咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 3,046 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,675 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,890 篇 工学
    • 3,765 篇 计算机科学与技术...
    • 3,055 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,275 篇 理学
    • 1,328 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,000 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7675 条 记 录,以下是4631-4640 订阅
排序:
A hybrid solution for smart supermarkets based on actuator networks  7
A hybrid solution for smart supermarkets based on actuator n...
收藏 引用
7th International Conference on Information, Communication and Networks, ICICN 2019
作者: Zhang, Yanping Xiao, Zhifeng Yang, Jianjun Wraith, Katerina Mosca, Patrick Department of Computer Science Gonzaga University SpokaneWA United States Department of Computer Science and Software Engineering Penn State Erie the Behrend College EriePA United States Department of Computer Science and Information Systems University of North Georgia GA United States Apple Inc. ClaytonCA United States
Smart supermarkets are a recent innovation that allows customers to have a seamless shopping experience. The Internet of Things (IoT) is a key component of smart supermarkets. Take AmazonGo as an example, it successfu... 详细信息
来源: 评论
Taming Self-Supervised Learning for Presentation Attack Detection: De-Folding and De-Mixing
arXiv
收藏 引用
arXiv 2021年
作者: Kong, Zhe Zhang, Wentian Liu, Feng Luo, Wenhan Liu, Haozhe Shen, Linlin Ramachandra, Raghavendra College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Guangdong Shenzhen518107 China Norwegian University of Science and Technology Gjøvik2818 Norway
Biometric systems are vulnerable to Presentation Attacks (PA) performed using various Presentation Attack Instruments (PAIs). Even though there are numerous Presentation Attack Detection (PAD) techniques based on both... 详细信息
来源: 评论
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering
Detect Stepping-stone Intrusion by Mining Network Traffic us...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Lixin Wang Jianhua Yang Mary Mccormick Peng-Jun Wan Xiaohua Xu TSYS School of Computer Science Columbus State University GA USA Illinois Institute of Technology Chicago Illinois USA College of Computing and Software Engineering Kennesaw State University GA USA
Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an attacker uses a chain of hos... 详细信息
来源: 评论
Joystick Mapping in Virtual Reality Shooting Game  3
Joystick Mapping in Virtual Reality Shooting Game
收藏 引用
3rd International Conference on Innovative Computing, ICIC 2019
作者: Nabeel, Muhammad Ahmad, Faiq Din, Hooria Muslih Ud Ahsan, Muhammad Ali, Usman Asif, Arslan University of Management and Technology Software Engineering Department Lahore Pakistan University of Management and Technology Computer Science Department Lahore Pakistan UCD Energy Institute University College Dublin Dublin Ireland
A method to use for mapping VR-Box joystick with shooting game input controls that include key mapping of every joystick key from the joystick with the game itself. Key mapping was observed and then the source code ke... 详细信息
来源: 评论
K-B2S+: A one-dimensional CNN model for AF detection with short single-lead ECG waves from wearable devices
收藏 引用
Digital Communications and Networks 2024年
作者: Bo Fang Zhaocheng Yu Li-bo Zhang Yue Teng Junxin Chen School of Computer Science University of Sydney NSW 2008 Australia College of Medicine and Biological Information Engineering Northeastern University Shenyang 110004 China Department of Radiology General Hospital of the Northern Theater of the Chinese People's Liberation Army Shenyang 110004 China School of Software Dalian University of Technology Dalian 116621 China
Wearable signal analysis is an important technology for monitoring physiological signals without interfering with an individual's daily behavior. As detecting cardiovascular diseases can dramatically reduce mortal... 详细信息
来源: 评论
Differentiable refraction-tracing for mesh reconstruction of transparent objects
arXiv
收藏 引用
arXiv 2020年
作者: Lyu, Jiahui Wu, Bojian Lischinski, Dani Cohen-Or, Daniel Huang, Hui Shenzhen University China Alibaba Group China Hebrew University of Jerusalem Israel Shenzhen University Tel Aviv University Israel College of Computer Science & Software Engineering Shenzhen University China
Capturing the 3D geometry of transparent objects is a challenging task, ill-suited for general-purpose scanning and reconstruction techniques, since these cannot handle specular light transport phenomena. Existing sta... 详细信息
来源: 评论
Diabetic Retinopathy Grade and Macular Edema Risk Classification Using Convolutional Neural Networks
Diabetic Retinopathy Grade and Macular Edema Risk Classifica...
收藏 引用
2019 IEEE International Conference on Power, Intelligent Computing and Systems, ICPICS 2019
作者: He, Jia Shen, Linlin Ai, Xingfang Li, Xuechen College of Computer Science and Software Engineering Shenzhen University Shenzhen Guangdong province China Research and Development Center Konka Group Co. Ltd. Shenzhen Guangdong province China
Diabetic retinopathy (DR) is one of the major causes of blindness in the western world. Effective treatment of DR is available, when detected early enough, which makes this a vital process. computers are able to obtai... 详细信息
来源: 评论
Multi-scale feature fusion for breast tumor grading using dual-adaptive attention mechanisms
收藏 引用
Pattern Recognition 2026年 169卷
作者: Israr Hussain Zhihui Lai Heng Kong Fazil Hussain College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen 518060 China Department of Thyroid and Breast Surgery BaoAn Central Hospital of Shenzhen Shenzhen 518102 China Department of Medicine Provincial Head Quarter (PHQ) Hospital Gilgit 15711 Pakistan
Breast cancer is the most common malignant tumor in women worldwide. Early detection and timely treatment are crucial for improving survival rates and ensuring effective treatment planning. While existing methods prim...
来源: 评论
Location Privacy Protection Scheme Based on Location Services  2019
Location Privacy Protection Scheme Based on Location Service...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Chen Yang Wei Yan School of Software Dalian University of Foreign Languages Dalian China School of Computer Science and Technology Harbin Engineering University Harbin China Department of Information Liaoning Police College Dalian China School of Software Dalian University of Technology Dalian China
Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location p... 详细信息
来源: 评论
Structural combinatorial of network information system of systems based on evolutionary optimization method
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Tingting Lan, Yushi Song, Aiguo Liu, Kun Wang, Nan Computer and military software engineering PLA Army Engineering University Nanjing China National defense key laboratory China Electronics Technology Group Corporation Nanjing China College of Instrument Science and Engineering Southeast University Nanjing China College of Command and Control Engineering PLA Army Engineering University Nanjing China
The network information system is a military information network system with evolution characteristics. Evolution is a process of replacement between disorder and order, chaos and equilibrium. Given that the concept o... 详细信息
来源: 评论