咨询与建议

限定检索结果

文献类型

  • 21,069 篇 会议
  • 10,063 篇 期刊文献
  • 238 册 图书
  • 6 篇 专利
  • 1 篇 学位论文

馆藏范围

  • 31,377 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 19,615 篇 工学
    • 14,693 篇 计算机科学与技术...
    • 12,241 篇 软件工程
    • 3,990 篇 信息与通信工程
    • 2,588 篇 控制科学与工程
    • 2,019 篇 生物工程
    • 1,817 篇 电气工程
    • 1,478 篇 机械工程
    • 1,463 篇 电子科学与技术(可...
    • 1,207 篇 生物医学工程(可授...
    • 1,073 篇 光学工程
    • 964 篇 化学工程与技术
    • 779 篇 仪器科学与技术
    • 763 篇 动力工程及工程热...
    • 750 篇 安全科学与工程
    • 640 篇 交通运输工程
    • 637 篇 材料科学与工程(可...
    • 574 篇 建筑学
  • 9,244 篇 理学
    • 5,130 篇 数学
    • 2,288 篇 物理学
    • 2,195 篇 生物学
    • 1,505 篇 统计学(可授理学、...
    • 1,017 篇 系统科学
    • 885 篇 化学
  • 5,996 篇 管理学
    • 3,818 篇 管理科学与工程(可...
    • 2,488 篇 图书情报与档案管...
    • 1,657 篇 工商管理
  • 1,117 篇 医学
    • 974 篇 临床医学
    • 851 篇 基础医学(可授医学...
  • 871 篇 法学
    • 690 篇 社会学
  • 639 篇 经济学
    • 637 篇 应用经济学
  • 551 篇 教育学
  • 295 篇 农学
  • 93 篇 文学
  • 93 篇 军事学
  • 64 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 1,006 篇 software enginee...
  • 641 篇 feature extracti...
  • 622 篇 training
  • 609 篇 deep learning
  • 559 篇 computational mo...
  • 522 篇 software
  • 512 篇 computer science
  • 443 篇 accuracy
  • 437 篇 semantics
  • 389 篇 machine learning
  • 386 篇 data mining
  • 319 篇 internet of thin...
  • 309 篇 computer archite...
  • 289 篇 data models
  • 285 篇 application soft...
  • 285 篇 predictive model...
  • 274 篇 conferences
  • 265 篇 cloud computing
  • 260 篇 support vector m...
  • 251 篇 optimization

机构

  • 754 篇 school of inform...
  • 498 篇 state key labora...
  • 469 篇 school of softwa...
  • 452 篇 college of compu...
  • 342 篇 school of softwa...
  • 220 篇 school of comput...
  • 219 篇 school of softwa...
  • 153 篇 school of comput...
  • 144 篇 university of el...
  • 140 篇 school of softwa...
  • 102 篇 school of comput...
  • 99 篇 school of comput...
  • 90 篇 school of softwa...
  • 89 篇 school of softwa...
  • 88 篇 school of softwa...
  • 77 篇 school of big da...
  • 77 篇 beijing engineer...
  • 75 篇 software enginee...
  • 73 篇 national key lab...
  • 68 篇 department of co...

作者

  • 58 篇 wang lei
  • 55 篇 liu yang
  • 47 篇 lei wang
  • 46 篇 bieliková mária
  • 40 篇 baowen xu
  • 38 篇 xiong hu
  • 38 篇 li li
  • 37 篇 shen furao
  • 36 篇 wang jian
  • 36 篇 wei jun
  • 35 篇 sun xingming
  • 33 篇 wang hui
  • 32 篇 jun zhang
  • 30 篇 zhou zhi-hua
  • 30 篇 zhang tao
  • 30 篇 john grundy
  • 29 篇 niyato dusit
  • 29 篇 stefan biffl
  • 29 篇 li xin
  • 29 篇 liu jinyuan

