咨询与建议

限定检索结果

文献类型

  • 2,200 篇 会议
  • 1,698 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 3,907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,551 篇 工学
    • 1,354 篇 计算机科学与技术...
    • 1,143 篇 软件工程
    • 699 篇 控制科学与工程
    • 458 篇 信息与通信工程
    • 409 篇 电气工程
    • 326 篇 机械工程
    • 321 篇 电子科学与技术(可...
    • 242 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 178 篇 光学工程
    • 168 篇 仪器科学与技术
    • 145 篇 化学工程与技术
    • 144 篇 动力工程及工程热...
    • 94 篇 材料科学与工程(可...
    • 85 篇 土木工程
    • 84 篇 交通运输工程
    • 84 篇 安全科学与工程
    • 77 篇 力学(可授工学、理...
  • 1,460 篇 理学
    • 729 篇 数学
    • 409 篇 物理学
    • 276 篇 生物学
    • 259 篇 系统科学
    • 205 篇 统计学(可授理学、...
    • 136 篇 化学
  • 579 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 199 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 233 篇 医学
    • 191 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
  • 75 篇 法学
  • 48 篇 农学
  • 46 篇 经济学
  • 28 篇 教育学
  • 8 篇 艺术学
  • 7 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 107 篇 feature extracti...
  • 83 篇 educational inst...
  • 79 篇 control systems
  • 71 篇 computational mo...
  • 65 篇 optimization
  • 63 篇 mathematical mod...
  • 62 篇 training
  • 55 篇 deep learning
  • 53 篇 robustness
  • 48 篇 neural networks
  • 48 篇 semantics
  • 48 篇 accuracy
  • 47 篇 image segmentati...
  • 39 篇 support vector m...
  • 38 篇 object detection
  • 37 篇 machine learning
  • 35 篇 stability analys...
  • 35 篇 algorithm design...
  • 34 篇 visualization
  • 32 篇 heuristic algori...

机构

  • 253 篇 college of compu...
  • 108 篇 college of contr...
  • 107 篇 college of compu...
  • 81 篇 college of compu...
  • 62 篇 college of compu...
  • 52 篇 fujian provincia...
  • 50 篇 fujian provincia...
  • 46 篇 school of contro...
  • 35 篇 college of elect...
  • 33 篇 northeast forest...
  • 28 篇 college of compu...
  • 27 篇 school of comput...
  • 27 篇 college of compu...
  • 24 篇 college of compu...
  • 24 篇 tianjin key labo...
  • 23 篇 control and inte...
  • 22 篇 computer enginee...
  • 22 篇 department of co...
  • 21 篇 college of compu...
  • 20 篇 department of el...

作者

  • 59 篇 li zuoyong
  • 41 篇 chen zengqiang
  • 38 篇 zengqiang chen
  • 28 篇 zuoyong li
  • 26 篇 dai xuefeng
  • 24 篇 el-sayed m.el-ke...
  • 23 篇 abdelhameed ibra...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zhang jianfei
  • 18 篇 zhongxin liu
  • 17 篇 johansson karl h...
  • 17 篇 feng duan
  • 17 篇 zhang fuquan
  • 15 篇 liu zhongxin
  • 15 篇 doaa sami khafag...
  • 15 篇 fan haoyi
  • 14 篇 yang yang
  • 14 篇 wang tao
  • 14 篇 wu junfeng
  • 14 篇 teng shenghua

