咨询与建议

限定检索结果

文献类型

  • 2,082 篇 会议
  • 1,780 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,899 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,582 篇 工学
    • 1,416 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 625 篇 信息与通信工程
    • 482 篇 电子科学与技术(可...
    • 429 篇 电气工程
    • 423 篇 控制科学与工程
    • 333 篇 生物工程
    • 320 篇 光学工程
    • 293 篇 生物医学工程(可授...
    • 194 篇 化学工程与技术
    • 193 篇 机械工程
    • 192 篇 仪器科学与技术
    • 161 篇 动力工程及工程热...
    • 146 篇 材料科学与工程(可...
    • 77 篇 力学(可授工学、理...
    • 77 篇 安全科学与工程
    • 65 篇 土木工程
  • 1,603 篇 理学
    • 683 篇 数学
    • 675 篇 物理学
    • 366 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 194 篇 化学
    • 178 篇 系统科学
  • 537 篇 管理学
    • 354 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 171 篇 工商管理
  • 241 篇 医学
    • 210 篇 临床医学
    • 190 篇 基础医学(可授医学...
    • 132 篇 药学(可授医学、理...
  • 77 篇 法学
    • 67 篇 社会学
  • 58 篇 经济学
  • 27 篇 教育学
  • 26 篇 农学
  • 10 篇 文学
  • 6 篇 军事学
  • 5 篇 艺术学

主题

  • 64 篇 training
  • 60 篇 machine learning
  • 56 篇 deep learning
  • 55 篇 feature extracti...
  • 43 篇 optimization
  • 39 篇 semantics
  • 38 篇 image segmentati...
  • 38 篇 accuracy
  • 37 篇 computational mo...
  • 37 篇 artificial intel...
  • 36 篇 robustness
  • 35 篇 sensors
  • 34 篇 conferences
  • 34 篇 neural networks
  • 33 篇 cloud computing
  • 32 篇 computer archite...
  • 32 篇 cameras
  • 32 篇 quality of servi...
  • 30 篇 computer science
  • 30 篇 visualization

机构

  • 58 篇 department of el...
  • 45 篇 school of electr...
  • 27 篇 security enginee...
  • 21 篇 school of comput...
  • 20 篇 department of el...
  • 17 篇 college of compu...
  • 16 篇 school of optica...
  • 15 篇 university of sc...
  • 15 篇 school of automa...
  • 15 篇 pazhou lab
  • 13 篇 faculty of elect...
  • 13 篇 lab
  • 13 篇 zhejiang lab
  • 12 篇 graduate institu...
  • 12 篇 department of el...
  • 11 篇 department of el...
  • 11 篇 department of co...
  • 11 篇 university of el...
  • 11 篇 university of ch...
  • 11 篇 the college of i...

作者

  • 20 篇 timofte radu
  • 19 篇 walid el-shafai
  • 17 篇 li haizhou
  • 17 篇 el-shafai walid
  • 12 篇 maier andreas
  • 12 篇 rajkumar buyya
  • 11 篇 bakas spyridon
  • 11 篇 caire giuseppe
  • 11 篇 qiu cheng-wei
  • 11 篇 kot alex c.
  • 10 篇 lakshminarayanan...
  • 10 篇 poor h. vincent
  • 9 篇 shoeibi afshin
  • 9 篇 bidgoli azam asi...
  • 9 篇 javadpour amir
  • 9 篇 zheng qian
  • 9 篇 zhuang songlin
  • 9 篇 yeo yee-chia
  • 9 篇 zhang yan
  • 9 篇 wang meng

