咨询与建议

限定检索结果

文献类型

  • 952 篇 会议
  • 920 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,877 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 833 篇 计算机科学与技术...
    • 654 篇 软件工程
    • 353 篇 信息与通信工程
    • 153 篇 电气工程
    • 145 篇 电子科学与技术(可...
    • 132 篇 控制科学与工程
    • 114 篇 生物工程
    • 101 篇 光学工程
    • 86 篇 机械工程
    • 69 篇 生物医学工程(可授...
    • 62 篇 仪器科学与技术
    • 57 篇 网络空间安全
    • 53 篇 动力工程及工程热...
    • 50 篇 化学工程与技术
    • 48 篇 交通运输工程
    • 33 篇 安全科学与工程
    • 32 篇 建筑学
    • 31 篇 土木工程
  • 606 篇 理学
    • 285 篇 数学
    • 210 篇 物理学
    • 127 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 51 篇 化学
    • 45 篇 系统科学
  • 328 篇 管理学
    • 193 篇 管理科学与工程(可...
    • 149 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 65 篇 医学
    • 49 篇 临床医学
    • 35 篇 基础医学(可授医学...
  • 42 篇 法学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 15 篇 教育学
  • 13 篇 军事学
  • 12 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 56 篇 computer network...
  • 54 篇 feature extracti...
  • 46 篇 semantics
  • 37 篇 training
  • 35 篇 accuracy
  • 34 篇 robustness
  • 30 篇 computational mo...
  • 29 篇 deep learning
  • 26 篇 bandwidth
  • 25 篇 federated learni...
  • 24 篇 protocols
  • 24 篇 delay
  • 23 篇 throughput
  • 22 篇 wireless communi...
  • 22 篇 computer vision
  • 20 篇 blockchain
  • 19 篇 security
  • 19 篇 telecommunicatio...
  • 18 篇 data mining
  • 18 篇 machine learning

机构

  • 66 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 51 篇 hubei key labora...
  • 48 篇 national enginee...
  • 47 篇 computer network...
  • 47 篇 center for multi...
  • 46 篇 national enginee...
  • 41 篇 national key lab...
  • 41 篇 national compute...
  • 33 篇 centre for multi...
  • 31 篇 university of ch...
  • 29 篇 national enginee...
  • 29 篇 collaborative in...
  • 28 篇 university of sc...
  • 26 篇 institute of inf...
  • 25 篇 centro brasileir...
  • 25 篇 istanbul technic...
  • 24 篇 national and kap...
  • 24 篇 yerevan physics ...
  • 24 篇 jd explore acade...

作者

  • 69 篇 du bo
  • 39 篇 tao dacheng
  • 33 篇 wang jin
  • 31 篇 hu ruimin
  • 29 篇 chia liang-tien
  • 27 篇 boxin shi
  • 27 篇 chai kiat yeo
  • 25 篇 shi boxin
  • 25 篇 wang zheng
  • 23 篇 sun xingming
  • 23 篇 ruimin hu
  • 23 篇 bu sung lee
  • 23 篇 liu juhua
  • 21 篇 konstantinou s.
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.
  • 20 篇 lowette s.
  • 19 篇 liang chao

