咨询与建议

限定检索结果

文献类型

  • 1,700 篇 会议
  • 1,561 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 3,269 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,097 篇 工学
    • 1,249 篇 计算机科学与技术...
    • 989 篇 软件工程
    • 401 篇 信息与通信工程
    • 310 篇 电子科学与技术(可...
    • 293 篇 控制科学与工程
    • 277 篇 电气工程
    • 238 篇 光学工程
    • 201 篇 机械工程
    • 185 篇 生物工程
    • 150 篇 仪器科学与技术
    • 129 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 102 篇 化学工程与技术
    • 86 篇 材料科学与工程(可...
    • 84 篇 交通运输工程
    • 78 篇 土木工程
    • 53 篇 建筑学
  • 1,092 篇 理学
    • 520 篇 数学
    • 323 篇 物理学
    • 225 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 105 篇 化学
  • 530 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 119 篇 医学
    • 98 篇 临床医学
    • 75 篇 基础医学(可授医学...
    • 48 篇 药学(可授医学、理...
  • 71 篇 法学
    • 59 篇 社会学
  • 39 篇 经济学
  • 29 篇 农学
  • 11 篇 教育学
  • 10 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 77 篇 laboratories
  • 75 篇 feature extracti...
  • 70 篇 computer science
  • 60 篇 data mining
  • 55 篇 computational mo...
  • 52 篇 deep learning
  • 52 篇 training
  • 50 篇 optimization
  • 50 篇 semantics
  • 43 篇 accuracy
  • 36 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 protocols
  • 32 篇 clustering algor...
  • 31 篇 object detection
  • 30 篇 neural networks
  • 28 篇 reinforcement le...
  • 28 篇 bandwidth
  • 28 篇 data models
  • 26 篇 computer archite...

机构

  • 111 篇 national enginee...
  • 95 篇 college of compu...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 41 篇 the key laborato...
  • 36 篇 department of co...
  • 36 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 30 篇 school of optica...
  • 30 篇 university of ch...
  • 29 篇 shenzhen city ke...
  • 28 篇 school of comput...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...
  • 25 篇 peng cheng labor...
  • 24 篇 shenzhen univers...
  • 23 篇 school of comput...

作者

  • 43 篇 shen linlin
  • 40 篇 ren jiadong
  • 36 篇 hai jin
  • 33 篇 jin hai
  • 28 篇 yang yang
  • 25 篇 mei-ling shyu
  • 25 篇 shu-ching chen
  • 21 篇 zhigang zhang
  • 20 篇 chen shu-ching
  • 20 篇 ji zhen
  • 19 篇 hu shengshan
  • 18 篇 wang xingjun
  • 18 篇 shyu mei-ling
  • 17 篇 zhen ji
  • 17 篇 linlin shen
  • 17 篇 li jianqiang
  • 16 篇 陈景标
  • 16 篇 zhang zhigang
  • 16 篇 shu haowen
  • 14 篇 zhang leo yu

语言

  • 2,855 篇 英文
  • 302 篇 其他
  • 115 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Science and Engineering System Laboratory"
3269 条 记 录,以下是491-500 订阅
排序:
Status and Outlook of Image-based Malware Detection Technology
Status and Outlook of Image-based Malware Detection Technolo...
收藏 引用
computer Technology and Information science (ISCTIS), International Symposium on
作者: Qiuyan Lan Yao Du Caixia Gao Haotian Zheng School of Computer Science and Engineering Southwest Minzu University Chengdu China Key Laboratory of Computer System State Ethnic Affairs Commission Southwest Minzu University Chengdu China
In recent years, computer vision technology has achieved rapid development and is widely used in the field of information security. Researchers have carried out a lot of research on the malicious code analysis technol...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model’s incor... 详细信息
来源: 评论
Prediction-Based Thunderstorm Path Recovery Method Using CNN-BiLSTM
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 1637-1654页
作者: Xu Yang Ling Zhuang Yuqiang Sun Wenjie Zhang School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6G 2R3Canada CCCC Highway Consultants Co. Ltd.Beijing100101China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing210044China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China
The loss of three-dimensional atmospheric electric field(3DAEF)data has a negative impact on thunderstorm *** paper proposes a method for thunderstorm point charge path *** on the relation-ship between a point charge ... 详细信息
来源: 评论
Integrated Parallel Chaos driven LiDAR system with High Interference Tolerance
Integrated Parallel Chaos driven LiDAR System with High Inte...
收藏 引用
2023 Conference on Lasers and Electro-Optics, CLEO 2023
作者: Chen, Ruixuan Shen, Bitao Shu, Haowen Chang, Lin Xie, Weiqiang Liao, Wenchao Tao, Zihan Bowers, John Wang, Xingjun State Key Laboratory of Advanced Optical Communications System and Networks School of Electronics Peking University Beijing100871 China Department of Electrical and Computer Engineering University of California Santa BarbaraCA93106 United States Frontiers Science Center for Nano-Optoelectronics Peking University Beijing100871 China
We introduce a chaotic microcomb based high interference-tolerance parallel LiDAR. Parallel chaos with record-high noise spectra beyond 7 GHz leads to sub-cm-level ranging accuracy. The intrinsic orthogonality permits... 详细信息
来源: 评论
Autonomous Emergency Landing on 3D Terrains: Approaches for Monocular Vision-based UAVs
Autonomous Emergency Landing on 3D Terrains: Approaches for ...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Weiming Du Junmou Lin Binqing Du Uddin Md. Borhan Jianqiang Li Jie Chen College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
With the increasing use of unmanned aerial vehicles (UAVs) in a variety of applications, their safety has become a critical concern. UAVs face numerous emergencies during missions, in these situations, the UAVs need t...
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing Advanced Information Network Laboratory Beijing China College of Computing and Data Science Singapore University of Miami Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing Coral Gables33146 United States University of Miami Department of Industrial and Systems Engineering Coral Gables33146 United States Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China North Carolina State University Department of Computer Science RaleighNC27695 United States Beijing Key Laboratory of Network System Architecture and Convergence China Beijing University of Posts and Telecommunications Beijing Advanced Information Network Laboratory Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously colle... 详细信息
来源: 评论
An Elite Archive-Assisted Multi-Objective Evolutionary Algorithm for mRNA Design
An Elite Archive-Assisted Multi-Objective Evolutionary Algor...
收藏 引用
Congress on Evolutionary Computation
作者: Wenjing Hong Cheng Chen Zexuan Zhu Ke Tang National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Messenger RNA (mRNA) vaccines have emerged as highly effective strategies in the prophylaxis and treatment of diseases. mRNA design, a key to the success of mRNA vaccines, in-volves finding optimal codons and increasi... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论