咨询与建议

限定检索结果

文献类型

  • 1,664 篇 期刊文献
  • 963 篇 会议
  • 28 册 图书

馆藏范围

  • 2,655 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,614 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 805 篇 软件工程
    • 349 篇 信息与通信工程
    • 258 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 170 篇 光学工程
    • 162 篇 生物工程
    • 154 篇 控制科学与工程
    • 119 篇 生物医学工程(可授...
    • 87 篇 机械工程
    • 86 篇 仪器科学与技术
    • 74 篇 动力工程及工程热...
    • 70 篇 核科学与技术
    • 63 篇 化学工程与技术
    • 52 篇 航空宇航科学与技...
    • 51 篇 材料科学与工程(可...
    • 51 篇 交通运输工程
  • 1,328 篇 理学
    • 751 篇 物理学
    • 436 篇 数学
    • 185 篇 生物学
    • 130 篇 统计学(可授理学、...
    • 89 篇 化学
    • 87 篇 地球物理学
    • 81 篇 系统科学
  • 390 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 143 篇 工商管理
    • 138 篇 图书情报与档案管...
  • 135 篇 医学
    • 119 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 59 篇 药学(可授医学、理...
  • 44 篇 法学
  • 35 篇 经济学
  • 25 篇 教育学
  • 24 篇 农学
  • 9 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 55 篇 machine learning
  • 47 篇 deep learning
  • 47 篇 proton-proton in...
  • 45 篇 computer science
  • 45 篇 computational mo...
  • 44 篇 higgs bosons
  • 40 篇 hadron colliders
  • 37 篇 grid computing
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 32 篇 computer archite...
  • 31 篇 distributed comp...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 feature extracti...
  • 29 篇 collisions (nucl...
  • 29 篇 application soft...
  • 29 篇 nuclear counters
  • 28 篇 cloud computing
  • 27 篇 bandwidth

机构

  • 288 篇 department for p...
  • 287 篇 department of ph...
  • 286 篇 faculty of scien...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 270 篇 kirchhoff-instit...
  • 268 篇 institute of phy...
  • 266 篇 department of ph...
  • 264 篇 department of ph...
  • 261 篇 institute of phy...
  • 260 篇 faculté des scie...
  • 247 篇 fakultät für phy...
  • 243 篇 instituto de fís...
  • 240 篇 institut für ast...
  • 235 篇 yerevan physics ...
  • 233 篇 physics departme...
  • 221 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 214 篇 department of ph...

作者

  • 269 篇 c. alexa
  • 269 篇 j. m. izen
  • 269 篇 g. bella
  • 269 篇 j. strandberg
  • 269 篇 d. calvet
  • 269 篇 c. amelung
  • 269 篇 g. spigo
  • 268 篇 f. siegert
  • 268 篇 a. c. könig
  • 264 篇 m. klein
  • 263 篇 h. a. gordon
  • 262 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 258 篇 s. jin
  • 258 篇 g. gaudio
  • 258 篇 s. mohapatra
  • 257 篇 h. sakamoto
  • 257 篇 y. nagasaka
  • 250 篇 s. guindon
  • 247 篇 a. kaczmarska

