咨询与建议

限定检索结果

文献类型

  • 1,200 篇 期刊文献
  • 1,135 篇 会议
  • 8 册 图书

馆藏范围

  • 2,343 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,544 篇 工学
    • 877 篇 计算机科学与技术...
    • 741 篇 软件工程
    • 408 篇 控制科学与工程
    • 272 篇 信息与通信工程
    • 245 篇 电气工程
    • 184 篇 机械工程
    • 182 篇 电子科学与技术(可...
    • 171 篇 生物工程
    • 143 篇 生物医学工程(可授...
    • 132 篇 光学工程
    • 85 篇 化学工程与技术
    • 81 篇 仪器科学与技术
    • 78 篇 动力工程及工程热...
    • 62 篇 材料科学与工程(可...
    • 61 篇 土木工程
    • 58 篇 安全科学与工程
    • 57 篇 交通运输工程
    • 54 篇 力学(可授工学、理...
  • 929 篇 理学
    • 470 篇 数学
    • 248 篇 物理学
    • 195 篇 生物学
    • 149 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 85 篇 化学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 177 篇 医学
    • 143 篇 临床医学
    • 109 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
  • 49 篇 法学
  • 34 篇 农学
  • 32 篇 经济学
  • 13 篇 教育学
  • 5 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 44 篇 training
  • 42 篇 optimization
  • 42 篇 control systems
  • 41 篇 deep learning
  • 39 篇 educational inst...
  • 39 篇 computational mo...
  • 34 篇 image segmentati...
  • 33 篇 semantics
  • 31 篇 robustness
  • 28 篇 machine learning
  • 27 篇 neural networks
  • 25 篇 accuracy
  • 24 篇 object detection
  • 23 篇 mathematical mod...
  • 22 篇 convolution
  • 21 篇 heuristic algori...
  • 20 篇 support vector m...
  • 20 篇 forecasting
  • 19 篇 image enhancemen...

机构

  • 105 篇 college of contr...
  • 57 篇 college of compu...
  • 40 篇 fujian provincia...
  • 26 篇 college of compu...
  • 26 篇 college of compu...
  • 26 篇 college of compu...
  • 24 篇 college of compu...
  • 22 篇 school of comput...
  • 21 篇 computer enginee...
  • 21 篇 college of mecha...
  • 21 篇 department of co...
  • 21 篇 college of elect...
  • 20 篇 school of inform...
  • 20 篇 college of compu...
  • 20 篇 college of scien...
  • 19 篇 department of co...
  • 19 篇 school of contro...
  • 19 篇 college of compu...
  • 18 篇 college of elect...
  • 18 篇 college of compu...

作者

  • 37 篇 li zuoyong
  • 24 篇 abdelhameed ibra...
  • 23 篇 el-sayed m.el-ke...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zuoyong li
  • 17 篇 johansson karl h...
  • 16 篇 doaa sami khafag...
  • 14 篇 wu junfeng
  • 14 篇 teng shenghua
  • 14 篇 chen jiming
  • 14 篇 zhiyun lin
  • 13 篇 yang kailun
  • 13 篇 chen zengqiang
  • 12 篇 wang tao
  • 12 篇 zengqiang chen
  • 11 篇 jian wang
  • 11 篇 fan haoyi
  • 11 篇 minyue fu
  • 10 篇 niyato dusit
  • 10 篇 zidong wang

