咨询与建议

限定检索结果

文献类型

  • 2,096 篇 会议
  • 2,000 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 4,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,764 篇 工学
    • 1,499 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 464 篇 信息与通信工程
    • 384 篇 化学工程与技术
    • 374 篇 电气工程
    • 314 篇 电子科学与技术(可...
    • 306 篇 控制科学与工程
    • 287 篇 材料科学与工程(可...
    • 237 篇 生物工程
    • 233 篇 机械工程
    • 189 篇 动力工程及工程热...
    • 168 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 119 篇 仪器科学与技术
    • 115 篇 冶金工程
    • 110 篇 力学(可授工学、理...
    • 104 篇 土木工程
    • 101 篇 建筑学
    • 100 篇 交通运输工程
  • 1,808 篇 理学
    • 765 篇 数学
    • 729 篇 物理学
    • 351 篇 化学
    • 275 篇 生物学
    • 181 篇 统计学(可授理学、...
    • 148 篇 系统科学
  • 622 篇 管理学
    • 421 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 126 篇 医学
    • 98 篇 临床医学
    • 88 篇 基础医学(可授医学...
  • 73 篇 法学
  • 61 篇 经济学
  • 50 篇 农学
  • 21 篇 教育学
  • 12 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 57 篇 educational inst...
  • 53 篇 deep learning
  • 49 篇 hadrons
  • 48 篇 semantics
  • 46 篇 training
  • 44 篇 neural networks
  • 43 篇 computational mo...
  • 37 篇 data models
  • 33 篇 accuracy
  • 33 篇 robustness
  • 32 篇 computer science
  • 32 篇 machine learning
  • 31 篇 cloud computing
  • 31 篇 web services
  • 30 篇 clustering algor...
  • 29 篇 quality of servi...
  • 29 篇 authentication
  • 29 篇 forecasting
  • 28 篇 convolution

机构

  • 508 篇 college of compu...
  • 358 篇 university of ch...
  • 344 篇 iccub universita...
  • 339 篇 infn sezione di ...
  • 337 篇 department of ph...
  • 336 篇 school of physic...
  • 334 篇 infn sezione di ...
  • 333 篇 infn sezione di ...
  • 332 篇 infn sezione di ...
  • 331 篇 cavendish labora...
  • 328 篇 imperial college...
  • 326 篇 universiteit maa...
  • 326 篇 department of ph...
  • 323 篇 horia hulubei na...
  • 322 篇 van swinderen in...
  • 321 篇 h.h. wills physi...
  • 321 篇 institute of par...
  • 318 篇 stfc rutherford ...
  • 297 篇 infn sezione di ...
  • 287 篇 infn sezione di ...

作者

  • 230 篇 barter w.
  • 229 篇 brundu d.
  • 204 篇 bellee v.
  • 201 篇 blake t.
  • 201 篇 betancourt c.
  • 200 篇 borsato m.
  • 200 篇 belin s.
  • 199 篇 aliouche z.
  • 199 篇 amato s.
  • 198 篇 birch m.
  • 198 篇 boettcher t.
  • 198 篇 atzeni m.
  • 196 篇 cali s.
  • 195 篇 andreianov a.
  • 193 篇 bencivenni g.
  • 191 篇 bowcock t.j.v.
  • 191 篇 byczynski w.
  • 190 篇 boelhauve j.a.
  • 188 篇 borsuk j.t.
  • 185 篇 capelli s.

