咨询与建议

限定检索结果

文献类型

  • 934 篇 期刊文献
  • 608 篇 会议
  • 11 册 图书

馆藏范围

  • 1,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 966 篇 工学
    • 469 篇 计算机科学与技术...
    • 365 篇 软件工程
    • 256 篇 信息与通信工程
    • 186 篇 电气工程
    • 163 篇 电子科学与技术(可...
    • 106 篇 控制科学与工程
    • 100 篇 光学工程
    • 96 篇 生物工程
    • 82 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 75 篇 核科学与技术
    • 63 篇 仪器科学与技术
    • 62 篇 动力工程及工程热...
    • 48 篇 化学工程与技术
    • 38 篇 材料科学与工程(可...
    • 36 篇 航空宇航科学与技...
    • 32 篇 交通运输工程
    • 31 篇 土木工程
  • 664 篇 理学
    • 306 篇 物理学
    • 219 篇 数学
    • 136 篇 生物学
    • 66 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 47 篇 化学
  • 202 篇 管理学
    • 133 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 62 篇 工商管理
  • 110 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
    • 35 篇 药学(可授医学、理...
  • 30 篇 农学
  • 27 篇 法学
  • 26 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 28 篇 w & z bosons
  • 28 篇 laboratories
  • 25 篇 deep learning
  • 24 篇 higgs bosons
  • 21 篇 computer archite...
  • 17 篇 semantics
  • 17 篇 feature extracti...
  • 17 篇 protocols
  • 17 篇 computer network...
  • 16 篇 computer science
  • 16 篇 reinforcement le...
  • 16 篇 optimization
  • 16 篇 cms
  • 15 篇 simulation
  • 15 篇 costs
  • 15 篇 artificial intel...
  • 15 篇 top quark
  • 14 篇 wireless communi...
  • 14 篇 neural networks

