咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,842 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,787 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 755 篇 信息与通信工程
    • 378 篇 电气工程
    • 320 篇 电子科学与技术(可...
    • 261 篇 控制科学与工程
    • 243 篇 生物工程
    • 166 篇 光学工程
    • 162 篇 机械工程
    • 146 篇 仪器科学与技术
    • 136 篇 生物医学工程(可授...
    • 115 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 632 篇 数学
    • 425 篇 物理学
    • 267 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 95 篇 化学
  • 669 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 109 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 108 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 99 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 70 篇 bandwidth
  • 65 篇 accuracy
  • 63 篇 computer science
  • 63 篇 deep learning
  • 60 篇 quality of servi...
  • 59 篇 training
  • 57 篇 wireless sensor ...
  • 53 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 network topology
  • 46 篇 computer archite...
  • 45 篇 authentication

机构

  • 159 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,751 篇 英文
  • 247 篇 其他
  • 125 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4112 条 记 录,以下是511-520 订阅
排序:
Learning label shift correction for test-agnostic long-tailed recognition  24
Learning label shift correction for test-agnostic long-taile...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Tong Wei Zhen Mao Zi-Hao Zhou Yuanyu Wan Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China School of Software Technology Zhejiang University Ningbo China
Long-tail learning primarily focuses on mitigating the label distribution shift between longtailed training data and uniformly distributed test data. However, in real-world applications, we often encounter a more intr...
来源: 评论
Secure and Efficient Blockchain-Based Access Control Scheme with Attribute Update
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zuo, Yuting Xu, Li Li, Jiguo Li, Jie Wang, Xiaoding Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Lab Shanghai200240 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
Secure data access control is widely concerned in Cyber Physical Systems (CPSs) to protect consumer rights. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an ideal solution that supports fine-grained access ... 详细信息
来源: 评论
Expert with Outlier Exposure for Continual Learning of New Diseases
Expert with Outlier Exposure for Continual Learning of New D...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Xu, Zhengjing Chen, Kanghao Zheng, Wei-Shi Tan, Zhijun Yang, Xiaobo Wang, Ruixuan Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE China State Key Laboratory of Dampness Syndrome of Chinese Medicine Guangzhou China Peng Cheng Laboratory Department of Network Intelligence Shenzhen China
Current intelligent diagnosis systems struggle to continually learn to diagnose more and more diseases due to catastrophic forgetting of old knowledge when learning new knowledge. Although storing small old data for s... 详细信息
来源: 评论
Enhanced Vgg16 for Medical Image Zero Watermarking: Integrating Attention, Skip Connections, Depth-Separated Convolution, and Dual-Logistic Encryption
SSRN
收藏 引用
SSRN 2024年
作者: Li, Jingyou Rongle, Wei Xi, Xiaotian Zhang, Guangda Yang, Zixin Zhang, Fengshan 1. School of Computer and Control Engineering Qiqihar University 2. Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University
The paper proposes an enhanced VGG16 network((referred to as DS-ResVGG16 with CBAM)) that incorporates the attention mechanism CBAM, skip connections, and depth-separable convolution to solve the medical image content... 详细信息
来源: 评论
Scheduling Model of Scenic Tour Task Based on Heuristic Intelligent Search Algorithm
Scheduling Model of Scenic Tour Task Based on Heuristic Inte...
收藏 引用
Artificial Intelligence Technology (ACAIT), Asian Conference on
作者: Hongbo Wang Rong Fei Zilong Wang Aimin Li Yajun Liu Fuyu Zhu School of Computer Science and Engineering Xi'an University of Technology Xi’an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
This paper constructs a scenic tour task scheduling model (hereinafter referred to as the model) based on heuristic intelligent search algorithm, puts forward the heuristic intelligent search solution scheme under sin... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and computer engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Zero Watermarking Algorithms for Medical Images Based on Cnn and Transformer with Dual-Branch network
SSRN
收藏 引用
SSRN 2024年
作者: Li, Jingyou Wei, Rongle Xi, Xiaotian Zhang, Guangda Yang, Zixin Zhang, Fengshan 1. School of Computer and Control Engineering Qiqihar University 2. Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University
The current research proposes a new zero-watermarking approach that aims to protect medical images from tampering by utilizing the power of deep learning. In this paper, we construct an innovative dual-branch network ... 详细信息
来源: 评论
Causal Prompting: Debiasing Large Language Model Prompting Based on Front-Door Adjustment  39
Causal Prompting: Debiasing Large Language Model Prompting B...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Congzhi Zhang, Linhai Wu, Jialong He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute United Kingdom
Despite the notable advancements of existing prompting methods, such as In-Context Learning and Chain-of-Thought for Large Language Models (LLMs), they still face challenges related to various biases. Traditional debi... 详细信息
来源: 评论
Natural Human Skin‑Inspired Wearable and Breathable Nanofiber‑based Sensors with Excellent Thermal Management Functionality
收藏 引用
Advanced Fiber Materials 2024年 第6期6卷 1955-1968页
作者: Peng Wang Xiaodan Li Guifen Sun Guoqing Wang Qing Han Chuizhou Meng Zhonghe Wei Yang Li School of Mechanical Engineering University of JinanJinan 250022China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China State Key Laboratory for Reliability and Intelligence of Electrical Equipment Engineering Research Center of Ministry of Education for Intelligent Rehabilitation Device and Detection TechnologyHebei Key Laboratory of Smart Sensing and Human‑Robot InteractionSchool of Mechanical EngineeringHebei University of TechnologyTianjin 300401China Shandong Provincial Key Laboratory of Network‑Based Intelligent Computing School of Information Science and EngineeringUniversity of JinanJinan 250022China Network Information Center Department of Computer ScienceQilu University of Technology(Shandong Academy of Sciences)Jinan 250353China School of Integrated Circuits Shandong UniversityJinan 250101China
Wearable sensors have been rapidly developed for application in various human monitoring ***,the wearing comfort and thermal properties of these devices have been largely ignored,and these characteristics urgently nee... 详细信息
来源: 评论
MTGA: Multi-View Temporal Granularity Aligned Aggregation for Event-Based Lip-Reading  39
MTGA: Multi-View Temporal Granularity Aligned Aggregation fo...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Wenhao Wang, Jun Luo, Yong Yu, Lei Yu, Wei He, Zheng Shen, Jialie School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Electronics and Information Wuhan University China Department of Computer Science City University of London United Kingdom
Lip-reading is to utilize the visual information of the speaker's lip movements to recognize words and sentences. Existing event-based lip-reading solutions integrate different frame rate branches to learn spatio-...
来源: 评论