咨询与建议

限定检索结果

文献类型

  • 4,493 篇 会议
  • 2,967 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,527 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,755 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,010 篇 软件工程
    • 1,056 篇 信息与通信工程
    • 595 篇 控制科学与工程
    • 581 篇 生物工程
    • 503 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 341 篇 电子科学与技术(可...
    • 318 篇 机械工程
    • 261 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 178 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 154 篇 仪器科学与技术
  • 2,251 篇 理学
    • 1,319 篇 数学
    • 635 篇 生物学
    • 428 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 190 篇 化学
  • 1,457 篇 管理学
    • 860 篇 管理科学与工程(可...
    • 640 篇 图书情报与档案管...
    • 344 篇 工商管理
  • 358 篇 医学
    • 301 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 157 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 206 篇 法学
    • 161 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 218 篇 training
  • 207 篇 deep learning
  • 205 篇 feature extracti...
  • 180 篇 computational mo...
  • 165 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 123 篇 optimization
  • 122 篇 software enginee...
  • 122 篇 predictive model...
  • 122 篇 data models
  • 105 篇 cloud computing
  • 104 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 85 篇 neural networks
  • 84 篇 artificial intel...
  • 82 篇 clustering algor...

机构

  • 1,220 篇 college of compu...
  • 156 篇 college of compu...
  • 129 篇 shenzhen univers...
  • 115 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 97 篇 college of compu...
  • 93 篇 software college...
  • 91 篇 state key labora...
  • 80 篇 school of softwa...
  • 72 篇 school of comput...
  • 66 篇 national enginee...
  • 62 篇 college of compu...
  • 58 篇 the college of c...
  • 58 篇 college of compu...
  • 57 篇 college of softw...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 53 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 zhong ming
  • 34 篇 he jingsha
  • 33 篇 lin qiuzhen
  • 32 篇 zhen ji
  • 32 篇 wang xingwei
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 26 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan
  • 24 篇 wu kaishun

