咨询与建议

限定检索结果

文献类型

  • 4,493 篇 会议
  • 2,994 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,777 篇 工学
    • 3,676 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 599 篇 控制科学与工程
    • 581 篇 生物工程
    • 516 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 343 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 200 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,261 篇 理学
    • 1,324 篇 数学
    • 638 篇 生物学
    • 432 篇 物理学
    • 413 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,461 篇 管理学
    • 863 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 361 篇 医学
    • 304 篇 临床医学
    • 272 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 131 篇 经济学
  • 101 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 217 篇 training
  • 209 篇 deep learning
  • 206 篇 feature extracti...
  • 180 篇 computational mo...
  • 165 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 124 篇 optimization
  • 122 篇 software enginee...
  • 122 篇 predictive model...
  • 121 篇 data models
  • 105 篇 cloud computing
  • 104 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 85 篇 neural networks
  • 84 篇 artificial intel...
  • 83 篇 clustering algor...

机构

  • 1,224 篇 college of compu...
  • 156 篇 college of compu...
  • 131 篇 shenzhen univers...
  • 115 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 97 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 80 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 60 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of softw...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 53 篇 school of inform...
  • 47 篇 school of comput...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 34 篇 he jingsha
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 24 篇 yan li
  • 24 篇 wu kaishun

