咨询与建议

限定检索结果

文献类型

  • 1,588 篇 会议
  • 1,533 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 3,137 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,053 篇 工学
    • 950 篇 计算机科学与技术...
    • 819 篇 软件工程
    • 627 篇 控制科学与工程
    • 367 篇 信息与通信工程
    • 354 篇 电气工程
    • 269 篇 电子科学与技术(可...
    • 251 篇 机械工程
    • 208 篇 生物工程
    • 143 篇 光学工程
    • 139 篇 生物医学工程(可授...
    • 112 篇 化学工程与技术
    • 110 篇 动力工程及工程热...
    • 109 篇 仪器科学与技术
    • 95 篇 交通运输工程
    • 83 篇 材料科学与工程(可...
    • 79 篇 航空宇航科学与技...
    • 72 篇 土木工程
    • 70 篇 安全科学与工程
    • 67 篇 力学(可授工学、理...
  • 1,278 篇 理学
    • 633 篇 数学
    • 326 篇 物理学
    • 302 篇 系统科学
    • 238 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 119 篇 化学
  • 390 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 127 篇 医学
    • 108 篇 临床医学
    • 87 篇 基础医学(可授医学...
  • 60 篇 法学
  • 37 篇 经济学
  • 27 篇 农学
  • 13 篇 教育学
  • 10 篇 军事学
  • 6 篇 文学
  • 2 篇 艺术学

主题

  • 62 篇 feature extracti...
  • 59 篇 control systems
  • 58 篇 computational mo...
  • 53 篇 optimization
  • 49 篇 robustness
  • 44 篇 mathematical mod...
  • 38 篇 machine learning
  • 38 篇 training
  • 36 篇 deep learning
  • 36 篇 neural networks
  • 34 篇 accuracy
  • 33 篇 laboratories
  • 32 篇 educational inst...
  • 30 篇 stability analys...
  • 30 篇 uncertainty
  • 29 篇 automatic contro...
  • 29 篇 nonlinear system...
  • 28 篇 object detection
  • 28 篇 real-time system...
  • 28 篇 algorithm design...

机构

  • 41 篇 beijing aerospac...
  • 34 篇 school of automa...
  • 33 篇 school of comput...
  • 33 篇 beijing key labo...
  • 31 篇 fujian provincia...
  • 31 篇 ieee
  • 31 篇 state key labora...
  • 26 篇 state key labora...
  • 24 篇 college of contr...
  • 24 篇 school of electr...
  • 22 篇 department of el...
  • 21 篇 seventh research...
  • 21 篇 school of comput...
  • 20 篇 department of el...
  • 20 篇 state key labora...
  • 19 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 guangdong key la...
  • 17 篇 college of elect...
  • 17 篇 state key labora...

作者

  • 34 篇 junping du
  • 33 篇 johansson karl h...
  • 31 篇 li zuoyong
  • 31 篇 yingmin jia
  • 24 篇 tóth roland
  • 22 篇 ai bo
  • 22 篇 kryjak tomasz
  • 20 篇 yi xinlei
  • 20 篇 fashan yu
  • 19 篇 shi ling
  • 19 篇 fei-yue wang
  • 18 篇 minyue fu
  • 16 篇 yang tao
  • 15 篇 yunong zhang
  • 15 篇 zhiyun lin
  • 14 篇 teng shenghua
  • 13 篇 niyato dusit
  • 13 篇 zuoyong li
  • 13 篇 shu feng
  • 13 篇 fan haoyi