语言

  • 7,091 篇 英文
  • 309 篇 其他
  • 132 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7527 条 记 录,以下是4731-4740 订阅
排序:
Dynamic Weight Allocation–Based Network Security and Anomaly Detection Model for Intelligent VANETs
收藏 引用
Transactions on Emerging Telecommunications Technologies 2025年 第6期36卷
作者: Aadam Quraishi Rakeshnag Dasari Sushilkumar Dangiya Sateesh Kumar Nallamala Krishna Kanth Kondapaka Swaroop Reddy Gayam Isa Bayhan Uguloy Berdieva Rubal Jeet M.D. Research Cognitive and AI laboratory Interventional treatment institute Houston Texas USA Department of CSE Acharya Nagarjuna University Nagarjuna Nagar Guntur India Department of Electronics and Communication Engineering GTU – School of Engineering and Technology Ahmedabad India Independent Researcher USA Independent Researcher California USA Independent Researcher and Senior Software Engineer at TJMax USA Assistant Professor of Tourist Guiding Dept Bolu Abant Izzet Baysal University Golkoy Campus Bolu Turkey The Department of Tax and Taxation Tashkent State University of Economics Tashkent Uzbekistan Chandigarh Group of Colleges Jhanjeri Chandigarh Engineering College Department of Computer Science and Engineering Punjab India
Determining the weights of evaluation metrics is one of the key factors influencing the cybersecurity and anomaly detection of intelligent vehicular ad hoc networks (VANETs). To address the limitations of traditional ... 详细信息
来源: 评论
Topology Sequences-based Fuzzy Track Initialization Method For Radars and ADS-B*
Topology Sequences-based Fuzzy Track Initialization Method F...
收藏 引用
Asian Control Conference
作者: Xiaobin Li Hongfeng Ma En Fan College of Software Engineering Lanzhou Institute of Technology Lanzhou China College of Electronic and Information Engineering Lanzhou Institute of Technology Lanzhou China Department of Computer Science and Engineering Shaoxing University Shaoxing China
Radars and automatic dependent surveillance -broadcast (ADS-B) are two important surveillance technologies in aerial surveillance networks. For this situations with different systematic errors of 2D radars and their t... 详细信息
来源: 评论
Application of quantisation-based deep-learning model compression in JPEG image steganalysis
Application of quantisation-based deep-learning model compre...
收藏 引用
作者: Wu, Xiancheng Shao, Zilong Ou, Pei Tan, Shunquan College of Information Engineering Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Steganography can hide secret information in an innocent cover medium. Its opponent is steganalysis, which is used to discriminate whether a suspicious carrier contains a hidden message or not. With the rapid developm... 详细信息
来源: 评论
Energy Efficient User Clustering, Hybrid Precoding and Power Optimization in Terahertz MIMO-NOMA Systems
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Haijun Zhang, Haisen Liu, Wei Long, Keping Dong, Jiangbo Leung, Victor C.M. Institute of Artificial Intelligence Beijing Advanced Innovation Center for Materials Genome Engineering Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing Beijing100083 China China Mobile Group Design Institute Co. Ltd Beijing100080 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering University of British Columbia VancouverBC V6T 1Z4 Canada
Terahertz (THz) band communication has been widely studied to meet the future demand for ultra-high capacity. In addition, multi-input multi-output (MIMO) technique and non-orthogonal multiple access (NOMA) technique ... 详细信息
来源: 评论
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing  13th
A New Lattice Sieving Algorithm Base on Angular Locality-Sen...
收藏 引用
13th International Conference on Information Securityand Cryptology, Inscrypt 2017
作者: Wang, Ping Shang, Dongdong College of Information Engineering Shenzhen University Shenzhen518060 China College of Computer Science and Software Shenzhen University Shenzhen518060 China
Currently, the space requirement of sieving algorithms to solve the shortest vector problem (SVP) grows as 2 0.2075n+o(n), where n is the lattice dimension. In high dimensions, the memory requirement makes them uncomp... 详细信息
来源: 评论
Emotion Recognition From Gait Analyses: Current Research and Future Directions
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Shihao Fang, Jing Hu, Xiping Ngai, Edith Wang, Wei Guo, Yi Leung, Victor C.M. School of Information Science and Engineering Lanzhou University Gansu730000 China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China School of Intelligent Systems Engineering Sun Yat-sen University Guangdong Shenzhen518107 China Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Second Clinical Medical College Jinan University Shenzhen518055 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518055 China Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
Human gait refers to a daily motion that represents not only mobility, but it can also be used to identify the walker by either human observers or computers. Recent studies reveal that gait even conveys information ab... 详细信息
来源: 评论
MeDaS: An open-source platform as service to help break the walls between medicine and informatics
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Liang Li, Johann Li, Ping Lu, Xiaoyuan Shen, Peiyi Zhu, Guangming Shah, Syed Afaq Bennarmoun, Mohammed Qian, Kun Schuller, Björn W. Embedded Technology & Vision Processing Research Center School of Computer and Technology Xidian University Xian China Shanghai BNC Shanghai China College of Science Health Enginering and Education Murdoch University Australia School of Computer Science and Software Engineering University of Western Australia Australia Educational Physiology Laboratory University of Tokyo Japan GLAM - Group on Language Audio & Music Imperial College London United Kingdom Chair of Embedded Intelligence for Health Care and Wellbeing University of Augsburg Germany
In the past decade, deep learning (DL) has achieved unprecedented success in numerous fields including computer vision, natural language processing, and healthcare. In particular, DL is experiencing an increasing deve... 详细信息
来源: 评论
Mapping digital forensic application requirement specification to an international standard
收藏 引用
Forensic science International: Reports 2020年 2卷 100137-100137页
作者: Kebande, Victor R. Baror, Stacey O. Parizi, Reza M. Choo, Kim-Kwang Raymond Venter, H.S. Department of Computer Science & Media Technology Malmö Universitete Malmö Sweden Department of Computer Science University of Pretoria South Africa College of Computing and Software Engineering Kennesaw State University Marietta GA United States Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio 78249-0631 TX United States
A potential security incident may go unsolved if standardized forensic approaches are not applied during lawful investigations. This paper highlights the importance of mapping the digital forensic application requirem... 详细信息
来源: 评论
Reducing Wi-Fi Fingerprint Collection Based on Affinity Propagation Clustering and WKNN Interpolation Algorithm  2
Reducing Wi-Fi Fingerprint Collection Based on Affinity Prop...
收藏 引用
2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2018
作者: Hu, Jiusong Liu, Hongli Liu, Dawei Yan, Zhi Xu, Kun College of Electrical and Information Engineering Hunan University China Department of Computer Science Software Engineering Xi' An Jiaotong-Liverpool University China
The Wi-Fi-based indoor positioning system compares the online signal strength indicator (RSSI) and offline stored fingerprints to find the closest match to estimate the target location of the device. However, the prob... 详细信息
来源: 评论
Artificial intelligence-enabled intelligent 6G networks
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Helin Alphones, Arokiaswami Xiong, Zehui Niyato, Dusit Zhao, Jun Wu, Kaishun School of Electrical and Electronic Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
With the rapid development of smart terminals and infrastructures, as well as diversified applications (e.g., virtual and augmented reality, remote surgery and holographic projection) with colorful requirements, curre... 详细信息
来源: 评论