咨询与建议

限定检索结果

文献类型

  • 1,330 篇 会议
  • 907 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,252 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,418 篇 工学
    • 879 篇 计算机科学与技术...
    • 682 篇 软件工程
    • 335 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 157 篇 电气工程
    • 135 篇 机械工程
    • 111 篇 生物工程
    • 110 篇 光学工程
    • 100 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 59 篇 动力工程及工程热...
    • 58 篇 材料科学与工程(可...
    • 58 篇 化学工程与技术
    • 58 篇 交通运输工程
    • 50 篇 建筑学
    • 50 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 754 篇 理学
    • 354 篇 数学
    • 227 篇 物理学
    • 127 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 66 篇 化学
  • 355 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 136 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 104 篇 医学
    • 87 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 40 篇 经济学
  • 27 篇 教育学
  • 27 篇 农学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 54 篇 deep learning
  • 42 篇 computational mo...
  • 42 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 33 篇 accuracy
  • 32 篇 training
  • 31 篇 data mining
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 26 篇 convolutional ne...
  • 25 篇 hardware
  • 24 篇 internet of thin...
  • 24 篇 predictive model...
  • 23 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 robbi rahim
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe
  • 8 篇 li jiangmeng

语言

  • 2,113 篇 英文
  • 80 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2252 条 记 录,以下是71-80 订阅
排序:
Fine-Grained Access Control with Privacy-Preserving Data Retrieval for Cloud-Assisted IoV
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Li, Wenchao Xia, Chunhe Yang, Simiao Wang, Kangming Huang, Guotao Huang, Luqi Guo, Fuchun Susilo, Willy Wang, Tianbo Beihang University School of Cyber Science and Technology Beijing100191 China University of Wollongong School of Computing and Information Technology Institute of Cybersecurity and Cryptology WollongongNSW2522 Australia Beihang University Beijing Key Laboratory of Network Technology Beijing100191 China Guangxi Normal University Guangxi Collab. Innovation Center of Multi-source Information Integration and Intelligent Processing Guilin541004 China Beihang University Sino-French Engineer School Beijing100191 China Beihang University Computer Science and Engineering School Beijing100191 China
In addition to the autonomous driving technology of single vehicles, the inter-group control algorithm serving the data sharing of multi-vehicle cooperative driving has also attracted widespread attention. To ensure s... 详细信息
来源: 评论
Can A Society of Generative Agents Simulate Human Behavior and Inform Public Health Policy? A Case Study on Vaccine Hesitancy
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Abe Bohan Du, Hongru Wang, Yichen Zhang, Jingyu Wang, Zixiao Liang, Paul Pu Khashabi, Daniel Gardner, Lauren He, Tianxing Department of Computer Science Johns Hopkins University United States Department of Civil & System Engineering Johns Hopkins University United States Department of Computer Science University of Chicago United States Department of Epidemiology Harvard University United States Media Lab and EECS Massachusetts Institute of Technology United States Institute of Interdisciplinary Information Sciences Tsinghua University China Shanghai Qi Zhi Institute China
Can we simulate a sandbox society with generative agents to model human behavior, thereby reducing the over-reliance on real human trials for assessing public policies? In this work, we investigate the feasibility of ... 详细信息
来源: 评论
Merging Clinical Knowledge into Large Language Models for Medical Research and Applications: A Survey
arXiv
收藏 引用
arXiv 2025年
作者: Li, Qiyuan Liu, Haijiang Guo, Caicai Chen, Deyu Wang, Meng Gao, Feng Gu, Jinguang College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China The Key Laboratory of Rich-Media Knowledge Organization Service of Digital Publishing Content Institute of Scientific and Technical Information of China Beijing100038 China School of Computer Science and Technology Huazhong University of Science and Technology Hubei Wuhan430074 China School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
Clinical knowledge is the collection of information learned from studies on the causes, prognosis, diagnosis, and treatment of diseases. This type of knowledge can improve curing performances, and promote physical hea... 详细信息
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
IOT based wearable sensor system architecture for classifying human activity
收藏 引用
Measurement: Sensors 2025年 39卷
作者: Mahalakshmi, V. Kumar, Pramod Bhende, Manisha Keshta, Ismail Rathod, Swatiben Yashvantbhai Ramesh, Janjhyam Venkata Naga Department of Computer Science College of Engineering and computer science Jazan University Jazan45142 Saudi Arabia Computer science and Technology Ganga Institute of Technology and Management Kablana Haryana Jhajjar124104 India Dr. D. Y. Patil Vidyapeeth Pune India Dr. D. Y. Patil School of Science & Technology Tathawade Pune India Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia Instrumentation And Control Department Vishwakrma Government Engineer College Chandkheda Ahmedabad382424 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur Dist. Andhra Pradesh 522302 India
