咨询与建议

限定检索结果

文献类型

  • 1,700 篇 会议
  • 1,570 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 3,278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,097 篇 工学
    • 1,248 篇 计算机科学与技术...
    • 989 篇 软件工程
    • 401 篇 信息与通信工程
    • 310 篇 电子科学与技术(可...
    • 293 篇 控制科学与工程
    • 277 篇 电气工程
    • 238 篇 光学工程
    • 201 篇 机械工程
    • 185 篇 生物工程
    • 150 篇 仪器科学与技术
    • 129 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 102 篇 化学工程与技术
    • 86 篇 材料科学与工程(可...
    • 84 篇 交通运输工程
    • 78 篇 土木工程
    • 52 篇 建筑学
  • 1,093 篇 理学
    • 520 篇 数学
    • 323 篇 物理学
    • 226 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 105 篇 化学
  • 531 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 120 篇 医学
    • 98 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 48 篇 药学(可授医学、理...
  • 70 篇 法学
    • 58 篇 社会学
  • 39 篇 经济学
  • 29 篇 农学
  • 11 篇 教育学
  • 10 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 77 篇 laboratories
  • 75 篇 feature extracti...
  • 70 篇 computer science
  • 60 篇 data mining
  • 55 篇 computational mo...
  • 52 篇 deep learning
  • 52 篇 training
  • 50 篇 optimization
  • 50 篇 semantics
  • 43 篇 accuracy
  • 37 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 protocols
  • 32 篇 clustering algor...
  • 31 篇 object detection
  • 30 篇 neural networks
  • 28 篇 reinforcement le...
  • 28 篇 bandwidth
  • 28 篇 data models
  • 26 篇 computer archite...

机构

  • 113 篇 national enginee...
  • 95 篇 college of compu...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 41 篇 the key laborato...
  • 36 篇 department of co...
  • 36 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 30 篇 school of optica...
  • 30 篇 university of ch...
  • 29 篇 school of comput...
  • 29 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...
  • 24 篇 state key labora...
  • 24 篇 shenzhen univers...
  • 23 篇 school of comput...

作者

  • 42 篇 shen linlin
  • 40 篇 ren jiadong
  • 36 篇 hai jin
  • 34 篇 jin hai
  • 28 篇 yang yang
  • 25 篇 mei-ling shyu
  • 25 篇 shu-ching chen
  • 23 篇 zhigang zhang
  • 20 篇 chen shu-ching
  • 20 篇 ji zhen
  • 20 篇 li jianqiang
  • 19 篇 hu shengshan
  • 18 篇 wang xingjun
  • 18 篇 shyu mei-ling
  • 17 篇 zhen ji
  • 17 篇 zhang zhigang
  • 17 篇 shu haowen
  • 17 篇 linlin shen
  • 16 篇 陈景标
  • 14 篇 zhang leo yu

语言

  • 2,863 篇 英文
  • 302 篇 其他
  • 116 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Science and Engineering System Laboratory"
3278 条 记 录,以下是571-580 订阅
排序:
Video2Reward: Generating Reward Function from Videos for Legged Robot Behavior Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Runhao Zhou, Dingjie Liang, Qiwei Liu, Junlin Li, Hui Huang, Changxin Li, Jianqiang Hu, Xiping Sun, Fuchun Artificial Intelligence Research Institute Shenzhen MSU-BIT University China College of Mechatronics and Control Engineering Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science and Technology Tsinghua University China
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func... 详细信息
来源: 评论
Clustering With Adaptive Graph Learning and Spectral Rotation  7
Clustering With Adaptive Graph Learning and Spectral Rotatio...
收藏 引用
7th International Conference on Vision, Image and Signal Processing, ICVISP 2023
作者: Yuan, Ge Zhou, Jie Huang, Chucheng Gao, Can Wang, Yangbo Shen, Xinrui National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China College of Mathematics and Statistics Shenzhen University Guangdong Shenzhen518060 China SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China
Prototype-based clustering algorithms have garnered considerable attention in the field of machine learning due to their efficiency and interpretability. Nonetheless, these algorithms often face performance degradatio... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Tracking Objects and Activities with Attention for Temporal Sentence Grounding
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zeyu Xiong Daizong Liu Pan Zhou Jiahao Zhu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wangxuan Institute of Computer Technology Peking University
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Enhancing Security in OpenID Connect Single Sign-On (SSO) systems: A Comprehensive Vulnerability Analysis and Mitigation Approach  4
Enhancing Security in OpenID Connect Single Sign-On (SSO) Sy...
收藏 引用
4th International Conference on Distributed Sensing and Intelligent systems, ICDSIS 2023
作者: Al-Shabi, Mohamed Bennour, Akram Al-Sarem, Mahamed Khalaf, Osama Ibrahim Sikder, Rajesh Algburi, Sameer Department of management Information system Taibah University Medina Saudi Arabia "LAMIS" Laboratory Echahid Chikh Larbi Tebessi University Tebessa Algeria College of Computer Science and Engineering Taibah University Medina Saudi Arabia Al-Nahrain University Jadriya Baghdad Iraq Information Technology University of the Cumberlands United States Al-Kitab University College of Engineering Techniques Kirkuk Iraq
Single Sign-On (SSO) systems have become popular for simplifying the login process by allowing users to authenticate with a single identity provider (IDP). However, the widespread use of these systems raises concerns ... 详细信息
来源: 评论
Method for Evaluating the Performance of Aircraft Collaborative Decision-Making Based on Dynamic Bayesian Network
Method for Evaluating the Performance of Aircraft Collaborat...
收藏 引用
Electronics and Devices, Computational science (ICEDCS), International Conference on
作者: Wenbo Zhang Boxiao Yu Jiahui Tong Jing Li National Key Laboratory of Complex System Control and Intelligent Agent Cooperation Beijing Electro-Mechanical Engineering Institute Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creat... 详细信息
来源: 评论
Phase apodized silicon Bragg grating filter with varying sidewall ridge width
Phase apodized silicon Bragg grating filter with varying sid...
收藏 引用
OptoElectronics and Communications Conference, OECC
作者: Xinyu Zhang Wei Jiang Shuo Yuan Haipeng Liu Wenbo Ren Xincheng Xia Jijun Feng School of Mathematics and Physics China University of Geosciences Wuhan P.R. China Shanghai Key Laboratory of Modern Optical System Engineering Research Center of Optical Instrument and System (Ministry of Education) School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai China
In this work, phase apodized silicon Bragg grating filters with varying sidewall ridge width and location were investigated, while the resonance wavelength, extinction ratio and rejection bandwidth can be tuned flexib... 详细信息
来源: 评论
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on computer and Information Processing Technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论