咨询与建议

限定检索结果

文献类型

  • 1,241 篇 期刊文献
  • 1,135 篇 会议
  • 8 册 图书

馆藏范围

  • 2,384 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,581 篇 工学
    • 902 篇 计算机科学与技术...
    • 757 篇 软件工程
    • 419 篇 控制科学与工程
    • 282 篇 信息与通信工程
    • 265 篇 电气工程
    • 190 篇 机械工程
    • 189 篇 电子科学与技术(可...
    • 171 篇 生物工程
    • 143 篇 生物医学工程(可授...
    • 134 篇 光学工程
    • 85 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 80 篇 动力工程及工程热...
    • 64 篇 材料科学与工程(可...
    • 58 篇 土木工程
    • 58 篇 安全科学与工程
    • 56 篇 交通运输工程
    • 54 篇 力学(可授工学、理...
  • 944 篇 理学
    • 481 篇 数学
    • 251 篇 物理学
    • 196 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 146 篇 系统科学
    • 86 篇 化学
  • 389 篇 管理学
    • 239 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 179 篇 医学
    • 142 篇 临床医学
    • 109 篇 基础医学(可授医学...
    • 73 篇 药学(可授医学、理...
  • 50 篇 法学
  • 34 篇 农学
  • 32 篇 经济学
  • 13 篇 教育学
  • 5 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 44 篇 training
  • 43 篇 optimization
  • 42 篇 control systems
  • 41 篇 deep learning
  • 40 篇 computational mo...
  • 39 篇 educational inst...
  • 34 篇 image segmentati...
  • 33 篇 semantics
  • 32 篇 robustness
  • 28 篇 machine learning
  • 27 篇 neural networks
  • 25 篇 accuracy
  • 24 篇 object detection
  • 23 篇 mathematical mod...
  • 22 篇 convolution
  • 22 篇 heuristic algori...
  • 20 篇 computer science
  • 20 篇 support vector m...
  • 20 篇 forecasting

机构

  • 105 篇 college of contr...
  • 57 篇 college of compu...
  • 40 篇 fujian provincia...
  • 26 篇 college of compu...
  • 26 篇 college of compu...
  • 26 篇 college of compu...
  • 25 篇 college of compu...
  • 22 篇 school of comput...
  • 22 篇 college of mecha...
  • 21 篇 school of inform...
  • 21 篇 computer enginee...
  • 21 篇 department of co...
  • 21 篇 college of elect...
  • 20 篇 college of compu...
  • 20 篇 college of scien...
  • 19 篇 college of compu...
  • 19 篇 department of co...
  • 19 篇 school of contro...
  • 18 篇 college of elect...
  • 18 篇 college of compu...

作者

  • 37 篇 li zuoyong
  • 24 篇 abdelhameed ibra...
  • 23 篇 el-sayed m.el-ke...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zuoyong li
  • 17 篇 johansson karl h...
  • 16 篇 doaa sami khafag...
  • 14 篇 wu junfeng
  • 14 篇 teng shenghua
  • 14 篇 chen jiming
  • 14 篇 zhiyun lin
  • 13 篇 yang kailun
  • 13 篇 chen zengqiang
  • 12 篇 wang tao
  • 12 篇 zengqiang chen
  • 11 篇 niyato dusit
  • 11 篇 jian wang
  • 11 篇 fan haoyi
  • 11 篇 minyue fu
  • 10 篇 zidong wang

