咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 797 篇 期刊文献

馆藏范围

  • 1,659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,102 篇 工学
    • 690 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 233 篇 信息与通信工程
    • 135 篇 生物工程
    • 133 篇 控制科学与工程
    • 116 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 102 篇 核科学与技术
    • 91 篇 光学工程
    • 77 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 51 篇 仪器科学与技术
    • 48 篇 化学工程与技术
    • 42 篇 材料科学与工程(可...
    • 36 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 702 篇 理学
    • 325 篇 物理学
    • 280 篇 数学
    • 147 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 50 篇 化学
    • 41 篇 系统科学
  • 261 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 125 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 20 篇 教育学
  • 19 篇 经济学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 46 篇 deep learning
  • 38 篇 semantics
  • 35 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 21 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting
  • 15 篇 conferences

机构

  • 139 篇 irfu cea univers...
  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 charles universi...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 121 篇 department of ph...
  • 120 篇 imperial college...
  • 120 篇 university of de...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,454 篇 英文
  • 173 篇 其他
  • 42 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Technology Application Key Laboratory"
1659 条 记 录,以下是741-750 订阅
排序:
Transfer learning-based few-shot sample deep learning-assisted template attacks
收藏 引用
Physical Communication 2025年 72卷
作者: Feng, Zhiying Li, Lang Ou, Yu Deng, Lianrui College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang421002 China
Deep learning-assisted template attack (DLATA) is a novel side-channel attack (SCA) method proposed by Lichao Wu at CHES2022. It utilizes a triplet network to assist template attacks (TA), avoiding the redundant train... 详细信息
来源: 评论
DioR: Adaptive Cognitive Detection and Contextual Retrieval Optimization for Dynamic Retrieval-Augmented Generation
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Hanghui Zhu, Jia Di, Shimin Shi, Weijie Chen, Zhangze Xu, Jiajie School of Computer Science and Technology Zhejiang Normal University China The Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University China School of Computer Science and Engineering Southeast University China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong School of Computer Science and Technology Soochow University China
Dynamic Retrieval-augmented Generation (RAG) has shown great success in mitigating hallucinations in large language models (LLMs) during generation. However, existing dynamic RAG methods face significant limitations i...
来源: 评论
PoW-Based Sybil Attack Resistant Model for P2P Reputation Systems  2nd
PoW-Based Sybil Attack Resistant Model for P2P Reputation Sy...
收藏 引用
2nd International Conference on Blockchain and Trustworthy Systems, Blocksys 2020
作者: Li, Biaoqi Fu, Xiaodong Yue, Kun Liu, Li Liu, Lijun Feng, Yong Yunnan Provincial Key Laboratory of Computer Technology Application Kunming650500 China Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China School of Information Science and Engineering Yunnan University Kunming650091 China
Peer-to-peer and other distributed systems are known particularly vulnerable to Sybil attack, so is P2P reputation systems. Reputation helps users to make better decisions in P2P systems, but Sybil attacker can obtain... 详细信息
来源: 评论
Filter Pruning for Efficient CNNs via Knowledge-driven Differential Filter Sampler
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Shaohui Huang, Wenxuan Xie, Jiao Zhang, Baochang Shen, Yunhang Yu, Zhou Han, Jungong Doermann, David The School of Computer Science and Technology East China Normal University Shanghai China The Key Laboratory of Advanced Theory and Application in Statistics and Data Science Ministry of Education China The Department of Automation School of Aerospace Engineering Xiamen University Xiamen China The Institute of Artificial Intelligence Beihang University Beijing China Zhongguancun Laboratory Beijing China The Youtu Lab Tencent Shanghai China The School of Statistics East China Normal University Shanghai China The Department of Computer Science University of Sheffield United Kingdom The University at Buffalo BuffaloNY United States
Filter pruning simultaneously accelerates the computation and reduces the memory overhead of CNNs, which can be effectively applied to edge devices and cloud services. In this paper, we propose a novel Knowledge-drive... 详细信息
来源: 评论
Autonomous Search Investigation for Radioactive Leaked Source Based on Updated Infotaxis Method During Nuclear Emergency Rescue
SSRN
收藏 引用
SSRN 2023年
