咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 48 篇 期刊文献

馆藏范围

  • 112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 53 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 28 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 11 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 交通运输工程
    • 2 篇 建筑学
    • 2 篇 船舶与海洋工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 环境科学与工程(可...
  • 37 篇 理学
    • 24 篇 数学
    • 8 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 海洋科学
  • 22 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 法学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 4 篇 gyroscopes
  • 4 篇 wireless sensor ...
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 wireless communi...
  • 3 篇 servers
  • 3 篇 switches
  • 3 篇 computational mo...
  • 3 篇 middleware
  • 3 篇 virtualization
  • 3 篇 mathematical mod...
  • 3 篇 energy efficienc...
  • 2 篇 complex networks
  • 2 篇 access control
  • 2 篇 support vector m...
  • 2 篇 base stations
  • 2 篇 relays
  • 2 篇 sensitivity
  • 2 篇 image segmentati...
  • 2 篇 image edge detec...

机构

  • 7 篇 computer enginee...
  • 7 篇 school of comput...
  • 6 篇 department of co...
  • 5 篇 school of softwa...
  • 5 篇 state key labora...
  • 4 篇 college of compu...
  • 4 篇 complex networks...
  • 4 篇 state key labora...
  • 4 篇 xidian universit...
  • 4 篇 school of softwa...
  • 3 篇 state key labora...
  • 3 篇 school of softwa...
  • 3 篇 state key labora...
  • 3 篇 peng cheng labor...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 shenzhen univers...
  • 3 篇 jiangsu high tec...
  • 3 篇 shanghai key lab...
  • 2 篇 school of mathem...

作者

  • 4 篇 haqiq abdelkrim
  • 4 篇 xiang cheng
  • 4 篇 leung victor c.m...
  • 4 篇 rongqing zhang
  • 4 篇 kim dong seong
  • 3 篇 peng chunlei
  • 3 篇 liuqing yang
  • 3 篇 li zhengbin
  • 3 篇 leung victor c.m
  • 3 篇 liu decheng
  • 3 篇 he jing
  • 3 篇 chen yanjun
  • 3 篇 zhou tong
  • 3 篇 wang nannan
  • 3 篇 zhang haijun
  • 3 篇 cao yuwen
  • 2 篇 niyato dusit
  • 2 篇 li peng
  • 2 篇 liu bo
  • 2 篇 yuwen cao