语言

  • 7,114 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7554 条 记 录,以下是301-310 订阅
排序:
Empowering Cross-Device Data Security Verification for IoT Sensor Nodes  7
Empowering Cross-Device Data Security Verification for IoT S...
收藏 引用
7th International Conference on Machine Learning and Natural Language Processing, MLNLP 2024
作者: Shi, Xin He, Sheng Wang, Ting Zhang, Chong Wang, Yang Zhang, Xiao School of Computer Science and Software Engineering Southwest Petroleum University Chengdu China School of Computer Science Chengdu University of Information Technology Chengdu China School of Information Engineering Mianyang Teachers College Mianyang China
In the process of realizing the Internet of Everything through the Internet of Things (IoT), the massive deployment of sensor nodes poses significant security challenges. This paper introduces a novel approach to anom... 详细信息
来源: 评论
Enhancing Communication Accessibility:UrSL-CNN Approach to Urdu Sign Language Translation for Hearing-Impaired Individuals
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 689-711页
作者: Khushal Das Fazeel Abid Jawad Rasheed Kamlish Tunc Asuroglu Shtwai Alsubai Safeeullah Soomro Department of Computer Engineering Modeling Electronics and Systems EngineeringUniversity of CalabriaRende Cosenza87036Italy Department of Information Systems University of Management and TechnologyLahore54770Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim UniversityIstanbul34303Turkey Department of Software Engineering Istanbul Nisantasi UniversityIstanbul34398Turkey Department of Computer Science COMSATS University IslamabadLahore CampusLahore54700Pakistan Faculty of Medicine and Health Technology Tampere UniversityTampere33720Finland Department of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam Bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Second Department of Computer Science College of Engineering and ComputingGeorge Mason UniversityFairfaxVA 4418USA
Deaf people or people facing hearing issues can communicate using sign language(SL),a visual *** works based on rich source language have been proposed;however,the work using poor resource language is still *** other ... 详细信息
来源: 评论
HFGNN: Efficient Graph Neural Networks Using Hub-Fringe Structures  24
HFGNN: Efficient Graph Neural Networks Using Hub-Fringe Stru...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Ip, Pak Lon Zhang, Shenghui Wei, Xuekai Chan, Tsz Nam Hou, Leong University of Macau SKL of Internet of Things for Smart City China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Existing message passing-based and transformer-based graph neural networks (GNNs) cannot satisfy requirements for learning representative graph embeddings due to restricted receptive fields, redundant message passing,... 详细信息
来源: 评论
Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 6273-6286页
作者: Gong, Cheng Xiong, Ling He, Xingyu Niu, Xianhua College of Computer and Software Engineering Xihua University Sichuan Chengdu610099 China National Key Laboratory of Science and Technology Communications University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Security and privacy are two challenging issues in Vehicular Ad-hoc Networks (VANETs), which have attracted widespread concern from industry and academia. However, the existing security schemes for VANETs environment ... 详细信息
来源: 评论
LESS: Label-Efficient and Single-Stage Referring 3D Segmentation  38
LESS: Label-Efficient and Single-Stage Referring 3D Segmenta...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Liu, Xuexun Xu, Xiaoxu Li, Jinlong Zhang, Qiudan Wang, Xu Sebe, Nicu Ma, Lin College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China University of Trento Italy Meituan Inc. China
Referring 3D Segmentation is a visual-language task that segments all points of the specified object from a 3D point cloud described by a sentence of query. Previous works perform a two-stage paradigm, first conductin...
来源: 评论
Ensuring IoT Controller Reliability with Colored Generalized Stochastic Petri Net  28
Ensuring IoT Controller Reliability with Colored Generalized...
收藏 引用
28th International computer science and engineering Conference, ICSEC 2024
作者: Samngamnoi, Kruntarat Pomsiri, Sutinun Kamput, Apipath Dechsupa, Chanon College of Computing Khon Kaen University Intelligent Software Engineering Research Group Department of Computer Science Khon Kaen40002 Thailand
In IoT systems managing multiple devices simultaneously, errors in system controllers often undermine intended operations. Formal verification offers a method to assess system reliability. Colored Generalized Stochast... 详细信息
来源: 评论
EOSAD: An Event-Oriented Physiological and Behavioral Social Anxiety Annotation Dataset in Virtual Reality
EOSAD: An Event-Oriented Physiological and Behavioral Social...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Hou, Qinyao Ding, Ding Yang, Jiaju Tu, Jiahang School of Computer Science and Engineering Southeast University Nanjing China Chien-Shiung Wu College Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China
Social phobia is a prevalent mental health con-dition characterized by overwhelming fear on apprehension of social situations, often leading individuals to avoid such encounters. It is a very common mental disorder am... 详细信息
来源: 评论
High Precision Method of Federated Learning Based on Cosine Similarity and Differential Privacy  15
High Precision Method of Federated Learning Based on Cosine ...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart Data, SmartData 2022
作者: Wang, Jia Li, Yazheng Ye, Ronghang Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen China Zhengzhou University of Industrial Technology College of Computer Science and Software Engineering Zhengzhou China
Federated learning has emerged as an efficient way to exploit distributed data in recent years. It allows multiple client nodes to collaboratively train an optimized machine learning model without revealing the partic... 详细信息
来源: 评论
Ensemble Graph and Device Clustering Method based on Attention Mechanism for Decomposing Monolithic to Microservices  22
Ensemble Graph and Device Clustering Method based on Attenti...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Deng, Qingyong Li, Qiuming Zuo, Qinghua Tian, Shujuan Long, Saiqin Guangxi Normal University School of Computer Science and Engineering The School of Software Guilin China Xiangtan University School of Computer Science Xiangtan China Jinan University College of Information Science and Technology Guangzhou China
Existing methods for decomposing monolithic applications into microservices in cloud environments primarily rely on the call relationships within itself. However, these methods are difficult to apply directly in resou... 详细信息
来源: 评论
Secure and Fast Remote Application-Based Authentication Dragonfly Using an LED Algorithm in Smart Buildings  6
Secure and Fast Remote Application-Based Authentication Drag...
收藏 引用
6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024
作者: Radhi, Batool Mohammed Hussain, Mohammed Abdulridha Abduljabbar, Zaid Ameen Nyangaresi, Vincent Omollo College of Education for Pure Sciences University of Basrah Department of Computer Science Basrah61004 Iraq Jaramogi Oginga Odinga University of Science and Technology Department of Computer Science and Software Engineering Bondo40601 Kenya
The proliferation of the internet of things (IoT) has led to the emergence of a wide range of intelligent devices, creating a broad domain with significant security concerns. These concerns impose a high level of secu... 详细信息
来源: 评论