咨询与建议

限定检索结果

文献类型

  • 4,474 篇 会议
  • 3,055 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,838 篇 工学
    • 3,724 篇 计算机科学与技术...
    • 3,041 篇 软件工程
    • 1,091 篇 信息与通信工程
    • 623 篇 控制科学与工程
    • 582 篇 生物工程
    • 550 篇 电气工程
    • 359 篇 生物医学工程(可授...
    • 352 篇 电子科学与技术(可...
    • 327 篇 机械工程
    • 269 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 181 篇 网络空间安全
    • 180 篇 化学工程与技术
    • 175 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 157 篇 仪器科学与技术
  • 2,289 篇 理学
    • 1,335 篇 数学
    • 643 篇 生物学
    • 441 篇 物理学
    • 422 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 194 篇 化学
  • 1,471 篇 管理学
    • 865 篇 管理科学与工程(可...
    • 652 篇 图书情报与档案管...
    • 343 篇 工商管理
  • 361 篇 医学
    • 303 篇 临床医学
    • 271 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 207 篇 法学
    • 163 篇 社会学
  • 132 篇 经济学
  • 101 篇 教育学
  • 87 篇 农学
  • 22 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 212 篇 deep learning
  • 210 篇 training
  • 205 篇 feature extracti...
  • 181 篇 computational mo...
  • 164 篇 machine learning
  • 163 篇 semantics
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 121 篇 data models
  • 105 篇 data mining
  • 105 篇 cloud computing
  • 102 篇 internet of thin...
  • 94 篇 security
  • 85 篇 neural networks
  • 85 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,223 篇 college of compu...
  • 156 篇 college of compu...
  • 135 篇 shenzhen univers...
  • 118 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 96 篇 college of compu...
  • 95 篇 software college...
  • 91 篇 state key labora...
  • 79 篇 school of softwa...
  • 71 篇 school of comput...
  • 67 篇 national enginee...
  • 58 篇 the college of c...
  • 58 篇 college of compu...
  • 58 篇 college of compu...
  • 57 篇 college of softw...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 53 篇 school of inform...
  • 47 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 35 篇 zhong ming
  • 34 篇 lin qiuzhen
  • 34 篇 he jingsha
  • 32 篇 zhen ji
  • 32 篇 wang xingwei
  • 31 篇 victor c. m. leu...
  • 31 篇 jianqiang li
  • 30 篇 kaishun wu
  • 30 篇 leung victor c. ...
  • 29 篇 zhou jie
  • 29 篇 ismail leila
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 wu kaishun
  • 24 篇 li yan

