咨询与建议

限定检索结果

文献类型

  • 4,472 篇 会议
  • 2,971 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,762 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 342 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,257 篇 理学
    • 1,322 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 210 篇 training
  • 205 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 148 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 83 篇 artificial intel...

机构

  • 1,215 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 114 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 95 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 82 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 59 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 56 篇 college of softw...
  • 52 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 36 篇 he jingsha
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 25 篇 wu kaishun
  • 24 篇 yan li

语言

  • 7,070 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7510 条 记 录,以下是181-190 订阅
排序:
Anomaly Detection in Spatial Information Networks: A Security Knowledge Graph-based Approach
Anomaly Detection in Spatial Information Networks: A Securit...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Tan, Yayue Zhang, Yaqi Liu, Hui Tang, Yongqing College of Computer and Information Science School of Software Southwest University Chongqing China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies.... 详细信息
来源: 评论
Group Signature with Time-Bound Keys for Secure E-health Record Sharing
Group Signature with Time-Bound Keys for Secure E-health Rec...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lu, Junze Hu, Chunqiang Ruan, Conghao Cai, Bin Xiang, Tao Chongqing University School of Big Data & Software Engineering China Chongqing University College of Computer Science China
With the advent of various mobile IoT devices, a large amount of e-health record (EHR) data has been generated. This data has great potential to improve medical research. However, there are many challenges regarding t... 详细信息
来源: 评论
SFPL: Improving CRS via Prompt Learning based Semantic Fusion Module  4
SFPL: Improving CRS via Prompt Learning based Semantic Fusio...
收藏 引用
4th IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Song, Ao Lei, Zhou Chen, Shengbo Shanghai University College of Computer Engineering and Science Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
With the popularity of the Internet and the massive increase of content production, users are faced with massive information and content, and it is often difficult to accurately and efficiently find the content that m... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
DLICA: Deep Learning based novel Strategy for Intelligent Channel Adaption in Wireless SDN-IoT Environment  3
DLICA: Deep Learning based novel Strategy for Intelligent Ch...
收藏 引用
3rd International Conference on Communication, Computing and Digital Systems, C-CODE 2023
作者: Zabeehullah Arif, Fahim Abbas, Yawar Ahmad, Shahbaz Waseem, Muhammad Computer Software Engineering Military College of Signals Rawalpindi Pakistan Computer Science University of Engineering and Technology Lahore Pakistan
software-Defined Network (SDN) is an emerging networking paradigm and provides the cost-effective scalability and flexibility required for an IoT environment. Here, wireless SDN is supposed to efficiently use limited ... 详细信息
来源: 评论
Combatting the TrickBot Threat: Analysis, Impact, and Defensive Strategies in Cybersecurity  17
Combatting the TrickBot Threat: Analysis, Impact, and Defens...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Cao, Jintao Null, Allie Stewart, Marissa Bhunia, Suman Salman, Mohammad Miami University Department of Computer Science and Software Engineering OxfordOH United States University of Anbar College of Computer Anbar Iraq
The TrickBot Botnet, emerging in late 2016, has been a significant cybersecurity threat, leveraging sophisticated attack vectors such as phishing emails, network vulnerabilities, and secondary payloads. This paper pro... 详细信息
来源: 评论
AoI Analysis for Automatic Repeat-Request in Vehicular Cooperative Perception Networks  100
AoI Analysis for Automatic Repeat-Request in Vehicular Coope...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Huang, Qinan Zeng, Jianhua Guo, Chongtao Liu, Jing Pan, Haoyuan Shenzhen University College of Electronics and Information Engineering Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
Cooperative perception has been shown an effective approach to address the perception limitation problem faced by the individual perception in the era of autonomous driving. Considering a two-source two-hop cooperativ... 详细信息
来源: 评论
Framework for Effective Utilization of Distributed Scrum in software Projects
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 407-422页
作者: Basit Shahzad Wardah Naeem Awan Fazal-e-Amin Ahsanullah Abro Muhammad Shoaib Sultan Alyahya Department of Software Engineering National University of Modern LanguagesIslamabad44000Pakistan Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science Sukkur IBA UniversitySindh65200Pakistan Department of Information Systems College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
There is an emerging interest in using agile methodologies in Global software Development(GSD)to get the mutual benefits of both *** is currently admired by many development teams as an agile most known meth-odology a... 详细信息
来源: 评论
A Space-Efficient One-Pass Online SVM Algorithm
收藏 引用
International Journal of Computational Geometry and Applications 2024年 第1-2期34卷 63-79页
作者: Liu, Yangwei Huang, Ziyun Xu, Jinhui Department of Computer Science and Engineering State University of New York at Buffalo Buffalo NY United States Department of Computer Science and Software Engineering Penn State Erie The Behrend College Erie PA United States
In this paper we consider the problem of training a Support Vector Machine (SVM) online using a stream of data in random order. We provide a fast online training algorithm for general SVM on very large datasets. Based... 详细信息
来源: 评论
An Efficient Algorithm for the 2-Central Path Problem
收藏 引用
International Journal of Computational Geometry and Applications 2024年 第1-2期34卷 43-61页
作者: Huang, Ziyun Zhu, Yongding Xu, Jinhui Department of Computer Science and Software Engineering Penn State Erie The Behrend College Erie PA United States Department of Computer Science and Engineering State University of New York at Buffalo Buffalo NY United States
In this paper we consider the following 2-Central Path Problem (2CPP): Given a set of m polygonal curves = {P1,P2,...,Pm} in the plane, find two curves Pu and Pl, called 2-central paths, that best represent all curves... 详细信息
来源: 评论