咨询与建议

限定检索结果

文献类型

  • 1,180 篇 会议
  • 1,150 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 2,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,606 篇 工学
    • 904 篇 计算机科学与技术...
    • 804 篇 软件工程
    • 430 篇 控制科学与工程
    • 291 篇 信息与通信工程
    • 232 篇 电气工程
    • 227 篇 机械工程
    • 176 篇 生物工程
    • 138 篇 生物医学工程(可授...
    • 134 篇 电子科学与技术(可...
    • 113 篇 光学工程
    • 84 篇 仪器科学与技术
    • 83 篇 化学工程与技术
    • 73 篇 动力工程及工程热...
    • 48 篇 材料科学与工程(可...
    • 47 篇 交通运输工程
    • 39 篇 安全科学与工程
    • 36 篇 力学(可授工学、理...
    • 36 篇 建筑学
  • 908 篇 理学
    • 494 篇 数学
    • 194 篇 生物学
    • 191 篇 系统科学
    • 179 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 76 篇 化学
  • 373 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 129 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 95 篇 医学
    • 87 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 48 篇 药学(可授医学、理...
  • 36 篇 法学
  • 26 篇 经济学
  • 19 篇 农学
  • 12 篇 教育学
  • 11 篇 艺术学
  • 7 篇 文学
  • 1 篇 军事学

主题

  • 54 篇 feature extracti...
  • 51 篇 automation
  • 44 篇 control systems
  • 36 篇 reinforcement le...
  • 35 篇 neural networks
  • 35 篇 training
  • 34 篇 laboratories
  • 32 篇 optimization
  • 31 篇 machine learning
  • 31 篇 accuracy
  • 30 篇 deep learning
  • 29 篇 image segmentati...
  • 27 篇 artificial intel...
  • 27 篇 robustness
  • 26 篇 computational mo...
  • 25 篇 trajectory
  • 25 篇 semantics
  • 25 篇 mathematical mod...
  • 23 篇 computer science
  • 22 篇 pattern recognit...

机构

  • 73 篇 school of automa...
  • 69 篇 department of au...
  • 56 篇 national laborat...
  • 56 篇 faculty of infor...
  • 49 篇 university of ch...
  • 46 篇 beijing key labo...
  • 46 篇 school of electr...
  • 44 篇 state key labora...
  • 38 篇 school of automa...
  • 35 篇 ieee
  • 35 篇 institute of aut...
  • 31 篇 school of artifi...
  • 31 篇 peng cheng labor...
  • 30 篇 school of comput...
  • 28 篇 school of comput...
  • 27 篇 school of automa...
  • 27 篇 institutes for r...
  • 27 篇 school of inform...
  • 27 篇 state key labora...
  • 24 篇 school of automa...

作者

  • 41 篇 niyato dusit
  • 38 篇 junping du
  • 37 篇 kang jiawen
  • 37 篇 yingmin jia
  • 27 篇 fashan yu
  • 23 篇 fei-yue wang
  • 20 篇 li kang
  • 19 篇 kang li
  • 19 篇 johansson karl h...
  • 18 篇 shi ling
  • 18 篇 du hongyang
  • 18 篇 yang tao
  • 17 篇 derong liu
  • 17 篇 yi xinlei
  • 15 篇 du junping
  • 15 篇 jia yingmin
  • 15 篇 fei minrui
  • 14 篇 shen tao
  • 14 篇 li stan z.
  • 14 篇 li xiang

