咨询与建议

限定检索结果

文献类型

  • 926 篇 会议
  • 628 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,558 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,053 篇 工学
    • 710 篇 计算机科学与技术...
    • 610 篇 软件工程
    • 222 篇 信息与通信工程
    • 159 篇 控制科学与工程
    • 118 篇 生物工程
    • 109 篇 电气工程
    • 104 篇 机械工程
    • 75 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 71 篇 电子科学与技术(可...
    • 57 篇 化学工程与技术
    • 41 篇 安全科学与工程
    • 33 篇 动力工程及工程热...
    • 32 篇 土木工程
    • 32 篇 交通运输工程
    • 31 篇 仪器科学与技术
    • 29 篇 建筑学
    • 26 篇 材料科学与工程(可...
  • 541 篇 理学
    • 300 篇 数学
    • 123 篇 生物学
    • 115 篇 物理学
    • 84 篇 统计学(可授理学、...
    • 79 篇 系统科学
    • 56 篇 化学
  • 290 篇 管理学
    • 157 篇 管理科学与工程(可...
    • 148 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 46 篇 法学
    • 40 篇 社会学
  • 45 篇 医学
    • 39 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 25 篇 经济学
  • 17 篇 教育学
  • 12 篇 农学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 54 篇 training
  • 39 篇 semantics
  • 37 篇 feature extracti...
  • 32 篇 computational mo...
  • 28 篇 data mining
  • 27 篇 deep learning
  • 26 篇 neural networks
  • 26 篇 accuracy
  • 25 篇 convolution
  • 25 篇 laboratories
  • 21 篇 computer science
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 20 篇 data models
  • 20 篇 robustness
  • 19 篇 reinforcement le...
  • 18 篇 software enginee...
  • 18 篇 machine learning
  • 17 篇 image segmentati...
  • 16 篇 artificial intel...

机构

  • 70 篇 college of compu...
  • 55 篇 beijing key labo...
  • 54 篇 school of softwa...
  • 47 篇 school of electr...
  • 46 篇 state key labora...
  • 37 篇 beijing key labo...
  • 35 篇 key laboratory o...
  • 35 篇 guangdong key la...
  • 35 篇 national enginee...
  • 28 篇 guangdong provin...
  • 26 篇 school of comput...
  • 25 篇 school of inform...
  • 22 篇 shenzhen institu...
  • 22 篇 seventh research...
  • 21 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 15 篇 guangdong key la...
  • 15 篇 beijing key labo...
  • 15 篇 computer vision ...
  • 14 篇 beijing key labo...

作者

  • 78 篇 junping du
  • 52 篇 shen linlin
  • 51 篇 yingmin jia
  • 30 篇 fashan yu
  • 24 篇 du junping
  • 17 篇 huadong ma
  • 16 篇 jia yingmin
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 15 篇 xie weicheng
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 gao can
  • 13 篇 fei dai
  • 12 篇 liang liu
  • 12 篇 dai fei
  • 12 篇 wang jinbao
  • 12 篇 zhang qiang
  • 12 篇 yu fashan
  • 11 篇 deyuan meng

语言

  • 1,359 篇 英文
  • 168 篇 其他
  • 41 篇 中文
检索条件"机构=Intelligent Software and Software Engineering Laboratory Southwest University"
1558 条 记 录,以下是1-10 订阅
排序:
A Review of intelligent Configuration and Its Security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论
Reconfigurable intelligent Surface-Aided Covert Communications: A Multi-User Scenario
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第6期74卷 10052-10057页
作者: Hu, Xiaoyan Zhao, Pengze Xiao, Han Zheng, Tong-Xing Wang, Wenjie Yang, Kun Xi'an Jiaotong University School of Information and Communications Engineering Xi'an710049 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Suzhou215163 China University of Essex School of Computer Science and Electronic Engineering United Kingdom
This paper explores a multi-user covert communication scenario with the assistance of a reconfigurable intelligent surface (RIS). Except a covert user monitored by the warden, there are multiple public users existing ... 详细信息
来源: 评论
FIFAWC:a dataset with detailed annotation and rich semantics for group activity recognition
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 271-272页
作者: Duoxuan PEI Di HUANG Yunhong WANG State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Intelligent Recognition and Image Processing Lab. School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
1 *** Activity Recognition(GAR),which aims to identify activities performed collectively in videos,has gained significant attention *** conventional action recognition centered on single individuals,GAR explores the c... 详细信息
来源: 评论
Blockchain-Assisted Fine-Grained Deduplication and Integrity Auditing for Outsourced Large-Scale Data in Cloud Storage
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21662-21678页
作者: Liu, Bingyun Zhang, Xiaojun Yang, Xingchun Zhang, Yuan Xue, Jingting Zhou, Rang Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China Sichuan Police College Intelligent Policing Key Laboratory of SichuanProvince Luzhou646000 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Chengdu University of Technology School of Computer Science and Cyber Security Chengdu610059 China
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing. In ... 详细信息
来源: 评论
A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code  24
A Color Image Encryption Algorithm Based on Complementary Ma...
收藏 引用
8th International Conference on Machine Learning and Soft Computing, ICMLSC 2024
作者: Xie, Yanlu Zhou, Shihua Lv, Hui Wang, Bin Che, Chao Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China
Encryption is a valid means to safeguard the safety of images, and for color images, encryption should be performed considering the intrinsic correlation between R, G, and B components. In this paper, we propose an im... 详细信息
来源: 评论
Based on the Conformer End-to-End Chinese Speech Recognition Method  4
Based on the Conformer End-to-End Chinese Speech Recognition...
收藏 引用
4th International Conference on Electronic Information engineering and Computer Science, EIECS 2024
作者: Feng, Haiwen Shi, Yunxiao School of Software Engineering Shenyang University of Technology Shenyang Key Laboratory of Intelligent Manufacturing of High-end Industrial Equipment Liaoning Shenyang China School of Software Engineering Shenyang University of Technology ShenganpLiaoning China
Aiming at the problem that the acoustic input network of Conformer encoder is insufficient for Fbank speech feature extraction, an end-to-end speech recognition modeling method of DM-Conformer is proposed. Firstly, th... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Lightweight Anonymous Authentication Frameworks for Wireless Sensor Networks  3
Lightweight Anonymous Authentication Frameworks for Wireless...
收藏 引用
3rd International Conference on Computer Technologies, ICCTech 2024
作者: Fu, Qin Xiong, Ling He, Mingxing Yang, Xingchun Xihua University School of Computer and Software Engineering Chengdu China Intelligent Policing Key Laboratory of Sichuan Province Chengdu China
Due to the limited resources, authentication schemes for low-cost wireless sensors networks (WSNs) environment prefer to use lightweight cryptographic primitives, like symmetric key encryption/decryption or hash funct... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
A comparison on the effects of coal fines and sand fouling on the shear behaviors of railway ballast using large scale direct shear tests
收藏 引用
Journal of Traffic and Transportation engineering(English Edition) 2025年 第1期12卷 52-67页
作者: Xu Zhang Shunying Ji Yang Feng Yongjun Li Chunfa Zhao School of Civil and Transportation Engineering Guangdong University of TechnologyGuangzhou 510006China State Key Laboratory of Rail Transit Vehicle System Southwest jiaotong UniversityChengdu 610031China State Key Laboratory of Structural Analysis Optimization and CAE Software for Industrial EquipmentDalian University of TechnologyDalian 116024China
Railway ballast is easily contaminated by different fouling material and the fouled ballast always causes the deterioration of railway *** previous studies focused on the effect of a certain kind of fouling material o... 详细信息
来源: 评论