语言

  • 106 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"机构=Laboratory for Software Engineering and Computer Networks"
112 条 记 录,以下是11-20 订阅
排序:
Downlink Transmit-End Beam Refinement for mmWave Communications Under Mobility
Downlink Transmit-End Beam Refinement for mmWave Communicati...
收藏 引用
2023 International Conference on Electrical engineering and Photonics, EExPolytech 2023
作者: Fokin, Grigoriy Grishin, Ilya Okuneva, Darina The Bonch-Bruevich Saint Petersburg State University of Telecommunications Laboratory of Software Defined Radio Saint Petersburg Russia The Bonch-Bruevich Saint Petersburg State University of Telecommunications Department of Communication Networks and Data Transmission Saint Petersburg Russia The Bonch-Bruevich Saint Petersburg State University of Telecommunications Department of Software Engineering and Computer Facilities Saint Petersburg Russia
This article discusses a method for adjusting the radiation pattern of a base station antenna array when conducting radio communications in the millimeter wavelength range for mobile user devices. The article describe... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable Systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Defining and Detecting the Defects of the Large Language Model-based Autonomous Agents
arXiv
收藏 引用
arXiv 2024年
作者: Ning, Kaiwen Chen, Jiachi Zhang, Jingwen Li, Wei Wang, Zexu Feng, Yuming Zhang, Weizhe Zheng, Zibin The School of Software Engineering Sun Yat-Sen University Peng Cheng Laboratory China The School of Software Engineering Sun Yat-Sen University China The School of Computer Science and Technology Harbin Institute of Technology China Peng Cheng Laboratory China The Department of New Networks Peng Cheng Laboratory China
Artificial intelligence (AI) agents are systems capable of perceiving their environment, autonomously planning and executing tasks. Recent advancements in Large Language Models (LLMs) have introduced a transformative ... 详细信息
来源: 评论
Enhancing Low-Latency and High-Reliability Data Forwarding for In-Vehicle Time-Sensitive networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Sun, Haitong Zhang, Haijun Guan, Wanqing Liu, Xiangnan Ma, Hui Leung, Victor C.M. Hebei Key Laboratory of Space-Air-Ground Intelligent Communication China Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing Beijing100083 China School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm11428 Sweden Department of Computer Science and Software Engineering Shenzhen University Shenzhen518061 China
To satisfy the low delay, low jitter, and high success rate requirements for in-vehicle networks, IEEE 802.1 Task Group proposed Time-Sensitive Networking (TSN), which has aroused increasing attention in managing time... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
A Channel Mix Method for Fine-Grained Cross-Modal Retrieval
A Channel Mix Method for Fine-Grained Cross-Modal Retrieval
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Shen, Yang Sun, Xuhao Wei, Xiu-Shen Hu, Hanxu Chen, Zhipeng School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Xidian University State Key Laboratory of Integrated Services Networks Xi'an China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China University of Edinburgh Edinburgh United Kingdom Beijing China
In this paper, we propose a simple but effective method for dealing with the challenging fine-grained cross-modal retrieval task where it aims to enable flexible retrieval among subor-dinate categories across differen... 详细信息
来源: 评论
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Decheng Su, Qixuan Peng, Chunlei Wang, Nannan Gao, Xinbo State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversar... 详细信息
来源: 评论
Combating Distribution Shift for Accurate Time Series Forecasting via Hypernetworks
arXiv
收藏 引用
arXiv 2022年
作者: Duan, Wenying He, Xiaoxi Zhou, Lu Thiele, Lothar Rao, Hong School of Mathematics and Computer Sciences Nanchang University Nanchang China Computer Engineering and Networks Laboratory ETH Zurich Zurich Switzerland Department of Civil and Environmental Engineering The Hong Kong Polytechnic University Hong Kong Computer Engineering and Networks Laboratory Zurich Switzerland Zurich Switzerland School of Software Nanchang University Nanchang China
Time series forecasting has widespread applications in urban life ranging from air quality monitoring to traffic analysis. However, accurate time series forecasting is challenging because real-world time series suffer... 详细信息
来源: 评论
A Method for Person Re-Identification and Trajectory Tracking in Cross-Device Edge Environments
A Method for Person Re-Identification and Trajectory Trackin...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Jian An Yunxiang Zhao Feifei Wang Xin He Xiaolin Gui School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks Xi’an Jiaotong University Xi’an China Henan Jiaoyuan Engineering Technology Group Co. LTD Henan China School of Software Henan University Henan China
Addressing expanded surveillance scopes, cross-device person re-identification emerges as a crucial issue. Traditional approaches to re-identification and tracking confront challenges in feature matching challenges, a... 详细信息
来源: 评论
Denoising Diffusion Model-Based Channel Estimation in IRS-Assisted ISAC Systems
Denoising Diffusion Model-Based Channel Estimation in IRS-As...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Lan Yi Jiansong Miao Tao Zhang Zhenhui Yuan Jiawen Kang Dusit Niyato Beijing Laboratory of Advanced Information Networks Beijing University of Posts and Telecommunications Beijing China School of Software Engineering Beijing Jiaotong University Beijing China School of Engineering University of Warwick UK School of Automation Guangdong University of Technology Guangzhou China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore
In Integrated Sensing and Communications (ISAC) systems assisted by Intelligent Reflecting Surfaces (IRS), precise channel estimation is crucial for optimal system performance and maximizing the potential benefits. Th... 详细信息
来源: 评论