咨询与建议

限定检索结果

文献类型

  • 3,023 篇 会议
  • 2,109 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,137 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,264 篇 工学
    • 2,042 篇 计算机科学与技术...
    • 1,572 篇 软件工程
    • 575 篇 信息与通信工程
    • 495 篇 控制科学与工程
    • 443 篇 电子科学与技术(可...
    • 418 篇 电气工程
    • 328 篇 机械工程
    • 284 篇 生物工程
    • 257 篇 光学工程
    • 202 篇 仪器科学与技术
    • 176 篇 化学工程与技术
    • 167 篇 生物医学工程(可授...
    • 157 篇 动力工程及工程热...
    • 131 篇 材料科学与工程(可...
    • 117 篇 交通运输工程
    • 109 篇 土木工程
    • 87 篇 建筑学
    • 85 篇 安全科学与工程
  • 1,753 篇 理学
    • 929 篇 数学
    • 467 篇 物理学
    • 329 篇 生物学
    • 258 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 175 篇 化学
  • 843 篇 管理学
    • 532 篇 管理科学与工程(可...
    • 331 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 145 篇 医学
    • 121 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 107 篇 法学
    • 83 篇 社会学
  • 59 篇 经济学
  • 54 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 139 篇 feature extracti...
  • 125 篇 computer archite...
  • 107 篇 computer science
  • 102 篇 computational mo...
  • 90 篇 semantics
  • 81 篇 training
  • 77 篇 optimization
  • 75 篇 accuracy
  • 72 篇 deep learning
  • 72 篇 data mining
  • 67 篇 bandwidth
  • 65 篇 protocols
  • 65 篇 hardware
  • 54 篇 clustering algor...
  • 54 篇 delay
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 183 篇 hubei province k...
  • 135 篇 school of comput...
  • 126 篇 department of co...
  • 117 篇 key laboratory o...
  • 117 篇 national enginee...
  • 103 篇 college of compu...
  • 98 篇 tianjin key labo...
  • 87 篇 key laboratory o...
  • 85 篇 college of compu...
  • 74 篇 department of co...
  • 73 篇 key laboratory o...
  • 67 篇 school of comput...
  • 63 篇 university of ch...
  • 61 篇 hubei province k...
  • 60 篇 shandong provinc...
  • 59 篇 key laboratory o...
  • 57 篇 college of infor...
  • 54 篇 school of softwa...
  • 49 篇 services computi...
  • 48 篇 key laboratory o...

作者

  • 108 篇 hai jin
  • 45 篇 xiaowei li
  • 40 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 32 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 25 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 19 篇 changjun jiang
  • 19 篇 jiang changjun

