咨询与建议

限定检索结果

文献类型

  • 4,472 篇 会议
  • 2,948 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 7,421 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,744 篇 工学
    • 3,653 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 338 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,257 篇 理学
    • 1,322 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 212 篇 training
  • 204 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 158 篇 machine learning
  • 154 篇 educational inst...
  • 149 篇 accuracy
  • 141 篇 computer science
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 111 篇 software enginee...
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 99 篇 internet of thin...
  • 90 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 80 篇 image segmentati...

机构

  • 1,203 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 113 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 96 篇 college of compu...
  • 91 篇 software college...
  • 89 篇 state key labora...
  • 83 篇 school of softwa...
  • 71 篇 school of comput...
  • 67 篇 national enginee...
  • 60 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 56 篇 college of softw...
  • 56 篇 state key labora...
  • 51 篇 college of compu...
  • 49 篇 school of inform...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 46 篇 leung victor c.m...
  • 36 篇 he jingsha
  • 35 篇 laizhong cui
  • 34 篇 lin qiuzhen
  • 33 篇 wang xingwei
  • 33 篇 zhong ming
  • 30 篇 zhen ji
  • 30 篇 victor c. m. leu...
  • 30 篇 jianqiang li
  • 29 篇 kaishun wu
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 26 篇 wu kaishun
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 24 篇 yan li

语言

  • 6,981 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7421 条 记 录,以下是261-270 订阅
排序:
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors  4
Dynamic Multimedia Encryption Using a Parallel File System B...
收藏 引用
4th IEEE International Conference on Data engineering and Communication Systems, ICDECS 2024
作者: Simi Margarat, G. Malathi, S. Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. New Prince Shri Bhavani College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Grt Institute of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Tiruttani India Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India
A new parallel file system and multi-core processor-based dynamic multimedia encryption method is presented in this study. Multimedia encryption efficiency and security were the main goals, addressing massive data set... 详细信息
来源: 评论
Towards 360∘ image compression for machines via modulating pixel significance
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90271-90288页
作者: Zheng, Silin Shen, Xuelin Zhang, Qiudan Chen, Zhuo Yang, Wenhan Wang, Xu College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen51800 China Guangdong Shenzhen51800 China Peng Cheng Laboratory Guangdong Shenzhen51800 China
The rapid growth of computer vision-based applications, including smart cities and autonomous driving, has created a pressing demand for efficient 360∘ image compression and computer vision analytics. In most circums...
来源: 评论
Structure learning of Bayesian networks using sparrow optimization algorithm
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2025年 第2期9卷 14-25页
作者: Kareem, Shahab Wahhab Awla, Hoshang Qasim Mohammed, Amin Salih Department of Technical Information Systems Engineering Erbil Technical Engineering College Erbil Polytechnic University Erbil Iraq Department of Computer Technical Engineering Al-Qalam University College Kirkuk Iraq Department of Computer Science Faculty of Science Soran University Soran Iraq Department of Software and Informatics Salahaddin University Erbil Iraq
Bayesian networks are powerful analytical models in machine learning, used to represent probabilistic relationships among variables and create learning structures. These networks are made up of parameters that show co... 详细信息
来源: 评论
Education and Teaching Research of IoT Embedded Subject under the National Vocational and Technical Skills Standards  6
Education and Teaching Research of IoT Embedded Subject unde...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Yanglu Wang, Xingchen Yadav, Amit Shah, Abhishek Pratap College of Computer and Software Chengdu Neusoft University Chengdu China College of Engineering IT and Environment Charles Darwin University Darwin Australia School of Management Science and Engineering University of Electronic Science and Technology of China Chengdu China
This research study analyzes six key factors in the education and teaching of IoT embedded direction: training objectives (which direction to teach), curriculum system (what to teach), teaching organization (how to te... 详细信息
来源: 评论
Performance-Guaranteed Finite-Time Tracking of Strict-Feedback Systems with Unknown Control Directions: A Novel Switching Mechanism
收藏 引用
IEEE Transactions on Automatic Control 2025年 第6期70卷 4061-4068页
作者: Mao, Bing Wu, Xiaoqun Fan, Ziye Lu, Jinhu Chen, Guanrong Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Wuhan University School of Mathematics and Statistics Hubei430072 China Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Electrical Engineering Hong Kong Hong Kong
The problem of achieving performance-guaranteed finite-time exact tracking for uncertain strict-feedback nonlinear systems with unknown control directions is addressed. A novel logic switching mechanism with monitorin... 详细信息
来源: 评论
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on Data engineering and Communication Systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论
Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication
收藏 引用
SN computer science 2024年 第1期5卷 4页
作者: Althaf Ali, A. Hussain, Mohammed Muzaffar Subramaneswara Rao, A. Lavanya, S. Feroz Khan, A.B. Department of Computer Applications Madanapalle Institute of Technology & Science (MITS) Andhra Pradesh Madanapalle India Department of Computer Science and Engineering C. Abdul Hakeem College of Engineering and Technology Tamil Nadu Melvisharam India Department of Software Applications Thiruthangal Nadar College Tamil Nadu Chennai India Department of Computer Science Syed Hameedha Arts and Science College Tamil Nadu Kilakarai India
The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based... 详细信息
来源: 评论
Similar Locality Based Transfer Evolutionary Optimization for Minimalistic Attacks  13
Similar Locality Based Transfer Evolutionary Optimization fo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Ma, Wenqiang Hau, Yaqing Yu, Hua Tong, Xiangrong Zhu, Zexuan Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian116024 China School of Computer and Control Engineering Yantai University Yantai264005 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
Deep neural networks are powerful and popular learning models;however, recent studies have shown that deep neural network-based policies are susceptible to deception by adversarial attacks. A minimalistic attack is a ... 详细信息
来源: 评论
A Survey on Evolutionary Computation Based Drug Discovery
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 第3期29卷 1-1页
作者: Yu, Qiyuan Lin, Qiuzhen Ji, Junkai Zhou, Wei He, Shan Zhu, Zexuan Tan, Kay Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Computer Science University of Birmingham Bir-mingham UK Department of Computing The Hong Kong Poly-technic University Hong Kong Hong Kong
Drug discovery is an expensive and risky process. To combat the challenges in drug discovery, an increasing number of researchers and pharmaceutical companies recognize the benefits of utilizing computational techniqu... 详细信息
来源: 评论
An end-to-end contrastive deep-learning framework for remote physiological signal measurement  3
An end-to-end contrastive deep-learning framework for remote...
收藏 引用
3rd Vision-Based Remote Physiological Signal Sensing Challenge and Workshop, RePSS 2024
作者: Wu, Bingjie Zhou, Menghan Liu, Wei Wang, Xingyao Zheng, Xingjian Xie, Yiping Luo, Chaoqi Zhen, Liangli Singapore Singapore College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Electrical Engineering Southwest Jiaotong University Chengdu China
Heart rate measurements based on remote physiological signals could significantly facilitate health monitoring in daily life. However, the ground-truth labels of the physiological signals are expensive and hard to col... 详细信息
来源: 评论