Human Activity Recognition (HAR) has applications in diverse fields, including sports management and behavior classification. Existing HAR methods can be categorized into three main approaches: camera-based, wearable ... 详细信息
来源: 评论
Performance Analysis of Joint NOMA and JT-CoMP Based on Stienen Model
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Chen, Yunpei Haenggi, Martin Zhu, Qi Guo, Caili Yuan, Yifei Hu, Zhuhua Li, Xiaohui Hainan Tropical Ocean University School of Marine Information Engineering Yazhou Bay Innovation Institute Sanya572022 China Nanjing University of Posts and Telecommunications School of Communication and Information Engineering Nanjing210003 China China Information Consulting and Designing Institute Company Ltd Chief Engineer's Office Nanjing210000 China University of Notre Dame Department of Electrical Engineering Notre DameIN46556 United States Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Wireless Communications Nanjing210003 China Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing100876 China China Mobile Research Institute Future Mobile Technology Lab Beijing100053 China Hainan University School of Information and Communication Engineering Haikou570228 China
For fifth-generation wireless networks to transition to sixth-generation wireless networks, the integration of coordinated multipoint (CoMP) and non-orthogonal multiple access (NOMA) techniques is expected to overcome... 详细信息
来源: 评论
QiMINT: Quantum-Inspired Mobile Intelligence - Advancing Complex Signal Processing with Machine Learning
QiMINT: Quantum-Inspired Mobile Intelligence - Advancing Com...
收藏 引用
International Conference on Trends in Electronics and Informatics (ICEI)
作者: Vinothkumar Kolluru E. Helen Parimala Kokilavani T Sunil Raj Y Bastin Jesuraj Afrig Aminuddin Department of Data Science Stevens Institute of Technology NJ USA Department of Computer Science Gitam Deemed to be University Bangalore India Department of Computer Science School of Sciences Christ (Deemed) University Bangalore India Department of Data Science St. Xavier's College (Autonomous) Palayamkottai India Department of Computer Science Mother Theresa Arts and Science College Theni Tamilnadu India Department of Information System Faculty of Computer Science Universitas Amikom Yogyakarta Sleman Indonesia
Integrating mobile intelligence with quantum-inspired machine learning (QiML) opens space for challenging mobile signal processing tasks. By utilizing superposition and entanglement, quantum computing principles, QiML... 详细信息
来源: 评论
Examining the Fourier Spectrum of Speech Signal from a Time-Frequency Perspective for Automatic Depression Level Prediction
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Niu, Mingyue Tao, Jianhua He, Yongjun Zhang, Shiqing Li, Ming YanShan University School of Information Science and Engineering Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China Tsinghua University Department of Automation Bejing100190 China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing100049 China Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Taizhou University Institute of Intelligent Information Processing Taizhou318000 China Zhejiang Normal University Zhejiang Key Laboratory of Intelligent Education Technology and Application Jinhua321004 China Zhejiang Institute of Optoelectronics Jinhua321004 China
Currently, many studies use Fourier amplitude spectra of speech signals to predict depression levels. However, those works often treat Fourier amplitude spectra as images or sequences to capture depression cues using ... 详细信息
来源: 评论
FoggyFuse: Infrared and visible image fusion method based on saturation line prior in foggy conditions
收藏 引用
Optics and Laser technology 2025年 190卷
作者: Wu, Shengkun Li, Hao Deng, Lei Yu, Heng Chen, Hanrui Chen, Zhixiang Dong, Mingli Zhu, Lianqing Key Laboratory of the Ministry of Education for Optoelectronic Measurement Technology and Instrument Beijing Information Science & Technology University Beijing100192 China Beijing Laboratory of Optical Fiber Sensing and System Beijing Information Science & Technology University Beijing100016 China Guangzhou Nansha Intelligent Photonic Sensing Research Institute Guangdong Province Guangzhou511462 China Department of Computer Science The University of Sheffield South Yorkshire SheffieldS1 4DP United Kingdom Robotics Institute Carnegie Mellon University Pittsburgh15213 United States
Infrared and visible image fusion is widely used to enhance image details and information. However, in foggy environments or military smoke bomb scenarios, the scattering and absorption of light significantly degrade ... 详细信息
来源: 评论