机构

  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 148 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 140 篇 imperial college...
  • 138 篇 university of de...
  • 138 篇 department of ph...
  • 137 篇 università di to...
  • 137 篇 rwth aachen univ...
  • 136 篇 indian institute...
  • 135 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 129 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,431 篇 英文
  • 93 篇 其他
  • 29 篇 中文
检索条件"机构=Computer and Network System Research Laboratory Department of Computer Engineering"
1553 条 记 录,以下是131-140 订阅
排序:
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area networks (HAN) and Neighborhood Area networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Precision control model for chaotic laser generation in optical communication and laser measurement systems
Precision control model for chaotic laser generation in opti...
收藏 引用
Photonics Applications in Astronomy, Communications, Industry, and High Energy Physics Experiments 2024
作者: Kurskoy, Yuriy Hnatenko, Oleksandr Sherstyuk, Daniil Zarytskyi, Valeriy Chernovolyk, Galyna Nussupbekova, Gulzhan Pogrebniak, Liudmyla Kisala, Piotr Klimek, Jacek Muslimov, Kuanysh Kharkiv National University of Radio Electronics 14 Nauku Ave. Kharkiv Ukraine Vinnytsia National Technical University Software Development Department Ukraine Turan University Computer and Software Engineering Department Almaty Kazakhstan Kruty Heroes Military Institute of Telecommunications and Information Technologies Telecommunication System and Network Department Kyiv Ukraine Lublin University of Technology Poland K.I. Satbayev Kazakh National Research Technical University Kazakhstan
The article is dedicated to advancing technologies in chaotic optical communication and investigating chaotic laser generation in measurement systems and instruments. It conducts an analysis of the informational poten... 详细信息
来源: 评论
MTGA: Multi-View Temporal Granularity Aligned Aggregation for Event-Based Lip-Reading
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Wenhao Wang, Jun Luo, Yong Yu, Lei Yu, Wei He, Zheng Shen, Jialie School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Electronics and Information Wuhan University China Department of Computer Science City University of London United Kingdom
Lip-reading is to utilize the visual information of the speaker’s lip movements to recognize words and sentences. Existing event-based lip-reading solutions integrate different frame rate branches to learn spatio-tem... 详细信息
来源: 评论
Dynamic Graph Neural networks for Joint Terahertz based Sensing and Communication Optimization in Vehicular networks
Dynamic Graph Neural Networks for Joint Terahertz based Sens...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Xuefei Li Mingzhe Chen Ye Hu Zhilong Zhang Danpu Liu Shiwen Mao Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijina China Department-of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Coral Gables FL USA Department of Industrial and System Engineering University of Miami Coral Gables FL USA Department of Electrical and Computer Engineering Auburn University Auburn AL USA
In this paper, the problem of vehicle service mode selection (sensing, communication, or both) and vehicle connections within terahertz (THz) enabled joint sensing and communications over vehicular networks is studied... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction  25
Using Lock-Free Design for Throughput-Optimized Cache Evicti...
收藏 引用
Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of computer systems
作者: Chao Dong Fang Wang Hong Jiang Dan Feng Key Laboratory of Information Storage System (Wuhan National Laboratory for Optoelectronics) Engineering Research Center of data storage systems and Technology (School of Computer Science and Technology) Ministry of Education of China Huazhong University of Science and Techonolgy Wuhan Hubei China Department of Computer Science and Engineering University of Texas at Arlington Arlington Texas USA
This paper presents a practical approach to cache eviction algorithm design, called Mobius, that optimizes the concurrent throughput of caches and reduces cache operation latency by utilizing lock-free data structures... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chaohe Lu Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
Novel Generation Injection Solution for Security Constrained Optimal Power Flow of Utility Practical Transmission Utility network  5
Novel Generation Injection Solution for Security Constrained...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Singh, Bhoori Sharma, Avdhesh Garg, Akhil Ranjan Mahela, Om Prakash Khan, Baseem Mbm University Department of Electrical Engineering Jodhpur India Rajasthan Rajya Vidyut Prasaran Nigam Ltd. Power System Planning Division Jaipur India Innovader Research Labs Innovader IITian Padhaiwala LearnlAb Pvt. Ltd. Jaipur India Hawassa University Department of Electrical and Computer Engineering Ethiopia Center for Renewable Energy and Microgrids Huanjiang Laboratory Zhejiang University Zhuji311816 China Western Caspian University Department of Technical Sciences Baku Azerbaijan
The security constrained optimal power flow (SCOPF) optimally configures and dispatches the power system in normal conditions to ensure that steady-state operating conditions do not exceed the emergency ratings when c... 详细信息
来源: 评论
Gradient Sign Inversion: Making an Adversarial Attack a Good Defense
Gradient Sign Inversion: Making an Adversarial Attack a Good...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xiaojian Ji Li Dong Rangding Wang Diqun Yan Yang Yin Jinyu Tian Department of Computer Science Ningbo University Zhejiang Key Laboratory of Mobile Network Application Technology Geely Auto Central Research Institute School of Computer Science and Engineering Macau University of Science and Technology
Deep neural networks have been proven vulnerable to deliberately crafted adversarial example, which cause serious safety and security concerns. Many defense approaches were proposed to resist such threats. However, ex...
来源: 评论
When Sign Language Meets Semantic Communications  35
When Sign Language Meets Semantic Communications
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Kouvakis, Vasileios Trevlakis, Stylianos E. Boulogeorgos, Alexandros-Apostolos A. Tsiftsis, Theodoros Singh, Keshav Qi, Nan InnoCube P.C. Department of Research and Development 17th Noemvriou 79 Thessaloniki55535 Greece University of Western Macedonia Department of Electrical and Computer Engineering Kozani50100 Greece University of Thessaly Department of Informatics & Telecommunications Lamia35100 Greece Institute of Communications Engineering National Sun Yat-sen University Kaohsiung804 Taiwan Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Nanjing210016 China
This paper presents an American sign language (ASL) semantic communications scheme. The scheme consists of a semantic encoder that leverages a convolutional neural network to effectively utilize the ASL alphabet. The ... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论