咨询与建议

限定检索结果

文献类型

  • 5,706 篇 会议
  • 3,631 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,151 篇 工学
    • 4,817 篇 计算机科学与技术...
    • 3,978 篇 软件工程
    • 1,355 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 692 篇 生物工程
    • 571 篇 电气工程
    • 420 篇 机械工程
    • 410 篇 电子科学与技术(可...
    • 385 篇 生物医学工程(可授...
    • 350 篇 光学工程
    • 235 篇 动力工程及工程热...
    • 213 篇 安全科学与工程
    • 213 篇 网络空间安全
    • 210 篇 化学工程与技术
    • 208 篇 仪器科学与技术
    • 177 篇 交通运输工程
  • 2,810 篇 理学
    • 1,571 篇 数学
    • 759 篇 生物学
    • 621 篇 物理学
    • 467 篇 统计学(可授理学、...
    • 308 篇 系统科学
    • 228 篇 化学
  • 1,917 篇 管理学
    • 1,185 篇 管理科学与工程(可...
    • 811 篇 图书情报与档案管...
    • 513 篇 工商管理
  • 399 篇 医学
    • 335 篇 临床医学
    • 300 篇 基础医学(可授医学...
    • 187 篇 公共卫生与预防医...
  • 326 篇 法学
    • 247 篇 社会学
  • 201 篇 经济学
    • 199 篇 应用经济学
  • 175 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 242 篇 software enginee...
  • 205 篇 deep learning
  • 203 篇 feature extracti...
  • 190 篇 computational mo...
  • 188 篇 machine learning
  • 165 篇 data mining
  • 151 篇 semantics
  • 143 篇 training
  • 137 篇 cloud computing
  • 136 篇 accuracy
  • 132 篇 software
  • 128 篇 internet of thin...
  • 124 篇 optimization
  • 122 篇 authentication
  • 119 篇 predictive model...
  • 108 篇 artificial intel...
  • 106 篇 security
  • 102 篇 servers
  • 101 篇 neural networks

机构

  • 305 篇 college of compu...
  • 272 篇 school of inform...
  • 267 篇 school of comput...
  • 144 篇 school of comput...
  • 114 篇 state key labora...
  • 89 篇 school of softwa...
  • 88 篇 school of inform...
  • 55 篇 school of comput...
  • 50 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 44 篇 shandong provinc...
  • 43 篇 college of compu...
  • 42 篇 college of infor...
  • 41 篇 sri lanka instit...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of big da...

