咨询与建议

限定检索结果

文献类型

  • 2,749 篇 会议
  • 2,021 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,780 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,015 篇 工学
    • 1,622 篇 计算机科学与技术...
    • 1,296 篇 软件工程
    • 569 篇 信息与通信工程
    • 536 篇 电气工程
    • 493 篇 控制科学与工程
    • 487 篇 电子科学与技术(可...
    • 322 篇 光学工程
    • 311 篇 机械工程
    • 252 篇 生物工程
    • 238 篇 动力工程及工程热...
    • 224 篇 仪器科学与技术
    • 185 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 138 篇 材料科学与工程(可...
    • 107 篇 土木工程
    • 106 篇 交通运输工程
    • 72 篇 力学(可授工学、理...
    • 68 篇 建筑学
  • 1,592 篇 理学
    • 791 篇 数学
    • 494 篇 物理学
    • 297 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 154 篇 化学
  • 685 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 160 篇 医学
    • 136 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 87 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
  • 45 篇 农学
  • 15 篇 教育学
  • 15 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 142 篇 laboratories
  • 105 篇 feature extracti...
  • 79 篇 computational mo...
  • 75 篇 data mining
  • 73 篇 computer science
  • 71 篇 optimization
  • 64 篇 training
  • 61 篇 deep learning
  • 58 篇 semantics
  • 56 篇 accuracy
  • 52 篇 neural networks
  • 49 篇 computer archite...
  • 49 篇 mathematical mod...
  • 43 篇 machine learning
  • 42 篇 control systems
  • 42 篇 hardware
  • 41 篇 predictive model...
  • 41 篇 protocols
  • 40 篇 object detection
  • 40 篇 costs

机构

  • 113 篇 national enginee...
  • 96 篇 college of compu...
  • 82 篇 school of contro...
  • 75 篇 state key labora...
  • 58 篇 school of comput...
  • 58 篇 college of infor...
  • 46 篇 hubei province k...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 33 篇 university of ch...
  • 32 篇 department of el...
  • 29 篇 school of optica...
  • 29 篇 school of comput...
  • 28 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...

作者

  • 42 篇 shen linlin
  • 35 篇 hai jin
  • 34 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 31 篇 yang yang
  • 29 篇 zongli lin
  • 28 篇 zhou mengchu
  • 27 篇 jin hai
  • 27 篇 ren jiadong
  • 25 篇 chen shu-ching
  • 25 篇 hamid soltanian-...
  • 23 篇 shyu mei-ling
  • 20 篇 wang xingjun
  • 20 篇 ji zhen
  • 19 篇 mengchu zhou
  • 19 篇 hu shengshan
  • 18 篇 xiao feng
  • 18 篇 chen mingzhe
  • 18 篇 zhang zhigang
  • 18 篇 linlin shen

