咨询与建议

限定检索结果

文献类型

  • 3,628 篇 会议
  • 2,511 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 6,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,208 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,643 篇 软件工程
    • 765 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 366 篇 生物工程
    • 315 篇 电气工程
    • 295 篇 机械工程
    • 262 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 201 篇 生物医学工程(可授...
    • 148 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 124 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 100 篇 交通运输工程
    • 95 篇 安全科学与工程
    • 94 篇 建筑学
    • 92 篇 材料科学与工程(可...
  • 1,855 篇 理学
    • 1,173 篇 数学
    • 400 篇 生物学
    • 326 篇 统计学(可授理学、...
    • 319 篇 物理学
    • 214 篇 系统科学
    • 149 篇 化学
  • 1,216 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 550 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 131 篇 法学
    • 97 篇 社会学
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 73 篇 经济学
  • 66 篇 教育学
  • 45 篇 农学
  • 21 篇 艺术学
  • 15 篇 文学
  • 12 篇 军事学
  • 5 篇 哲学

主题

  • 180 篇 semantics
  • 161 篇 computer science
  • 135 篇 feature extracti...
  • 131 篇 software enginee...
  • 125 篇 laboratories
  • 123 篇 training
  • 111 篇 computational mo...
  • 99 篇 software
  • 97 篇 data mining
  • 97 篇 web services
  • 92 篇 educational inst...
  • 91 篇 deep learning
  • 87 篇 algorithm design...
  • 83 篇 accuracy
  • 81 篇 optimization
  • 78 篇 cloud computing
  • 74 篇 clustering algor...
  • 65 篇 data models
  • 62 篇 machine learning
  • 61 篇 authentication

机构

  • 458 篇 state key labora...
  • 279 篇 state key labora...
  • 206 篇 school of comput...
  • 178 篇 college of compu...
  • 175 篇 state key labora...
  • 151 篇 state key labora...
  • 144 篇 school of inform...
  • 131 篇 school of electr...
  • 123 篇 key laboratory o...
  • 111 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 shanghai key lab...
  • 105 篇 school of comput...
  • 102 篇 school of comput...
  • 90 篇 university of ch...
  • 85 篇 shandong provinc...
  • 76 篇 state key labora...
  • 69 篇 shandong provinc...
  • 65 篇 department of co...
  • 64 篇 school of comput...

作者

  • 73 篇 junping du
  • 55 篇 shen linlin
  • 49 篇 tao dacheng
  • 47 篇 du bo
  • 43 篇 huang di
  • 43 篇 xiao limin
  • 40 篇 gao yang
  • 40 篇 shi yinghuan
  • 35 篇 chen zhong
  • 35 篇 yu huiqun
  • 32 篇 fan guisheng
  • 32 篇 ruan li
  • 31 篇 miao huaikou
  • 31 篇 limin xiao
  • 30 篇 baowen xu
  • 29 篇 zhao jian
  • 29 篇 liu hong
  • 28 篇 shen furao
  • 28 篇 hong mei
  • 27 篇 xu baowen