语言

  • 2,205 篇 英文
  • 100 篇 其他
  • 46 篇 中文
检索条件"机构=Laboratory of Computer Science Engineering and Automation"
2350 条 记 录,以下是21-30 订阅
排序:
Resilient Cooperative Control of Multiple DC Microgrids With Interconnection Networks Against Cyber Attacks
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 116-126页
作者: Xiao, Feng Liu, Shiyu Wei, Bo Fang, Fang Qin, Jiahu North China Electric Power University State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources Beijing102206 China North China Electric Power University School of Control and Computer Engineering Beijing102206 China North China Electric Power University New Energy Generation National Engineering Research Center Beijing102206 China University of Science and Technology of China Department of Automation Hefei230027 China
The two control objectives of voltage regulation and precise current sharing are conflicting in multi-bus DC microgrids. In this paper, a distributed control strategy is proposed, and it can achieve accurate current s... 详细信息
来源: 评论
Out-of-Distribution Fault Diagnosis of Industrial Cyber-Physical Systems Based on Orthogonal Anchor Clustering With Adaptive Balance
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 48-60页
作者: Liu, Ruonan Hu, Puyuan Zhao, Siheng Sun, Zhijian Han, Te Pang, Zhibo Zhang, Weidong Shanghai Jiao Tong University Department of Automation Shanghai200240 China National Key Laboratory of Marine Engine Science and Technology Shanghai201108 China Crossocean of Suzhou Technology Suzhou215121 China Beijing Institute of Technology Center for Energy and Environmental Policy Research School of Management Beijing100081 China ABB Corporate Research Sweden Department of Automation Technology Vasteras722 26 Sweden KTH Royal Institute of Technology Department of Intelligent Systems Stockholm114 28 Sweden Henan University Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Kaifeng475001 China Shanghai Jiaotong University Department of Automation Shanghai200240 China
Given the critical role of rotating machinery in industrial cyber-physical systems (ICPS), ensuring their reliable operation is essential for the stability and safety of ICPS. Deep neural networks have demonstrated co... 详细信息
来源: 评论
Facilitating Continuous Facial Aging through Latent Age Attribute Modulation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Hu, Xiyuan Qu, Jinglei Chen, Chen Beijing University of Technology School of Computer Science Beijing100124 China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China
In recent years, facial aging has attracted significant research interest due to its broad applications and potential benefits. While Generative Adversarial Networks (GANs) have achieved notable progress in synthesizi... 详细信息
来源: 评论
A Noise-robust U2 Scheme for Automatic Speech Recognition of Air Traffic Voice Communication
A Noise-robust U2 Scheme for Automatic Speech Recognition of...
收藏 引用
2025 Integrated Communications, Navigation and Surveillance Conference, ICNS 2025
作者: Jiang, Yutong Zhang, Xiaoxiao Zhang, Huaiwen Qian, Shengsheng Yang, Yang School of Electronic and Information Engineering Beihang University State Key Laboratory of CNS/ATM Beijing China School of Inner Mongolia University of Computer Science Hohhot China Institute of Automation CAS University of Chinese Academy of Sciences Beijing China
Air traffic voice communication (ATC Communication) involves the transmission of operational commands between controllers and pilots through voice. This communication is crucial for maintaining the safety and order of... 详细信息
来源: 评论
RAC-Based One-Stop Professional Course Teaching Model Exploration and Practice - Taking the Course of "Microcomputer Principles and Interface Technology" as an Example  6th
RAC-Based One-Stop Professional Course Teaching Model Explor...
收藏 引用
6th International Conference on computer science and Educational Informatization, CSEI 2024
作者: Wan, Xiaorong Li, Yingna Luo, Chuan Li, Chuan You, Jinguo Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Yunnan Key Laboratory of Computer Technology Applications Kunming650500 China
In the context of the country’s requirement for academic disciplines to be aligned and mutually reinforcing with industry chains, innovation chains, and talent chains, the integration of education and industry has be... 详细信息
来源: 评论
ENS-RFMC: An Encrypted Network Traffic Sampling Method Based on Rule-Based Feature Extraction and Multi-hierarchical Clustering for Intrusion Detection  27th
ENS-RFMC: An Encrypted Network Traffic Sampling Method Based...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Liang-Chen Gao, Shu Wei, Zi-Xuan Liu, Bao-Xu Zhang, Xu-Yao School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China Institute of Automation NLPR Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer China University of Labor Relations Beijing100048 China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing100093 China
Efficiently and quickly identifying malware in encrypted network traffic is a major challenge. This research presents and evaluates a novel approach for sampling encrypted network traffic, called ENS-RFMC. Initially, ... 详细信息
来源: 评论
A third-party platoon coordination service: Pricing under government subsidies
A third-party platoon coordination service: Pricing under go...
收藏 引用
作者: Bai, Ting Johansson, Alexander Li, Shaoyuan Johansson, Karl Henrik Mårtensson, Jonas School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden KTH Royal Institute of Technology Stockholm Sweden Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Shanghai China Digital Futures Stockholm Sweden
This paper models a platooning system consisting of trucks and a third-party service provider (TPSP), which performs platoon coordination, distributes the platooning profit in platoons, and charges trucks in exchange ... 详细信息
来源: 评论
Visual numerical cognition in pigeons: conformity to the Weber–Fechner law
收藏 引用
Animal Cognition 2025年 第1期28.0卷 1-13页
作者: Wu, Peng Zhu, Juncai He, Qingzhi Wang, Zhizhong Shi, Li School of Electrical and Information Engineering Zhengzhou University Zhengzhou 450001 China Henan Key Laboratory of Brain Science and Brain-Computer Interface Technology Zhengzhou 450001 China Department of Automation Tsinghua University Beijing 100084 China
As representatives of a basal bird lineage, pigeons have exhibited remarkable visual numerical cognition, comparable even to that of monkeys. Nevertheless, whether visual numerical cognition in pigeons conforms to the... 详细信息
来源: 评论
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Wang, Donghua Yao, Wen Jiang, Tingsong Li, Chao Zhejiang University College of Computer Science and Technology Hangzhou China Chinese Academy of Military Science Intelligent Game and Decision Laboratory Defense Innovation Institute Beijing China Zhongyuan University of Technology School of Automation and Electrical Engineering Zhengzhou China
Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on white-box attacks and are mere... 详细信息
来源: 评论
Barrier Offset Varying-Parameter Dynamic Learning Network for Solving Dual-Arms Human-Like Behavior Generation
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2025年
作者: Zhang, Zhijun Zhang, Mingyang Guo, Jinjia He, Haotian School of Automation Science and Engineering South China University of Technology Guangzhou510640 China Key Library of Autonomous Systems and Network Control Ministry of Education China Jiangxi Thousand Talents Plan Nanchang University Nanchang330031 China Guangzhou510335 China Shaanxi Provincial Key Laboratory of Industrial Automation School of Mechanical Engineering Shanxi University of Technology Hanzhong723001 China School of Information Science and Engineering Changsha Normal University Changsha410100 China School of Automation Science and Engineering Institute of Artificial Intelligence and Automation Guangdong University of Petrochemical Technology Maoming525000 China School of Computer Science and Engineering Jishou University Jishou416000 China
Enabling robots to imitate human actions and perform tasks with high precision while avoiding potential obstacles in the environment can effectively enhance the interaction between social robots and humans. In this pa... 详细信息
来源: 评论