咨询与建议

限定检索结果

文献类型

  • 13,918 篇 期刊文献
  • 12,073 篇 会议
  • 110 册 图书

馆藏范围

  • 26,099 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 16,354 篇 工学
    • 9,272 篇 计算机科学与技术...
    • 7,478 篇 软件工程
    • 3,260 篇 信息与通信工程
    • 2,462 篇 电子科学与技术(可...
    • 2,459 篇 控制科学与工程
    • 2,424 篇 电气工程
    • 2,223 篇 生物工程
    • 2,011 篇 光学工程
    • 1,897 篇 生物医学工程(可授...
    • 1,297 篇 化学工程与技术
    • 1,254 篇 机械工程
    • 1,041 篇 仪器科学与技术
    • 988 篇 材料科学与工程(可...
    • 728 篇 动力工程及工程热...
    • 505 篇 力学(可授工学、理...
    • 451 篇 土木工程
  • 11,090 篇 理学
    • 5,059 篇 物理学
    • 4,049 篇 数学
    • 2,608 篇 生物学
    • 1,516 篇 化学
    • 1,438 篇 统计学(可授理学、...
    • 770 篇 系统科学
  • 3,541 篇 管理学
    • 2,150 篇 管理科学与工程(可...
    • 1,424 篇 图书情报与档案管...
    • 895 篇 工商管理
  • 1,919 篇 医学
    • 1,583 篇 临床医学
    • 1,282 篇 基础医学(可授医学...
    • 802 篇 药学(可授医学、理...
    • 543 篇 公共卫生与预防医...
  • 563 篇 法学
    • 453 篇 社会学
  • 376 篇 农学
  • 334 篇 经济学
  • 266 篇 教育学
  • 98 篇 文学
  • 55 篇 军事学
  • 34 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 522 篇 deep learning
  • 342 篇 feature extracti...
  • 331 篇 computer science
  • 326 篇 machine learning
  • 317 篇 training
  • 248 篇 accuracy
  • 242 篇 image segmentati...
  • 227 篇 semantics
  • 215 篇 computational mo...
  • 181 篇 reinforcement le...
  • 173 篇 neural networks
  • 168 篇 optimization
  • 156 篇 internet of thin...
  • 156 篇 three-dimensiona...
  • 141 篇 deep neural netw...
  • 140 篇 magnetic resonan...
  • 139 篇 data mining
  • 136 篇 object detection
  • 134 篇 support vector m...
  • 133 篇 computer archite...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 641 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 524 篇 iccub universita...
  • 518 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 481 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 240 篇 s. chen
  • 239 篇 f. siegert
  • 233 篇 bowcock t.j.v.
  • 228 篇 brundu d.
  • 226 篇 blake t.
  • 224 篇 y. tayalati
  • 217 篇 r. ströhmer
  • 216 篇 m. rijssenbeek
  • 210 篇 s. jin

