咨询与建议

限定检索结果

文献类型

  • 1,664 篇 期刊文献
  • 963 篇 会议
  • 28 册 图书

馆藏范围

  • 2,655 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,614 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 805 篇 软件工程
    • 349 篇 信息与通信工程
    • 258 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 170 篇 光学工程
    • 162 篇 生物工程
    • 154 篇 控制科学与工程
    • 119 篇 生物医学工程(可授...
    • 87 篇 机械工程
    • 86 篇 仪器科学与技术
    • 74 篇 动力工程及工程热...
    • 70 篇 核科学与技术
    • 63 篇 化学工程与技术
    • 52 篇 航空宇航科学与技...
    • 51 篇 材料科学与工程(可...
    • 51 篇 交通运输工程
  • 1,328 篇 理学
    • 751 篇 物理学
    • 436 篇 数学
    • 185 篇 生物学
    • 130 篇 统计学(可授理学、...
    • 89 篇 化学
    • 87 篇 地球物理学
    • 81 篇 系统科学
  • 390 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 143 篇 工商管理
    • 138 篇 图书情报与档案管...
  • 135 篇 医学
    • 119 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 59 篇 药学(可授医学、理...
  • 44 篇 法学
  • 35 篇 经济学
  • 25 篇 教育学
  • 24 篇 农学
  • 9 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 55 篇 machine learning
  • 47 篇 deep learning
  • 47 篇 proton-proton in...
  • 45 篇 computer science
  • 45 篇 computational mo...
  • 44 篇 higgs bosons
  • 40 篇 hadron colliders
  • 37 篇 grid computing
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 32 篇 computer archite...
  • 31 篇 distributed comp...
  • 31 篇 training
  • 30 篇 laboratories
  • 30 篇 feature extracti...
  • 29 篇 collisions (nucl...
  • 29 篇 application soft...
  • 29 篇 nuclear counters
  • 28 篇 cloud computing
  • 27 篇 bandwidth

机构

  • 288 篇 department for p...
  • 287 篇 department of ph...
  • 286 篇 faculty of scien...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 270 篇 kirchhoff-instit...
  • 268 篇 institute of phy...
  • 266 篇 department of ph...
  • 264 篇 department of ph...
  • 261 篇 institute of phy...
  • 260 篇 faculté des scie...
  • 247 篇 fakultät für phy...
  • 243 篇 instituto de fís...
  • 240 篇 institut für ast...
  • 235 篇 yerevan physics ...
  • 233 篇 physics departme...
  • 221 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 214 篇 department of ph...

作者

  • 269 篇 c. alexa
  • 269 篇 j. m. izen
  • 269 篇 g. bella
  • 269 篇 j. strandberg
  • 269 篇 d. calvet
  • 269 篇 c. amelung
  • 269 篇 g. spigo
  • 268 篇 f. siegert
  • 268 篇 a. c. könig
  • 264 篇 m. klein
  • 263 篇 h. a. gordon
  • 262 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 258 篇 s. jin
  • 258 篇 g. gaudio
  • 258 篇 s. mohapatra
  • 257 篇 h. sakamoto
  • 257 篇 y. nagasaka
  • 250 篇 s. guindon
  • 247 篇 a. kaczmarska

语言

  • 2,491 篇 英文
  • 128 篇 其他
  • 34 篇 中文
  • 2 篇 德文
检索条件"机构=High-Performance Computing Laboratory Department of Computer Science and Information Engineering"
2655 条 记 录,以下是61-70 订阅
排序:
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
NUC-Net: Non-uniform Cylindrical Partition Network for Efficient LiDAR Semantic Segmentation
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Wang, Xuzhi Feng, Wei Kong, Lingdong Wan, Liang Tianjin Normal University College of Computer and Information Engineering Tianjin300380 China Tianjin Key Laboratory of Student Mental Health and Intelligence Assessment China Tianjin University College of Intelligence and Computing Tianjin300350 China National University of Singapore Department of Computer Science 117597 Singapore
LiDAR semantic segmentation plays a vital role in autonomous driving. Existing voxel-based methods for LiDAR semantic segmentation apply uniform partition to the 3D Li- DAR point cloud to form a structured representat... 详细信息
来源: 评论
From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning
arXiv
收藏 引用
arXiv 2025年
作者: Li, Ziang Zhang, Hongguang Wang, Juan Chen, Meihui Hu, Hongxin Yi, Wenzhe Xu, Xiaoyang Yang, Mengda Ma, Chenjun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Shanghai Innovation Institute China Ant Group China Department of Computer Science and Engineering University at Buffalo SUNY United States
Model Inversion Attacks (MIAs) aim to reconstruct private training data from models, leading to privacy leakage, particularly in facial recognition systems. Although many studies have enhanced the effectiveness of whi... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
FAMOS: robust privacy-preserving authentication on payment apps via federated multi-modal contrastive learning  24
FAMOS: robust privacy-preserving authentication on payment a...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Yifeng Cai Ziqi Zhang Jiaping Gui Bingyan Liu Xiaoke Zhao Ruoyu Li Zhe Li Ding Li Key Laboratory of High Confidence Software Technologies (PKU) Ministry of Education and School of Computer Science Peking University Department of Computer Science University of Illinois Urbana-Champaign School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University School of Computer Science Beijing University of Posts and Telecommunications Ant Group
The rise of mobile payment apps necessitates robust user authentication to ensure legitimate user access. Traditional methods, like passwords and biometrics, are vulnerable once a device is compromised. To overcome th...
来源: 评论
FundusGAN: A Hierarchical Feature-Aware Generative Framework for high-Fidelity Fundus Image Generation
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Qingshan Wang, Meng Cao, Peng Ke, Zou Liu, Xiaoli Fu, Huazhu Zaiane, Osmar R. Computer Science and Engineering Northeastern University Shenyang China Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University Shenyang China Alberta Machine Intelligence Institute University of Alberta Edmonton Canada Ophthalmology Yong Loo Lin School of Medicine National University of Singapore Singapore Institute of High Performance Computing Agency for Science Technology and Research Singapore
Recent advancements in ophthalmology foundation models such as RetFound have demonstrated remarkable diagnostic capabilities but require massive datasets for effective pre-training, creating significant barriers for d... 详细信息
来源: 评论
Staging of Different Tumor by Utilizing Laser Guidance (@405 nm) in CT Scan Images Along with Statistical Analysis
收藏 引用
Lasers in engineering 2025年 第4-6期59卷 309-325页
作者: Amjad, M. Ullah, H. Siddique, M.A. Majid, M.A. Aleem, A. Akhtar, M. Gilanie, G. Abdullah-Al-Wadud, M. Farhan, M. Akram, A. Batool, Z. Nazir, A. Biophotonics Imaging Techniques Laboratory Institute of Physics The Islamia University of Bahawalpur 63100 Pakistan Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur Bahawalpur Pakistan Dept. of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia School of Earth Sciences and Engineering Hohai University Nanjing China
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w... 详细信息
来源: 评论
An Imperceptible Adversarial Attack Against 3D Object Detectors in Autonomous Driving
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Yizhou Wu, Libing Jin, Jiong Wang, Enshu Zhang, Zhuangzhuang Zhao, Yu Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Swinburne University of Technology School of Engineering MelbourneVIC3122 Australia Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong
As LiDAR-based 3D object detection gains attention, existing research on point cloud adversarial attacks has exposed vulnerabilities in 3D neural network models, which can further impact the reliability of perception ... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论