咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,141 篇 期刊文献

馆藏范围

  • 3,181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,064 篇 工学
    • 1,124 篇 计算机科学与技术...
    • 980 篇 软件工程
    • 505 篇 控制科学与工程
    • 378 篇 信息与通信工程
    • 276 篇 生物工程
    • 272 篇 电气工程
    • 257 篇 机械工程
    • 237 篇 电子科学与技术(可...
    • 236 篇 生物医学工程(可授...
    • 210 篇 光学工程
    • 128 篇 化学工程与技术
    • 116 篇 仪器科学与技术
    • 91 篇 材料科学与工程(可...
    • 84 篇 交通运输工程
    • 73 篇 动力工程及工程热...
    • 55 篇 力学(可授工学、理...
    • 48 篇 航空宇航科学与技...
    • 46 篇 土木工程
  • 1,230 篇 理学
    • 679 篇 数学
    • 330 篇 物理学
    • 309 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 189 篇 系统科学
    • 122 篇 化学
  • 445 篇 管理学
    • 285 篇 管理科学与工程(可...
    • 165 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 161 篇 医学
    • 134 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 52 篇 法学
  • 38 篇 农学
  • 28 篇 教育学
  • 27 篇 经济学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 9 篇 文学
  • 2 篇 哲学

主题

  • 129 篇 feature extracti...
  • 83 篇 training
  • 70 篇 image segmentati...
  • 66 篇 semantics
  • 56 篇 computational mo...
  • 50 篇 accuracy
  • 47 篇 object detection
  • 45 篇 deep learning
  • 44 篇 optimization
  • 43 篇 convolution
  • 43 篇 robustness
  • 40 篇 machine learning
  • 38 篇 support vector m...
  • 37 篇 predictive model...
  • 36 篇 mathematical mod...
  • 35 篇 neural networks
  • 35 篇 image processing
  • 35 篇 clustering algor...
  • 33 篇 stability analys...
  • 30 篇 simulation

机构

  • 121 篇 fujian provincia...
  • 116 篇 department of au...
  • 116 篇 shanghai enginee...
  • 113 篇 key laboratory o...
  • 87 篇 school of artifi...
  • 69 篇 key laboratory o...
  • 60 篇 school of automa...
  • 57 篇 guangxi key labo...
  • 52 篇 fujian provincia...
  • 52 篇 key laboratory o...
  • 52 篇 shaanxi key labo...
  • 48 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 37 篇 shaanxi key labo...
  • 35 篇 key laboratory o...
  • 33 篇 shenzhen huazhon...
  • 31 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 71 篇 li zuoyong
  • 64 篇 sang nong
  • 64 篇 wu dongrui
  • 59 篇 zhang fuquan
  • 51 篇 zeng zhigang
  • 51 篇 gao changxin
  • 47 篇 jiao licheng
  • 45 篇 zhigang zeng
  • 44 篇 jian huang
  • 43 篇 yongji wang
  • 38 篇 huang jian
  • 37 篇 ding mingyue
  • 36 篇 pan linqiang
  • 34 篇 zuoyong li
  • 33 篇 wang yongji
  • 32 篇 licheng jiao
  • 32 篇 cao zhiguo
  • 32 篇 mingyue ding
  • 31 篇 wang hesheng
  • 30 篇 hai-tao zhang

