咨询与建议

限定检索结果

文献类型

  • 1,937 篇 期刊文献
  • 1,573 篇 会议
  • 14 册 图书

馆藏范围

  • 3,524 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,249 篇 工学
    • 1,357 篇 计算机科学与技术...
    • 1,071 篇 软件工程
    • 619 篇 信息与通信工程
    • 372 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 293 篇 控制科学与工程
    • 256 篇 生物工程
    • 187 篇 光学工程
    • 163 篇 机械工程
    • 151 篇 生物医学工程(可授...
    • 147 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 125 篇 化学工程与技术
    • 102 篇 材料科学与工程(可...
    • 83 篇 交通运输工程
    • 72 篇 网络空间安全
    • 63 篇 力学(可授工学、理...
    • 63 篇 航空宇航科学与技...
    • 62 篇 安全科学与工程
  • 1,451 篇 理学
    • 634 篇 数学
    • 623 篇 物理学
    • 292 篇 生物学
    • 204 篇 统计学(可授理学、...
    • 161 篇 化学
    • 100 篇 系统科学
  • 512 篇 管理学
    • 363 篇 管理科学与工程(可...
    • 167 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 122 篇 医学
    • 104 篇 临床医学
    • 84 篇 基础医学(可授医学...
  • 73 篇 法学
  • 54 篇 经济学
  • 35 篇 农学
  • 16 篇 教育学
  • 13 篇 军事学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 feature extracti...
  • 71 篇 deep learning
  • 49 篇 hadrons
  • 49 篇 educational inst...
  • 48 篇 semantics
  • 48 篇 machine learning
  • 45 篇 computational mo...
  • 43 篇 data models
  • 41 篇 reinforcement le...
  • 40 篇 accuracy
  • 40 篇 training
  • 38 篇 optimization
  • 37 篇 blockchain
  • 36 篇 wireless sensor ...
  • 33 篇 simulation
  • 32 篇 internet of thin...
  • 32 篇 neural networks
  • 31 篇 image segmentati...
  • 30 篇 wireless communi...
  • 30 篇 artificial intel...

机构

  • 379 篇 university of ch...
  • 345 篇 iccub universita...
  • 340 篇 infn sezione di ...
  • 338 篇 department of ph...
  • 334 篇 infn sezione di ...
  • 327 篇 universiteit maa...
  • 325 篇 school of physic...
  • 323 篇 horia hulubei na...
  • 322 篇 h.h. wills physi...
  • 322 篇 van swinderen in...
  • 322 篇 cavendish labora...
  • 320 篇 infn sezione di ...
  • 319 篇 infn sezione di ...
  • 314 篇 department of ph...
  • 309 篇 imperial college...
  • 302 篇 stfc rutherford ...
  • 301 篇 institute of par...
  • 283 篇 college of compu...
  • 276 篇 infn sezione di ...
  • 267 篇 infn sezione di ...

作者

  • 230 篇 barter w.
  • 228 篇 brundu d.
  • 203 篇 bellee v.
  • 200 篇 blake t.
  • 199 篇 aliouche z.
  • 198 篇 betancourt c.
  • 198 篇 belin s.
  • 197 篇 borsato m.
  • 196 篇 amato s.
  • 194 篇 birch m.
  • 193 篇 boettcher t.
  • 192 篇 bowcock t.j.v.
  • 192 篇 cali s.
  • 192 篇 atzeni m.
  • 188 篇 andreianov a.
  • 186 篇 boelhauve j.a.
  • 185 篇 bencivenni g.
  • 184 篇 byczynski w.
  • 180 篇 capelli s.
  • 178 篇 borsuk j.t.