语言

  • 3,859 篇 英文
  • 130 篇 中文
  • 112 篇 其他
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=College of Computer Science and Engineering Hunan University of Science and Technology Xiangtan"
4101 条 记 录,以下是251-260 订阅
排序:
Contrastive Learning of Sequential Recommendation with Graph Attention Mechanisms  5
Contrastive Learning of Sequential Recommendation with Graph...
收藏 引用
5th International Conference on computer engineering and Intelligent Control, ICCEIC 2024
作者: Xie, Xu Chen, Rongyuan College of Computer Science Hunan University of Technology and Business Hunan Changsha China School of Resource & Environment Hunan University of Technology and Business Hunan Changsha China
Sequential recommendation models the dynamic interest changes of users based on their interaction information with items, in order to predict the next interaction item for users. Existing sequential recommendation alg... 详细信息
来源: 评论
Privacy-Preserving Publishing Mechanism for Real-Time Vehicle Trajectory in Vehicle-to-Grid Networks
Privacy-Preserving Publishing Mechanism for Real-Time Vehicl...
收藏 引用
Power Electronics, computer Applications (ICPECA), IEEE International Conference on
作者: Yulong Wang Jianbo Xu Bo Gong School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
The Vehicle-to-Grid (V2G) network is a smart grid technology generated under the background of the rapid development of new energy technology, which allows mobile energy storage vehicles (MESVs) to realize bidirection... 详细信息
来源: 评论
Physical layer key negotiation attacks and detection under a static environment  4
Physical layer key negotiation attacks and detection under a...
收藏 引用
4th International Seminar on Artificial Intelligence, Networking and Information technology, AINIT 2023
作者: Qi, Yuan Hu, Qiao College of Computer Science and Electronic Engineering Hunan University Changsha Hunan China
The existing physical layer key generation methods overly rely on the results of channel probing, which not only weakens the randomness of the key in a static environment but also makes the physical layer key vulnerab... 详细信息
来源: 评论
A Progress Prediction Model Using Res-zLSTM for LOCA in Nuclear Power Plants
A Progress Prediction Model Using Res-zLSTM for LOCA in Nucl...
收藏 引用
2024 International Conference on Electrical Power Systems and Intelligent Control, EPSIC 2024
作者: Liu, Liang She, Jingke Shu, Lingyu Zhao, Yizhong College of Computer Science & Electronic Engineering Hunan University Changsha China Hunan 6906 Information Technology Co. Ltd Yueyang China
Predicting the changes in various operation conditions following a loss of coolant accident (LOCA) in a nuclear power plant is of great significance. To enhance the accuracy of prediction, this paper proposes a novel ... 详细信息
来源: 评论
Fine-Grained Multivariate Time Series Anomaly Detection in IoT
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5027-5047页
作者: Shiming He Meng Guo Bo Yang Osama Alfarraj Amr Tolba Pradip Kumar Sharma Xi’ai Yan School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computing Science University of AberdeenAberdeenAB243FXUK Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police AcademyChangsha410138China
Sensors produce a large amount of multivariate time series data to record the states of Internet of Things(IoT)*** time series timestamp anomaly detection(TSAD)can identify timestamps of attacks and ***,it is necessar... 详细信息
来源: 评论
BeamCount: Indoor Crowd Counting Using Wi-Fi Beamforming Feedback Information  24
BeamCount: Indoor Crowd Counting Using Wi-Fi Beamforming Fee...
收藏 引用
2024 International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2024
作者: Chen, Siyu Jiang, Hongbo Xiong, Jie Hu, Jingyang Wang, Penghao Liu, Chao Xiao, Zhu Li, Bo College of Computer Science and Electronic Engineering Hunan University China Microsoft Research Asia University of Massachusetts Amherst United States Department of Computer Science and Technology Ocean University of China China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong Hong Kong
Real-time indoor crowd counting plays an important role in many applications such as crowd control, resource allocation and advertisement. Current research predominantly relies on camera-based methods. However, comput... 详细信息
来源: 评论
FedHPM: Online Federated Learning via Heterogeneous Prediction Model
FedHPM: Online Federated Learning via Heterogeneous Predicti...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Zhi Zhang Shiwen Zhang Shuang Chen Wei Liang Hunan University of Science and Technology College of Computer Science and Technology Xiangtan China School of Computer Science and Engineering Hunan University of Science and Technology and Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China
In the era of big data and growing privacy concerns, Federated Learning (FL) has emerged as a promising solution for collaborative model training while preserving user data privacy. However, FL faces challenges such a... 详细信息
来源: 评论
Secure Image Retrieval Based on Deep Learning in Cloud Computing  23
Secure Image Retrieval Based on Deep Learning in Cloud Compu...
收藏 引用
8th International Conference on Multimedia and Image Processing, ICMIP 2023
作者: Li, Sijie Li, Xiehua College of Computer Science and Electronic Engineering Hunan University China
The rapid growth of multimedia data and the limited storage and computing capacity of local devices motivate the outsourcing service of cloud storage. For the outsourced images, users usually encrypt them to protect t... 详细信息
来源: 评论
Identifying possible lncRNA-disease associations based on deep learning and positive-unlabeled learning
Identifying possible lncRNA-disease associations based on de...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Peng, Lihong Huang, Liangliang Lu, Yuankang Liu, Guangyi Chen, Min Han, Guosheng Hunan University of Technology School of Computer Science Zhuzhou China Xiangtan University Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan China
lncRNAs are involved in many biological processes, and their mutations and disorders are closely related to many diseases. Identification of LncRNA-Disease Associations (LDAs) helps us understand the pathogenesis of d... 详细信息
来源: 评论
DCSE: Domain Confusion with Self-Ensembling for Unsupervised Domain Adaptation
DCSE: Domain Confusion with Self-Ensembling for Unsupervised...
收藏 引用
2024 International Annual Conference on Complex Systems and Intelligent science, CSIS-IAC 2024
作者: Lin, Zhijie Wang, Jiawei He, Zhaoshui Liang, Hao An, Juan Su, Wenqing School of Automation Guangdong University of Technology GuangZhou China College of Computer Science and Electronic Engineering Hunan University Changsha China
Data collection and annotation are time-consuming in machine learning, especially for large-scale problems. A com-mon approach for these problems is to transfer knowledge from the related labeled domain to the target ... 详细信息
来源: 评论