语言

  • 2,237 篇 英文
  • 92 篇 其他
  • 46 篇 中文
  • 11 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=College of Computer Science and Control Engineering"
2384 条 记 录,以下是11-20 订阅
排序:
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 114-125页
作者: Yu-Ang Wang Zidong Wang Lei Zou Bo Shen Hongli Dong the College of Information Science and Technology Donghua University the Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education IEEE the College of Electrical Engineering and Automation Shandong University of Science and Technology the Department of Computer Science Brunel University London Uxbridge the Sanya Offshore Oil and Gas Research Institute Northeast Petroleum University the Artificial Intelligence Energy Research Institute Northeast Petroleum University Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum University
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... 详细信息
来源: 评论
A Zero-Sequence Current Analysis Approach for Rotating Machinery Fault Diagnosis of Induction Motor Drivetrain Based on Sparse Learning
收藏 引用
IEEE Transactions on Power Electronics 2025年 第7期40卷 9800-9810页
作者: Liu, Zhao-Hua Long, Jun-Jie Wei, Hua-Liang Liu, Kan Zhang, Ying-Jie Li, Xiao-Hua Hunan University of Science and Technology School of Information and Electrical Engineering Xiangtan411201 China The University of Sheffield School of Electrical and Electronic Engineering Department of Automatic Control and Systems Engineering SheffieldS1 3JD United Kingdom Hunan University College of Mechanical and Vehicle Engineering Changsha410082 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
Fault diagnosis of rotating machinery driven by induction motors has received increasing attention. Current diagnostic methods, which can be performed on existing inverters or current transformers of three-phase induc... 详细信息
来源: 评论
Small Signal Stability-Guaranteed Moving Target Defense Against Load Redistribution Attack On IoT-based Smart Grid
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17413-17429页
作者: Wang, Bingdong Zhang, Zhenyong Wang, Mufeng Liu, Mengxiang Ye, Rui Deng, Ruilong Zhang, Xin Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China China Industrial Control Systems Cyber Emergency Response Team Beijing100040 China University of Sheffield Department of Automatic Control and System Engineering Sheffield United Kingdom Guizhou Power Grid Co. Ltd. Intelligent Operation Center China Zhejiang University State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Hangzhou310027 China Huzhou Institute of Industrial Control Technology Huzhou313000 China
Moving target defense (MTD) is a promising approach to defend against load redistribution attacks on the internet-of-things (IoT)-based smart grid networks by probing the distorted state estimates with the distributed... 详细信息
来源: 评论
Fully Distributed Model-Free Adaptive Sliding Mode control for MASs With Hybrid-Attacked Topology
收藏 引用
IEEE Transactions on Automation science and engineering 2025年 22卷 12336-12346页
作者: Duan, Shitao Chen, Guangdeng Zhou, Qi Li, Hongyi Huang, Tingwen Guangdong University of Technology School of Automation Guangdong-Hong Kong Joint Laboratory for Intelligent Decision and Cooperative Control Guangdong Provincial Key Laboratory for Intelligent Decision and Cooperative Control Guangzhou510006 China Southwest University College of Electronic and Information Engineering Chongqing400715 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
A fully distributed model-free adaptive sliding mode control (MFASMC) strategy is proposed in this paper for unknown nonlinear multi-agent systems (MASs), in which topology networks are exposed to hybrid attacks consi... 详细信息
来源: 评论
YOLOv8n-CGW: A novel approach to multi-oriented vehicle detection in intelligent transportation systems
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3809-3840页
作者: Berwo, Michael Abebe Fang, Yong Sarwar, Nadeem Mahmood, Jabar Aljohani, Mansourah Elhosseini, Mostafa School of Information and Engineering Chang’an University Shaanxi Xi’an710064 China Department of Computer Science Bahria University Lahore Campus Punjab Lahore54600 Pakistan Department of Information Technology Faculty of Computing and Information Technology University of Sialkot Punjab Sialkot51040 Pakistan College of Computer Science and Engineering Taibah University Yanbu46421 Saudi Arabia Computers and Control Systems Engineering Department Faculty of Engineering Mansoura University Mansoura35516 Egypt
In the context of Intelligent Transportation Systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep... 详细信息
来源: 评论
FineBID: Fine-Grained Protocol Reverse engineering for Bit-Level Field IDentification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2670-2686页
作者: Huang, Tao Gao, Yansong Zheng, Yifeng Wang, Zhanfeng Hu, Chao Fu, Anmin Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Xidian University State Key Laboratory of Integrated Services Networks Xian710071 China University of Western Australia CrawleyWA6009 Australia Harbin Institute of Technology School of Computer Science and Technology Guangdong Shenzhen518055 China Lexbell Company Ltd. Nanjing210014 China Army Engineering University of PLA College of Command and Control Engineering Nanjing210007 China
Protocol Reverse engineering (PRE) serves as the foundation for numerous security analysis techniques, such as vulnerability mining and intrusion detection, etc. The PRE analysis precision can directly affect the accu... 详细信息
来源: 评论
A New Benchmark and Algorithm for Clothes-Changing Video Person Re-Identification
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 1993-2005页
作者: Wang, Likai Zhang, Xiangqun Han, Ruize Wei, Yanjie Wang, Song Feng, Wei Tianjin University College of Intelligence and Computing Tianjin300350 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518107 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
Person re-identification (Re-ID) is a classical computer vision task and has significant applications for public security and information forensics. Recently, long-term Re-ID with clothes-changing has attracted increa... 详细信息
来源: 评论
Improving Power Response of Single-controllable VSG-Based Active Distribution Network
收藏 引用
CSEE Journal of Power and Energy Systems 2025年 第1期11卷 102-114页
作者: Shah Fahad Arman Goudarzi Pierluigi Siano Ji Xiang Department of Electrical and Computer Engineering Missouri University of Science and TechnologyUSA University of Victoria Canada Department of Management&Innovation Systems University of SalernoItaly Department of Electrical and Electronic Engineering Science University of JohannesburgJohannesburg2006South Africa National Laboratory of Industrial Control Technology College of Electrical EngineeringZhejiang UniversityHangzhou310058China
controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approa... 详细信息
来源: 评论
MRI Brain Tumor Classification Using Optimized APSO-LLRBFNN  2
MRI Brain Tumor Classification Using Optimized APSO-LLRBFNN
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Krishna, Tiruveedula Gopi Sreenivas, Nune Ajay Kumar, M. Reddy, Chandra Sekhar Rathee, Davinder Sing Urgessa, Teklu College of Electrical Engineering and Computing Adama Science and Technology University Department of Computer Science and Engineering Adama Ethiopia Andhra Loyala institute of Engineering and Technology Department of Electrical and Electronics Engineering Vijayawada India College of Electrical Engineering and Computing Adama Science and Technology University Department of Electrical Power and Control Engineering Adama Ethiopia College of Electrical Engineering and Computing Adama Science and Technology University Department of ECE Adama Ethiopia
The research presents a new efficient machine learning method to classify brain tumors because this task remains vital in fighting the high incidence of brain cancers. The proposed approach unites all its operations i... 详细信息
来源: 评论
CAST: Contrastive Analysis of Spatial and Temporal Features for QIM-Based VoIP Steganalysis
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 1935-1939页
作者: Zhang, Cheng Yan, Yue Jiang, Shujuan Chen, Zhong China University of Mining and Technology School of Computer Science and Technology Engineering Research Center of Mine Digitalization Ministry of Education Xuzhou221116 China Swinburne College of Shandong University of Science and Technology Shandong 250031 China China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China
QIM(quantization index modulation)-based VoIP steganography is an information-hiding technology that malicious users could misuse to engage in illegal activities. Its countermeasure, commonly known as the QIM-based Vo... 详细信息
来源: 评论