语言

  • 5,631 篇 英文
  • 369 篇 其他
  • 157 篇 中文
检索条件"机构=The Key Laboratory of Computer Software Engineering"
6153 条 记 录,以下是741-750 订阅
排序:
GCFormer: Granger Causality based Attention Mechanism for Multivariate Time Series Anomaly Detection
GCFormer: Granger Causality based Attention Mechanism for Mu...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Shiwang Xing Jianwei Niu Tao Ren State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University China Zhongguancun Laboratory Beijing China Laboratory for Internet Software Technologies Institute of Software Chinese Academy of Sciences China
Multivariate time series anomaly detection, crucial for ensuring the safety of real-world systems, primarily focuses on extracting characteristics from time series under normal condition, and identifying potential ano...
来源: 评论
Enhance Learning Efficiency of Oblique Decision Tree via Feature Concatenation
arXiv
收藏 引用
arXiv 2025年
作者: Lyu, Shen-Huan He, Yi-Xiao Wang, Yanyan Qu, Zhihao Tang, Bin Ye, Baoliu Key Laboratory of Water Big Data Technology of Ministry of Water Resources College of Computer Science and Software Engineering Hohai University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China
Oblique Decision Tree (ODT) separates the feature space by linear projections, as opposed to the conventional Decision Tree (DT) that forces axis-parallel splits. ODT has been proven to have a stronger representation ... 详细信息
来源: 评论
An end-to-end graph attention network hashing for cross-modal retrieval  24
An end-to-end graph attention network hashing for cross-moda...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Huilong Jin Yingxue Zhang Lei Shi Shuang Zhang Feifei Kou Jiapeng Yang Chuangying Zhu Jia Luo College of Engineering Hebei Normal University College of Computer and Cyber Security Hebei Normal University State Key Laboratory of Media Convergence and Communication Communication University of China and Key Laboratory of Education Informatization for Nationalities (Yunnan Normal University) Ministry of Education School of Computer Science Beijing University of Posts and Telecommunications and Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology State Key Laboratory of Media Convergence and Communication Communication University of China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Chongqing Research Institute Beijing University of Technology
Due to its low storage cost and fast search speed, cross-modal retrieval based on hashing has attracted widespread attention and is widely used in real-world applications of social media search. However, most existing...
来源: 评论
A Novel Drug-Drug Interaction Prediction Model Based on Line Subgraph Generation Strategy
A Novel Drug-Drug Interaction Prediction Model Based on Line...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Bai, Tian Li, Chu Peng, Xinyue Guan, Haotian Zhang, Zefan Wang, Guishen Jilin University College of Computer Science and Technology Changchun China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China Jilin University College of Software Changchun China Jilin University School of Nursing Changchun China Jilin University School of Life Sciences Changchun China Changchun University of Technology College of Computer Science and Engineering Changchun China
Drug-Drug Interaction (DDI) prediction task is helpful for better-understanding drugs. In this paper, we propose a novel drug-drug interaction prediction model based on line subgraph generation strategy, named DDI-LSG... 详细信息
来源: 评论
A Systematic Literature Review of software Vulnerability Mining Approaches Based on Symbolic Execution
收藏 引用
International Journal of software engineering and Knowledge engineering 2025年 第5期35卷 609-656页
作者: Li, Lining Ren, Rong Dong, Jun Zhang, Bing Kang, Xu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory of Software Engineering Yanshan University Qinhuangdao China China University of Petroleum-Beijing at Karamay College of Petroleum China
With the rapid development of the software industry, the escalating issue of software vulnerabilities has posed significant risks to users. Symbolic execution as a vulnerability mining technology offers a high-test co... 详细信息
来源: 评论
Circular Decomposition and Cross-Modal Recombination for Multimodal Sentiment Analysis
Circular Decomposition and Cross-Modal Recombination for Mul...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haijian Liang Weicheng Xie Xilin He Siyang Song Linlin Shen School of Computer Science & Software Engineering Computer Vision Institue Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University School of Computing and Mathematical Sciences University of Leicester National Engineering Laboratory for Big Data System Computing Technology Shenzhen University
Multimodal Sentiment Analysis is a burgeoning research area, leveraging various modalities to predict the sentiment score. Nevertheless, previous studies have disregarded the impact of noise interference on specific m...
来源: 评论
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking
收藏 引用
Science China(Information Sciences) 2020年 第11期63卷 147-158页
作者: Qi WANG Weidong MIN Daojing HE Song ZOU Tiemei HUANG Yu ZHANG Ruikang LIU School of Information Engineering Nanchang University School of Software Nanchang University Jiangxi Key Laboratory of Smart City Nanchang University School of Computer Science and Software Engineering East China Normal University
Research on the application of vehicle re-identification to video surveillance has attracted increasingly growing attention. Existing methods are associated with the difficulties of distinguishing different instances ... 详细信息
来源: 评论
Asymptotic behavior of least squares estimators for nonlinear autoregressive models
收藏 引用
Science China(Information Sciences) 2023年 第6期66卷 299-300页
作者: Zhaobo LIU Chanying LI College of Computer Science and Software Engineering Shenzhen University Key Laboratory of Systems and Control Academy of Mathematics and Systems ScienceChinese Academy of Sciences School of Mathematical Sciences University of Chinese Academy of Sciences
Dear editor,Estimations of nonlinear autoregressive(AR) models in the literature typically involve ergodic series. Based on this assumption,the asymptotic theory has been established accordingly(see [1–3]). However,t...
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
Accelerometer signals denoising without clean training data based on Noise2Noise approach  3
Accelerometer signals denoising without clean training data ...
收藏 引用
3rd International Conference on Electronic Information engineering and Data Processing, EIEDP 2024
作者: Zheng, Fengling Li, Wei Cui, Xiaohui Rajaboevich, G.S. School of Artificial Intelligence and Computer Science Jiangsu Key Laboratory of Media Design and Software Technology Jiangnan University Jiangsu China School of Cyber Science and Engineering Wuhan University Wuhan China Tashkent University of Information Technologies named after Muhammad al –Khwarizmi Yunusobod district 108 Amir Temur str Tashkent100202 Uzbekistan
The accelerometer signal is capable of providing crucial information regarding object motion, posture, and vibration. Therefore, it is of great significance to investigate noise suppression techniques for acceleromete... 详细信息
来源: 评论