咨询与建议

限定检索结果

文献类型

  • 10,890 篇 会议
  • 9,760 篇 期刊文献
  • 57 册 图书

馆藏范围

  • 20,707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,577 篇 工学
    • 9,016 篇 计算机科学与技术...
    • 7,236 篇 软件工程
    • 3,288 篇 信息与通信工程
    • 1,641 篇 电气工程
    • 1,623 篇 控制科学与工程
    • 1,544 篇 电子科学与技术(可...
    • 1,417 篇 生物工程
    • 1,166 篇 光学工程
    • 1,053 篇 机械工程
    • 822 篇 生物医学工程(可授...
    • 685 篇 化学工程与技术
    • 665 篇 仪器科学与技术
    • 520 篇 动力工程及工程热...
    • 443 篇 材料科学与工程(可...
    • 425 篇 网络空间安全
    • 353 篇 交通运输工程
    • 340 篇 建筑学
    • 330 篇 安全科学与工程
  • 7,802 篇 理学
    • 3,849 篇 数学
    • 2,735 篇 物理学
    • 1,585 篇 生物学
    • 1,252 篇 统计学(可授理学、...
    • 729 篇 化学
    • 705 篇 系统科学
  • 3,488 篇 管理学
    • 1,987 篇 管理科学与工程(可...
    • 1,619 篇 图书情报与档案管...
    • 714 篇 工商管理
  • 705 篇 医学
    • 596 篇 临床医学
    • 511 篇 基础医学(可授医学...
  • 528 篇 法学
    • 417 篇 社会学
  • 243 篇 经济学
  • 226 篇 农学
  • 159 篇 教育学
  • 93 篇 军事学
  • 83 篇 文学
  • 54 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 447 篇 feature extracti...
  • 428 篇 laboratories
  • 398 篇 computer science
  • 383 篇 semantics
  • 342 篇 deep learning
  • 305 篇 computational mo...
  • 267 篇 training
  • 221 篇 optimization
  • 214 篇 data mining
  • 210 篇 image segmentati...
  • 204 篇 neural networks
  • 186 篇 object detection
  • 180 篇 convolution
  • 170 篇 accuracy
  • 166 篇 routing
  • 164 篇 conferences
  • 162 篇 computer archite...
  • 155 篇 bandwidth
  • 139 篇 support vector m...
  • 133 篇 information tech...

机构

  • 289 篇 faculty of scien...
  • 288 篇 department for p...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 275 篇 department of co...
  • 274 篇 department of ph...
  • 267 篇 department of ph...
  • 264 篇 department of ph...
  • 259 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 231 篇 fakultät für phy...
  • 227 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 212 篇 department of ph...
  • 209 篇 institute of phy...
  • 204 篇 institut für ast...
  • 200 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 261 篇 g. gaudio
  • 261 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 256 篇 y. nagasaka
  • 249 篇 d. guest
  • 242 篇 y. tayalati

