咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 4,366 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 8,806 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,813 篇 工学
    • 3,424 篇 计算机科学与技术...
    • 2,901 篇 软件工程
    • 1,241 篇 信息与通信工程
    • 846 篇 控制科学与工程
    • 790 篇 电气工程
    • 769 篇 电子科学与技术(可...
    • 615 篇 光学工程
    • 600 篇 生物工程
    • 591 篇 机械工程
    • 399 篇 生物医学工程(可授...
    • 389 篇 化学工程与技术
    • 373 篇 仪器科学与技术
    • 278 篇 材料科学与工程(可...
    • 227 篇 动力工程及工程热...
    • 205 篇 交通运输工程
    • 171 篇 安全科学与工程
    • 165 篇 土木工程
    • 158 篇 建筑学
  • 3,623 篇 理学
    • 1,606 篇 数学
    • 1,476 篇 物理学
    • 703 篇 生物学
    • 507 篇 统计学(可授理学、...
    • 415 篇 化学
    • 263 篇 系统科学
  • 1,318 篇 管理学
    • 748 篇 管理科学与工程(可...
    • 612 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 318 篇 医学
    • 265 篇 临床医学
    • 225 篇 基础医学(可授医学...
    • 155 篇 药学(可授医学、理...
  • 146 篇 法学
  • 110 篇 农学
  • 85 篇 经济学
  • 55 篇 教育学
  • 36 篇 军事学
  • 22 篇 艺术学
  • 19 篇 文学
  • 9 篇 哲学

主题

  • 284 篇 feature extracti...
  • 230 篇 semantics
  • 205 篇 training
  • 152 篇 deep learning
  • 140 篇 computational mo...
  • 118 篇 object detection
  • 116 篇 accuracy
  • 101 篇 visualization
  • 96 篇 data mining
  • 95 篇 optimization
  • 94 篇 convolution
  • 93 篇 face recognition
  • 91 篇 laboratories
  • 89 篇 neural networks
  • 89 篇 machine learning
  • 86 篇 predictive model...
  • 84 篇 reinforcement le...
  • 83 篇 image segmentati...
  • 83 篇 data models
  • 73 篇 computers

机构

  • 606 篇 university of ch...
  • 431 篇 key laboratory o...
  • 128 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 97 篇 yunnan observato...
  • 96 篇 state key labora...
  • 91 篇 department of ph...
  • 85 篇 faculty of infor...
  • 82 篇 key laboratory f...
  • 82 篇 peng cheng labor...
  • 78 篇 center for astro...
  • 76 篇 school of physic...
  • 73 篇 cas key laborato...
  • 73 篇 national astrono...
  • 66 篇 institute of art...
  • 66 篇 key laboratory o...
  • 62 篇 cas center for e...
  • 59 篇 institute for nu...
  • 53 篇 school of comput...

作者

  • 85 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 75 篇 li cheng
  • 71 篇 kuleshov d.
  • 70 篇 li xin
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 69 篇 chen m.j.
  • 69 篇 dai h.l.
  • 67 篇 liu yang
  • 66 篇 guo y.q.
  • 63 篇 min z.
  • 62 篇 liu b.
  • 62 篇 liu qun
  • 62 篇 shiguang shan
  • 60 篇 bao y.w.

