咨询与建议

限定检索结果

文献类型

  • 860 篇 会议
  • 800 篇 期刊文献

馆藏范围

  • 1,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,095 篇 工学
    • 692 篇 计算机科学与技术...
    • 588 篇 软件工程
    • 234 篇 信息与通信工程
    • 135 篇 控制科学与工程
    • 135 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 96 篇 光学工程
    • 90 篇 核科学与技术
    • 79 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 43 篇 材料科学与工程(可...
    • 34 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 708 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 147 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 object detection
  • 18 篇 convolutional ne...
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,549 篇 英文
  • 78 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Technology Application Key Laboratory"
1660 条 记 录,以下是541-550 订阅
排序:
Population-Based Evolutionary Gaming for Unsupervised Person Re-identification
arXiv
收藏 引用
arXiv 2023年
作者: Zhai, Yunpeng Peng, Peixi Jia, Mengxi Li, Shiyong Chen, Weiqiang Gao, Xuesong Tian, Yonghong National Engineering Research Center of Visual Technology School of Computer Science Peking University China School of Electronic and Computer Engineering Peking University Shenzhen Graduate School China Peng Cheng Laboratory China AI Application Research Center Huawei Technologies Co. Ltd China State Key Laboratory of Digital Multimedia Technology Hisense Qingdao China
Unsupervised person re-identification has achieved great success through the self-improvement of individual neural networks. However, limited by the lack of diversity of discriminant information, a single network has ... 详细信息
来源: 评论
An ADRC-Incorporated Stochastic Gradient Descent Algorithm for Latent Factor Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jinli Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Engineering Research Center of Big Data Application for Smart Cities Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The College of Computer and Information Science Southwest University Chongqing400715 China
High-dimensional and incomplete (HDI) matrix contains many complex interactions between numerous nodes. A stochastic gradient descent (SGD)-based latent factor analysis (LFA) model is remarkably effective in extractin... 详细信息
来源: 评论
A Method of Constructing and Automatically Labeling Radio Frequency Signal Training Dataset for UAV
A Method of Constructing and Automatically Labeling Radio Fr...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chao Liu Ruipeng Ma Zheng Si Mingmin Chi School of Computer Science Shanghai Key Laboratory of Data Science Fudan University Zhengzhou Zhongke Institute of Integrated Circuit and System Application School of Cyber Science and Engineering Zhengzhou University Henan Institute of Advanced Technology Zhengzhou University
The problem of signal detection and classification of multiple UAVs can be solved using object detection techniques in computer vision. However, this requires collecting and labeling a large amount of reliable raw dat... 详细信息
来源: 评论
Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain
Threat Capability of Stubborn Mining in Imperfect GHOST Bitc...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Haoran Zhu Zhi Chen Jelena Mišić Vojislav B. Mišić Xiaolin Chang Jing Bai Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University P. R. China Beijing Institute of Computer Technology and Application P. R. China Ryerson University Toronto ON Canada
Bitcoin is the largest PoW blockchain, which currently uses the longest-chain protocol for chain selection and is vulnerable to various attacks like stubborn mining attack. As a variant of selfish mining attack, stubb...
来源: 评论
HSR-Diff: Hyperspectral Image Super-Resolution via Conditional Diffusion Models
HSR-Diff: Hyperspectral Image Super-Resolution via Condition...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Chanyue Wu Dong Wang Yunpeng Bai Hanyu Mao Ying Li Qiang Shen National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech & Image Information Processing School of Computer Science Northwestern Polytechnical University China Department of Computer Science Faculty of Business and Physical Sciences Aberystwyth University U.K.
Despite the proven significance of hyperspectral images (HSIs) in performing various computer vision tasks, its potential is adversely affected by the low-resolution (LR) property in the spatial domain, resulting from...
来源: 评论
Fracture Analysis of Fractured Sandstone Based on Multiple Parameters
SSRN
收藏 引用
SSRN 2024年
作者: Zhu, Xing He, Chunlei Zhu, Hao Fan, Jie State Key Laboratory of Geohazard Prevention and Geoenvironment Protection Chengdu University of Technology Chengdu610059 China College of Environment and Civil Engineering Chengdu University of Technology Chengdu610059 China College of Computer and Cyber Security Chengdu University of Technology Chengdu610059 China Sichuan Engineering Technology Research Center of Industrial Internet Intelligent Monitoring and Application Chengdu University of Technology Chengdu610059 China
To understand the deformation and fracture characteristics of fractured rock masses, a systematic experimental study was carried out on sandstone samples with various prefabricated cracks. Acoustic emission and digita... 详细信息
来源: 评论
Bfs2adv: Black-Box Adversarial Attack Towards Hard-to-Attack Short Texts
SSRN
收藏 引用
SSRN 2023年
作者: Han, Xu Li, Qiang Cao, Hongbo Han, Lei Wang, Bin Bao, Xuhua Han, Yufei Wang, Wei Beijing Key Laboratory of Security and Privacy of Intelligent Transportation Beijing Jiaotong University Beijing100044 China Beijing Institute of Computer Technology and Application Beijing100584 China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Zhejiang University Hangzhou310027 China Sangfro Technologies Inc Shenzhen518055 China INRIA Bretagne Rennes35042 France
The advent of Machine Learning as a Service (MLaaS) and deep learning applications has increased the susceptiblility of models to adversarial textual attacks, particularly in black-box settings. Prior work on black-bo... 详细信息
来源: 评论
A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading Transactions
A Hybrid Blockchain Scheme for Tracing Manufacturing Process...
收藏 引用
International Symposium on Parallel and Distributed Processing with applications, ISPA
作者: Ye Yuan Mingxing Yang Ruoting Xiong Yani Sun Xianchao Zhang Wei Ren HuBei Land Resources Vocational College China Gemological Institute China University of Geosciences Wuhan China School of Computing Science University of East Anglia UK Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang University Kunming China Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing University Jiaxing China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR Beijing China Ministry of Education Key Laboratory of Data Protection and Intelligent Management (Sichuan University) China School of Computer Science China University of Geosciences Wuhan China
Blockchain can be envisioned as an enabling framework in terms of cryptography and distributed computing to construct trusted data records among un-trusted users. It can be applied in two typical scenarios - historica... 详细信息
来源: 评论
EAPDS: Efficient Auditable and Privacy-preservation Data Sharing Scheme Based on Attribute-Based Encryption for IoMT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Hui Xie, Yong Luo, Min Liu, Yining Shirazi, Syed Hamad Qinghai University Department of Information Technology Xining810016 China Qinghai Institute of Technology School of Computer and Information Science Xining810016 China Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining810016 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325000 China Hazara University Department of Information Technology Mansehra21300 Pakistan
Data sharing schemes based on the Internet of Medical Things (IoMT) have emerged as a more convenient way to monitor and manage individuals’ health. However, this scenario faces challenges such as privacy preservatio... 详细信息
来源: 评论
Research on Two-stage Conveying Bar Counting and Dividing System Based on Vision
Research on Two-stage Conveying Bar Counting and Dividing Sy...
收藏 引用
International Symposium on Distributed Computing and applications to Business, Engineering and Science (DCABES)
作者: Guojun Chen Yang Wu Jiangsu Key Laboratory of IoT Application Technology Wuxi Taihu University Wuxi China College of Computer Internet of Tings Engineering Wuxi Taihu University Wuxi China
A vision-based automatic bar counting system for two-stage conveying bars is proposed. The system solves the counting problems of sticking and relative sliding of a large number of rebar stacks through image processin... 详细信息
来源: 评论