语言

  • 2,925 篇 英文
  • 151 篇 其他
  • 60 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Laboratory of Science and Technology of Automatic Control and Computer Engineering"
3137 条 记 录,以下是721-730 订阅
排序:
Safe reinforcement learning task planning with uncertain duration and resource consumption in limited daytime for lunar rovers
Safe reinforcement learning task planning with uncertain dur...
收藏 引用
2024 IAF Space Operations Symposium at the 75th International Astronautical Congress, IAC 2024
作者: Lu, Siyao Xu, Rui Gao, Ai Li, Zhaoyu Liu, Jiamou Zhang, Libo Zhao, Zhijun Zhu, Shengying Li, Yuqiong School of Aerospace Engineering Beijing Institute of Technology 5th Zhongguancun South Street Haidian Distinct Beijing Beijing100081 China Key Laboratory of Autonomous Navigation and Control for Deep Space Exploration Beijing Institute of Technology Ministry of Industry and Information Technology Beijing100081 China School of Computer Science University of Auckland 34 Princes Street Auckland1010 New Zealand Beijing Institute of Spacecraft Engineering Beijing Beijing100094 China Institute of Mechanics Chinese Academy of Sciences 15th North Fourth Ring West Road Haidian District Beijing100190 China
The International Lunar Research Station will be established near the south pole through advanced unmanned rovers at the beginning period. The south pole of the moon has short daytime, so the efficiency of remote cont... 详细信息
来源: 评论
Large-Scale Data Generation Using SWLBM on the Sunway TaihuLight Supercomputer and Subsequent Data Mining with Physics-Informed Neural Networks  12th
Large-Scale Data Generation Using SWLBM on the Sunway TaihuL...
收藏 引用
12th CCF Conference on BigData, BigData 2024
作者: Chu, Xuesen Guo, Wei Wu, Tianqi Cai, Shengze Yang, Guangwen China Ship Scientific Research Center Wuxi214082 China Taihu Lake Laboratory of Deep Sea Technology and Science Wuxi214082 China Department of Computer Science and Technology Tsinghua University Beijing100084 China College of Control Science and Engineering Zhejiang University Hangzhou310027 China National Supercomputing Center in Wuxi Wuxi214072 China
Generating large-scale datasets on supercomputers is a critical component of modern research, enabling sophisticated analysis and mining applications. In the context of SUBOFF model studies for advanced submarine deve... 详细信息
来源: 评论
Lightweight Trust Model with Machine Learning scheme for secure privacy in VANET  18
Lightweight Trust Model with Machine Learning scheme for sec...
收藏 引用
18th International Learning and technology Conference, L and T 2021
作者: Junejo, Muhammad Haleem Ab Rahman, Ab Al-Hadi Shaikh, Riaz Ahmed Yusof, Kamaludin Mohamad Kumar, Dileep Memon, Imran Faculty of Electrical Engineering Universiti Teknologi Malaysia Johor Skudai81310 Malaysia Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Department of Computer Science Bahria University Karachi campus sindh Pakistan
A vehicular ad hoc network (VANETs) is transforming public transport into a safer wireless network, increasing its safety and efficiency. The VANET consists of several nodes which include RSU (Roadside Units), vehicle... 详细信息
来源: 评论
Multi-modal Speech Emotion Recognition via Feature Distribution Adaptation Network
arXiv
收藏 引用
arXiv 2024年
作者: Li, Shaokai Ji, Yixuan Song, Peng Sun, Haoqin Zheng, Wenming School of Computer and Control Engineering Yantai University Yantai264005 China Business School Xuzhou University of Technology Xuzhou221018 China College of Computer Science Nankai University Tianjin300350 China Key Laboratory of Child Development and Learning Science of Ministry of Education Southeast University Nanjing210096 China
In this paper, we propose a novel deep inductive transfer learning framework, named feature distribution adaptation network, to tackle the challenging multi-modal speech emotion recognition problem. Our method aims to... 详细信息
来源: 评论
Distributed Event-Triggered Bandit Convex Optimization With Time-Varying Constraints
收藏 引用
IEEE Transactions on control of Network Systems 2025年
作者: Zhang, Kunpeng Yi, Xinlei Wen, Guanghui Cao, Ming Johansson, Karl H. Chai, Tianyou Yang, Tao Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China Ministry of Education Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai201210 China Southeast University School of Automation Nanjing210096 China University of Groningen Engineering and Technology Institute Groningen Faculty of Science and Engineering GroningenAG 9747 Netherlands KTH Royal Institute of Technology Division of Decision and Control Systems School of Electrical Engineering and Computer Science Stockholm10044 Sweden KTH Royal Institute of Technology Digital Futures Stockholm10044 Sweden
This paper considers the distributed bandit convex optimization problem with time-varying inequality constraints over a network of agents, where the goal is to minimize network regret and cumulative constraint violati... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
Stealthy Attacks on Sampled-Data control and Encryption-Based Countermeasures
收藏 引用
IEEE Transactions on automatic control 2025年
作者: Shang, Jun Li, Yuzhe Chen, Tongwen Tongji University Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada
This paper investigates stealthy attacks on sampled-data control systems, where a continuous process is sampled periodically, and the resultant discrete output and control signals are transmitted through dual channels... 详细信息
来源: 评论
Research on Black-Box Adversarial Attack Based on Transformer
Research on Black-Box Adversarial Attack Based on Transforme...
收藏 引用
Frontiers technology of Information and computer (ICFTIC), IEEE International Conference on
作者: Wenjuan Zheng Hanxu Luo YuXin Ji Haipeng Li Longjian Cong Master of Computer Vision National Key Laboratory of Aerospace Intelligent Control Technology Beijing China Beijing Aerospace Automatic Control Institute Beijing China Department of Information Engineering Wuhan University of Technology Wuhan Hubei Province China
The classic adversarial samples of black-box attacks are all aimed at the models of Convolutional neural networks (CNNs), but they do not perform well on the new recognition networks based on Transformer. In this pape... 详细信息
来源: 评论
A Material Identification Approach Based on Wi-Fi Signal
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 3383-3397页
作者: Chao Li Fan Li Wei Du Lihua Yin Bin Wang Chonghua Wang Tianjie Luo Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510700China PCL Research Center of Cyberspace Security Peng Cheng LaboratoryShenzhen518052China Department of Computer Science and Computer Engineering University of ArkansasFayetteville72701USA College of Electrical Engineering Zhejiang UniversityHangzhou310058China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Material identification is a technology that can help to identify the type of target *** approaches depend on expensive instruments,complicated pre-treatments and professional *** is difficult to find a substantial ye... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou310023 China ZJUT Binjiang Institute of Artificial Intelligence Hangzhou310056 China Fudan University Adaptive Networks and Control Lab Department of Electronic Engineering School of Information Science and Technology Shanghai200433 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Shenzhen518066 China National Key Laboratory of Electromagnetic Space Security Jiaxing314033 China
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti... 详细信息
来源: 评论