语言

  • 7,133 篇 英文
  • 337 篇 其他
  • 130 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7596 条 记 录,以下是41-50 订阅
排序:
Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds  18th
Truthful Double Auction-Based Resource Allocation Mechanisms...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Wu, Dongkuo Wang, Xueyi Wang, Xingwei Huang, Min Wang, Zhitong College of Computer Science and Engineering Northeastern University Liaoning Shenyang China College of Software Northeastern University Liaoning Shenyang China College of Information Science and Engineering Northeastern University Liaoning Shenyang China
With the rapid advancement of wireless networks, edge computing has emerged as a promising paradigm for providing computing services to nearby latency-sensitive applications. Toward this trend, resource trading market... 详细信息
来源: 评论
Exploring the Privacy-Accuracy Trade-Off Using Adaptive Gradient Clipping in Federated Learning
收藏 引用
IEEE Transactions on Network science and engineering 2025年 第3期12卷 2254-2265页
作者: Zhang, Benteng Mao, Yingchi He, Xiaoming Ping, Ping Huang, Huawei Wu, Jie Hohai University College of Computer Science and Software Engineering Nanjing211100 China Nanjing University of Posts and Telecommunications College of Internet of Things Nanjing210003 China Sun Yat-Sen University School of Software Engineering Zhuhai519082 China Temple University Center for Networked Computing PhiladelphiaPA19122 United States
In Differentially Private Federated Learning (DP-FL), gradient clipping can prevent excessive noise from being added to the gradient and ensure that the impact of noise is within a controllable range. However, state-o... 详细信息
来源: 评论
Highly Robust and Diverse Coverless Image Steganography Against Passive and Active Steganalysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2771-2787页
作者: Guo, Bobiao Ping, Ping Xu, Feng Hohai University College of Computer Science and Software Engineering Nanjing210098 China Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources Nanjing210098 China Jiangsu Ocean University School of Computer Engineering Lianyungang222005 China
To avoid the pixel modification traces left by steganography from being detected by passive steganalysis, and to prevent the hidden data from being destroyed by active steganalysis attacks, Coverless Image Steganograp... 详细信息
来源: 评论
Unpaired 3D Shape-to-Shape Translation via Gradient-Guided Triplane Diffusion
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 3376-3386页
作者: Zhang, Wenxiao Rahmani, Hossein Liu, Jun Hohai University College of Computer Science and Software Engineering Nanjing211100 China Lancaster University School of Computing and Communications LancasterLA1 4YW United Kingdom
Unpaired shape-to-shape translation refers to the task of transforming the geometry and semantics of an input shape into a new shape domain without paired training data. Previous methods utilize GAN-based architecture... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
SLwF: A Split Learning Without Forgetting Framework for Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12008-12020页
作者: Feng, Xingyu Jia, Renqi Luo, Chengwen Leung, Victor C. M. Xu, Weitao School of Information Engineering Beijing100190 China City University of Hong Kong Shenzhen Research Institute Hong Kong Hong Kong City University of Hong Kong Department of Computer Science Hong Kong Hong Kong Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
Split learning (SL) is widely regarded as a promising distributed machine learning framework with superior privacy-preserving properties, lower communication and computation costs. However, in real Internet of Things ... 详细信息
来源: 评论
CLS-3D: Content-Wise LiDAR-Camera Fusion and Slot Reweighting Transformer for 3D Object Detection in Autonomous Vehicles
收藏 引用
IEEE Access 2025年 13卷 69840-69856页
作者: Mushtaq, Husnain Latif, Sohaib Saad Bin Ilyas, Muhammad Mohsin, Syed Muhammad Ali, Mohammed Central South University School of Computer Science and Engineering Changsha410083 China Grand Asian University Department of Computer Science and Software Engineering Sialkot51040 Pakistan The University of Chenab Department of Computer Science Gujranwala50700 Pakistan COMSATS University Islamabad Department of Computer Science Islamabad45550 Pakistan Virtual University of Pakistan Standard College of Modern Sciences Lahore55150 Pakistan King Khalid University Department of Computer Science Abha61421 Saudi Arabia Abha61421 Saudi Arabia
Accurate 3D object detection is vital in autonomous driving. Single-modal detectors, using either camera or LiDAR, struggle with issues like limited depth perception or difficulty in distinguishing semantically simila... 详细信息
来源: 评论
YOLOCSP-PEST for Crops Pest Localization and Classification
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2373-2388页
作者: Farooq Ali Huma Qayyum Kashif Saleem Iftikhar Ahmad Muhammad Javed Iqbal Department of Software Engineering University of Engineering and TechnologyTaxila47050Pakistan Department of Computer Science&Engineering College of Applied Studies&Community ServiceKing Saud UniversityRiyadh11362Saudi Arabia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science University of Engineering and TechnologyTaxila47050Pakistan
Preservation of the crops depends on early and accurate detection of pests on crops as they cause several diseases decreasing crop production and quality. Several deep-learning techniques have been applied to overcome... 详细信息
来源: 评论
IPT-ILR: Image Pyramid Transformer Coupled With Information Loss Regularization for All-in-One Image Restoration
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第5期35卷 4341-4356页
作者: Yang, Sai Hu, Bin Liu, Fan Wu, Xiaoxin Ding, Weiping Zhou, Jun Nantong University School of Electrical Engineering and Automation Nantong226019 China Nantong University School of Artificial Intelligence and Computer Science Nantong226019 China Hohai University College of Computer Science and Software Engineering Nanjing210098 China Griffith University School of Information and Communication Technology NathanQLD4111 Australia
All-in-one image restoration has recently developed to be a new research trend in the low-level computer vision field, aiming to tackle multiple image degradation types simultaneously in a unified model. As a typical ... 详细信息
来源: 评论
Next-Generation Cybersecurity Solution: A Decentralized Ransomware Recovery Network (DRRN) with Secret Sharing
收藏 引用
SN computer science 2025年 第5期6卷 1-22页
作者: Ali, Sijjad Wang, Jia Leung, Victor C. M. Ali, Asad College of Computer Science and Software Engineering Shenzhen University Yuehai Campus Guangdong Shenzhen 518060 China College of Electronics and information Engineering Shenzhen University Yuehai Campus Guangdong Shenzhen 518060 China
The increasing frequency of ransomware attacks, with a reported growth rate of 59%, has exposed significant vulnerabilities in existing cybersecurity measures. Traditional defenses, such as routine data backups and en... 详细信息
来源: 评论