咨询与建议

限定检索结果

文献类型

  • 860 篇 会议
  • 800 篇 期刊文献

馆藏范围

  • 1,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,095 篇 工学
    • 692 篇 计算机科学与技术...
    • 588 篇 软件工程
    • 234 篇 信息与通信工程
    • 135 篇 控制科学与工程
    • 135 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 96 篇 光学工程
    • 90 篇 核科学与技术
    • 79 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 43 篇 材料科学与工程(可...
    • 34 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 708 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 147 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 object detection
  • 18 篇 convolutional ne...
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,549 篇 英文
  • 78 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Technology Application Key Laboratory"
1660 条 记 录,以下是401-410 订阅
排序:
Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems
Avoid attacks: A Federated Data Sanitization Defense in IoMT...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Chong Chen Ying Gao Siquan Huang Xingfu Yan School of Computer Science and Technology South China University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application China School of Computer Science South China Normal University Guangzhou China
Malicious falsification of medical data destroys the training process of the medical-aided diagnosis models and causes serious damage to Healthcare IoMT Systems. To solve this unsupervised problem, this paper finds a ...
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm  10th
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Wang, Ying Liu, Qingyun Sun, Yaqi Zhang, Feng Zhu, Yining College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine lear... 详细信息
来源: 评论
Research on Differential Power Analysis of Lightweight Block Cipher LED  10th
Research on Differential Power Analysis of Lightweight Block...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Zou, Yi Li, Lang Zhao, Hui-huang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Human Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retriev... 详细信息
来源: 评论
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal and Collision Reduction
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal a...
收藏 引用
作者: Deng, Hong-wei Zeng, Wei Yao, Ming Kong, Jia-li College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this study, we propose an ALOHA anti-collision algorithm for frame idle slot removal and collision reduction—called the Cancel Idle and Reduce Collision Framed Slotted Aloha (CIRC-FSA) algorithm—to address the co... 详细信息
来源: 评论
Design of a Real-Time and Reliable Multi-machine System  10th
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control use... 详细信息
来源: 评论
An Optimized Scheme of Information Hiding-Based Visual Secret Sharing  9th
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
9th International Conference on computer Engineering and Networks, CENet2019
作者: Zou, Yi Li, Lang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and co... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan  10th
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Liu, Qingyun Lin, Mugang Sun, Yaqi Zhang, Feng College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos  10th
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Li, Kangman Li, Qiuping College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
ConsistencyDet: A Robust Object Detector with a Denoising Paradigm of Consistency Model
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Lifan Wang, Zhihui Wang, Changmiao Li, Ming Leng, Jiaxu Wu, Xindong the College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266510 China Shenzhen Research Institute of Big Data Shenzhen518172 China Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University Jinhua321004 China the Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China Jiangsu Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing210094 China the Key Laboratory of Knowledge Engineering with Big Data the Ministry of Education of China China School of Computer Science and Information Technology Hefei University of Technology Hefei230009 China
Object detection, a quintessential task in the realm of perceptual computing, can be tackled using a generative methodology. In the present study, we introduce a novel framework designed to articulate object detection... 详细信息
来源: 评论
Adaptive Ensemble Model for Ultra-short-term Wind Power Forecasting  11
Adaptive Ensemble Model for Ultra-short-term Wind Power Fore...
收藏 引用
11th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2022
作者: Li, Yunlong Jin, Huaiping Jin, Huaikang Cao, Yundong Kunming University of Science and Technology Faculty of Information Engineering and Automation Department of Automation Kunming650500 China Yunnan Key Laboratory of Computer Technologies Application Kunming650500 China Huaneng Renewables Co. Ltd. Yunnan Branch Kunming650000 China
Stable and reliable wind power forecasting is of great significance for grid dispatching. However, wind power has strong nonlinear characteristics. Its amount of historical data is very large, and traditional machine ... 详细信息
来源: 评论