal point mechanism is crucial for highlighting the most relevant features within an image, thereby influencing the quality of generated descriptions. To address th... 详细信息
来源: 评论