咨询与建议

限定检索结果

文献类型

  • 1,373 篇 会议
  • 950 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 2,334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,419 篇 工学
    • 727 篇 计算机科学与技术...
    • 620 篇 软件工程
    • 442 篇 控制科学与工程
    • 227 篇 电气工程
    • 215 篇 信息与通信工程
    • 189 篇 机械工程
    • 169 篇 电子科学与技术(可...
    • 111 篇 光学工程
    • 111 篇 生物工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 仪器科学与技术
    • 84 篇 交通运输工程
    • 76 篇 化学工程与技术
    • 73 篇 动力工程及工程热...
    • 51 篇 力学(可授工学、理...
    • 49 篇 材料科学与工程(可...
    • 48 篇 安全科学与工程
    • 44 篇 土木工程
    • 44 篇 航空宇航科学与技...
  • 801 篇 理学
    • 395 篇 数学
    • 256 篇 物理学
    • 159 篇 系统科学
    • 128 篇 生物学
    • 127 篇 统计学(可授理学、...
    • 69 篇 化学
  • 303 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 83 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 95 篇 医学
    • 78 篇 临床医学
    • 58 篇 基础医学(可授医学...
  • 30 篇 法学
  • 27 篇 经济学
  • 23 篇 教育学
  • 19 篇 农学
  • 5 篇 军事学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 62 篇 control systems
  • 55 篇 computational mo...
  • 46 篇 mathematical mod...
  • 44 篇 feature extracti...
  • 43 篇 robustness
  • 37 篇 neural networks
  • 36 篇 accuracy
  • 34 篇 training
  • 33 篇 optimization
  • 27 篇 mobile robots
  • 27 篇 machine learning
  • 26 篇 predictive model...
  • 26 篇 uncertainty
  • 26 篇 data models
  • 25 篇 heuristic algori...
  • 24 篇 reinforcement le...
  • 24 篇 algorithm design...
  • 24 篇 automatic contro...
  • 23 篇 trajectory
  • 23 篇 adaptive control

机构

  • 52 篇 school of comput...
  • 37 篇 school of contro...
  • 30 篇 school of contro...
  • 29 篇 college of artif...
  • 27 篇 school of artifi...
  • 20 篇 institute for pl...
  • 20 篇 cloud computing ...
  • 20 篇 beijing engineer...
  • 20 篇 institute of com...
  • 19 篇 department of co...
  • 19 篇 university of so...
  • 19 篇 college of elect...
  • 18 篇 department of as...
  • 18 篇 college of contr...
  • 18 篇 department of co...
  • 18 篇 beijing institut...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...

作者

  • 50 篇 gang xiong
  • 28 篇 xiong gang
  • 25 篇 zhen shen
  • 23 篇 stjepan bogdan
  • 20 篇 el-sayed m.el-ke...
  • 20 篇 xiwang dong
  • 19 篇 shukai duan
  • 19 篇 lidan wang
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 xisong dong
  • 18 篇 zhang ren
  • 18 篇 wei xing zheng
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon

