咨询与建议

限定检索结果

文献类型

  • 2,749 篇 会议
  • 2,021 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,780 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,015 篇 工学
    • 1,622 篇 计算机科学与技术...
    • 1,296 篇 软件工程
    • 569 篇 信息与通信工程
    • 536 篇 电气工程
    • 493 篇 控制科学与工程
    • 487 篇 电子科学与技术(可...
    • 322 篇 光学工程
    • 311 篇 机械工程
    • 252 篇 生物工程
    • 238 篇 动力工程及工程热...
    • 224 篇 仪器科学与技术
    • 185 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 138 篇 材料科学与工程(可...
    • 107 篇 土木工程
    • 106 篇 交通运输工程
    • 72 篇 力学(可授工学、理...
    • 68 篇 建筑学
  • 1,592 篇 理学
    • 791 篇 数学
    • 494 篇 物理学
    • 297 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 154 篇 化学
  • 685 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 160 篇 医学
    • 136 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 87 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
  • 45 篇 农学
  • 15 篇 教育学
  • 15 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 142 篇 laboratories
  • 105 篇 feature extracti...
  • 79 篇 computational mo...
  • 75 篇 data mining
  • 73 篇 computer science
  • 71 篇 optimization
  • 64 篇 training
  • 61 篇 deep learning
  • 58 篇 semantics
  • 56 篇 accuracy
  • 52 篇 neural networks
  • 49 篇 computer archite...
  • 49 篇 mathematical mod...
  • 43 篇 machine learning
  • 42 篇 control systems
  • 42 篇 hardware
  • 41 篇 predictive model...
  • 41 篇 protocols
  • 40 篇 object detection
  • 40 篇 costs

机构

  • 113 篇 national enginee...
  • 96 篇 college of compu...
  • 82 篇 school of contro...
  • 75 篇 state key labora...
  • 58 篇 school of comput...
  • 58 篇 college of infor...
  • 46 篇 hubei province k...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 33 篇 university of ch...
  • 32 篇 department of el...
  • 29 篇 school of optica...
  • 29 篇 school of comput...
  • 28 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...

作者

  • 42 篇 shen linlin
  • 35 篇 hai jin
  • 34 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 31 篇 yang yang
  • 29 篇 zongli lin
  • 28 篇 zhou mengchu
  • 27 篇 jin hai
  • 27 篇 ren jiadong
  • 25 篇 chen shu-ching
  • 25 篇 hamid soltanian-...
  • 23 篇 shyu mei-ling
  • 20 篇 wang xingjun
  • 20 篇 ji zhen
  • 19 篇 mengchu zhou
  • 19 篇 hu shengshan
  • 18 篇 xiao feng
  • 18 篇 chen mingzhe
  • 18 篇 zhang zhigang
  • 18 篇 linlin shen

语言

  • 4,421 篇 英文
  • 203 篇 其他
  • 157 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Engineering Laboratory"
4780 条 记 录,以下是461-470 订阅
排序:
Dynamic State Estimation for Integrated Electricity-gas systems Based on Kalman Filter
收藏 引用
CSEE Journal of Power and Energy systems 2022年 第1期8卷 293-303页
作者: Yanbo Chen Yuan Yao Yuzhang Lin Xiaonan Yang State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Electrical&Electronic EngineeringNorth China Electric Power University102206 BeijingChina Qinghai Key Laboratory of Efficient Utilization of Clean Energy Tus-Institute for Renewable EnergyQinghai UniversityXining 810016China School of Engineering Xining UniversityXining 810016China School of Electrical&Electronic Engineering North China Electric Power University102206 BeijingChina Department of Electrical and Computer Engineering University of MassachusettsLowellMA 01852USA State Key Laboratory of Power Grid Safety and Energy Conservation China Electric Power Research Institute100192 BeijingChina
In recent years, integrated electricity-gas systems(IEGSs) have attracted widespread attention. The unifiedscheduling and control of the IEGS depends on high-precisionoperating data. To this end, it is necessary to es... 详细信息
来源: 评论
Defending Poisoning Attacks in Federated Learning via Loss Value Normal Distribution
Defending Poisoning Attacks in Federated Learning via Loss V...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Fei Han Yao Zhang Meng Zhao Engineering Research Center of Learning-Based Intelligent System Ministry of Education Key Laboratory of Computer Vision and System of Ministry of Education Tianjin University of Technology Tianjin China
As an emerging distributed machine learning paradigm, federated learning (FL) only shares model updates between clients and servers, and training data are secured on each client’s device. Due to local data privacy, F...
来源: 评论
Personalized Federated Learning with Multiple Classifier Aggregation
SSRN
收藏 引用
SSRN 2024年
作者: Zheng, Shaifeng Zhu, Qingling Lin, Qiuzhen Liu, Songbai Wong, Ka-Chun Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science City University of Hong Kong Hong Kong
Personalized federated learning (PFL) has garnered attention due to its capability to address statistical heterogeneity among clients. Typically, prevailing PFL methods aggregate a single global model for personalizat... 详细信息
来源: 评论
Learning Pareto Set for Multi-Objective Continuous Robot Control
arXiv
收藏 引用
arXiv 2024年
作者: Shu, Tianye Shang, Ke Gong, Cheng Nan, Yang Ishibuchi, Hisao Department of Computer Science and Engineering Southern University of Science and Technology China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science City University of Hong Kong Hong Kong
For a control problem with multiple conflicting objectives, there exists a set of Pareto-optimal policies called the Pareto set instead of a single optimal policy. When a multi-objective control problem is continuous ... 详细信息
来源: 评论
Short-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)
收藏 引用
Neural Computing and Applications 2024年 1-20页
作者: Zhang, Ying Xu, Shimin Zhang, Linghui Jiang, Weiwei Alam, Sameer Xue, Dabin College of General Aviation and Flight Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Air Traffic Management System Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Air Traffic Management Research Institute School of Mechanical & ampAerospace Engineering Nanyang Technological University Singapore Singapore Department of Land Surveying and Geo-Informatics The Hong Kong Polytechnic University Hong Kong
Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencies of air... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Resilience Enhancement Techniques in Cyber Physical Distribution system: an Overview
Resilience Enhancement Techniques in Cyber Physical Distribu...
收藏 引用
Australasian Universities Power engineering Conference, AUPEC
作者: Jialun Zhang Jimmy Peng Chih-Hsien Gabriela Hug Future Resilient Systems Singapore-ETH Centre Singapore Electrical and Computer Engineering National University of Singapore Singapore Power System Laboratory ETH Zurich Switzerland
The evolution of power systems into cyberphysical distribution systems (CPDSs) integrates complex communication networks with traditional power infrastructures, thereby exposing systems to both cyber and physical disr... 详细信息
来源: 评论
Distributionally Robust Optimization for Computation Offloading in Aerial Access Networks
Distributionally Robust Optimization for Computation Offload...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Jiang, Guanwang Jia, Ziye He, Lijun Dong, Chao Wu, Qihui Han, Zhu Nanjing University of Aeronautics and Astronautics Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Nanjing211111 China Northwestern Polytechnical University School of Software Xi'an710072 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States
With the rapid increment of multiple users for data offloading and computation, it is challenging to guarantee the quality of service (QoS) in remote areas. To deal with the challenge, it is promising to combine aeria... 详细信息
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论