语言

  • 3,651 篇 英文
  • 203 篇 其他
  • 41 篇 中文
  • 1 篇 日文
检索条件"机构=Cloud Lab Electrical Engineering and Computer Science"
3899 条 记 录,以下是491-500 订阅
排序:
Joint Channel Estimation and Data Detection for AFDM Receivers With Oversampling
Joint Channel Estimation and Data Detection for AFDM Receive...
收藏 引用
2025 International Conference on Computing, Networking and Communications, ICNC 2025
作者: Rayan Ranasinghe, Kuranage Roche Ge, Yao Freitas De Abreu, Giuseppe Thadeu Liang Guan, Yong Constructor University School of Computer Science and Engineering Bremen28759 Germany Nanyang Technological University Continental-NTU Corporate Lab 639798 Singapore Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore
In this paper, we propose a novel low complexity time domain (TD) oversampling receiver framework under affine frequency division multiplexing (AFDM) waveforms for joint channel estimation and data detection (JCEDD). ... 详细信息
来源: 评论
Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Heterogeneous Anomaly Detection for Software Systems via Sem...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Cheryl Lee Tianyi Yang Zhuangbin Chen Yuxin Su Yongqiang Yang Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China Sun Yat-sen University Guangzhou China Computing and Networking Innovation Lab Cloud BU Huawei
Prompt and accurate detection of system anomalies is essential to ensure the reliability of software systems. Unlike manual efforts that exploit all available run-time information, existing approaches usually leverage...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Parasitic Parameters Effect on the Operation of High Frequency Electric Drive System
Parasitic Parameters Effect on the Operation of High Frequen...
收藏 引用
International Conference on electrical Machines, ICEM
作者: Fawzy A. Abdo Kotb B. Tawfiq Peter Sergeant Department of Electromechanical Systems and Metal Engineering Ghent University Ghent Belgium Flanders Make@UGent Core Lab MIRO Leuven Belgium Department of Electrical Engineering Menoufia University Menoufia Egypt Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi UAE
The rapid switching of semiconductor power modules in electric drive systems generates high frequency (HF) common mode voltage at the motor terminals which causes bearing failure and winding degradation. Therefore, ac... 详细信息
来源: 评论
Deep Learning Innovations in Diagnosing Diabetic Retinopathy: The Potential of Transfer Learning and the DiaCNN Model
arXiv
收藏 引用
arXiv 2024年
作者: Shoaib, Mohamed R. Emara, Heba M. Zhao, Jun El-Shafai, Walid Soliman, Naglaa F. Mubarak, Ahmed S. Omer, Osama A. Abd El-Samie, Fathi E. Esmaiel, Hamada School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore Electrical Engineering Department Aswan Faculty of Engineering Aswan University Aswan81542 Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia
Diabetic retinopathy (DR) is a significant cause of vision impairment, emphasizing the critical need for early detection and timely intervention to avert visual deterioration. Diagnosing DR is inherently complex, as i... 详细信息
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Focal volume optics for composite structuring in transparent solids
收藏 引用
International Journal of Extreme Manufacturing 2025年 第1期7卷 357-366页
作者: Bo Zhang Zhuo Wang Dezhi Tan Min Gu Yuanzheng Yue Jianrong Qiu State Key Laboratory of Modern Optical Instrumentation College of Optical Science and EngineeringZhejiang UniversityHangzhou 310027People’s Republic of China Zhejiang Lab Hangzhou 311100People’s Republic of China School of Materials Science and Engineering Zhejiang UniversityHangzhou 310027People’s Republic of China Institute of Photonic Chips University of Shanghai for Science and TechnologyShanghaiPeople’s Republic of China Centre for Artificial-Intelligence Nanophotonics School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghaiPeople’s Republic of China Department of Chemistry and Bioscience Aalborg University9220 AalborgDenmark
Achieving high-level integration of composite micro-nano structures with different structural characteristics through a minimalist and universal process has long been the goal pursued by advanced manufacturing researc... 详细信息
来源: 评论
Cyber Twin Technology for AI-Driven Real-Time Software Security in IoT Ecosystems
Cyber Twin Technology for AI-Driven Real-Time Software Secur...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE International Conference on
作者: Krishna Chaitanya Sunkara Gulshan Dhasmana Ravi K S Nayana Yadav M Ishan Desai Rajmani Shankar Oracle Cloud Engineering Data Center Design & Modeling AL/ML Expert North Carolina USA Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Department of Mechanical Engineering Vidyavardhaka College of Engineering Mysuru India Department of Computer Science and Engineering AJ Institute of Engineering and Technology Mangalore India Department of Electrical Engineering Faculty of Engineering and Technology Parul institute of Engineering and Technology Parul University Gujarat India Faculty of Law Symbiosis Law School Symbiosis International (Deemed University) Pune India
As Internet of Things (IoT) ecosystems grow more complex, ensuring real-time security has become a major challenge. Traditional security approaches are insufficient for handling dynamic and interconnected IoT networks... 详细信息
来源: 评论
Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth
Two-Server Private Information Retrieval with High Throughpu...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Huang, Cheng Yang, Anjia Liu, Dongxiao Lu, Rongxing Shen, Xuemin Sherman University of Waterloo Department of Electrical and Computer Engineering WaterlooONN2L 3G1 Canada Jinan University College of Cyber Security Guangzhou510632 China University of New Brunswick Faculty of Computer Science FrederictonNBE3B 5A3 Canada Pazhou Lab Guangzhou China
In this paper, we propose a high-throughput, logarithmic-bandwidth private information retrieval (PIR) scheme, which enables a client to securely retrieve any record from a database replicated on two remote servers wi... 详细信息
来源: 评论
Biotic Browser: Applying StreamingLLM as a Persistent Web Browsing Co-Pilot
arXiv
收藏 引用
arXiv 2024年
作者: Dunnell, Kevin F. Stoddard, Andrew P. Media Lab Massachusetts Institute of Technology CambridgeMA02139 United States Electrical Engineering & Computer Science Massachusetts Institute of Technology CambridgeMA02139 United States
This paper presents "Biotic Browser," an innovative AI assistant leveraging StreamingLLM to transform web navigation and task execution. Characterized by its ability to simulate the experience of a passenger... 详细信息
来源: 评论