语言

  • 7,424 篇 英文
  • 1,138 篇 其他
  • 272 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Intelligent Information Institute of Computing Technology"
8806 条 记 录,以下是541-550 订阅
排序:
High-adaption locomotion with stable robot body for planetary exploration robot carrying potential instruments on unstructured terrain
收藏 引用
Chinese Journal of Aeronautics 2021年 第5期34卷 652-665页
作者: Kang XU Shoukun WANG Junzheng WANG Xiuwen WANG Zhihua CHEN Jinge SI School of Automation Beijing Institute of Technology.Beijing 100081China Key Laboratory of Intelligent Control and Decision of Complex System Beijing Institute of TechnologyBeijing 100081China Key Laboratory Ministry of Industry and Information Technology Beijing Institute of TechnologyBeijing 100081China
There is a strong demand for Planetary Exploration Mobile robots(PEMRs)that have the capability of the traversability,stability,efficiency and high load while tackling the specialized tasks on planet *** this paper,an... 详细信息
来源: 评论
Functional signatures: new definition and constructions
收藏 引用
Science China(information Sciences) 2021年 第12期64卷 189-201页
作者: Qingwen GUO Qiong HUANG Sha MA Meiyan XIAO Guomin YANG Willy SUSILO College of Mathematics and Informatics South China Agricultural University Guangzhou Key Laboratory of Intelligent Agriculture South China Agricultural University School of Computing and Information Technology University of Wollongong
Functional signatures(FS) enable a master authority to delegate its signing privilege to an assistant. Concretely, the master authority uses its secret key skFto issue a signing key skffor a designated function f ∈ F... 详细信息
来源: 评论
A Cross-domain Radar Emitter Recognition Method with Few-shot Learning  4
A Cross-domain Radar Emitter Recognition Method with Few-sho...
收藏 引用
4th International Symposium on Computer Engineering and intelligent Communications, ISCEIC 2023
作者: Luo, Yixian Liu, Tianrui Li, Xueqiong Liu, Hengzhu Institute for Quantum Information State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China
In many realistic scenarios, it is necessary but challenging to acquire a large number of annotated radar emitter samples for training a recognition model. This study proposes a cross-domain radar emitter recognition ... 详细信息
来源: 评论
Study on energy band design of mid-wave infrared high-gain quantum cascade laser  11
Study on energy band design of mid-wave infrared high-gain q...
收藏 引用
11th International Symposium on Precision Mechanical Measurements
作者: Han, Y.Z. Dongliang, Zhang Lidan, Lu Lianqing, Zhu Key Laboratory of the Ministry of Education for Optoelectronic Measurement Technology and Instrument Beijing Information Science & Technology University Beijing100192 China Guangzhou Nansha Intelligent Photonic Sensing Research Institute Guangdong Province GuangZhou511462 China
Because of its superior performance, infrared lasers are frequently employed in medical detection, infrared imaging, gas detection, and space optical communication. This work proposes a new simple energy band structur... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Extracting High-order Connectivity of EEG-based Dynamic Functional Connectivity Networks for Diagnosis of Major Depressive Disorder  24
Extracting High-order Connectivity of EEG-based Dynamic Func...
收藏 引用
4th Asia-Pacific Artificial Intelligence and Big Data Forum, AIBDF 2024
作者: Zhao, Feng Fan, Wenxuan Han, Zhongwei Chen, Hongyu School of Computer Science and Technology Shandong Technology and Business University Shandong Yantai China Yantai Key Laboratory of Big Data Modeling and Intelligent Computing Shandong Yantai China Immersion Technology and Evaluation Shandong Engineering Research Center Shandong Yantai China Information Engineering College Yantai Institute of Technology Shandong Yantai China Shandong Technology and Business University Shandong Yantai China
Functional connectivity networks (FCNs), particularly those utilizing the phase lag index (PLI) method, have been instrumental in elucidating the pathological features of Major Depressive Disorder (MDD) by assessing t... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Variant quantifiers in L_(3)-valued first-order logic
收藏 引用
Frontiers of Computer Science 2021年 第5期15卷 151-159页
作者: Wei LI Yuefei SUI State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100083China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China
Traditional first-order logic has four definitions for quantifiers,which are defined by universal and existential *** L_(3)-valued(three-valued)first-order logic,there are eight kinds of definitions for quantifiers;an... 详细信息
来源: 评论
Application of Autonomous Control for Quadruped Robots Based on Deep Reinforcement Learning  6
Application of Autonomous Control for Quadruped Robots Based...
收藏 引用
6th International Conference on Communications, information System and Computer Engineering, CISCE 2024
作者: Qi, Yonghui Yu, Bo Xu, Sen Yang, Xin School of Computer Science and Technology Shenyang University of Chemical Technology Liaoning Key Laboratory of Intelligent Technology for Chemical Process Industry Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Shenyang China School of Computer Science and Technology Shenyang University of Chemical Technology Shenyang China
To endow the simulated quadruped robot with autonomous action control capabilities, this paper proposes the use of the PPO (Proximal Policy Optimization) algorithm, a deep reinforcement learning technique, to enable t... 详细信息
来源: 评论
Privacy-Preserving Large-Scale AI Models for intelligent Railway Transportation Systems:Hierarchical Poisoning Attacks and Defenses in Federated Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第11期141卷 1305-1325页
作者: Yongsheng Zhu Chong Liu Chunlei Chen Xiaoting Lyu Zheng Chen Bin Wang Fuqiang Hu Hanxi Li Jiao Dai Baigen Cai Wei Wang School of Automation and Intelligence Beijing Jiaotong UniversityBeijing100044China Institute of Computing Technologies China Academy of Railway Sciences Corporation LimitedBeijing100081China School of Computer Science and Technology Beijing Jiaotong UniversityBeijing100044China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China Institute of Infrastructure Inspection China Academy of Railway Sciences Corporation LimitedBeijing100081China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and CybersecurityHangzhou310053China
The development of intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system *** learning offers a promising... 详细信息
来源: 评论