咨询与建议

限定检索结果

文献类型

  • 1,686 篇 会议
  • 1,569 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 3,263 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,107 篇 工学
    • 1,254 篇 计算机科学与技术...
    • 994 篇 软件工程
    • 403 篇 信息与通信工程
    • 307 篇 电子科学与技术(可...
    • 294 篇 控制科学与工程
    • 279 篇 电气工程
    • 243 篇 光学工程
    • 202 篇 机械工程
    • 185 篇 生物工程
    • 150 篇 仪器科学与技术
    • 130 篇 生物医学工程(可授...
    • 102 篇 动力工程及工程热...
    • 101 篇 化学工程与技术
    • 86 篇 材料科学与工程(可...
    • 85 篇 交通运输工程
    • 76 篇 土木工程
    • 51 篇 建筑学
  • 1,101 篇 理学
    • 525 篇 数学
    • 324 篇 物理学
    • 228 篇 生物学
    • 167 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 104 篇 化学
  • 531 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 122 篇 医学
    • 100 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 48 篇 药学(可授医学、理...
  • 69 篇 法学
    • 57 篇 社会学
  • 39 篇 经济学
  • 31 篇 农学
  • 12 篇 教育学
  • 11 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 77 篇 laboratories
  • 72 篇 feature extracti...
  • 70 篇 computer science
  • 59 篇 data mining
  • 53 篇 training
  • 51 篇 deep learning
  • 51 篇 computational mo...
  • 49 篇 optimization
  • 47 篇 semantics
  • 39 篇 accuracy
  • 37 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 protocols
  • 32 篇 clustering algor...
  • 31 篇 object detection
  • 30 篇 neural networks
  • 29 篇 reinforcement le...
  • 28 篇 bandwidth
  • 28 篇 data models
  • 25 篇 computer archite...

机构

  • 112 篇 national enginee...
  • 96 篇 college of compu...
  • 58 篇 school of comput...
  • 58 篇 college of infor...
  • 46 篇 hubei province k...
  • 41 篇 the key laborato...
  • 36 篇 school of cyber ...
  • 35 篇 department of co...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 31 篇 university of ch...
  • 29 篇 school of optica...
  • 29 篇 school of comput...
  • 28 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...
  • 25 篇 state key labora...
  • 24 篇 shenzhen univers...
  • 23 篇 department of el...

作者

  • 42 篇 shen linlin
  • 40 篇 ren jiadong
  • 36 篇 hai jin
  • 34 篇 jin hai
  • 28 篇 yang yang
  • 25 篇 mei-ling shyu
  • 25 篇 shu-ching chen
  • 23 篇 zhigang zhang
  • 20 篇 chen shu-ching
  • 20 篇 ji zhen
  • 20 篇 li jianqiang
  • 19 篇 hu shengshan
  • 18 篇 wang xingjun
  • 18 篇 shyu mei-ling
  • 18 篇 linlin shen
  • 17 篇 zhen ji
  • 17 篇 zhang zhigang
  • 16 篇 陈景标
  • 15 篇 shu haowen
  • 14 篇 li peng

语言

  • 2,977 篇 英文
  • 173 篇 其他
  • 114 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Science and Engineering System Laboratory"
3263 条 记 录,以下是91-100 订阅
排序:
On convergence of covariance matrix of empirical Bayes hyper-parameter estimator
收藏 引用
Control Theory and Technology 2024年 第2期22卷 149-162页
作者: Yue Ju Biqiang Mu Tianshi Chen School of Data Science and Shenzhen Research Institute of Big Data The Chinese University of Hong KongShenzhenShenzhen518172GuangdongChina Division of Decision and Control Systems School of Electrical Engineering and Computer ScienceKTH Royal Institute of Technology10044StockholmSweden Key Laboratory of Systems and Control Institute of Systems ScienceAcademy of Mathematics and System ScienceChinese Academy of SciencesBeijing100190China
Regularized system identification has become the research frontier of system identification in the past *** related core subject is to study the convergence properties of various hyper-parameter estimators as the samp... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd International Conference on Blockchain Technology and Information Security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1280-1284页
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
Recent Progress in Reinforcement Learning and Adaptive Dynamic Programming for Advanced Control Applications
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 18-36页
作者: Ding Wang Ning Gao Derong Liu Jinna Li Frank L.Lewis IEEE the Faculty of Information Technology Beijing Key Laboratory of Computational Intelligence and Intelligent SystemBeijing Laboratory of Smart Environmental Protectionand Beijing Institute of Artificial IntelligenceBeijing University of TechnologyBeijing 100124China the School of System Design and Intelligent Manufacturing Southern University of Science and TechnologyShenzhen 518055China the Department of Electrical and Computer Engineering University of Illinois at ChicagoChicago IL 60607 USA the School of Information and Control Engineering Liaoning Petrochemical UniversityFushun 113001China the UTA Research Institute the University of Texas at ArlingtonArlington TX 76118 USA
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ... 详细信息
来源: 评论
Autonomous Emergency Landing on 3D Terrains: Approaches for Monocular Vision-based UAVs  8
Autonomous Emergency Landing on 3D Terrains: Approaches for ...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Du, Weiming Lin, Junmou Du, Binqing Borhan, Uddin Md. Li, Jianqiang Chen, Jie College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
With the increasing use of unmanned aerial vehicles (UAVs) in a variety of applications, their safety has become a critical concern. UAVs face numerous emergencies during missions, in these situations, the UAVs need t... 详细信息
来源: 评论
IBATree: A Novel Method for Interpretable Cancer Cell Diagnosis Using Information Bottleneck Attribution
IBATree: A Novel Method for Interpretable Cancer Cell Diagno...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Raza, Muhammad Umair Chen, Jie Nawaz, Adil Saeed, Faisal Leung, Victor C.M. Li, Jianqiang Wang, Zhaoxia Shenzhen University College of Computer Science and Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China Shenzhen Children's Hospital Department of Gastroenterology China
Deep Neural Networks (DNNs) have demonstrated remarkable performance in classification and regression tasks on RGB-based pathological inputs. The network's prediction mechanism must be interpretable to establish t... 详细信息
来源: 评论
Defect Screening on Nuclear Power Plant Concrete Structures: A Two-staged Method Based on Contrastive Representation Learning  8
Defect Screening on Nuclear Power Plant Concrete Structures:...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Huang, Wenlian Zhu, Guanming Huang, Qiang Chen, Zhuangzhuang Chen, Jie Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Intelligent defect detection methods are important for the surface of the containment of nuclear power plants and face many challenges in the field of computer vision. Due to the irregular shapes and large variation o... 详细信息
来源: 评论
Status and Outlook of Image-based Malware Detection Technology  3
Status and Outlook of Image-based Malware Detection Technolo...
收藏 引用
3rd International Symposium on computer Technology and Information science, ISCTIS 2023
作者: Lan, Qiuyan Du, Yao Gao, Caixia Zheng, Haotian School of Computer Science and Engineering Southwest Minzu University Chengdu China Southwest Minzu University Key Laboratory of Computer System State Ethnic Affairs Commission Chengdu China
In recent years, computer vision technology has achieved rapid development and is widely used in the field of information security. Researchers have carried out a lot of research on the malicious code analysis technol... 详细信息
来源: 评论