语言

  • 4,421 篇 英文
  • 203 篇 其他
  • 157 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Engineering Laboratory"
4780 条 记 录,以下是651-660 订阅
排序:
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Multi-scale Dynamic and Hierarchical Relationship Modeling for Facial Action Units Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Zihan Song, Siyang Luo, Cheng Deng, Songhe Xie, Weicheng Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China University of Leicester United Kingdom Monash University Australia
Human facial action units (AUs) are mutually related in a hierarchical manner, as not only they are associated with each other in both spatial and temporal domains but also AUs located in the same/close facial regions... 详细信息
来源: 评论
Intermodal interference based refractive index sensor employing elliptical core photonic crystal fiber
收藏 引用
Optoelectronics Letters 2021年 第5期17卷 271-275页
作者: WU Xu-jie SONG Bin-bin WU Ji-xuan HUANG Wei The Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China Tianjin Key Laboratory of Optoelectronic Detection Technology and Systems College of Electronic and Information EngineeringTiangong UniversityTianjin 300387China
A refractive index(RI)sensor based on elliptical core photonic crystal fiber(EC-PCF)has been *** asymmetric elliptical core introduces the polarization-dependent characteristics of the fiber core *** performances of i... 详细信息
来源: 评论
Performance Improvements of Machine Learning-Based Crime Prediction, A Case Study in Bangladesh
Performance Improvements of Machine Learning-Based Crime Pre...
收藏 引用
Computing and Machine Intelligence (ICMI), International Conference on
作者: SM Nuruzzaman Nobel S M Masfequier Rahman Swapno Md Babul Islam V. P. Meena Francesco Benedetto Dept. of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh Department of Computer Modeling Electronic and System Engineering UNICAL Rende Italy Department of EEE Amrita School of Engineering Bengaluru India Economics Dept SP4TE Laboratory University of ROMA TRE Via Silvio Italy
Crime observation examines information on criminal episodes to identify trends in their types, locations, and timing. Forecasting probable criminal activity in some places exploits previous data and data analysis to p... 详细信息
来源: 评论
Method for Evaluating the Performance of Aircraft Collaborative Decision-Making Based on Dynamic Bayesian Network
Method for Evaluating the Performance of Aircraft Collaborat...
收藏 引用
Electronics and Devices, Computational Science (ICEDCS), International Conference on
作者: Wenbo Zhang Boxiao Yu Jiahui Tong Jing Li National Key Laboratory of Complex System Control and Intelligent Agent Cooperation Beijing Electro-Mechanical Engineering Institute Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creat... 详细信息
来源: 评论
Streamflow Prediction in the Mekong River Basin Using Deep Neural Networks
收藏 引用
IEEE Access 2023年 11卷 97930-97943页
作者: Nguyen, Thi-Thu-Ha Vu, Duc-Quang Mai, Son T. Dang, Thanh Duc National Taiwan University Department of Bioenvironmental Systems Engineering Taipei10617 Taiwan National Central University Department of Computer Science and Information System Taoyuan320317 Taiwan Thai Nguyen University of Education Thai Nguyen250000 Viet Nam Queen's University Belfast School of Electronics Electrical Engineering and Computer Science BelfastBT7 1NN United Kingdom Institute for Computational Science and Artificial Intelligence Van Lang University Laboratory of Environmental Sciences and Climate Change Ho Chi Minh City70000 Viet Nam Van Lang University Faculty of Environment Ho Chi Minh City70000 Viet Nam
In recent years, the Mekong River Basin (MRB), one of the largest river basins in Southeast Asia, has experienced severe impacts from extreme droughts and floods. Streamflow forecasting has become crucial for effectiv... 详细信息
来源: 评论
Formal Verification of Interrupt Isolation for the TrustZone-based TEE
Formal Verification of Interrupt Isolation for the TrustZone...
收藏 引用
Asia-Pacific Conference on Software engineering
作者: Leping Zhang Qianying Zhang Xinyue Wang Ximeng Li Guohui Wang Zhiping Shi Yong Guan College of Information Engineering Capital Normal University Beijing China School of Computer Science and Engineering Beihang University Beijing China Beijing Engineering Research Center of High Reliable Embedded System Beijing China Beijing Key Laboratory of Electronic System Reliability Technology Beijing China
ARM TrustZone is a hardware security technology commonly used to implement the Trusted Execution Environment (TEE), which is a hardware-based isolated execution environment in which security-critical software can exec...
来源: 评论
Efficient Hybrid Multi-Population Genetic Algorithm for Multi-UAV Task Assignment in Consumer Electronics Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Bai, Xiaoshan Jiang, Haoyu Li, Chao Ullah, Inam Dabel, Maryam M. Al Bashir, Ali Kashif Wu, Zongze Sam, Shuzhi Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China Shenzhen University Shenzhen City Joint Laboratory of Autonomous Unmanned Systems and Intelligent Manipulation Shenzhen518060 China Tashkent State University of Economics Department of Artificial Intelligence Tashkent100066 Uzbekistan University of Hafr Al Batin Department of Computer Science and Engineering College of Computer Science and Engineering Saudi Arabia Manchester Metropolitan University Manchester United Kingdom Shenzhen518060 China National University of Singapore Department of Electrical and Computer Engineering Singapore117576 Singapore
In recent years, as people’s living standards have improved and consumption concepts have been transformed, the demand for purchasing consumer electronics online has continued to grow, further stimulating the develop... 详细信息
来源: 评论
Securing Mobile Robotic Networks Against Replacement Attack
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Li, Yushan He, Jianping Chen, Cailian Guan, Xinping Cai, Lin Shanghai Jiao Tong University Dept. of Automation China Ministry of Education of China The Key Laboratory of System Control and Information Processing China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai200240 China University of Victoria Dept. of Electrical and Computer Engineering BC Canada
The security of mobile robotic networks (MRNs) has been an active research topic in recent years. This paper aims to secure the ubiquitous formation control of MRNs against the replacement attack, where an external ro... 详细信息
来源: 评论
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on computer and Information Processing Technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论