语言

  • 3,283 篇 英文
  • 171 篇 其他
  • 68 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 荷兰文
检索条件"机构=College of Computer and Communications Engineering Changsha University of Science and Technology"
3524 条 记 录,以下是41-50 订阅
排序:
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks
收藏 引用
Digital communications and Networks 2025年 第1期11卷 83-91页
作者: Yanbo Zhang Zheng Yang Jingjing Cui Xianfu Lei Yi Wu Jun Zhang Chao Fang Zhiguo Ding College of Photonic and Electronic Engineering Fujian Normal UniversityFuzhou 350007China School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK Institute of Mobile Communications Southwest Jiaotong UniversityChengdu 610031China Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and TelecommunicationsNanjing 210003China Faculty of Information Technology Beijing University of TechnologyBeijingChina School of Electrical and Electronics Engineering The University of ManchesterManchester M139PLUK
In this paper,the application of Non-Orthogonal Multiple Access(NOMA)is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential *** support secure transmissions f... 详细信息
来源: 评论
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
收藏 引用
International Journal of Crowd science 2025年 第1期9卷 44-55页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Nabot, Ahmad Jebreen, Issam Alauthman, Mohammad Alangari, Someah Aburub, Faisal Aldweesh, Amjad Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan Department of Information Security University of Petra Amman11196 Jordan Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia
In the contemporary business landscape, software has evolved into a strategic asset crucial for organizations seeking sustainable competitive advantage. The imperative of ensuring software quality becomes evident as l... 详细信息
来源: 评论
Hybrid lightweight encryption for IoT: integrating chaotic key generators with Feistel and substitution-permutation networks for secure 3DV transmission
收藏 引用
Multimedia Tools and Applications 2025年 1-47页
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin H. Elbahnasawy, Nirmeen A. El-Samie, Fathi E. Abd Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Deptartment of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o... 详细信息
来源: 评论
Iterative Bounded Distance Decoding With Random Flipping for Product-Like Codes
收藏 引用
IEEE Transactions on communications 2025年 第5期73卷 2864-2875页
作者: Li, Guorong Wang, Shiguo Zhao, Shancheng Jinan University National and Local Joint Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Changsha University of Science and Technology Computer and Communication Engineering Institute Changsha410114 China
Product-like codes are widely used in high-speed communication systems since they can be decoded with low-complexity hard decision decoders (HDDs). To meet the growing demand of data rates, enhanced HDDs are required.... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
A Hybrid Vectorized Merge Sort on ARM NEON  24th
A Hybrid Vectorized Merge Sort on ARM NEON
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Zhou, Jincheng Zhang, Jin Zhang, Xiang Xiao, Tiaojie Ma, Di Gong, Chunye School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer National University of Defense Technology Hunan Changsha410073 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Supercomputer Center in Tianjin Tianjin300457 China
Sorting algorithms are the most extensively researched topics in computer science and serve for numerous practical applications. Although various sorts have been proposed for efficiency, different architectures offer ... 详细信息
来源: 评论
Performance Enhancement for Non-Light-of-Sight Optical Camera Communication using RPSNN
收藏 引用
IEEE Photonics technology Letters 2025年 第14期37卷 789-792页
作者: Shi, Jin Luo, Jing He, Jing Wuhan University of Technology School of Information Engineering Wuhan430070 China Wuhan University of Technology School of Automation Wuhan430070 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
Non-line-of-sight (NLOS) optical cameracommunication (OCC) offers a promising avenue for improvinglink availability, thanks to its resilience against link ***, the diverse reflection coefficients across variousreflect... 详细信息
来源: 评论
APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Embedding
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2443-2459页
作者: Zhou, Shicheng Liu, Jingju Lu, Yuliang Yang, Jiahai Hou, Dongdong Zhang, Yue Hu, Shulong National University of Defense Technology College of Electronic Engineering Hefei230037 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation Hefei230037 China Tsinghua University Institute for Network Sciences and Cyberspace Beijing National Research Center for Information Science and Technology Beijing100084 China National University of Defense Technology College of Computer Science and Technology Changsha410073 China
Penetration testing (pentesting) assesses cybersecurity through simulated attacks, while the conventional manual-based method is costly, time-consuming, and personnel-constrained. Reinforcement learning (RL) provides ... 详细信息
来源: 评论
RGB-Based Category-Level Object Pose Estimation via Depth Recovery and Adaptive Refinement
收藏 引用
IEEE Robotics and Automation Letters 2025年 第6期10卷 5377-5384页
作者: Yang, Hui Sun, Wei Liu, Jian Zheng, Jin Zeng, Zhiwen Mian, Ajmal Hunan University National Engineering Research Center for Robot Visual Perception and Control Technology College of Electrical and Information Engineering Changsha410082 China Hunan University State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body Changsha410082 China Central South University School of Architecture and Art Changsha410082 China University of Western Australia Department of Computer Science and Software Engineering CrawleyWA6009 Australia
Category-level pose estimation methods have received widespread attention as they can be generalized to intra-class unseen objects. Although RGB-D-based category-level methods have made significant progress, reliance ... 详细信息
来源: 评论
RDP: Ranked Differential Privacy for Facial Feature Protection in Multi-Scale Sparsified Subspaces
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17333-17348页
作者: Ou, Lu Liao, Shaolin Gao, Shihui Huang, Guandong Qin, Zheng Hunan University School of Journalism and Communication Hunan Changsha China Sun Yat-sen University Guangdong Guangzhou China Illinois Institute of Technology ChicagoIL United States Purdue University West LafayetteIN United States Hunan University College of Computer Science and Electronic Engineering Hunan Changsha China State Grid Hunan Materials Company Changsha China
With the widespread sharing of personal face images on the Internet, systems based on face recognition encounter the real threat of being breached by potential adversaries who are able to access individuals' face ... 详细信息
来源: 评论