语言

  • 19,449 篇 英文
  • 790 篇 其他
  • 482 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Information Technology Laboratory"
20707 条 记 录,以下是81-90 订阅
排序:
Characterizing the spatial potential of an ion trap chip
收藏 引用
Chip 2025年 第1期4卷 62-71页
作者: Qingqing Qin Ting Chen Xinfang Zhang Baoquan Ou Jie Zhang Chunwang Wu Yi Xie Wei Wu Pingxing Chen College of Science National University of Defense TechnologyChangsha 410073China Hunan Key Laboratory of Mechanism and Technology of Quantum Information Changsha 410073HunanChina College of Computer Science National University of Defense TechnologyChangsha 410073China
The accurate characterization of the spatial electric field generated by electrodes in a surface electrode trap is of paramount *** this pursuit,we have identified a simple yet highly precise parametric expression to ... 详细信息
来源: 评论
A unified user behavior model for trajectory-based tasks with different types of path constraints
收藏 引用
science China(information sciences) 2023年 第10期66卷 316-318页
作者: Hao ZHANG Jin HUANG Huawei TU Feng TIAN Guozhong DAI Hongan WANG Beijing Key Laboratory of Human-Computer Interaction Institute of Software Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences School of Artificial Intelligence University of Chinese Academy of Sciences Department of Computer Science and Information Technology La Trobe University
An important research branch of human-computer interaction(HCI) is to develop predictive models for human performance in fundamental interactions [1]. On today's graphical user interface(GUI), users often implicit...
来源: 评论
DetSpace:Distributed Congestion Free Routing for Global Deterministic Network in Mega-Constellations
收藏 引用
China Communications 2024年 第12期21卷 203-216页
作者: Li Jihao Li Hewu Lai Zeqi Wang Xiaomo Beijing National Research Center for Information Science and Technology(BNRist) Beijing 100084China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Institute of Network Science and Cyberspace Tsinghua UniversityBeijing 100084China Zhongguancun Laboratory Beijing 100095China China Academy of Electronics and Information Technology Beijing 100040China
Emerging long-range industrial IoT applications(e.g.,remote patient monitoring)have increasingly higher requirements for global deterministic *** many existing methods have built deterministic networks in small-scale ... 详细信息
来源: 评论
Code-Based Conjunction Obfuscation
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 237-247页
作者: ZHANG Zheng ZHANG Zhuoran ZHANG Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology
The pattern-matching problem with wildcards can be formulated as a conjunction where an accepting string is same as the pattern for all non-wildcards. A scheme of conjunction obfuscation is a algorithm that “encrypt... 详细信息
来源: 评论
Improving long-tail classification via decoupling and regularisation
收藏 引用
CAAI Transactions on Intelligence technology 2025年 第1期10卷 62-71页
作者: Shuzheng Gao Chaozheng Wang Cuiyun Gao Wenjian Luo Peiyi Han Qing Liao Guandong Xu School of Computer Science and Technology Harbin Institute of TechnologyShenzhenChina Peng Cheng Laboratory ShenzhenChina Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Harbin Institute of TechnologyShenzhenChina Faculty of Engineering and Information Technology University of Technology SydneySydneyNew South WalesAustralia
Real-world data always exhibit an imbalanced and long-tailed distribution,which leads to poor performance for neural network-based *** methods mainly tackle this problem by reweighting the loss function or rebalancing... 详细信息
来源: 评论
Attack based on data: a novel perspective to attack sensitive points directly
收藏 引用
Cybersecurity 2024年 第3期7卷 111-123页
作者: Yuyao Ge Zhongguo Yang Lizhe Chen Yiming Wang Chengyang Li School of Information Science and Technology North China University of TechnologyBeijingChina Bejing Key Laboratory on Integration and Analysis of Large-Scale Stream Data North China University of TechnologyBeijingChina School of Computer Science Peking UniversityBeijingChina
Adversarial attack for time-series classification model is widely explored and many attack methods are *** there is not a method of attack based on the data *** this paper,we innovatively proposed a black-box sparse a... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to Data Clustering
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论
Analysis and Classification of Fake News Using Sequential Pattern Mining
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 942-963页
作者: M.Zohaib Nawaz M.Saqib Nawaz Philippe Fournier-Viger Yulin He College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060 Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen 518107China Department of Computer Science Faculty of Computing and Information TechnologyUnivesity of SargodhaSargodha 40100Pakistan
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies... 详细信息
来源: 评论
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
收藏 引用
Chinese Physics B 2024年 第5期33卷 292-304页
作者: 田婧希 金松昌 张晓强 杨绍武 史殿习 School of Computer Science National University of Defense TechnologyChangsha 410003China Intelligent Game and Decision Laboratory (IGDL) Beijing 100091China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface *** safeguard this sensitive data,image encryption technology is *** this paper,a n... 详细信息
来源: 评论
Multi-scale feature fusion for facial expression recognition
收藏 引用
Neural Computing and Applications 2025年 1-22页
作者: Guo, Jiatao Peng, Junjie Huang, Yansong Chen, Gan Cai, Zesu Tan, Shuhua School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China School of Computer Science and Technology Harbin Institute of Technology Harbin China National Engineering Laboratory for Logistics Information Technology YTO Express Co. Ltd. Shanghai China
As an important computer vision task that can be used in many areas, facial expression recognition (FER) has been widely studied which much progress has been obtained especially when deep learning (DL) approaches have... 详细信息
来源: 评论