咨询与建议

限定检索结果

文献类型

  • 33,052 篇 期刊文献
  • 2,381 篇 会议
  • 3 册 图书

馆藏范围

  • 35,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29,525 篇 工学
    • 18,770 篇 计算机科学与技术...
    • 8,431 篇 电气工程
    • 8,118 篇 软件工程
    • 7,924 篇 控制科学与工程
    • 7,131 篇 材料科学与工程(可...
    • 7,064 篇 电子科学与技术(可...
    • 6,954 篇 信息与通信工程
    • 5,750 篇 机械工程
    • 3,048 篇 仪器科学与技术
    • 2,832 篇 网络空间安全
    • 1,953 篇 生物医学工程(可授...
    • 1,905 篇 力学(可授工学、理...
    • 1,319 篇 动力工程及工程热...
    • 1,152 篇 化学工程与技术
    • 904 篇 光学工程
    • 621 篇 生物工程
    • 606 篇 航空宇航科学与技...
  • 17,410 篇 理学
    • 9,764 篇 数学
    • 4,244 篇 物理学
    • 2,389 篇 生物学
    • 1,522 篇 天文学
    • 1,437 篇 化学
    • 1,375 篇 系统科学
    • 795 篇 统计学(可授理学、...
  • 5,374 篇 管理学
    • 4,160 篇 管理科学与工程(可...
    • 1,220 篇 图书情报与档案管...
  • 3,070 篇 医学
    • 2,581 篇 临床医学
    • 777 篇 基础医学(可授医学...
  • 840 篇 农学
  • 772 篇 经济学
    • 756 篇 应用经济学
  • 705 篇 法学
    • 568 篇 社会学
  • 691 篇 教育学
  • 615 篇 艺术学
  • 530 篇 文学
  • 431 篇 军事学
  • 53 篇 哲学
  • 38 篇 历史学

主题

  • 1,197 篇 deep learning
  • 736 篇 machine learning
  • 290 篇 network
  • 252 篇 internet of thin...
  • 249 篇 security
  • 249 篇 classification
  • 247 篇 clustering
  • 229 篇 optimization
  • 224 篇 analysis
  • 217 篇 simulation
  • 187 篇 model
  • 183 篇 cloud computing
  • 181 篇 artificial intel...
  • 179 篇 data
  • 175 篇 blockchain
  • 172 篇 computer
  • 149 篇 system
  • 143 篇 algorithm
  • 142 篇 learning
  • 138 篇 of

机构

  • 240 篇 ieee
  • 204 篇 department of co...
  • 151 篇 university of ch...
  • 91 篇 department of co...
  • 87 篇 school of comput...
  • 72 篇 college of compu...
  • 67 篇 school of comput...
  • 57 篇 department of co...
  • 52 篇 school of comput...
  • 47 篇 college of infor...
  • 44 篇 college of compu...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 38 篇 college of compu...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 school of comput...
  • 27 篇 department of co...

作者

  • 83 篇 yunyoung nam
  • 79 篇 abdelwahed motwa...
  • 52 篇 cheng-wei qiu
  • 51 篇 mehedi masud
  • 47 篇 jian wang
  • 41 篇 jing zhang
  • 39 篇 abu sarwar zaman...
  • 37 篇 jun zhang
  • 33 篇 rui wang
  • 31 篇 jun wang
  • 30 篇 xin liu
  • 30 篇 imran khan
  • 30 篇 li zhang
  • 30 篇 anwer mustafa hi...
  • 29 篇 mengchu zhou
  • 28 篇 wei liu
  • 27 篇 ge yu
  • 26 篇 mohamed k.nour
  • 24 篇 wei gao
  • 24 篇 mesfer al duhayy...

语言

  • 34,340 篇 英文
  • 1,096 篇 中文
检索条件"机构=mDepartment of Computer Science"
35436 条 记 录,以下是1-10 订阅
排序:
What can we learn from quality assurance badges in open-source software?
收藏 引用
science China(Information sciences) 2024年 第4期67卷 146-163页
作者: Feng LI Yiling LOU Xin TAN Zhenpeng CHEN Jinhao DONG Yang LI Xuanzhi WANG Dan HAO Lu ZHANG MoE Key Lab of HCST School of Computer SciencePeking University Department of computer science Purdue University School of computer science & Engineering Beihang University(BUAA) Department of computer science University College London(UCL)
In the development of open-source software(OSS), many developers use badges to give an overview of the software and share some key features/metrics conveniently. Among various badges, quality assurance(QA) badges make... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Practical cloud storage auditing using serverless computing
收藏 引用
science China(Information sciences) 2024年 第3期67卷 33-47页
作者: Fei CHEN Jianquan CAI Tao XIANG Xiaofeng LIAO College of computer science and Software Engineering Shenzhen University College of computer science Chongqing University
Cloud storage auditing research is dedicated to solving the data integrity problem of outsourced storage on the cloud. In recent years, researchers have proposed various cloud storage auditing schemes using different ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
APF-GAN:Exploring asymmetric pre-training and fine-tuning strategy for conditional generative adversarial network
收藏 引用
Computational Visual Media 2024年 第1期10卷 187-192页
作者: Yuxuan Li Lingfeng Yang Xiang Li College of computer science Nankai UniversityTianjinChina School of computer science and Engineering Nanjing University of Science and TechnologyNanjingChina
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited di... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Encoding-Decoding Framework Based on CNN for circ RNA-RBP Binding Sites Prediction
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 256-263页
作者: Yajing GUO Xiujuan LEI Yi PAN School of computer science Shaanxi Normal University Faculty of computer science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Department of computer science Georgia State University
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 735-759页
作者: Wael M.S.Yafooz Abdullah Alsaeedi Department of computer science College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Task Scheduling Algorithm Based on Clustering Pre-processing in Space-Based Information Network
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 217-230页
作者: Yufei WANG Jun LIU Shengnan ZHANG Sai XU Jingyi WANG School of computer science and Engineering Northeastern University
With the diversification of space-based information network task requirements and the dramatic increase in demand, the efficient scheduling of various tasks in space-based information network becomes a new challenge. ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(Information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of Cyber Engineering Xidian University School of computer science and Technology Xidian University Department of computer and Information science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Weakly-Supervised Crowd Density Estimation Method Based on Two-Stage Linear Feature Calibration
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 965-981页
作者: Yong-Chao Li Rui-Sheng Jia Ying-Xiang Hu Hong-Mei Sun the College of computer science and Engineering Shandong University of Science and TechnologyQingdao 266590 the Faculty of Information science and Engineering Ocean University of ChinaQingdao 266000China the College of computer science and Engineering Shandong University of Science and TechnologyQingdao 266590China the College of computer science and Engineering Nanjing University of Science and TechnologyNanjing 210000China
In a crowd density estimation dataset,the annotation of crowd locations is an extremely laborious task,and they are not taken into the evaluation *** this paper,we aim to reduce the annotation cost of crowd datasets,a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua science and Technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu School of computer science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of computer science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of computer science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information science and Engineering Hunan Normal University School of computer science Shaanxi Normal University Faculty of computer science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences computer science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论