语言

  • 4,373 篇 英文
  • 543 篇 其他
  • 235 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5137 条 记 录,以下是421-430 订阅
排序:
X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream Analytics
X-Stream: A Flexible, Adaptive Video Transformer for Privacy...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Dou Feng Lin Wang Shutong Chen Lingching Tung Fangming Liu National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Paderborn University Germany National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Guangxi University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Peng Cheng Laboratory China
Video stream analytics (VSA) systems fuel many exciting applications that facilitate people’s lives, but also raise critical concerns about exposing too much individuals’ privacy. To alleviate these concerns, variou... 详细信息
来源: 评论
Research on Causal Model Construction and Fault Diagnosis of Control systems  7th
Research on Causal Model Construction and Fault Diagnosis of...
收藏 引用
7th International Conference on Computing, Control and Industrial Engineering, CCIE 2023
作者: Zhu, Qun Chen, Zhi Liu, Jie Xu, Zhuoran Wen, Juan Yang, Jinghua Jian, Yifan School of Computer Science University of South China Hengyang421200 China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu610064 China School of Electrical Engineering University of South China Hengyang421200 China
Fault diagnosis of complex control systems is a difficult and hot topic of research at this stage. In order to explore the internal operation characteristics of complex control systems and fault propagation methods to... 详细信息
来源: 评论
A Single Image Derain Method Based on Residue Channel Decomposition in Edge Computing
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 1469-1482页
作者: Yong Cheng Zexuan Yang Wenjie Zhang Ling Yang Jun Wang Tingzhao Guan School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Automation Nanjing University of Information Science and TechnologyNanjing210044China School of Geographical Sciences Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China School of Applied Technology Nanjing University of Information Science and TechnologyNanjing210044China
The numerous photos captured by low-price Internet of Things(IoT)sensors are frequently affected by meteorological factors,especially *** causes varying sizes of white streaks on the image,destroying the image texture... 详细信息
来源: 评论
BDGSE: A Symbolic Execution Technique for High MC/DC  23
BDGSE: A Symbolic Execution Technique for High MC/DC
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023
作者: Cai, Huangli Zhang, Zhiyi Jian, Yifan Li, Dan Huang, Zhiqiu Nanjing University of Aeronautics and Astronautics Collage of Computer Science and Technology Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Nuclear Power Institute of China Science and Technology on Reactor System Design Technology Laboratory Chengdu China Nanjing University of Aeronautics and Astronautics Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing China
Modified Condition/Decision Coverage (MC/DC) is a test coverage standard with excellent fault detection capability, which is widely used in testing safety-critical software. Symbolic execution generates test cases aut... 详细信息
来源: 评论
PDEGAN: A Panoramic Style Transfer Based on Generative Adversarial Networks
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2112-2121页
作者: Wang, Qinghua Long, Xinling Huang, Jingwei Chen, Yang Yang, Lirong Zhang, Fuquan College of Computer and Big Data Minjiang University Fuzhou350108 China Fuzhou Technology Innovation Center of intelligent Manufacturing information System Minjiang University Fuzhou350108 China Fujian Province University Fuzhou350300 China College of Computer and Control Engineering Minjiang University Fuzhou350108 China College of Computer and Big Data Fuzhou University Fuzhou China School of Mechanical and Automotive Engineering Fujian University of Technology Fuzhou China College of foreign languages Dalian Jiaotong University Dalian116028 China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu610021 China
Panoramic image plays an extremely important role in the application of 3D, but in some special scenarios, the depth information is also needed as an auxiliary, but to obtain the panoramic depth information needs a hi... 详细信息
来源: 评论
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Learning  22
Depth-Aware Multi-Modal Fusion for Generalized Zero-Shot Lea...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Cao, Weipeng Yao, Xuyang Xu, Zhiwu Pan, Yinghui Sun, Yixuan Li, Dachuan Qiu, Bohua Wei, Muheng Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Stony Brook University New York United States Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China ZhenDui Industry Artificial Intelligence Co. Ltd Shenzhen China Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
Realizing Generalized Zero-Shot Learning (GZSL) based on large models is emerging as a prevailing trend. However, most existing methods merely regard large models as black boxes, solely leveraging the features output ... 详细信息
来源: 评论
Metric Learning with Distillation for Overcoming Catastrophic Forgetting  16th
Metric Learning with Distillation for Overcoming Catastrop...
收藏 引用
16th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2021
作者: Yu, Piaoyao He, Juanjuan Min, Qilang Zhu, Qi College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
In incremental learning, reducing catastrophic forgetting always adds additional weights to the classification layer when a new task comes. Moreover, it focuses on prediction accuracy, ignores mislabeling differences,... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Training Verification-Friendly Neural Networks via Neuron Behavior Consistency  39
Training Verification-Friendly Neural Networks via Neuron Be...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Zongxin Zhao, Zhe Song, Fu Sun, Jun Yang, Pengfei Huang, Xiaowei Zhang, Lijun Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China RealAI Beijing China Nanjing Institute of Software Technology Nanjing China Singapore Management University Singapore College of Computer and Information Science Software College Southwest University Chongqing China The University of Liverpool Liverpool United Kingdom
Formal verification provides critical security assurances for neural networks, yet its practical application suffers from the long verification time. This work introduces a novel method for training verification-frien...
来源: 评论