咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 3,046 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,675 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,890 篇 工学
    • 3,765 篇 计算机科学与技术...
    • 3,055 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,275 篇 理学
    • 1,328 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,000 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7675 条 记 录,以下是4531-4540 订阅
排序:
Modeling Neural Networks Training Process with Markov Decision Process
Modeling Neural Networks Training Process with Markov Decisi...
收藏 引用
Artificial Intelligence and computer engineering (ICAICE), International Conference on
作者: Yantao Bai Wanwei Liu Xinjun Mao Zhen Liang Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China College of Computer Science National University of Defense Technology Changsha China State Key Laboratory of High Performance Computing Institute for Quantum Information &#x0026 National University of Defense Technology Changsha China
With the development of computer technology, statistics-based machine learning method has made great break-throughs, and also improved the development of artificial intelligence. Nevertheless, as a very influential mo... 详细信息
来源: 评论
Triple-level model inferred collaborative network architecture for video deraining
arXiv
收藏 引用
arXiv 2021年
作者: Mu, Pan Liu, Zhu Liu, Yaohua Liu, Risheng Fan, Xin The College of Computer Science and Technology Zhejiang University of Technology Hangzhou China The School of Mathematical Sciences Dalian University of Technology Dalian China The School of Software Dalian University of Technology Dalian116024 China The DUT-RU International School of Information Science & Engineering Dalian University of Technology Dalian116024 China The Pazhou Lab Guangzhou China
Video deraining is an important issue for outdoor vision systems and has been investigated extensively. However, designing optimal architectures by the aggregating model formation and data distribution is a challengin... 详细信息
来源: 评论
MFPN-6D : Real-time One-stage Pose Estimation of Objects on RGB Images
MFPN-6D : Real-time One-stage Pose Estimation of Objects on ...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Penglei Liu Qieshi Zhang Jin Zhang Fei Wang Jun Cheng CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Shenzhen College of Advanced Technology University of Chinese Academy of Sciences Beijing China The Chinese University of Hong Kong Hong Kong China The College of Computer Science and Software Engineering Shenzhen University China
6D pose estimation of objects is an important part of robot grasping. The latest research trend on 6D pose estimation is to train a deep neural network to directly predict the 2D projection position of the 3D key poin... 详细信息
来源: 评论
TPFIANet: Three path feature progressive interactive attention learning network for medical image segmentation
收藏 引用
Knowledge-Based Systems 2025年 323卷
作者: Yawu Zhao Shudong Wang Yande Ren Jiehuan Wang Shaoqiang Wang Sibo Qiao Tiyao Liu Shanchen Pang Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum Qingdao Shandong China Department of Medical Imaging Center Affiliated Hospital of Qingdao University Qingdao Shandong China Department of Medical Imaging Affiliated Hospital of Jining Medical University Jining Shandong China School of Information and Control Engineering Qingdao University of Technology Qingdao Shandong China School of Software Tiangong University Tianjin China
In the field of medical image segmentation, medical image segmentation methods with high accuracy and generalization capabilities are crucial for driving personalized healthcare solutions and enhancing patient experie... 详细信息
来源: 评论
Comprehensive Analysis of Lightweight Cryptographic Algorithms for Battery-Limited Internet of Things Devices
收藏 引用
International Journal of Distributed Sensor Networks 2025年 第1期2025卷
作者: Nahom Gebeyehu Zinabu Yihenew Wondie Marye Kula Kekeba Tune Samuel Asferaw Demilew Department of Software Engineering College of Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia aastu.edu.et Associate Professor in School of Electrical and Computer Engineering (SECE) Addis Ababa Institute of Technology (AAiT) Addis Ababa University (AAU) Addis Ababa Ethiopia aau.edu.et Department of Information Technology College of Computing Debre Berhan University Debre Berhan Ethiopia dbu.edu.et
The growth of billions of devices functioning in resource-constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and... 详细信息
来源: 评论
Edge Caching Replacement Optimization for D2D Wireless Networks via Weighted Distributed DQN
Edge Caching Replacement Optimization for D2D Wireless Netwo...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Ruibin Li Yiwei Zhao Chenyang Wang Xiaofei Wang Victor C. M. Leung Xiuhua Li Tarik Taleb College of Intelligence and Computing Tianjin University Tianjin China College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Intelligence and Computing Chongqing University Chongqing China School of Electrical Engineering Aalto University Helsinki Finland
Duplicated download has been a big problem that affects the users' quality of service/experience (QoS/QoE) of current mobile networks. Edge caching and Device-to-Device communication are two promising technologies...
来源: 评论
A Biologically Inspired Feature Enhancement Framework for Zero-Shot Learning
A Biologically Inspired Feature Enhancement Framework for Ze...
收藏 引用
IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)
作者: Zhongwu Xie Weipeng Cao Xizhao Wang Zhong Ming Jingjing Zhang Jiyong Zhang College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Command and Control Engineering Army Engineering University of People’s Liberation Army of China Nanjing China School of Automation Hangzhou Dianzi University Hangzhou China
Most of the Zero-Shot Learning (ZSL) algorithms currently use pre-trained models as their feature extractors, which are usually trained on ImageNet by using deep neural networks. The richness of the feature informatio... 详细信息
来源: 评论
A biologically inspired feature enhancement framework for zero-shot learning
arXiv
收藏 引用
arXiv 2020年
作者: Xie, Zhongwu Cao, Weipeng Wang, Xizhao Ming, Zhong Zhang, Jingjing Zhang, Jiyong College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Command and Control Engineering Army Engineering University of People’s Liberation Army of China Nanjing China School of Automation Hangzhou Dianzi University Hangzhou China
Most of the Zero-Shot Learning (ZSL) algorithms currently use pre-trained models as their feature extractors, which are usually trained on the ImageNet data set by using deep neural networks. The richness of the featu... 详细信息
来源: 评论
A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority Ratio
A Four-Feature Keyword Extraction Algorithm Based on Word Le...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Hui Kang Lingfeng Lu Hang Su College of Computer Science and Technology Jilin University Changchun College of Software Engineering Jilin university Changchun Tool product platform department AVIC China Aero-Poly technology Establishment Beijing
With the rapid development of Internet technology and the advent of the information age, it has become a research hotspot to obtain key information from numerous data. Due to the diversity and irregularity of network ... 详细信息
来源: 评论
AI Enhanced Automatic Response System for Resisting Network Threats  4th
AI Enhanced Automatic Response System for Resisting Network ...
收藏 引用
4th International Conference on Smart Computing and Communications, SmartCom 2019
作者: Xia, Song Qiu, Meikang Liu, Meiqin Zhong, Ming Zhao, Hui College of Electronic and Information Wuhan University WuhanHubei China College of Computer Science Shenzhen University ShenzhenGuangdong China Department of Computer Science Harrisburg University of Science and Technology Harrisburg United States College of Electrical Engineering Zhejiang University Zhejiang China School of Software Henan University Kaifeng China
Network threats are malicious attacks that endanger network security. With terabits of information stored in the network and much of this information being confidential, cyber security turns to be very important. Most... 详细信息
来源: 评论