语言

  • 2,210 篇 英文
  • 101 篇 其他
  • 28 篇 中文
检索条件"机构=Control and Computing Engineering"
2334 条 记 录,以下是881-890 订阅
排序:
Towards Integrated Traffic control with Operating Decentralized Autonomous Organization
Towards Integrated Traffic Control with Operating Decentrali...
收藏 引用
International Conference on Intelligent Transportation
作者: Shengyue Yao Jingru Yu Yi Yu Jia Xu Xingyuan Dai Honghai Li Fei-Yue Wang Yilun Lin Urban Computing Shanghai AI Lab Shanghai China The State Key Laboratory for Management and Control of Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China Research and Development Center of Transport Industry of Autonomous Driving Technology RIOH High and Technology Group Institute of Automation Chinese Academy of Sciences Beijing China Macau Institute of Systems Engineering Macau University of Science and Technology Macau China
With a growing complexity of the intelligent traffic system (ITS), an integrated control of ITS that is capable of considering plentiful heterogeneous intelligent agents is desired. However, existing control methods b...
来源: 评论
Byzantine-robust federated learning considering distributed Non-IID data in privacy-sensitive scenarios
收藏 引用
Information Fusion 2025年 124卷
作者: Zongpu Wei Jinsong Wang Zening Zhao Zhao Zhao School of Computer Science and Engineering Tianjin University of technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300384 China National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin 300457 China
For federated learning (FL), its decentralized training approach is vulnerable to the targeted or untargeted attacks from Byzantine clients, which results in decreased model accuracy. In privacy-sensitive scenarios, t... 详细信息
来源: 评论
ANN Based Sensor and Actuator Fault Detection in Nuclear Reactors  8
ANN Based Sensor and Actuator Fault Detection in Nuclear Rea...
收藏 引用
8th International Conference on control, Mechatronics and Automation, ICCMA 2020
作者: Banerjee, Shohan Deng, Jiamei Gorse, Chris Vajpayee, Vineet Becerra, Victor Shimjith, S.R. Engineering and Computing Leeds Beckett University School of Built Environment Leeds United Kingdom University of Portsmouth School of Energy and Electronic Engineering Portsmouth United Kingdom Bhabha Atomic Research Centre and Homi Bhabha National Institute Reactor Control System Design Section Mumbai India
In the nuclear power plants (NPPs), fault detection and diagnosis (FDD) methods are very important to improve the safety and reliability of plants. Researchers have established various FDD methods such as model-based ... 详细信息
来源: 评论
Graph-Neural-Network-Based Transaction Link Prediction Method for Public Blockchain in Heterogeneous Information Networks
收藏 引用
Blockchain: Research and Applications 2025年
作者: Zening Zhao Jinsong Wang Jiajia Wei School of Computer Science and Engineering Tianjin University of Technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300384 China National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin 300457 China
Public blockchain has outstanding performance in transaction privacy protection because of its anonymity. The data openness brings feasibility to transaction behavior analysis. At present, the transaction data of the ... 详细信息
来源: 评论
An Efficient Bitcoin Network Topology Discovery Algorithm for Dynamic Display
收藏 引用
Blockchain: Research and Applications 2025年
作者: Zening Zhao Jinsong Wang Miao Yang Haitao Wang School of Computer Science and Engineering Tianjin University of Technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin 300384 China National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin 300457 China
The Bitcoin network comprises numerous nodes, necessitating users to invest significant network requests and time in comprehending its network topology. In this paper, we propose a Bitcoin network topology discovery a... 详细信息
来源: 评论
TGAC: traffic graph adaptive convolutional neural network-based decentralized application encrypted traffic classification
收藏 引用
Journal of Supercomputing 2025年 第8期81卷
作者: Ren, Chunni Wang, Jinsong Zhao, Zening School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin300384 China National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin300457 China
The rise of blockchain technology has accelerated the development of decentralized applications (DApps), bringing user and network security threats. Efficient decentralized application (DApp) identification is essenti... 详细信息
来源: 评论
Collaborative Scheduling of computing Tasks for Edge computing
Collaborative Scheduling of Computing Tasks for Edge Computi...
收藏 引用
2021 China Automation Congress, CAC 2021
作者: Liu, Yue Xiong, Gang Zhu, Fenghua Chen, Shichao Zhang, Liguo Liu, Xudong School of Artificial Intelligence and Automation Beijing University of Technology The State Key Laboratory for Management and Control of Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China Beijing Engineering Research Center of Intelligent Systems and Technology Institute of Automation The Cloud Computing Center Chinese Academy of Sciences Beijing China The State Key Laboratory for Management and Control of Complex Systems Institute of Automation Qingdao Academy of Intelligent Industries Chinese Academy of Sciences Beijing China Faculty of Information and Technology Beijing University of Technology Beijing China
In the face of the rapid development of the IoT, the traditional cloud computing, while providing services for mobile intelligent devices, also brings problems such as network bandwidth occupation and communication de... 详细信息
来源: 评论
Calibration of agent-based model using reinforcement learning  1
Calibration of agent-based model using reinforcement learnin...
收藏 引用
1st IEEE International Conference on Digital Twins and Parallel Intelligence, DTPI 2021
作者: Song, Bing Xiong, Gang Yu, Songmin Ye, Peijun Dong, Xisong Lv, Yisheng Institute of Automation Chinese Academy of Sciences The State Key Laboratory for Management and Control of Complex Systems Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing China The Guangdong Engineering Research Center of 3D Printing and Intelligent Manufacturing The Cloud Computing Center Chinese Academy of Sciences Beijing China Fraunhofer Institute for Systems and Innovation Research Breslauer Germany
In the research and application of Agent-Based Models (ABM), parameter calibration is an important content. Based on the existing state transfer equations that link the micro-parameters and macro-states of the multi-a... 详细信息
来源: 评论
When measurements fail: using an interactive SLAM solution to fight bad odometry
When measurements fail: using an interactive SLAM solution t...
收藏 引用
IEEE Instrumentation and Measurement Technology Conference
作者: Robert Milijaš Juraj Oršulić Stjepan Bogdan Laboratory for Robotics and Intelligent Control Systems Faculty of Electrical Engineering and Computing University of Zagreb Zagreb Croatia
In this paper we use the underlying pose graph structure of graph SLAM to allow the user to inspect and intervene into the Simultaneous Localization and Mapping (SLAM) process. With post-processing the map by insertin... 详细信息
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5577-5587页
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论