作者: Chen, Liwei Zhou, Cong Wang, Yu Zong, Yiran Lu, Tingting Chen, Chunhua School of Computer and Artificial Intelligence Hefei Normal University Anhui Hefei230601 China Institute of Nuclear Energy Safety Technology Hefei Institutes of Physical Science Chinese Academy of Sciences Anhui Hefei230031 China Key Laboratory for the Application and Transformation of Traditional Chinese Medicine in the Prevention and Treatment of Major Pulmonary Diseases Anhui University of Chinese Medicine Anhui Province Anhui Hefei230012 China Department of Computer Science Hong Kong Baptist University 999077 Hong Kong
Identifying leakage location is one of key issues for off-site decision worker under nuclear accident condition, especially for early emergency rescue. In order to rapidly reduce the environmental radiation level of s... 详细信息
来源: 评论
Nanodet-Ghost: A Lightweight Network for Quality Detection of Wheat Kernels Appearance
SSRN
收藏 引用
SSRN 2022年
作者: Wang, Yunfei Wang, Yanan Wang, Zheng Li, Rong Hua, Zhixin Zhang, Chuandong Zhang, Zuojing Song, Huaibo College of Mechanical and Electronic Engineering Northwest A&F University Yangling Shaanxi 712100 China Key Laboratory of Agricultural Internet of Things Ministry of Agriculture and Rural Affairs Yangling Shaanxi 712100 China School of Mathematics and Computer Application Technology Jining University Shandong Qufu273155 China
Quality detection of wheat grain appearance is a pre-step for acquiring high-throughput phenotyping and wheat breeding information. However, low portability brought by parameter redundancy is a challenge for general d... 详细信息
来源: 评论
ResfEANet: ResNet-fused External Attention Network for Tuberculosis Diagnosis using Chest X-ray Images
收藏 引用
computer Methods and Programs in Biomedicine Update 2024年 5卷
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Nnani, Ann O Deng, Fuhu Ejiyi, Thomas Ugochukwu Ejiyi, Makuachukwu Bennedith Agbesi, Victor Kwaku Bamisile, Olusola Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China College of Environmental Science and Engineering Hohai University Nanjing China Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu Nigeria Pharmacy Department University of Nigeria Nsukka Enugu Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Technology Research Centre Chengdu University of Technology Chengdu China
Pulmonary tuberculosis (TB), the most prevalent form of TB, remains a major global public health concern, contributing to more than a million deaths each year. The accurate and timely diagnosis of this disease is of p... 详细信息
来源: 评论
Stable and Diverse: A Unified Approach for computerized Adaptive Testing
Stable and Diverse: A Unified Approach for Computerized Adap...
收藏 引用
IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS)
作者: Yuting Ning Ye Liu Zhenya Huang Haoyang Bi Qi Liu Enhong Chen Dan Zhang Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China School of Data Science University of Science and Technology of China iFLYTEK Research iFLYTEK CO. LTD
computerized Adaptive Testing (CAT), aiming to provide personalized tests for each examinee, is an emerging task in the intelligent education field. A CAT system selects questions step by step according to the knowled... 详细信息
来源: 评论
C²F²: Cross-Task Cross-Domain Feature Fusion for Semi-Supervised Change Detection
收藏 引用
IEEE Geoscience and Remote Sensing Letters 2024年 21卷
作者: Dongjie Zhang Yuting Hong Xiaojie Qiu Li Dong Diqun Yan Chengbin Peng Faculty of Electrical Engineering and Computer Science and the Key Laboratory of Mobile Network Application Technology of Zhejiang Province Ningbo University Ningbo China Zhejiang Cowain Automation Technology Company Ltd. Ningbo China
Semi-supervised learning for change detection (CD), which significantly reduces the labor costs associated with data annotation, has recently garnered substantial attention. In this study, we propose to enhance tradit... 详细信息
来源: 评论
An Incentive Mechanism Considering Privacy Metric for Personalized application
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xie, Yun Li, Peng Zhang, Jindan Attar, Razaz Waheeb Arya, Varsha Gupta, Brij B. Nanjing Vocational College of Information Technology Jiangsu Province Service Customization Network Application Engineering Research Center Jiangsu Province Service Customization Network Application Engineering Research Center Nanjing210023 China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210023 China Xianyang Polytechnic Institute China Princess Nourah bint Abdulrahman University College of Business Administration Management Department Riyadh11671 Saudi Arabia Hong Kong Metropolitan University Hong Kong Hong Kong Center for Interdisciplinary Research Dehradun India Asia University Department of Computer Science and Information Engineering Taichung413 Taiwan China Medical University Hospital China Medical University Department of Medical Research Taichung Taiwan Pune India Korea University School of Cybersecurity Seoul Korea Republic of Kyung Hee University Kyungheedae-ro Seoul26 Korea Republic of
Edge-based federated learning (EFL) is a solution for personalized applications. It addresses the limitations of cloud-based consumer service systems, such as data privacy and network latency. To further enhance the E... 详细信息
来源: 评论