语言

  • 3,472 篇 英文
  • 338 篇 其他
  • 97 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=College of Computer and Control Engineering Minjiang University"
3907 条 记 录,以下是121-130 订阅
排序:
Frequency Attacks Based on Invertible Neural Networks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 292-300页
作者: Shao, Ming-Wen Yang, Jian-Xin Meng, Ling-Zhuang Hu, Zhi-Yong China University of Petroleum School of Computer Science and Technology East China Qingdao266580 China China University of Petroleum College of Control Science and Engineering East China Qingdao266580 China
Adversarial attacks reveal the vulnerability of classifiers based on deep neural networks to well-designed perturbations. Most existing attack methods focus on adding perturbations directly to the pixel space. However... 详细信息
来源: 评论
An adaptive enhanced windowed correlation filter for visual tracking
An adaptive enhanced windowed correlation filter for visual ...
收藏 引用
IEEE Asia-Pacific Conference on Antennas and Propagation (APCAP)
作者: Xiaochun Xu Huibin Feng Qihang Wu Ente Guo Xinxin Wang College of Computer and Control Engineering Minjiang University Fuzhou China International Digital Economy College Minjiang University Fuzhou China
Boundary effect, as an inherent drawback of discriminative correlation filter (DCF) trackers, cannot be handled well in most existing studies. This paper proposes an adaptive enhanced windowed correlation filter track...
来源: 评论
Fourier Series Fitting-Based Intrusion Detection for Real-Time Industrial control Systems
Fourier Series Fitting-Based Intrusion Detection for Real-Ti...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2024
作者: Zhang, Heng Wang, Yinchu Xue, Yawen Deng, Ruilong Li, Hongran Zhang, Jian School of Computer Engineering Jiangsu Ocean University Lianyungang China College of Control Science and Engineering Zhejiang University Hangzhou China
Recent incidents have shown the attacks against Industrial control System (ICS), which may result in failure or even catastrophe and prompt the studies of defense. Existing security systems are mostly based on network... 详细信息
来源: 评论
Hybrid Optimization Algorithm for Handwritten Document Enhancement
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3763-3786页
作者: Shu-Chuan Chu Xiaomeng Yang Li Zhang Václav Snášel Jeng-Shyang Pan College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China Faculty of Electrical Engineering and Computer Science VŠB-TU OstravaOstrava70080Czech Republic Department of Information Management Chaoyang University of TechnologyTaichung41349Taiwan
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study intro... 详细信息
来源: 评论
Detecting the One-Shot Dummy Attack on the Power Industrial control Processes With an Unsupervised Data-Driven Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 550-553页
作者: Zhenyong Zhang Yan Qin Jingpei Wang Hui Li Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China the School of Chemical and Biomedical Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China IEEE
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... 详细信息
来源: 评论
A dual adaptive unscented Kalman filter algorithm for SINS-based integrated navigation system
收藏 引用
Journal of Systems engineering and Electronics 2024年 第3期35卷 732-740页
作者: LYU Xu MENG Ziyang LI Chunyu CAI Zhenyu HUANG Yi LI Xiaoyong YU Xingkai Department of Precision Instrument Tsinghua UniversityBeijing 100084China College of Mechanical and Power Engineering Three Gorges UniversityYichang 443002China Unit 91001 of the PLA Beijing 100161China School of Control and Computer Engineering North China Electric Power UniversityBeijing 100096China
In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual ... 详细信息
来源: 评论
Interference Suppression and Jitter Elimination Ability-Based Adaption Tracking Guidance for Robotic Fishes
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 126-137页
作者: Dongfang Li Jie Huang Rob Law Xin Xu Limin Zhu Edmond Q.Wu IEEE the School of Electrical Engineering and Automation Fuzhou University the Key Laboratory of System Control and Information Processing Ministry of Education the School of Electrical Engineering and Automation Fuzhou University 5G+Industrial Internet Institute Fuzhou University the University of Macau the College of Mechatronics and Automation National University of Defense Technology the School of Mechanical Engineering Shanghai Jiao Tong University the Department of Computer Science and Engineering Shanghai Jiao Tong University
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance ru... 详细信息
来源: 评论
Insulator Defect Detection Based on YOLOv4-tiny with Improved Feature Fusion  12
Insulator Defect Detection Based on YOLOv4-tiny with Improve...
收藏 引用
12th International Conference on Information Technology in Medicine and Education, ITME 2022
作者: Zhong, Yuning Hu, Rong Li, Zuoyong Cai, Yuanzheng Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Fuzhou350121 China
Insulator exposed to a wild environment for long-term running usually suffers from the damage of natural calamities that makes them become one of the most fragile components in the whole power system. In this case, ev... 详细信息
来源: 评论
Phy-CoCo: Physical Constraint-Based Correlation Learning for Tropical Cyclone Intensity and Size Estimation  27
Phy-CoCo: Physical Constraint-Based Correlation Learning for...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Yan, Hanting Mu, Pan Huang, Cheng Zhang, Jinglin Bai, Cong College of Computer Science Zhejiang University of Technology China School of Control Science and Engineering Shandong University China
Tropical Cyclone (TC) estimation aims to estimate various attributes of TC in real-time to alleviate and prevent disasters caused by violent TCs. As artificial intelligence technology advances, various deep learning-b... 详细信息
来源: 评论
Research on Intelligent Scene Generation Based on Unity3D  16th
Research on Intelligent Scene Generation Based on Unity3D
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2020
作者: Zheng, Lingbin Li, Menghua Gao, Yuxi Chen, Hang Zhang, Fuquan College of Computer and Control Engineering Minjiang University Fuzhou350108 China
This paper presents a systematic intelligent scene generation algorithm, based on which the user randomly generates the required scene map. Using this algorithm, we can pick out the material needed by the user from th... 详细信息
来源: 评论