咨询与建议

限定检索结果

文献类型

  • 3,495 篇 期刊文献
  • 2,339 篇 会议

馆藏范围

  • 5,834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,658 篇 工学
    • 2,389 篇 计算机科学与技术...
    • 1,977 篇 软件工程
    • 857 篇 信息与通信工程
    • 469 篇 生物工程
    • 459 篇 电气工程
    • 364 篇 控制科学与工程
    • 352 篇 电子科学与技术(可...
    • 278 篇 光学工程
    • 266 篇 生物医学工程(可授...
    • 220 篇 机械工程
    • 199 篇 化学工程与技术
    • 186 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 132 篇 核科学与技术
    • 128 篇 力学(可授工学、理...
    • 122 篇 交通运输工程
    • 114 篇 网络空间安全
  • 2,811 篇 理学
    • 1,452 篇 物理学
    • 1,031 篇 数学
    • 546 篇 生物学
    • 393 篇 统计学(可授理学、...
    • 250 篇 化学
    • 152 篇 地球物理学
    • 139 篇 系统科学
  • 855 篇 管理学
    • 476 篇 管理科学与工程(可...
    • 423 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 234 篇 医学
    • 204 篇 临床医学
    • 169 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 127 篇 法学
  • 63 篇 经济学
  • 59 篇 农学
  • 27 篇 教育学
  • 19 篇 文学
  • 13 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 227 篇 bosons
  • 167 篇 feature extracti...
  • 153 篇 hadron colliders
  • 139 篇 semantics
  • 127 篇 training
  • 123 篇 deep learning
  • 111 篇 computational mo...
  • 107 篇 data models
  • 96 篇 accuracy
  • 72 篇 neural networks
  • 72 篇 machine learning
  • 69 篇 convolution
  • 66 篇 predictive model...
  • 64 篇 photons
  • 63 篇 federated learni...
  • 60 篇 generative adver...
  • 59 篇 data mining
  • 56 篇 deep neural netw...
  • 54 篇 robustness
  • 50 篇 optimization

机构

  • 890 篇 yerevan physics ...
  • 869 篇 centro brasileir...
  • 845 篇 university of de...
  • 843 篇 charles universi...
  • 839 篇 department of ph...
  • 816 篇 institute rudjer...
  • 810 篇 university of so...
  • 798 篇 helsinki institu...
  • 784 篇 rwth aachen univ...
  • 780 篇 university of cy...
  • 779 篇 academy of scien...
  • 772 篇 institute of hig...
  • 762 篇 university of sp...
  • 759 篇 indian institute...
  • 748 篇 national and kap...
  • 744 篇 ghent university...
  • 737 篇 infn sezione di ...
  • 737 篇 vrije universite...
  • 736 篇 panjab universit...
  • 735 篇 deutsches elektr...

作者

  • 577 篇 lowette s.
  • 576 篇 waltenberger w.
  • 522 篇 tavernier s.
  • 500 篇 lemaitre v.
  • 496 篇 adam w.
  • 493 篇 skovpen k.
  • 493 篇 schieck j.
  • 492 篇 sznajder a.
  • 491 篇 tytgat m.
  • 485 篇 vannerom d.
  • 485 篇 tumasyan a.
  • 476 篇 alves g.a.
  • 466 篇 delaere c.
  • 465 篇 jeitler m.
  • 460 篇 giammanco a.
  • 459 篇 van mechelen p.
  • 454 篇 moraes a.
  • 445 篇 carvalho w.
  • 440 篇 delcourt m.
  • 437 篇 wulz c.-e.