语言

  • 2,491 篇 英文
  • 128 篇 其他
  • 34 篇 中文
  • 2 篇 德文
检索条件"机构=High-Performance Computing Laboratory Department of Computer Science and Information Engineering"
2655 条 记 录,以下是21-30 订阅
排序:
New Composite Chaotic Map Applied to an Image Encryption Scheme in Cybersecurity Applications
收藏 引用
IEEE Access 2025年 13卷 70676-70690页
作者: Kouadra, Imane Bekkouche, Tewfik Ziet, Lahcene Mehidi, Imane Alshathri, Samah El-Shafai, Walid Ferhat Abbas University LEPCI Laboratory Department of Electronics Setif1900 Algeria University of Bordj Bou Arreridj ETA Laboratory Department of Electromechanics Bordj Bou Arreridj3400 Algeria Ferhat Abbas University Laboratory of Dosing Analysis and Characterization with High-Resolution Department of Physics Setif1900 Algeria Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Computer Science Department Riyadh11586 Saudi Arabia Menoufia University Faculty of Electronic Engineering Department of Electronics and Electrical Communications Engineering Menouf32952 Egypt
Chaotic systems have long played a crucial role in cryptographic applications due to their inherent unpredictability and sensitivity to initial conditions. Building on this foundation, this paper introduces an Improve... 详细信息
来源: 评论
Virtualizing Next-Generation Programmable Networks: Techniques, Use Cases, and Promising Future Directions
收藏 引用
IEEE Network 2025年 第3期39卷 148-155页
作者: Chen, Xiang Du, Hongyang Liu, Wenjing Liu, Hongyan Zhang, Jianshan Yang, Xu Zhang, Dong Wu, Chunming Liu, Xuan Niyato, Dusit Zhejiang University College of Computer Science and Technology Hangzhou310027 China The University of Hong Kong Department of Electrical and Electronic Engineering Pokfulam Hong Kong Zhejiang Media Group Hangzhou310005 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Data Science Fuzhou350108 China Fuzhou University College of Computer and Data Science Fuzhou350108 China Yangzhou University College of Information Engineering College of Artificial Intelligence Yangzhou225009 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore
For decades, network virtualization plays a crucial role in modern networks, e.g., 6G mobile networks: tenants construct arbitrary virtual networks on the same physical network. However, production networks are becomi... 详细信息
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
APP: Enabling Soft Real-Time Execution on Densely-Populated Hybrid Memory System  23
APP: Enabling Soft Real-Time Execution on Densely-Populated ...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Zheng-Wei Wu Yun-Chih Chen Yuan-Hao Chang Tei-Wei Kuo Department of Computer Science and Information Engineering National Taiwan University Institute of Information Science Academia Sinica Taiwan Department of Computer Science and Information Engineering National Taiwan University and Mohamed bin Zayed University of Artificial Intelligence Department of Computer Science and NTU High Performance and Scientific Computing Center National Taiwan University
Memory swapping was considered slow and evil, but swapping to Ultra Low-Latency storage like Optane has become a promising solution to save power and cost, helping densely-populated edge server to overcome its DRAM ca...
来源: 评论
Questionable Fairness in Federated Learning  8
Questionable Fairness in Federated Learning
收藏 引用
8th International Conference on Data science and Machine Learning Applications, CDMA 2025
作者: Alharbi, Raed Nguyen, Truc Yousefzadeh, Nooshin Aljohani, Ahmed National Renewable Energy Laboratory Computatioual Science Center GoldenCO United States University of Florida Computer and Information Science and Engineering Department GainesvilleFL United States College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia University of North Texas Computer Science and Engineering Denton United States
Federated learning (FL) has emerged as a powerful framework for training deep learning models across numerous distributed clients, where a central server distributes and aggregates model updates without accessing clie... 详细信息
来源: 评论
Network intrusion detection based on feature fusion of attack dimension
收藏 引用
Journal of Supercomputing 2025年 第6期81卷 1-33页
作者: Sun, Xiaolong Gu, Zhengyao Zhang, Hao Gu, Jason Liu, Yanhua Dong, Chen Ye, Junwei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou350116 China Department of Electrical and Computer Engineering Dalhousie University HalifaxNSB3J 1Z1 Canada
Network traffic anomaly detection involves the rapid identification of intrusions within a network through the detection, analysis, and classification of network traffic data. The variety of cyberattacks encompasses d... 详细信息
来源: 评论
CLIMS++: Cross Language Image Matching with Automatic Context Discovery for Weakly Supervised Semantic Segmentation
收藏 引用
International Journal of computer Vision 2025年 1-20页
作者: Xie, Jinheng Deng, Songhe Hou, Xianxu Luo, Zhaochuan Shen, Linlin Huang, Yawen Zheng, Yefeng Shou, Mike Zheng Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Computer Science Wenzhou-Kean University Wenzhou325060 China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Show Lab National University of Singapore Singapore639798 Singapore School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University Suzhou215400 China Jarvis Research Center Tencent YouTu Lab Shenzhen518703 China
While promising results have been achieved in weakly-supervised semantic segmentation (WSSS), limited supervision from image-level tags inevitably induces discriminative reliance and spurious relations between target ... 详细信息
来源: 评论
Federated Meta Continual Learning for Efficient and Autonomous Edge Inference  24th
Federated Meta Continual Learning for Efficient and Autono...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Bingze Ho, Stella Qu, Youyang Xu, Chenhao Luan, Tom H. Gao, Longxiang Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Department of Biomedical Engineering The University of Melbourne VIC Melbourne Australia School of Information Technology Deakin University VIC Geelong Australia School of Cyber Engineering Xidian University Xi’an China
With an increasing volume of data being collected and processed on edge, Federated Learning (FL) has become a dominant approach to train shared global models on distributed data held by diverse edge clients without ex... 详细信息
来源: 评论
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Peng, Xiong Liu, Feng Wang, Nannan Lan, Long Liu, Tongliang Cheung, Yiu-Ming Han, Bo Hong Kong Baptist University Department of Computer Science Hong Kong The University of Melbourne School of Computing and Information Systems Australia Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Shaanxi Xi'an710071 China National University of Defense Technology State Key Laboratory of High Performance Computing School of Computer Hunan Changsha410000 China The University of Sydney Sydney AI Centre School of Computer Science Faculty of Engineering Australia
By abusing access to a well-trained classifier, model inversion (MI) attacks pose a significant threat as they can recover the original training data, leading to privacy leakage. Previous studies mitigated MI attacks ... 详细信息
来源: 评论
A Vertical Federated Multiview Fuzzy Clustering Method for Incomplete Data
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年 第5期33卷 1510-1524页
作者: Li, Yan Hu, Xingchen Yu, Shengju Ding, Weiping Pedrycz, Witold Kiat, Yeo Chai Liu, Zhong National University of Defense Technology Laboratory for Big Data and Decision Changsha410073 China National University of Defense Technology School of Computer Changsha410073 China Nantong University School of Artificial Intelligence and Computer Science Nantong226019 China Gliwice44-100 Poland University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Nanyang Technological University College of Computing and Data Science 639798 Singapore
Multiview fuzzy clustering (MVFC) has gained widespread adoption owing to its inherent flexibility in handling ambiguous data. The proliferation of privatization devices has driven the emergence of new challenge in MV... 详细信息
来源: 评论