语言

  • 23,993 篇 英文
  • 1,683 篇 其他
  • 417 篇 中文
  • 20 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Center for Robotics and School of Computer Science and Engineering"
26101 条 记 录,以下是171-180 订阅
排序:
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1805-1819页
作者: Jin Wang Wei Ou Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Engineering Chonnam National UniversityGwangju61186Korea School of Computer Science Engineering Research Center of Digital Forensics of Ministry of EducationNanjing University of Information Science&TechnologyNanjing210044China
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block... 详细信息
来源: 评论
A Review of Intrusion Detection for Internet of Things Using Machine Learning
A Review of Intrusion Detection for Internet of Things Using...
收藏 引用
2024 International Conference on Cybernation and Computation, CYBERCOM 2024
作者: Paul, Ekwueme Chika Amrita Sharda School of Engineering & Technology Sharda University Computer Science & Engineering UP Greater Noida India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University UP Greater Noida India
As Internet of Things (IoT) networks proliferate across consumer and industrial sectors, safeguarding these interconnected cyber-physical systems is imperative. IoT ecosystems present abundant targets for malicious in... 详细信息
来源: 评论
UniSaT: Unified-Objective Belief Model and Planner to Search for and Track Multiple Objects
UniSaT: Unified-Objective Belief Model and Planner to Search...
收藏 引用
AIAA science and Technology Forum and Exposition, AIAA SciTech Forum 2025
作者: Santos, Leonardo Moon, Brady Scherer, Sebastian Nguyen, Hoa Van School of Engineering Federal University of Minas Gerais MG Belo Horizonte Brazil Robotics Institute School of Computer Science Carnegie Mellon University PittsburghPA United States Department of Electrical and Computer Engineering Curtin University BentleyWA6102 Australia
Path planning for autonomous search and tracking of multiple objects is a critical problem in applications such as reconnaissance, surveillance, and data gathering. Due to the inherent competing objectives of searchin... 详细信息
来源: 评论
ACSarF:a DRL-based adaptive consortium blockchain sharding framework for supply chain finance
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 26-34页
作者: Shijing Hu Junxiong Lin Xin Du Wenbin Huang Zhihui Lu Qiang Duan Jie Wu School of Computer Science Fudan UniversityShanghai 200438China Shanghai Blockchain Engineering Research Center Fudan UniversityShanghai 200438China Information Sciences and Technology Department Pennsylvania State UniversityAbingtonPA 19001USA
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech appli... 详细信息
来源: 评论
Resisting Over-Smoothing in Graph Neural Networks via Dual-Dimensional Decoupling  24
Resisting Over-Smoothing in Graph Neural Networks via Dual-D...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Shen, Wei Ye, Mang Huang, Wenke National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Graph Neural Networks (GNNs) are widely employed to derive meaningful node representations from graphs. Despite their success, deep GNNs frequently grapple with the oversmoothing issue, where node representations beco... 详细信息
来源: 评论
Empowering Visible-Infrared Person Re-Identification with Large Foundation Models  38
Empowering Visible-Infrared Person Re-Identification with La...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Zhangyi Yang, Bin Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
来源: 评论
A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84275-84297页
作者: Feng, Sijia Zhao, Maochang Liu, Zhaobin Li, Yuanyu Tianjin public emergency early warning information release center Tianjin Meteorology Information Center Tianjin300074 China School of Information Science & amp Technology Dalian Maritime University Dalian116026 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro... 详细信息
来源: 评论
PKEST: Public-Key Encryption With Similarity Test for Medical Consortia Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 680-693页
作者: Chen, Junsong Zeng, Shengke Han, Song Yin, Jin Chen, Peng Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China Sichuan University West China Biomedical Big Data Center West China Hospital Chengdu610041 China
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo... 详细信息
来源: 评论
Harmonizing space–time dynamics for precision in human action recognition
收藏 引用
Multimedia Tools and Applications 2025年 第5期84卷 2805-2832页
作者: Majid, Abdul Wang, Yulin Ullah, Anwar Naiz, Fahim Zarar, Muhammad School of Computer Science Wuhan University Hubei Wuhan430072 China National Engineering Research Center for E-Leaning Central China Normal University Hubei Wuhan430072 China
Human action recognition (HAR) plays a vital role in various fields, including surveillance, healthcare, and human–computer interaction. Recognizing multi-actor actions in crowded scenarios poses a significant challe... 详细信息
来源: 评论
Intelligent Predetermination of Generator Tripping Scheme: Knowledge Fusion-based Deep Reinforcement Learning Framework
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第1期10卷 66-75页
作者: Lingkang Zeng Wei Yao Ze Hu Hang Shuai Zhouping Li Jinyu Wen Shijie Cheng State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronics EngineeringHuazhong University of Science and TechnologyWuhan 430074China Dispatching and Control Center Central China Branch of State Grid Corporation of ChinaWuhan 430077China. Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ... 详细信息
来源: 评论