咨询与建议

限定检索结果

文献类型

  • 872 篇 会议
  • 804 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,682 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,032 篇 工学
    • 572 篇 计算机科学与技术...
    • 452 篇 软件工程
    • 212 篇 信息与通信工程
    • 193 篇 电气工程
    • 174 篇 电子科学与技术(可...
    • 155 篇 控制科学与工程
    • 109 篇 光学工程
    • 103 篇 生物工程
    • 102 篇 机械工程
    • 71 篇 化学工程与技术
    • 69 篇 仪器科学与技术
    • 68 篇 生物医学工程(可授...
    • 66 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 45 篇 交通运输工程
    • 43 篇 土木工程
    • 40 篇 安全科学与工程
  • 590 篇 理学
    • 245 篇 数学
    • 171 篇 物理学
    • 131 篇 生物学
    • 74 篇 化学
    • 67 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 27 篇 大气科学
  • 242 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 60 篇 工商管理
  • 89 篇 医学
    • 72 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 33 篇 农学
  • 29 篇 法学
  • 23 篇 经济学
  • 4 篇 教育学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 35 篇 laboratories
  • 29 篇 deep learning
  • 28 篇 training
  • 25 篇 semantics
  • 23 篇 computer archite...
  • 23 篇 optimization
  • 23 篇 computational mo...
  • 21 篇 machine learning
  • 20 篇 computer science
  • 19 篇 scalability
  • 19 篇 data mining
  • 17 篇 reinforcement le...
  • 17 篇 costs
  • 17 篇 accuracy
  • 16 篇 neural networks
  • 16 篇 energy consumpti...
  • 16 篇 control systems
  • 16 篇 robustness
  • 15 篇 signal processin...

机构

  • 49 篇 school of comput...
  • 35 篇 shandong provinc...
  • 33 篇 school of cyber ...
  • 24 篇 national enginee...
  • 24 篇 hubei province k...
  • 24 篇 key laboratory o...
  • 23 篇 hubei key labora...
  • 21 篇 state key labora...
  • 20 篇 shandong fundame...
  • 19 篇 national mobile ...
  • 19 篇 services computi...
  • 19 篇 hubei engineerin...
  • 19 篇 cluster and grid...
  • 18 篇 university of ch...
  • 16 篇 hubei key labora...
  • 16 篇 college of compu...
  • 14 篇 school of softwa...
  • 14 篇 state key labora...
  • 14 篇 big data science...
  • 13 篇 department of co...

作者

  • 37 篇 jin hai
  • 29 篇 hai jin
  • 16 篇 hu shengshan
  • 13 篇 han zhu
  • 12 篇 zhang leo yu
  • 11 篇 soltanian-zadeh ...
  • 11 篇 zhou pan
  • 11 篇 fu chong
  • 11 篇 li minghui
  • 10 篇 zhuang songlin
  • 10 篇 dan feng
  • 10 篇 ai bo
  • 9 篇 zhou ziqi
  • 9 篇 feng dan
  • 9 篇 heping zeng
  • 8 篇 zou deqing
  • 8 篇 wan wei
  • 8 篇 liu yongshan
  • 8 篇 cheol-hoon lee
  • 8 篇 zhi zhang