语言

  • 5,427 篇 英文
  • 313 篇 其他
  • 106 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
5834 条 记 录,以下是41-50 订阅
排序:
Textual data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1539-1556页
作者: Weihao Song Zidong Wang Zhongkui Li Jianan Wang Qing-Long Han IEEE the State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering ScienceCollege of Engineering Peking University the Department of Computer Science Brunel University London the School of Aerospace Engineering Beijing Institute of Technology the School of Science Computing and Engineering Technologies Swinburne University of Technology
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i... 详细信息
来源: 评论
Lay CO:Achieving Least Lossy Accuracy for Most Efficient RRAM-Based Deep Neural network Accelerator via Layer-Centric Co-Optimization
收藏 引用
计算机科学技术学报(英文版) 2023年 第2期38卷 328-347页
作者: Shao-Feng Zhao Fang Wang Bo Liu Dan Feng Yang Liu Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cloud Computing and Big Data Institute Henan University of Economics and LawZhengzhou 450001China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Research Institute of Huazhong University of Science and Technology in Shenzhen Shenzhen 518057China School of Computer and Artificial Intelligence Zhengzhou UniversityZhengzhou 450001China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cloud Computing and Big Data Institute Henan University of Economics and LawZhengzhou 450001China
Resistive random access memory(RRAM)enables the functionality of operating massively parallel dot prod-ucts and ***-based accelerator is such an effective approach to bridging the gap between Internet of Things device... 详细信息
来源: 评论
ControlVideo: conditional control for one-shot text-driven video editing and beyond
收藏 引用
science China(Information sciences) 2025年 第3期68卷 150-162页
作者: Min ZHAO Rongzhen WANG Fan BAO Chongxuan LI Jun ZHU Department of Computer Science and Technology Institute for AI Tsinghua-Bosch Joint ML CenterTsinghua Laboratory of Brain and Intelligence Lab Tsinghua University ShengShu Technology Gaoling School of Artificial Intelligence Renmin University of China Beijing Key Laboratory of Big Data Management and Analysis Methods Pazhou Laboratory (Huangpu)
This paper presents ControlVideo for text-driven video editing — generating a video that aligns with a given text while preserving the structure of the source video. Building on a pre-trained text-to-image diffusion ... 详细信息
来源: 评论
DSAFF-Net:A Backbone network Based on Mask R-CNN for Small Object Detection
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3405-3419页
作者: Jian Peng Yifang Zhao Dengyong Zhang Feng Li Arun Kumar Sangaiah Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computing Science and Engineering Vellore Institute of Technology(VIT)Vellore632014India
Recently,object detection based on convolutional neural networks(CNNs)has developed *** backbone networks for basic feature extraction are an important component of the whole detection ***,we present a new feature ext... 详细信息
来源: 评论
Application of meta-learning in cyberspace security:a survey
收藏 引用
Digital Communications and networks 2023年 第1期9卷 67-78页
作者: Aimin Yang Chaomeng Lu Jie Li Xiangdong Huang Tianhao Ji Xichang Li Yichao Sheng Hebei Key Laboratory of Data Science and Application North China University of Science and TechnologyTangshan063000China Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes North China University of Science and TechnologyTangshan063000China The Key Laboratory of Engineering Computing in Tangshan City North China University of Science and TechnologyTangshan063000China
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in ***,these traditional machine learning algorithms usually require a lot of data ... 详细信息
来源: 评论
Multi-Perspective data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1227-1252页
作者: Yongwang Yuan Xiangwei Liu Ke Lu School of Mathematics and Big Data Anhui University of Science and TechnologyHuainan232001China School of Economics and Management Anhui University of Science and TechnologyHuainan232001China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji UniversityShanghai201804China
Predictive Business Process Monitoring(PBPM)is a significant research area in Business Process Management(BPM)aimed at accurately forecasting future behavioral *** present,deep learning methods are widely cited in PBP... 详细信息
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Glare-SNet: Unsupervised Glare Suppression Balance network  27th
Glare-SNet: Unsupervised Glare Suppression Balance Network
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Pei Zuo, Chengyu Wei, Wangjuan Pan, Xiaoying Wang, Zhanhao School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an China Shaanxi Key Laboratory of Intelligent Media Computing and interaction Xi’an China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an China
In light of the problems associated with glare and halo effects in low-light images, as well as the inadequacy of existing processing algorithms in handling details, a glare suppression balance network based on unsupe... 详细信息
来源: 评论