语言

  • 29,929 篇 英文
  • 962 篇 其他
  • 496 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 7 篇 土耳其文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Software Engineering and Technology"
31377 条 记 录,以下是101-110 订阅
排序:
Research and Application of E-commerce Marketing Fraud Detection Method Based on Graph Neural Network  24
Research and Application of E-commerce Marketing Fraud Detec...
收藏 引用
2nd International Conference on Artificial Intelligence, Systems and Network Security, AISNS 2024
作者: Zhu, Hui Huang, Zihao Zhong, Weijie Wang, Zhenyu School of Economics and Trade Guangdong Mechanical &Electrical Polytechnic Guangzhou China School of Software Engineering South China University of Technology Guangzhou China School of Software Engineering South China University of Technology Guangdong Guangzhou China
In recent years, graph-based E-commerce Fraud detection methods have received more and more attention, but there are still some problems. Firstly, fraudulent users only account for a small part of active users, and th... 详细信息
来源: 评论
Efficient Low-Polygon Building Model Generation with Opening Detection  41st
Efficient Low-Polygon Building Model Generation with Openin...
收藏 引用
41st Computer Graphics International Conference, CGI 2024
作者: Wang, Yixian Lin, Boheng Chen, Weiya Wan, Lin School of Software and Engineering Huazhong University of Science and Technology Wuhan China School of Civil and Hydraulic Engineering Huazhong University of Science and Technology Wuhan China
With the rapid increase of complexity and volume of 3D building models, industries such as digital games and computer-aided design face considerable challenges. One feasible solution is to generate low-polygon models ... 详细信息
来源: 评论
Advancing Evasion: Distributed Backdoor Attacks in Federated Learning  25th
Advancing Evasion: Distributed Backdoor Attacks in Federate...
收藏 引用
25th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2024
作者: Wang, Jian Shen, Hong Ke, Wei Faculty of Applied Sciences Macao Polytechnic University China School of Engineering and Technology Central Queensland University Rockhampton Australia School of Software Technology Guangzhou Institute of Software Guangzhou China
Federated Learning (FL) is vulnerable to backdoor attacks through data poisoning if the data is not scrutinized, as malicious participants can inject backdoor triggers in normal samples, leading to poisoned updates. D... 详细信息
来源: 评论
Two Compact Hybrid Band-Pass Filters Using Eighth-Mode Substrate-Integrated Waveguide and Microstrip Resonators
收藏 引用
Progress in Electromagnetics Research C 2025年 151卷 167-175页
作者: Tang, Luyao Han, Wei Wei, Hao Li, Yanbin The 54th Research Institute of China Electronics Technology Group Corporation China National Engineering Reasearch Center of Communication Software and Asic Design China
Two compact substrate-integrated waveguide (SIW) filters with hybrid coupling of eighth-mode substrate integrated waveg-uide (EMSIW) resonators and microstrip are proposed in this paper. Hybrid coupled filters were ac... 详细信息
来源: 评论
SQUMUTH squirrel search based algorithm for high order mutant generation in mutation testing
收藏 引用
Discover Computing 2025年 第1期28卷 1-17页
作者: Mohanty, Subhasish Mishra, Jyotirmaya Mohapatra, Sudhir Kumar Bejo, Seifu Detso Deferisha, Aliazar Deneke Computer Science and Engineering GIET University Odisha Gunupur India Faculty of Engineering and Technology Sri Sri University Cuttack India Department of Software Engineering CCI Wolkite University Wolkite Ethiopia Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia
In today's software testing community, quality assessment remains critical, with mutation testing standing as a cornerstone technique for evaluating the effectiveness of test cases. This method involves introducin... 详细信息
来源: 评论
Credible Negotiation for Multi-agent Reinforcement Learning in Long-term Coordination
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 2025年 第1期20卷 1-27页
作者: Gu, Tianlong Zhi, Taihang Bao, Xuguang Chang, Liang Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Engineering Research Center of Trustworthy Ai Jinan University Guangzhou China
The coordination of multi-agent is one of the critical problems in Multi-agent Reinforcement Learning (MARL). The traditional methods of MARL focus on finding a stochastically acceptable solution called Nash Equilibri... 详细信息
来源: 评论
Learning Hierarchical Adaptive Code Clouds for Neural 3D Shape Representation
收藏 引用
Machine Intelligence Research 2025年 第2期22卷 304-323页
作者: Yuanxun Lu Xinya Ji Hao Zhu Xun Cao State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China School of Electronic Science and Engineering Nanjing UniversityNanjing 210023China School of Intelligence Science and Technology Nanjing UniversitySuzhou 215163China
Neural implicit representation(NIR)has attracted significant attention in 3D shape representation for its efficiency,generalizability,and flexibility compared with traditional explicit *** works usually parameterize s... 详细信息
来源: 评论
Heterogeneous signcryption scheme from CLC to IBC for IIoT
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第4期18卷 1-14页
作者: Jin, Chunhua Qin, Wenyu Chen, Zhiwei Li, Chenhao Chen, Xiaobing Chen, Guanhua Zhang, Hao Weng, Jian Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai’an 233003 China The College of Information Science and Technology Jinan University Zhuhuai 510632 China
The Industrial Internet of Things (IIoT) involves the real-time gathering of information from physical devices and technologies for improved perception and management. To ensure information transmission security, an e... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论
DA-FR-UNet: A Dual Attention-Enhanced Approach for Retinal Vessel Image Segmentation
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of Computer Science 2025年 第5期52卷 1325-1335页
作者: Li, Yuanyuan Wu, Jiansheng Liu, Yang School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China University of Science and Technology Liaoning Anshan114051 China
Retinal vessel image segmentation is crucial for the early diagnosis and treatment of ophthalmic diseases. However, accurate segmentation remains challenging due to the complexity and diversity of retinal images, as w... 详细信息
来源: 评论