咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,582 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,371 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,082 篇 工学
    • 4,759 篇 计算机科学与技术...
    • 3,947 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 714 篇 控制科学与工程
    • 689 篇 生物工程
    • 531 篇 电气工程
    • 416 篇 机械工程
    • 398 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 196 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,886 篇 管理学
    • 1,159 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 391 篇 医学
    • 332 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 196 篇 经济学
    • 196 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 240 篇 software enginee...
  • 200 篇 feature extracti...
  • 198 篇 deep learning
  • 189 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 145 篇 training
  • 140 篇 cloud computing
  • 134 篇 software
  • 127 篇 internet of thin...
  • 127 篇 accuracy
  • 122 篇 authentication
  • 120 篇 optimization
  • 118 篇 predictive model...
  • 106 篇 security
  • 105 篇 artificial intel...
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 113 篇 state key labora...
  • 91 篇 school of inform...
  • 88 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 46 篇 school of softwa...
  • 44 篇 sri lanka instit...
  • 42 篇 college of compu...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 37 篇 state key labora...
  • 37 篇 school of comput...

作者

  • 47 篇 shen linlin
  • 35 篇 sun xingming
  • 35 篇 mohammad s. obai...
  • 35 篇 xu xiaolong
  • 33 篇 qi lianyong
  • 33 篇 ismail leila
  • 32 篇 susilo willy
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 27 篇 huang min
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 21 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,315 篇 英文
  • 929 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9371 条 记 录,以下是4851-4860 订阅
排序:
Identity-based public key cryptographic primitive with delegated equality test against insider attack in cloud computing
收藏 引用
International Journal of Network Security 2020年 第5期22卷 743-751页
作者: Alornyo, Seth Mensah, Acheampong Edward Abbam, Abraham Opanfo School of Information and Software Engineering University of Electronic Science and Technology of China 4 E 2nd Sec. 1st Ring Rd Jianshe Road Chenghua Chengdu Sichuan China Computer Science Department Koforidua Technical University Koforidua Ghana
The notion of attacks perpetuated by an insider (cloud server) is paramount in this era of cloud computing and data analytics. When a cloud server is delegated with certain responsibilities, it is possible for a cloud... 详细信息
来源: 评论
The Quantum Internet (Technical Version)
arXiv
收藏 引用
arXiv 2025年
作者: Rohde, Peter P. Huang, Zixin Ouyang, Yingkai Huang, He-Liang Su, Zu-En Devitt, Simon Ramakrishnan, Rohit Mantri, Atul Tan, Si-Hui Liu, Nana Harrison, Scott Radhakrishnan, Chandrashekar Brennen, Gavin K. Baragiola, Ben Q. Dowling, Jonathan P. Byrnes, Tim Munro, William J. Centre for Quantum Software and Information Faculty of Engineering and Information Technology University of Technology Sydney SydneyNSW Australia Hearne Institute for Theoretical Physics Louisiana State University Baton Rouge United States School of Mathematical and Physical Sciences Macquarie University NSW2109 Australia School of Mathematical and Physical Sciences University of Sheffield SheffieldS3 7RH United Kingdom Henan Key Laboratory of Quantum Information and Cryptography Henan Zhengzhou450000 China Hefei National Laboratory for Physical Sciences at Microscale Department of Modern Physics University of Science & Technology of China Hefei China CAS Centre for Excellence and Synergetic Innovation Centre in Quantum Information & Quantum Physics University of Science & Technology of China Hefei China CAS-Alibaba Quantum Computing Laboratory Shanghai China InstituteQ Aalto University Espoo02150 Finland Indian Institute of Science Bangalore India Singapore University of Technology & Design Singapore Centre for Quantum Technologies National University of Singapore Singapore Horizon Quantum Ireland 24 Fitzwilliam Place Dublin 2 D02 T296 Ireland Institute of Natural Sciences Shanghai Jiao Tong University Shanghai200240 China School of Mathematical Sciences Shanghai Jiao Tong University Shanghai200240 China Ministry of Education Key Laboratory in Scientific and Engineering Computing Shanghai Jiao Tong University Shanghai200240 China Shanghai Artificial Intelligence Laboratory Shanghai China University of Michigan Shanghai Jiao Tong University Joint Institute Shanghai200240 China Leibniz Institute for Research & Information in Education Frankfurt am Main Germany Department of Computer Science and Engineering NYU Shanghai 567 West Yangsi Road Shanghai200124 China Centre of Excellence in Engineered Quantum Systems Macquarie University NSW Australia Centre for Quantum Computation and Communication Technology School of Science RMIT University VIC
The desire to share and unite remote digital assets motivated the development of the classical internet, the enabler of the entire 21st century economy and our modern way of life. As we enter the quantum era, it is to... 详细信息
来源: 评论
PGD-UNet: A Position-Guided Deformable Network for Simultaneous Segmentation of Organs and Tumors
arXiv
收藏 引用
arXiv 2020年
作者: Li, Ziqiang Zhu, Yaping Pan, Hong Qin, A.K. School of Automation Southeast University No.2 Sipailou Nanjing210096 China School of Information and Communication Engineering Communication University of China No.1 Dingfuzhuang East Street Beijing100024 China Department of Computer Science and Software Engineering Swinburne University of Technology John St HawthornVIC3122 Australia
Precise segmentation of organs and tumors plays a crucial role in clinical applications. It is a challenging task due to the irregular shapes and various sizes of organs and tumors as well as the significant class imb... 详细信息
来源: 评论
Mural sketch generation via style-aware convolutional neural network  2018
Mural sketch generation via style-aware convolutional neural...