语言

  • 2,829 篇 英文
  • 291 篇 其他
  • 76 篇 中文
检索条件"机构=Key Laboratory for Image Processing and Intelligent control"
3181 条 记 录,以下是1121-1130 订阅
排序:
controller Synthesis of Signal Temporal Logical Tasks for Cyber-Physical Production Systems via Acyclic Decomposition
Controller Synthesis of Signal Temporal Logical Tasks for Cy...
收藏 引用
IEEE Conference on Decision and control
作者: Shuling Wang Shanying Zhu Cailian Chen Liang Xu Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai China Institute of Artificial Intelligence Shanghai University Shanghai China
Modularization facilitates the adaptability of cyber-physical production systems (CPPSs) with a variety of collaborative tasks. Various production rules can be captured by signal temporal logic (STL) specifications im...
来源: 评论
Scene Classification Using Deep Networks Combined with Visual Attention
收藏 引用
Journal of Sensors 2022年 2022卷
作者: Shi, Jing Zhu, Hong Li, Yuxing Li, Yanghui Du, Sen School of Automation and Information Engineering Xi'An University of Technology Xi'an710048 China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'An University of Technology Xi'an710048 China
In view of the scene's complexity and diversity in scene classification, this paper makes full use of the contextual semantic relationships between the objects to describe the visual attention regions of the scene... 详细信息
来源: 评论
Fragility-Aware Stealthy Attack Strategy for Multi-Robot Systems against Multi-Hop Wireless Networks
Fragility-Aware Stealthy Attack Strategy for Multi-Robot Sys...
收藏 引用
IEEE Conference on Decision and control
作者: Yun Gao Kai Luo Chongrong Fang Jianping He Dept. of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China and Shanghai Engineering Research Center of Intelligent Control and Management Shanghai China
This paper proposes a fragility-aware stealthy attack for multiple mobile robots to secretly learn the accurate model of a multi-hop wireless network (MHWN). The stealthy attack scenario consists of three steps: activ... 详细信息
来源: 评论
Analysis and Design of Application-Layer Rateless Codes Based on Reliability and Latency Trade-Off
Analysis and Design of Application-Layer Rateless Codes Base...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Haobo Huang Yusun Fu Junpeng Yin Ningbo Artificial Intelligence Institute Shanghai Jiao Tong University Ningbo China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai Jiao Tong University Shanghai China
With the Internet of Things (IoT) playing an increasingly crucial role in connecting diverse devices, applications have different requirements for communication and various evaluation metrics have emerged, such as Age... 详细信息
来源: 评论
Channel Reflection: Knowledge-Driven Data Augmentation for Eeg-Based Bcis
SSRN
收藏 引用
SSRN 2024年
作者: Wang, Ziwei Li, Siyang Luo, Jingwei Liu, Jiajing Wu, Dongrui Key Laboratory of the Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China China Electronic System Technology Co. Ltd. Beijing100089 China School of Civil and Hydraulic Engineering Huazhong University of Science and Technology Wuhan430074 China
A brain-computer interface (BCI) enables direct communication between the human brain and external devices. Electroencephalography (EEG) based BCIs are currently the most popular for able-bodied users. To increase use... 详细信息
来源: 评论
Impact signal detection and recovery based on the novel potential well model
Impact signal detection and recovery based on the novel pote...
收藏 引用
第40届中国控制会议
作者: Shangbin Jiao Qing Zhang Shuang Lei Ding Xin Zhang Qing Wang Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi’an University of Technology
To further improve the output effect of the stochastic resonance system driven by the impact signal,this paper uses a novel potential well model as the nonlinear model of the *** the α stable noise environment,the de... 详细信息
来源: 评论
Context-aware Proposal Network for Temporal Action Detection
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Xiang Zhang, Huaxin Zhang, Shiwei Gao, Changxin Shao, Yuanjie Sang, Nong Laboratory of Image Processing Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology China Alibaba Group China School of Electronic Information and Communications Huazhong University of Science and Technology China
This technical report presents our first place winning solution for temporal action detection task in CVPR-2022 AcitivityNet Challenge. The task aims to localize temporal boundaries of action instances with specific c... 详细信息
来源: 评论
Named Entity Recognition Based on Anchor Span for Manufacturing Text Knowledge Extraction
SSRN
收藏 引用
SSRN 2024年
作者: Li, Yahui Sun, Qi Zhou, Chunjie Liu, Lu Tian, Yu-Chu School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China Key Laboratory of Image Processing and Intelligent Control Ministry of Education Huazhong University of Science and Technology Hubei Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China School of Computer Science Queensland University of Technology BrisbaneQLD4001 Australia
intelligent industrial manufacturing heavily relies on structured knowledge. Named Entity Recognition (NER), an essential technique for extracting structured knowledge from text, has garnered significant research inte... 详细信息
来源: 评论
A Survey of Machine Learning-based IoT Intrusion Detection Techniques  6
A Survey of Machine Learning-based IoT Intrusion Detection T...
收藏 引用
6th IEEE International Conference on Smart Cloud, SmartCloud 2021
作者: Long, Jing Fang, Fei Luo, Haibo College of Information Science and Engineering Hunan Normal University Changsha410081 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou350121 China
Research on data anomaly intrusion detection in the Internet of Things (IoT) environment is still insufficient, and there are still many practical problems that need to be solved urgently. At present, the deep integra... 详细信息
来源: 评论
Analysis and Design of Application-Layer Rateless Codes Based on Reliability and Latency Trade-Off
Analysis and Design of Application-Layer Rateless Codes Base...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Huang, Haobo Fu, Yusun Yin, Junpeng Ningbo Artificial Intelligence Institute Shanghai Jiao Tong University Ningbo China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Ministry of Education of China Key Laboratory of System Control and Information Processing Shanghai China Shanghai Jiao Tong University Shanghai Engineering Research Center of Intelligent Control and Management Shanghai China
With the Internet of Things (IoT) playing an increasingly crucial role in connecting diverse devices, applications have different requirements for communication and various evaluation metrics have emerged, such as Age... 详细信息
来源: 评论