语言

  • 1,636 篇 英文
  • 212 篇 其他
  • 29 篇 中文
  • 1 篇 日文
检索条件"机构=Center of Multimedia and Network Technology School of Computer Engineering"
1877 条 记 录,以下是41-50 订阅
排序:
Combining Fourier-based Channel Attention with TCN and Informer for Railway Accident Prediction  15
Combining Fourier-based Channel Attention with TCN and Infor...
收藏 引用
15th IEEE Global Reliability and Prognostics and Health Management Conference, PHM-Beijing 2024
作者: Shen, Nahao Li, Honghui Bai, Yanhui Yang, Xiaorui He, Ruiyi School of Computer Science and Technology Beijing Jiaotong University Beijing China School of Computer Science and Technology Beijing Jiaotong University Engineering Research Center of Network Management Technology for High Speed Railway of MOE Beijing China
The rapid expansion of railway networks and technological advancements has introduced significant challenges in ensuring railway safety. To address the critical need for effective prediction and prevention mechanisms,... 详细信息
来源: 评论
Tensor Factorization for Accurate Anomaly Detection in Dynamic networks
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 439-450页
作者: Li, Xiaocan Wen, Jigang Xie, Kun Xie, Gaogang Liang, Wei Hunan University College of Computer Science Electronics Engineering Changsha410012 China Ministry of Education Key Laboratory of Supercomputing Artificial Intelligence Fusion Computing Changsha410012 China School of Computer Science Engineering Hunan University of Science Technology Xiangtan411199 China Chinese Academy of Sciences Computer Network Information Center Beijing411199 China
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ... 详细信息
来源: 评论
A Theory of Transfer-Based Black-Box Attacks: Explanation and Implications  37
A Theory of Transfer-Based Black-Box Attacks: Explanation an...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Chen, Yanbo Liu, Weiwei School of Computer Science Wuhan University National Engineering Research Center for Multimedia Software Wuhan University Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Transfer-based attacks [1] are a practical method of black-box adversarial attacks in which the attacker aims to craft adversarial examples from a source model that is transferable to the target model. Many empirical ...
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Adversarial Self-Training Improves Robustness and Generalization for Gradual Domain Adaptation  37
Adversarial Self-Training Improves Robustness and Generaliza...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Shi, Lianghe Liu, Weiwei School of Computer Science Wuhan University National Engineering Research Center for Multimedia Software Wuhan University Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Gradual Domain Adaptation (GDA), in which the learner is provided with additional intermediate domains, has been theoretically and empirically studied in many contexts. Despite its vital role in security-critical scen...
来源: 评论
Deep Imputation Bi-stochastic Graph Regularized Matrix Factorization for Clustering Single-cell RNA-sequencing Data
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2024年 PP卷 1-11页
作者: Lan, Wei Chen, Jianwei Liu, Mingyang Chen, Qingfeng Liu, Jin Wang, Jianxin Chen, Yi-Ping Phoebe Wei Lan is School of Computer Electronic and Information and Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning Guangxi China School of Computer Electronic and Information Guangxi University Nanning Guangxi China School of Computer Electronic and Information and State Key Laboratory for Conservation and Utilization of Subtropical Agro-bioresources Guangxi University Nanning Guangxi China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha Hunan China Department of Computer Science and Information Technology La Trobe University Melbourne Victoria Australia
By generating massive gene transcriptome data and analyzing transcriptomic variations at the cell level, single-cell RNA-sequencing (scRNA-seq) technology has provided new way to explore cellular heterogeneity and fun... 详细信息
来源: 评论
Cycle Self-Refinement for Multi-Source Domain Adaptation  38
Cycle Self-Refinement for Multi-Source Domain Adaptation
收藏 引用
38th AAAI Conference on Artificial Intelligence, AAAI 2024
作者: Zhou, Chaoyang Wang, Zengmao Du, Bo Luo, Yong School of Computer Science Wuhan University China National Engineering Research Center for Multimedia Software Wuhan University China Institute of Artificial Intelligence Wuhan University China Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Hubei Luojia Laboratory China
Multi-source domain adaptation (MSDA) aims to transfer knowledge from multiple source domains to the unlabeled target domain. In this paper, we propose a cycle self-refinement domain adaptation method, which progressi... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
Zero-Shot Event-Intensity Asymmetric Stereo via Visual Prompting from Image Domain  38
Zero-Shot Event-Intensity Asymmetric Stereo via Visual Promp...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Lou, Hanyue Liang, Jinxiu Teng, Minggui Fan, Bin Xu, Yong Shi, Boxin State Key Laboratory of Multimedia Information Processing School of Computer Science Peking University China National Engineering Research Center of Visual Technology School of Computer Science Peking University China National Key Laboratory of General AI School of Intelligence Science and Technology Peking University China School of Computer Science and Engineering South China University of Technology China
Event-intensity asymmetric stereo systems have emerged as a promising approach for robust 3D perception in dynamic and challenging environments by integrating event cameras with frame-based sensors in different views....
来源: 评论
Region-adaptive Concept Aggregation for Few-shot Visual Recognition
收藏 引用
Machine Intelligence Research 2023年 第4期20卷 554-568页
作者: Mengya Han Yibing Zhan Baosheng Yu Yong Luo Han Hu Bo Du Yonggang Wen Dacheng Tao School of Computer Science National Engineering Research Center for Multimedia SoftwareWuhan UniversityWuhan430072China Hubei Luojia Laboratory Wuhan430072China School of Computer Science The University of SydneySydney2006Australia JD Explore Academy Beijing101116China School of Information and Electronics Beijing Institute of TechnologyBeijing100081China School of Computer Science and Engineering Nanyang Technological UniversitySingapore639798Singapore
Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking robustness in concept learning. Specifically, existing FSL methods usually ig... 详细信息
来源: 评论