收藏 引用
2018 computer Graphics International Conference, CGI 2018
作者: Pan, Gang Sun, Di Zhan, Rui Zhang, Jiawan School of Computer Software Tianjin University China School of Computer Science and Information Engineering Tianjin University of Science and Technology China
Sketch is one of the most important art expression forms for traditional Chinese painting. This paper presents a complete sketch generation framework for ancient mural paintings. First, we propose a deep learning netw... 详细信息
来源: 评论
A Survey on Hand-based Behavioral Activity Recognition
A Survey on Hand-based Behavioral Activity Recognition
收藏 引用
International Conference on Wavelet Active Media Technology and information Processing (ICWAMTIP)
作者: Happy Nkanta Monday Jian Ping Li Grace Ugochi Nneji Mordecai Folarin Raji Chima C. Ukwuoma Jalaluddin Khan Chukwuebuka J. Ejiyi Amin Ulhaq Saifun Nahar Hassan S. Abubakar Chikwendu A. Ijeoma School of Computer Science and engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu
Wrist-worn devices such as smart-watches can be a perfect way to collect personalized user data, since these devices are embedded with various sensors such as the accelerometer and gyroscope which can sense user's... 详细信息
来源: 评论
Linear adjusting programming in factor space
arXiv
收藏 引用
arXiv 2020年
作者: He, Jing Kong, Qi-Wei Lui, Ho-Chung Liu, Hai-Tao Ji, Yi-Mu Yao, Hai-Chang Liu, Mo-Zhengfu Chen, Jin-Jun School of Software and Electrical Engineering Swinburne University of Technology Hawthorn Australia Institute of Information Engineering Nanjing University of Finance and Economics Nanjing China Research Center on Fictitious economy & Data Science Chinese Academy of Sciences Beijing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Swinburne University of Technology Melbourne3122 Australia
The definition of factor space and a unified optimization based classification model were developed for linear programming and supervised learning. Intelligent behaviour appeared in a decision process can be treated a... 详细信息
来源: 评论
ROBY: Evaluating the robustness of a deep model by its decision boundaries
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Jinyin Wang, Zhen Zheng, Haibin Xiao, Jun Ming, Zhaoyan Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China College of Software Technology Zhejiang University Hangzhou310007 China College of Information Engineering Zhejiang University of Technology Hangzhou310007 China College of Computer Science and Technology Zhejiang University Hangzhou310007 China Institute of Computing Innovation Zhejiang Univeristy Hangzhou310023 China
With the successful application of deep learning models in many real-world tasks, the model robustness becomes more and more critical. Often, we evaluate the robustness of the deep models by attacking them with purpos... 详细信息
来源: 评论
BuildSenSys: Reusing building sensing data for traffic prediction with cross-domain learning
arXiv
收藏 引用
arXiv 2020年
作者: Fan, Xiaochen Xiang, Chaocan Chen, Chao Yang, Panlong Gong, Liangyi Song, Xudong Nanda, Priyadarsi He, Xiangjian School of Electrical and Data Engineering Faculty of Engineering and Information Technology University of Technology SydneyNSW2007 Australia Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing University Ministry of Education China College of Computer Science Chongqing University Chongqing400044 China School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230026 China School of Software BNRist Tsinghua University Beijing100084 China
With the rapid development of smart cities, smart buildings are generating a massive amount of building sensing data by the equipped sensors. Indeed, building sensing data provides a promising way to enrich a series o... 详细信息
来源: 评论
Some characterizations of coherent rings in terms of strongly FP-injective modules
收藏 引用
Communications in Algebra 2020年 第7期48卷 2857-2871页
作者: Chen, Mingzhao Kim, Hwankoo Wang, Fanggui Zhang, Xiaolei College of Mathematics and Information Science Leshan Normal University Leshan China Division of Computer & Information Engineering Hoseo University Asan South Korea College of Mathematics and Software Science Sichuan Normal University Chengdu China Department of Basic Courses Chengdu Aeronautic Polytechnic Chengdu China
An R-module M is called strongly FP-injective if (Formula presented.) for any finitely presented R-module P and any i > 0. Denoted by (Formula presented.) the class of all strongly FP-injective R-modules and by (Fo... 详细信息
来源: 评论
Quantum circuit architecture search for variational quantum algorithms
arXiv
收藏 引用
arXiv 2020年
作者: Du, Yuxuan Huang, Tao You, Shan Hsieh, Min-Hsiu Tao, Dacheng Ubtech Sydney Ai Centre School of Computer Science Faculty of Engineering The University of Sydney NSW2008 Australia Jd Explore Academy Beijing101111 China SenseTime Beijing100080 China Centre for Quantum Software and Information Faculty of Engineering and Information Technology University of Technology Sydney NSW2007 Australia Hon Hai Quantum Computing Research Center Taipei114 Taiwan
Variational quantum algorithms (VQAs) are expected to be a path to quantum advantages on noisy intermediate-scale quantum devices. However, both empirical and theoretical results exhibit that the deployed ansatz heavi... 详细信息
来源: 评论