咨询与建议

限定检索结果

文献类型

  • 3,011 篇 会议
  • 2,090 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,231 篇 工学
    • 2,021 篇 计算机科学与技术...
    • 1,565 篇 软件工程
    • 565 篇 信息与通信工程
    • 485 篇 控制科学与工程
    • 427 篇 电子科学与技术(可...
    • 396 篇 电气工程
    • 325 篇 机械工程
    • 282 篇 生物工程
    • 255 篇 光学工程
    • 198 篇 仪器科学与技术
    • 175 篇 化学工程与技术
    • 164 篇 生物医学工程(可授...
    • 154 篇 动力工程及工程热...
    • 125 篇 材料科学与工程(可...
    • 115 篇 交通运输工程
    • 107 篇 土木工程
    • 85 篇 建筑学
    • 82 篇 安全科学与工程
  • 1,732 篇 理学
    • 923 篇 数学
    • 456 篇 物理学
    • 327 篇 生物学
    • 257 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 172 篇 化学
  • 838 篇 管理学
    • 529 篇 管理科学与工程(可...
    • 329 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 143 篇 医学
    • 120 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 106 篇 法学
    • 83 篇 社会学
  • 59 篇 经济学
  • 53 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 137 篇 feature extracti...
  • 125 篇 computer archite...
  • 107 篇 computer science
  • 101 篇 computational mo...
  • 90 篇 semantics
  • 81 篇 training
  • 76 篇 optimization
  • 74 篇 accuracy
  • 71 篇 data mining
  • 70 篇 deep learning
  • 67 篇 bandwidth
  • 65 篇 hardware
  • 64 篇 protocols
  • 54 篇 clustering algor...
  • 54 篇 delay
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 183 篇 hubei province k...
  • 134 篇 school of comput...
  • 125 篇 department of co...
  • 117 篇 key laboratory o...
  • 115 篇 national enginee...
  • 103 篇 college of compu...
  • 99 篇 tianjin key labo...
  • 87 篇 key laboratory o...
  • 83 篇 college of compu...
  • 75 篇 department of co...
  • 72 篇 key laboratory o...
  • 67 篇 school of comput...
  • 61 篇 university of ch...
  • 60 篇 hubei province k...
  • 59 篇 key laboratory o...
  • 57 篇 college of infor...
  • 56 篇 shandong provinc...
  • 55 篇 school of softwa...
  • 50 篇 services computi...
  • 47 篇 key laboratory o...

作者

  • 107 篇 hai jin
  • 45 篇 xiaowei li
  • 40 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 32 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 25 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 changjun jiang
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 18 篇 wei hu

语言

  • 4,500 篇 英文
  • 387 篇 其他
  • 233 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5106 条 记 录,以下是221-230 订阅
排序:
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection  36
Multi-Scale Feature Extraction with Supervised Contrastive L...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Zhao, Yahui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
The capacity of Deep Learning to automatically learn features from source code has facilitated its extensive utilization in detecting software vulnerabilities. However, existing pre-trained models regard code snippets... 详细信息
来源: 评论
GNN-Assisted BiG-AMP: Joint Channel Estimation and Data Detection for Massive MIMO Receiver
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 4631-4646页
作者: Liu, Zishen Wu, Nan He, Dongxuan Yuan, Weijie Li, Yonghui Quek, Tony Q. S. School of Information and Electronics Beijing Institute of Technology Beijing100081 China School of System Design and Intelligent Manufacturing Shenzhen Key Laboratory of Robotics and Computer Vision Southern University of Science and Technology Shenzhen518055 China School of Electrical and Information Engineering The University of Sydney SydneyNSW2008 Australia Singapore University of Technology and Design 487372 Singapore Department of Electronic Engineering Kyung Hee University Yongin17104 Korea Republic of
In this paper, we develop a graph neural network (GNN)-assisted bilinear inference approach to enhance the receiver performance of the MIMO system through message passing-based joint channel estimation and data detect... 详细信息
来源: 评论
Optical Satellite Networks
Optical Satellite Networks
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: Chan, Vincent W.S. Massachusetts Institute of Technology Research Laboratory of Electronics Steve Schwarzman College of Computing Ai and Decision System Sector Department of Electrical Engineering and Computer Science United States
We will explore the architecture of optical satellite networks at 100G-1Tbps. The challenge is to architect the system and the network protocols with large bandwidth-delay products and the presence of atmospheric turb... 详细信息
来源: 评论
Autonomous Emergency Landing on 3D Terrains: Approaches for Monocular Vision-based UAVs  8
Autonomous Emergency Landing on 3D Terrains: Approaches for ...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Du, Weiming Lin, Junmou Du, Binqing Borhan, Uddin Md. Li, Jianqiang Chen, Jie College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
With the increasing use of unmanned aerial vehicles (UAVs) in a variety of applications, their safety has become a critical concern. UAVs face numerous emergencies during missions, in these situations, the UAVs need t... 详细信息
来源: 评论
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network  36
Vulnerability Detection Based on Pre-trained Code Language M...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Liao, Tingfeng Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro... 详细信息
来源: 评论
Port-controllable routing of orbital angular momentum modes using a rotatable diffractive neural network
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第6期68卷 154-163页
作者: Junmin Liu Jiafu Chen Qingji Zeng Zemin Liang Xinping Wu Xin Zhao Jiangnan Xiao Huapeng Ye Ze Dong Dianyuan Fan Shuqing Chen Institute of Microscale Optoelectronics Shenzhen UniversityShenzhen 518060China College of New Materials and New Energies Shenzhen Technology UniversityShenzhen 518118China Terahertz Technology Innovation Research Institute Shanghai Key Laboratory of Modern Optical SystemTerahertz Science Cooperative Innovation CenterSchool of Optical-Electrical Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghai 200093China Guangdong Provincial Key Laboratory of Optical Information Materials and Technology&Institute of Electronic Paper Displays South China Academy of Advanced OptoelectronicsSouth China Normal UniversityGuangzhou 510006China School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China
Orbital angular momentum(OAM)modes provide an additional orthogonal physical dimension,offering transformative potential for enhancing optical communication *** significant progress in mode multiplexing,the developmen... 详细信息
来源: 评论
Defect Screening on Nuclear Power Plant Concrete Structures: A Two-staged Method Based on Contrastive Representation Learning  8
Defect Screening on Nuclear Power Plant Concrete Structures:...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Huang, Wenlian Zhu, Guanming Huang, Qiang Chen, Zhuangzhuang Chen, Jie Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China
Intelligent defect detection methods are important for the surface of the containment of nuclear power plants and face many challenges in the field of computer vision. Due to the irregular shapes and large variation o... 详细信息
来源: 评论
Focused Feature Enhancement and Multi-scale Feature Fusion for Road Defect Detection
Focused Feature Enhancement and Multi-scale Feature Fusion f...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yanan Li Fayu Wang Hongtao Chen Xinge Li Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
Given the characteristics of road defect detection, such as the small proportion of defective targets in defective images, the large scale difference of different types of defects, and the complex background environme... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
收藏 引用
IEEE Transactions on computers 2025年 第7期74卷 2168-2182页
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论