语言

  • 2,196 篇 英文
  • 92 篇 其他
  • 46 篇 中文
  • 11 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=College of Computer Science and Control Engineering"
2343 条 记 录,以下是21-30 订阅
排序:
Detecting the One-Shot Dummy Attack on the Power Industrial control Processes With an Unsupervised Data-Driven Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 550-553页
作者: Zhenyong Zhang Yan Qin Jingpei Wang Hui Li Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China the School of Chemical and Biomedical Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China IEEE
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... 详细信息
来源: 评论
Heterogeneous Image Knowledge Driven Visual Perception
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 255-257页
作者: Lan Yan Wenbo Zheng Fei-Yue Wang IEEE the College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China the School of Computer Science and Artificial Intelligence Wuhan University of TechnologyWuhan 430070China the State Key Laboratory for Management and Control of Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
Dear Editor,This letter is concerned with visual perception closely related to heterogeneous *** the huge challenge brought by different image modalities,we propose a visual perception framework based on heterogeneous... 详细信息
来源: 评论
QTFN:A General End-to-End Time-Frequency Network to Reveal the Time-Varying Signatures of the Time Series
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 905-919页
作者: Tao Chen Yang Jiao Lei Xie Hongye Su State Key Laboratory of Industrial Control Technology Zhejiang UniversityHangzhou 310027China Shenzhen Key Laboratory of Intelligent Bioinformatics and College of Computer Science and Control EngineeringShenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China
Nonstationary time series are ubiquitous in almost all natural and engineering *** the time-varying signatures from nonstationary time series is still a challenging problem for data *** Time-Frequency Distribution(TFD... 详细信息
来源: 评论
Identification of Important FPGA Modules Based on Complex Network
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1027-1047页
作者: Senjie Zhang Jinbo Wang Shan Zhou Jingpei Wang Zhenyong Zhang Ruixue Wang School of Aeronautics and Astronautics University of Chinese Academy of SciencesBeijing101408China Technology and Engineering Center for Space Utilization Chinese Academy of SciencesBeijing100094China College of Control Science and Engineering Zhejiang UniversityHangzhou310063China College of Computer Science and Technology Guizhou UniversityGuiyang550025China
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing ***,existing defense... 详细信息
来源: 评论
Fourier Series Fitting-Based Intrusion Detection for Real-Time Industrial control Systems
Fourier Series Fitting-Based Intrusion Detection for Real-Ti...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2024
作者: Zhang, Heng Wang, Yinchu Xue, Yawen Deng, Ruilong Li, Hongran Zhang, Jian School of Computer Engineering Jiangsu Ocean University Lianyungang China College of Control Science and Engineering Zhejiang University Hangzhou China
Recent incidents have shown the attacks against Industrial control System (ICS), which may result in failure or even catastrophe and prompt the studies of defense. Existing security systems are mostly based on network... 详细信息
来源: 评论
An Unsupervised Leak Detection Method via Assembling Twin Attention-based Prediction Models for Natural Gas Gathering Pipelines
An Unsupervised Leak Detection Method via Assembling Twin At...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Zhang, Hao Zuo, Zhonglin Zheng, Li Liang, Shan Lü, Qingguo College of Automation Chongqing University Chongqing China College of Control Science and Engineering Zhejiang University Hangzhou China College of Computer Science Chongqing University Chongqing China
Accurately detecting leaks in natural gas gathering pipelines cannot only help enterprises and governments timely cope with the safety management problems, but also maintain the reliable operation of pipelines. The da... 详细信息
来源: 评论
Sector-Based Incremental Clustering and Scalable Deletion for Real-Time Big Data Streaming Application  2nd
Sector-Based Incremental Clustering and Scalable Deletion fo...
收藏 引用
2nd International Conference on Deep sciences for Computing and Communications, IconDeepCom 2023
作者: Ananthi, M. Mangayarkarasi, T. Department of Computer Science and Business Systems Sri Sairam Engineering College Chennai India Department of Instrumentation and Control Engineering Sri Sairam Engineering College Chennai India
Massive streaming data is the most current technology for storing and manipulating large quantities of data. Processing the substantial amount of streaming data is still a challenging issue. The speed and throughput c... 详细信息
来源: 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi Liu Xuya Cong Xiaobo Li Li Yin Institute of Systems Security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China School of Mathematics and Information Science Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 评论
African Bison Optimization Algorithm:A New Bio-Inspired Optimizer with engineering Applications
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 603-623页
作者: Jian Zhao Kang Wang Jiacun Wang Xiwang Guo Liang Qi School of Science University of Science and Technology LiaoningAnshan114051China Team of Artificial Intelligence Theory and Application University of Science and Technology LiaoningAnshan114051China Department of Computer Science and Software Engineering Monmouth UniversityWest Long BranchNJ 07764USA Information and Control Engineering College Liaoning Petrochemical UniversityFushun113000China Department of Computer Science and Technology Shandong University of Science and TechnologyQingdao266590China
This paper introduces the African Bison Optimization(ABO)algorithm,which is based on biological *** is inspired by the survival behaviors of the African bison,including foraging,bathing,jousting,mating,and *** foragin... 详细信息
来源: 评论
GRU combined model based on multi-objective optimization for short-term residential load forecasting
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 10423-10440页
作者: Yi, Lingzhi Peng, Xinlong Fan, Chaodong Wang, Yahui Li, Yunfan Liu, Jiangyong College of Automation and Electronic Engineering Xiangtan University Hunan Engineering Research Center of Multi-energy Cooperative Control Technology Hunan Xiangtan China School of Computer Science and Technology Hainan University Hainan China College of Electrical and Information Engineering Hunan University Changsha China
Reliable and accurate short-term forecasting of residential load plays an important role in DSM. However, the high uncertainty inherent in single-user loads makes them difficult to forecast accurately. Various traditi... 详细信息
来源: 评论