语言

  • 1,560 篇 英文
  • 76 篇 其他
  • 48 篇 中文
检索条件"机构=Computer and System Research Laboratory"
1682 条 记 录,以下是1-10 订阅
排序:
Attribute-Based Access Control Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2227-2242页
作者: Wang, Xiuhua Yu, Mengyang Wang, Yaohui Pi, Yinjia Xu, Peng Wang, Shuai Jin, Hai Han, Min Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Wuhan430074 China State Key Laboratory of Cryptology Beijing100878 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The burgeoning complexity of communication necessitates a high demand for security. Access control encryption is a promising primitive to meet the security demand but the bulk of its constructions rely on formulating ... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Listen With Seeing: Cross-Modal Contrastive Learning for Audio-Visual Event Localization
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2650-2665页
作者: Sun, Chao Chen, Min Zhu, Chuanbo Zhang, Sheng Lu, Ping Chen, Jincai Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China School of Computer Science and Technology Wuhan430074 China South China University of Technology School of Computer Science and Engineering Guangzhou510640 China Pazhou Laboratory Guangzhou510640 China
In real-world physiological and psychological scenarios, there often exists a robust complementary correlation between audio and visual signals. Audio-Visual Event Localization (AVEL) aims to identify segments with Au... 详细信息
来源: 评论
Flexible, Super-stable, and Multifunctional Capacitive Pressure Sensors with Tilted Micropillar Array by Inclined Laser Ablation and Demolding
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 9367-9374页
作者: Xu, Tianlong Li, Kaixin Zhou, Yihao Zhang, Dawei Sheng, Bin College of Optical Electrical and Computer Engineering Unversity of Shanghai for Science and Technology Shanghai 200093 China. Shanghai Key Laboratory of Modern Optical Systems Engineering Research Center of Optical Instruments and System Shanghai 200093 China
Flexible capacitive pressure sensors have garnered considerable interest across diverse applications, including medical monitoring, electronic skin, and robotic tactile systems, owing to their straightforward fabricat... 详细信息
来源: 评论
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale Residual Channel Attention  21st
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale R...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yu, Xingye Li, Ye Zhang, Peng Lin, Lingxia Cai, Tianyu Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the development of modern communication technology, although wideband speech coding provides high-fidelity speech transmission, its high bandwidth requirement limits its application in resource-constrained environm... 详细信息
来源: 评论
3DGCformer: 3-Dimensional Graph Convolutional transformer for multi-step origin–destination matrix forecasting
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-18页
作者: Huang, Yiou Deng, Hao Zhao, Shengjie School of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Shanghai China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of Education Shanghai China
Forecasting Human mobility is of great significance in the simulation and control of infectious diseases like COVID-19. To get a clear picture of potential future outbreaks, it is necessary to forecast multi-step Ori... 详细信息
来源: 评论
SAM-COD+: SAM-Guided Unified Framework for Weakly-Supervised Camouflaged Object Detection
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年 第5期35卷 4635-4647页
作者: Chen, Huafeng Wei, Pengxu Guo, Guangqian Gao, Shan Northwestern Polytechnical University Unmanned System Research Institute Xi’an710072 China National Key Laboratory of Unmanned Aerial Vehicle Technology Xi’an710072 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Peng Cheng Laboratory Shenzhen518066 China
Most Camouflaged Object Detection (COD) methods heavily rely on mask annotations, which are time-consuming and labor-intensive to acquire. Existing weakly-supervised COD approaches exhibit significantly inferior perfo... 详细信息
来源: 评论
Behaviour-diverse automatic penetration testing:a coverage-based deep reinforcement learning approach
收藏 引用
Frontiers of computer Science 2025年 第3期19卷 15-24页
作者: Yizhou YANG Longde CHEN Sha LIU Lanning WANG Haohuan FU Xin LIU Zuoning CHEN Zhongguancun Laboratory Beijing 100081China Zhejiang Lab Hangzhou 311121China National Research Centre of Parallel Computer Engineering and Technology Wuxi 214000China Faculty of Geographical Science Beijing Normal UniversityBeijing 100875China Department of Earth System Science Tsinghua UniversityBeijing 100084China
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca... 详细信息
来源: 评论
Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data  18th
Defending Against Poisoning Attacks in Federated Prototype ...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Zhang, Jie Zhang, Hongliang Wang, Guijuan Dong, Anming Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China
Federated learning (FL) is an emerging distributed machine learning paradigm that enables participants to cooperatively train learning tasks without revealing the raw data. However, the distributed nature of FL makes ... 详细信息
来源: 评论
MiT-Unet: Mixed Transformer Unet for Transmission Line Segmentation in UAV Images
收藏 引用
IEEE Transactions on Power Delivery 2025年 第3期40卷 1279-1288页
作者: Wei, Ning Chen, Jianwei Sun, Shuifa The Hubei Key Laboratory of Intelligent Vision-Based Monitoring for Hydro electric Engineering College of Computer and Information Technology China Three Gorges University Yichang443002 China The Engineering Research Center of Mobile Health Management System Ministry of Education Hangzhou Normal University China
The segmentation of power lines in drone images is one of the challenging tasks in the field of computer vision. Although power lines share the same difficulties with tiny object segmentation, occupying only a very sm... 详细信息
来源: 评论