咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 3,046 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,675 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,890 篇 工学
    • 3,765 篇 计算机科学与技术...
    • 3,055 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,275 篇 理学
    • 1,328 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,000 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7675 条 记 录,以下是821-830 订阅
排序:
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems  22
Fast Distributed Polynomial Multiplication Algorithm for Lat...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Zhao, Hongjian Tao, Yunting Kong, Fanyu Zhang, Guoyan Zhang, Hanlin Yu, Jia Shandong University School of Software Jinan China Binzhou Polytechnic College of Information Engineering Binzhou China Shandong University Shandong Sansec Information Technology Co. Ltd School of Software Jinan China Shandong University School of Cyber Science and Technology Qingdao China Qingdao University College of Computer Science and Technology Qingdao China
Lattice-based Post-Quantum Cryptography (PQC) can effectively resist the quantum threat to blockchain's underlying cryptographic algorithms. Blockchain node decryption is one of the most commonly used cryptographi... 详细信息
来源: 评论
Aspect Level Songs Rating Based Upon Reviews in English
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2589-2605页
作者: Muhammad Aasim Qureshi Muhammad Asif Saira Anwar Umar Shaukat Atta-ur-Rahman Muhammad Adnan Khan Amir Mosavi Department of Computer Science Bahria University Lahore54000Pakistan Lahore Institute of Science and Technology Lahore 54792Pakistan Department of Multidisciplinary Engineering Texas A&M UniversityCollege Station77843USA Department of Computer Science College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam 31441Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea John von Neumann Faculty of Informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia Faculty of Civil Engineering TU-DresdenDresden01062Germany
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormo... 详细信息
来源: 评论
Corpus of Carbonate Platforms with Lexical Annotations for Named Entity Recognition
收藏 引用
computer Modeling in engineering & sciences 2023年 第4期135卷 91-108页
作者: Zhichen Hu Huali Ren Jielin Jiang Yan Cui Xiumian Hu Xiaolong Xu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Institution of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou515021China School of Earth Sciences and Engineering Nanjing UniversityNanjing210023China College of Mathematics and Information Science Nanjing Normal University of Special EducationNanjing210023China
An obviously challenging problem in named entity recognition is the construction of the kind data set of *** some research has been conducted on entity database construction,the majority of them are directed at Wikipe... 详细信息
来源: 评论
Low Resolution Face Image Recognition Based on Consistent Discriminant Correlation Analysis with Weight Correction  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Lin, Xiaoan Li, Meihua Pei, Jihong Zhao, Yang College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
Consistent Discriminant Correlation Analysis (CDCA) is an effective algorithm for dual-view learning. However, the importance of information from different samples and features may vary. In CDCA, the sample features f... 详细信息
来源: 评论
Cloud Security Service for Identifying Unauthorized User Behaviour
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2581-2600页
作者: D.Stalin David Mamoona Anam Chandraprabha Kaliappan S.Arun Mozhi Selvi Dilip Kumar Sharma Pankaj Dadheech Sudhakar Sengan Department of Computer Science and Engineering IFET College of EngineeringVillupuram605108Tamil NaduIndia Department of Computer Sciences and Software Engineering Faculty of Basic and Applied SciencesInternational Islamic UniversityIslamabadPakistan Department of Information Technology Bannari Amman Institute of TechnologySathyamangalam638401Tamil NaduIndia Department of Computer Science Engineering DMI St.John the Baptist UniversityMangochiLilongweMalawi Department of Mathematics Jaypee University of Engineering and TechnologyGuna473226Madhya PradeshIndia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement and Gramothan(SKIT)Jaipur302017RajasthanIndia Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers... 详细信息
来源: 评论
Out-of-Distribution Detection with Prototypical Outlier Proxy  39
Out-of-Distribution Detection with Prototypical Outlier Prox...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Gong, Mingrong Chen, Chaoqi Sun, Qingqiang Wang, Yue Huang, Hui College of Computer Science and Software Engineering Shenzhen University China School of Engineering Great Bay University China Department of Computer Science University College London United Kingdom
Out-of-distribution (OOD) detection is a crucial task for deploying deep learning models in the wild. One of the major challenges is that well-trained deep models tend to perform over-confidence on unseen test data. R... 详细信息
来源: 评论
Palette-based Color Transfer between Images
arXiv
收藏 引用
arXiv 2024年
作者: Lv, Chenlei Zhang, Dan College of Computer Science and Software Engineering Shenzhen University China School of Computer Science Qinghai Normal University China
As an important subtopic of image enhancement, color transfer aims to enhance the color scheme of a source image according to a reference one while preserving the semantic context. To implement color transfer, the pal... 详细信息
来源: 评论
Regularized Loose Coupled Deep Non-negative Basis Matrix Factorization for Low-Resolution Face Image Recognition  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Li, Jianhua Wang, Jinxin Pei, Jihong Zhao, Yang College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
Low-resolution face image recognition is a research focus in computer vision and pattern recognition. In this paper, the potential relationship between matched high-resolution face and low-resolution face images is co... 详细信息
来源: 评论
Coupled Non-negative Matrix Factorization with Deep Part-Based Feature Learning for Low-Resolution Image Recognition  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Wang, Jinxin Zhao, Yang Pei, Jihong Yang, Xuan College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Guangdong Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen China
The existing low-resolution (LR) image recognition methods based on coupled relationship learning of high- and low-resolution images usually take similar feature extraction steps for both high- and low-resolution imag... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论