咨询与建议

限定检索结果

文献类型

  • 4,472 篇 会议
  • 2,948 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 7,421 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,744 篇 工学
    • 3,653 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 338 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,257 篇 理学
    • 1,322 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 212 篇 training
  • 204 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 158 篇 machine learning
  • 154 篇 educational inst...
  • 149 篇 accuracy
  • 141 篇 computer science
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 111 篇 software enginee...
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 99 篇 internet of thin...
  • 90 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 80 篇 image segmentati...

机构

  • 1,203 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 113 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 96 篇 college of compu...
  • 91 篇 software college...
  • 89 篇 state key labora...
  • 83 篇 school of softwa...
  • 71 篇 school of comput...
  • 67 篇 national enginee...
  • 60 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 56 篇 college of softw...
  • 56 篇 state key labora...
  • 51 篇 college of compu...
  • 49 篇 school of inform...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 46 篇 leung victor c.m...
  • 36 篇 he jingsha
  • 35 篇 laizhong cui
  • 34 篇 lin qiuzhen
  • 33 篇 wang xingwei
  • 33 篇 zhong ming
  • 30 篇 zhen ji
  • 30 篇 victor c. m. leu...
  • 30 篇 jianqiang li
  • 29 篇 kaishun wu
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 26 篇 wu kaishun
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 24 篇 yan li

语言

  • 6,981 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7421 条 记 录,以下是191-200 订阅
排序:
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs  22
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lu, Jincheng Cai, Miao Ye, Baoliu Hohai University College of Computer Science and Software Engineering Nanjing China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
High fan-out requests are prevalent in systems employing multi-tier architectures. These requests are divided into several sub-requests for parallel processing. However, a high fan-out request must await all sub-reque... 详细信息
来源: 评论
A Curious Case of Searching for the Correlation between Training Data and Adversarial Robustness of Transformer Textual Models  62
A Curious Case of Searching for the Correlation between Trai...
收藏 引用
Findings of the 62nd Annual Meeting of the Association for Computational Linguistics, ACL 2024
作者: Dang, Cuong Le, Dung D. Le, Thai FPT Software AI Center Viet Nam College of Engineering and Computer Science VinUniversity Viet Nam Department of Computer Science Indiana University United States
Existing works have shown that fine-tuned textual transformer models achieve state-of-the-art prediction performances but are also vulnerable to adversarial text perturbations. Traditional adversarial evaluation is of... 详细信息
来源: 评论
YOLOCSP-PEST for Crops Pest Localization and Classification
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2373-2388页
作者: Farooq Ali Huma Qayyum Kashif Saleem Iftikhar Ahmad Muhammad Javed Iqbal Department of Software Engineering University of Engineering and TechnologyTaxila47050Pakistan Department of Computer Science&Engineering College of Applied Studies&Community ServiceKing Saud UniversityRiyadh11362Saudi Arabia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science University of Engineering and TechnologyTaxila47050Pakistan
Preservation of the crops depends on early and accurate detection of pests on crops as they cause several diseases decreasing crop production and quality. Several deep-learning techniques have been applied to overcome... 详细信息
来源: 评论
CRAYM: Neural Field Optimization via Camera RAY Matching  38
CRAYM: Neural Field Optimization via Camera RAY Matching
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Lin, Liqiang Wu, Wenpeng Fu, Chi-Wing Zhang, Hao Huang, Hui College of Computer Science and Software Engineering Shenzhen University China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong School of Computing Science Simon Fraser University Canada
We introduce camera ray matching (CRAYM) into the joint optimization of camera poses and neural fields from multi-view images. The optimized field, referred to as a feature volume, can be "probed" by the cam...
来源: 评论
Two-Stage Lesion Detection Approach Based on Dimension-Decomposition and 3D Context
收藏 引用
Tsinghua science and Technology 2022年 第1期27卷 103-113页
作者: Jiacheng Jiao Haiwei Pan Chunling Chen Tao Jin Yang Dong Jingyi Chen the College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China the School of Software Tsinghua UniversityBeijng 100084China
Lesion detection in Computed Tomography(CT) images is a challenging task in the field of computer-aided *** important issue is to locate the area of lesion *** a branch of Convolutional Neural Networks(CNNs),3D Contex... 详细信息
来源: 评论
APT Detector: Detect and Identify APT Malware Based on Deep Learning Framework  23
APT Detector: Detect and Identify APT Malware Based on Deep ...
收藏 引用
9th International Conference on Computing and Artificial Intelligence, ICCAI 2023
作者: Tang, Binhui Yang, Jialin Li, Xin Cao, Yang Wang, Jie School of Computer and software Chengdu Jincheng College School of Cyber Science and Engineering Sichuan University China School of Computer and software Chengdu Jincheng College China
Advanced persistent threat (APT) attacks use sophisticated attack techniques and covert command and control (C&C) channels to conduct long-term sustained cyber attacks on specific targets as unobtrusively as possi... 详细信息
来源: 评论
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3397-3416页
作者: Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany Computer Science and Information Technology Jazan UniversityJazanSaudi Arabia CSE Eudoxia Research UniversityNew CastleUSA Department of Information Technology College of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in Software Sangmyung UniversitySeoulKorea Department of Computer Science and Engineering Lovely Professional UniversityPhagwaraPunjabIndia
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc... 详细信息
来源: 评论
Variational Collective Graph AutoEncoder for Multi-behavior Recommendation  23
Variational Collective Graph AutoEncoder for Multi-behavior ...
收藏 引用
23rd IEEE International Conference on Data Mining, ICDM 2023
作者: Liu, Yang Rao, Qianzhen Pan, Weike Ming, Zhong Shenzhen University College of Computer Science and Software Engineering Shenzhen China Shenzhen China
Variational autoencoder (VAE) is known as a classic and effective method in modeling users' homogeneous behaviors in recommender systems. In recent years, graph neural networks (GNNs) have achieved promising perfo... 详细信息
来源: 评论
In silico prediction methods of self-interacting proteins:an empirical and academic survey
收藏 引用
Frontiers of computer science 2023年 第3期17卷 199-216页
作者: Zhanheng CHEN Zhuhong YOU Qinhu ZHANG Zhenhao GUO Siguo WANG Yanbin WANG College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China School of Computer Science Northwestern Polytechnical UniversityXi’an 710129China Institute of Machine Learning and Systems Biology School of Electronics and Information EngineeringTongji UniversityShanghai 201804China School of Cyber Science and Technology Zhejiang UniversityHangzhou 310058China
In silico prediction of self-interacting proteins(SIPs)has become an important part of *** is an urgent need to develop effective and reliable prediction methods to overcome the disadvantage of high cost and labor int... 详细信息
来源: 评论
Gastrointestinal Diseases Classification Using Deep Transfer Learning and Features Optimization
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2227-2245页
作者: Mousa Alhajlah Muhammad Nouman Noor Muhammad Nazir Awais Mahmood Imran Ashraf Tehmina Karamat College of Applied Computer Science King Saud University(Almuzahmiyah Campus)Riyadh11543Saudi Arabia Department of Computer Science HITEC UniversityTaxila47080Pakistan Department of Computer Engineering HITEC UniversityTaxila47080Pakistan Department of Software Engineering Foundation University IslamabadIslamabad44000Pakistan
Gastrointestinal diseases like ulcers, polyps’, and bleeding areincreasing rapidly in the world over the last decade. On average 0.7 millioncases are reported worldwide every year. The main cause of gastrointestinald... 详细信息
来源: 评论