作者

  • 52 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 30 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 28 篇 huang min
  • 26 篇 qi liu
  • 26 篇 susilo willy
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 23 篇 zhang zhao
  • 22 篇 liu yang
  • 22 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,096 篇 英文
  • 1,223 篇 其他
  • 156 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9449 条 记 录,以下是4591-4600 订阅
排序:
Multiparty quantum sealed-bid auction using single photons as message carrier
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Wen-Jie Wang, Hai-Bin Yuan, Gong-Lin Xu, Yong Chen, Zhen-Yu An, Xing-Xing Ji, Fu-Gao Gnitou, Gnim Tchalim Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China College of Mathematics and Information Science Guangxi University Nanning Guangxi China School of Electronics & Information Engineering Nanjing University of Information Science & Technology Nanjing210044 China
In this study, a novel multiparty quantum sealed-bid auction protocol using the single photons as the message carrier of bids is proposed, followed by an example of three-party auction. Compared with those protocols b... 详细信息
来源: 评论
A NOMA Power Allocation Strategy Based on Genetic Algorithm  8th
A NOMA Power Allocation Strategy Based on Genetic Algorithm
收藏 引用
8th International Conference on Communications, Signal Processing, and Systems, CSPS 2019
作者: Yin, Lu Chenggong, Wang Kai, Mao Kuanxin, Bao Haowei, Bian Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Nanjing University of Posts and Telecommunications Ministry of Education Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
The NOMA technology uses the power domain non-orthogonal multiplexing method to enable multiple users to occupy the entire frequency band simultaneously to transmit signals. In order to maximize the total transmission... 详细信息
来源: 评论
Data Anonymous Authentication for BIoMT with Proxy Group Signature
收藏 引用
Journal of Cyber Security 2021年 第4期3卷 207-216页
作者: Chaoyang Li Yalan Wang Gang Xu Xiubo Chen Xiangjun Xin Jian Li College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450001China Department of Computer Science University of SurreyGuildfordSurreyGU27XHUK School of Computing Science and Technology North China University of TechnologyBeijing100144China Information Security Centre State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical *** blockchain-enabled Internet of Medical Things(BIoMT)has been developed to re... 详细信息
来源: 评论
Iterative Algorithm Induced Deep-Unfolding Neural Networks: Precoding Design for Multiuser MIMO Systems
arXiv
收藏 引用
arXiv 2020年
作者: Hu, Qiyu Cai, Yunlong Shi, Qingjiang Xu, Kaidi Yu, Guanding Ding, Zhi College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China School of Software Engineering Tongji University Shanghai China Department of Electrical and Computer Engineering University of California DavisCA95616 United States
Optimization theory assisted algorithms have received great attention for precoding design in multiuser multiple-input multiple-output (MU-MIMO) systems. Although the resultant optimization algorithms are able to prov... 详细信息
来源: 评论
Correction to: Feature selection and risk prediction for patients with coronary artery disease using data mining
收藏 引用
Medical & biological engineering & computing 2022年 第3期60卷 887页
作者: Nashreen Md Idris Yin Kia Chiam Kasturi Dewi Varathan Wan Azman Wan Ahmad Kok Han Chee Yih Miin Liew Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya 50603 Kuala Lumpur Malaysia. Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya 50603 Kuala Lumpur Malaysia. yinkia@um.edu.my. Department of Information Systems Faculty of Computer Science and Information Technology Universiti Malaya 50603 Kuala Lumpur Malaysia. Department of Medicine University Malaya Medical Centre 50603 Kuala Lumpur Malaysia. Department of Biomedical Engineering Faculty of Engineering Universiti Malaya 50603 Kuala Lumpur Malaysia.
来源: 评论
Recommender systems based on generative adversarial networks: a problem-driven perspective
arXiv
收藏 引用
arXiv 2020年
作者: Gao, Min Zhang, Junwei Yu, Junliang Li, Jundong Wen, Junhao Xiong, Qingyu Department of Electrical and Computer Engineering Department of Computer Science School of Data Science University of Virginia Charlottesville22904 United States School of Information Technology and Electrical Engineering University of Queensland QLD4072 Australia School of Big Data and Software Engineering Chongqing University Chongqing401331 China
Recommender systems (RS) play a very important role in various aspects of people’s online life. Many companies leverage RS to help users discover new and favored items. Despite their empirical success, these systems ... 详细信息
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论
Federated learning in network traffic classification: Taxonomy of implementation, application, and impact on sixth-generation wireless networks
收藏 引用
engineering Applications of Artificial Intelligence 2025年 158卷
作者: Azizi Ariffin Firdaus Afifi Faiz Zaki Hazim Hanif Nor Badrul Anuar Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya 50603 Kuala Lumpur Malaysia School of Computing Sciences College of Computing Informatics and Mathematics Universiti Teknologi MARA 40450 Shah Alam Selangor Malaysia Faculty of Computer Science and Mathematics Universiti Malaysia Terengganu Kuala Nerus Terengganu 21030 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya 50603 Kuala Lumpur Malaysia Centre of Research for Cyber Security and Network (CSNET) Faculty of Computer Science and Information Technology Universiti Malaya 50603 Kuala Lumpur Malaysia Institute of Informatics & Computing in Energy Universiti Tenaga Nasional Putrajaya Kampus 43000 Kajang Selangor Malaysia
Objectives Network traffic classification (NTC) is crucial for network management. However, the surge in Internet traffic poses scalability and privacy issues. Researchers are turning to federated learning (FL) to tac...
来源: 评论
Geometry Constrained Weakly Supervised Object Localization
arXiv
收藏 引用
arXiv 2020年
作者: Lu, Weizeng Jia, Xi Xie, Weicheng Shen, Linlin Zhou, Yicong Duan, Jinming Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China School of Computer Science University of Birmingham United Kingdom Department of Computer and Information Science University of Macau China
We propose a geometry constrained network, termed GC-Net, for weakly supervised object localization (WSOL). GC-Net consists of three modules: a detector, a generator and a classifier. The detector predicts the object ... 详细信息
来源: 评论
Average-case algorithms for testing isomorphism of polynomials, algebras, and multilinear forms
arXiv
收藏 引用
arXiv 2020年
作者: Grochow, Joshua A. Qiao, Youming Tang, Gang Departments of Computer Science and Mathematics University of Colorado—Boulder BoulderCO80309-0430 United States Centre for Quantum Software and Information School of Computer Science Faculty of Engineering and Information Technology University of Technology SydneyNSW2150 Australia
We study the problems of testing isomorphism of polynomials, algebras, and multilinear forms. Our first main results are average-case algorithms for these problems. For example, we develop an algorithm that takes two ... 详细信息
来源: 评论