咨询与建议

限定检索结果

文献类型

  • 91,521 篇 会议
  • 46,107 篇 期刊文献
  • 43 册 图书
  • 2 篇 科技报告

馆藏范围

  • 137,673 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 83,059 篇 工学
    • 52,929 篇 计算机科学与技术...
    • 43,508 篇 软件工程
    • 20,907 篇 信息与通信工程
    • 13,732 篇 控制科学与工程
    • 11,864 篇 电气工程
    • 11,848 篇 电子科学与技术(可...
    • 9,206 篇 生物工程
    • 7,017 篇 光学工程
    • 6,772 篇 机械工程
    • 6,514 篇 生物医学工程(可授...
    • 4,997 篇 仪器科学与技术
    • 4,914 篇 化学工程与技术
    • 4,685 篇 动力工程及工程热...
    • 3,546 篇 材料科学与工程(可...
    • 3,150 篇 交通运输工程
    • 3,040 篇 网络空间安全
    • 2,991 篇 安全科学与工程
  • 46,357 篇 理学
    • 22,997 篇 数学
    • 15,069 篇 物理学
    • 10,290 篇 生物学
    • 7,641 篇 统计学(可授理学、...
    • 5,228 篇 系统科学
    • 5,174 篇 化学
  • 21,295 篇 管理学
    • 13,641 篇 管理科学与工程(可...
    • 8,522 篇 图书情报与档案管...
    • 5,670 篇 工商管理
  • 6,183 篇 医学
    • 5,048 篇 临床医学
    • 4,539 篇 基础医学(可授医学...
    • 2,796 篇 药学(可授医学、理...
  • 3,421 篇 法学
    • 2,805 篇 社会学
  • 2,303 篇 经济学
  • 1,658 篇 农学
  • 1,276 篇 教育学
  • 592 篇 文学
  • 329 篇 军事学
  • 243 篇 艺术学
  • 11 篇 哲学
  • 7 篇 历史学

主题

  • 3,501 篇 accuracy
  • 3,480 篇 feature extracti...
  • 3,022 篇 deep learning
  • 2,993 篇 computational mo...
  • 2,977 篇 training
  • 2,260 篇 machine learning
  • 2,157 篇 computer science
  • 2,019 篇 optimization
  • 1,874 篇 predictive model...
  • 1,571 篇 neural networks
  • 1,570 篇 semantics
  • 1,535 篇 real-time system...
  • 1,517 篇 internet of thin...
  • 1,487 篇 data models
  • 1,477 篇 support vector m...
  • 1,446 篇 data mining
  • 1,409 篇 convolutional ne...
  • 1,218 篇 wireless sensor ...
  • 1,153 篇 robustness
  • 1,123 篇 security

机构

  • 3,275 篇 school of electr...
  • 2,433 篇 school of comput...
  • 1,523 篇 school of comput...
  • 1,336 篇 school of comput...
  • 1,080 篇 cavendish labora...
  • 995 篇 department of ph...
  • 963 篇 school of comput...
  • 944 篇 physikalisches i...
  • 920 篇 oliver lodge lab...
  • 846 篇 university of ch...
  • 675 篇 school of comput...
  • 613 篇 school of electr...
  • 553 篇 chitkara univers...
  • 534 篇 horia hulubei na...
  • 524 篇 school of physic...
  • 524 篇 school of comput...
  • 520 篇 department of ph...
  • 518 篇 school of comput...
  • 515 篇 school of physic...
  • 515 篇 fakultät physik ...

作者

  • 280 篇 niyato dusit
  • 271 篇 a. gomes
  • 256 篇 barter w.
  • 252 篇 c. alexa
  • 250 篇 j. m. izen
  • 244 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 c. amelung
  • 240 篇 d. calvet
  • 236 篇 s. chen
  • 232 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 212 篇 bencivenni g.

语言

  • 130,079 篇 英文
  • 5,229 篇 其他
  • 2,315 篇 中文
  • 138 篇 日文
  • 16 篇 德文
  • 16 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Engineering and Technology"
137673 条 记 录,以下是351-360 订阅
排序:
Masked Generative Light Field Prompting for Pixel-Level Structure Segmentations
收藏 引用
Research 2024年 第4期2024卷 533-544页
作者: Mianzhao Wang Fan Shi Xu Cheng Shengyong Chen The Engineering Research Center of Learning-Based Intelligent System(Ministry of Education) Tianjin University of TechnologyTianjin 300384China Key Laboratory of Computer Vision and System(Ministry of Education) Tianjin University of TechnologyTianjin 300384China School of Computer Science and Engineering Tianjin University of TechnologyTianjin 300384China
Pixel-level structure segmentations have attracted considerable attention,playing a crucial role in autonomous driving within the metaverse and enhancing comprehension in light field-based machine ***,current light fi... 详细信息
来源: 评论
An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions (Nov, bxac165, 2022)
收藏 引用
computer JOURNAL 2024年 第2期67卷 806-806页
作者: Amin-Ghafari, Vahid Attari, Mahmoud Ahmadian School of Information and Control Engineering China University of Mining and Technology Jiangsu 221116 P. R. China Electrical and Computer Engineering School K. N. Toosi University of Technology Tehran *** Iran
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was s... 详细信息
来源: 评论
Bootstrap-Based Layerwise Refining for Causal Structure Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2708-2722页
作者: Xiang, Guodu Wang, Hao Yu, Kui Guo, Xianjie Cao, Fuyuan Song, Yukun Hefei University of Technology Key Laboratory of Knowledge Engineering with the Big Data of Ministry of Education Hefei230601 China Hefei University of Technology School of Computer Science and Information Engineering Hefei230601 China Shanxi University School of Computer and Information Technology Taiyuan030006 China
Learning causal structures from observational data is critical for causal discovery and many machine learning tasks. Traditional constraint-based methods first adopt conditional independence (CI) tests to learn a glob... 详细信息
来源: 评论
Derandomizing Codes for the Adversarial Wiretap Channel of Type II
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4686-4707页
作者: Ruzomberka, Eric Nikbakht, Homa Brinton, Christopher G. Love, David J. Poor, H. Vincent Air Force Institute of Technology Department of Electrical and Computer Engineering United States Princeton University Department of Electrical and Computer Engineering United States Purdue University Elmore Family School of Electrical and Computer Engineering West Lafayette United States
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy... 详细信息
来源: 评论
Automatic Query Generation Based on Adaptive Naked Mole-Rate Algorithm
收藏 引用
Multimedia Tools and Applications 2024年 1-32页
作者: Kinikar, Mayura Saleena, B. School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai India Pune India
In the growing information retrieval (IR) world, selecting suitable keywords and generating queries is important for effective retrieval. Modern database applications need a sophisticated interface for automatically u... 详细信息
来源: 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua Science and technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 评论
EEG Prediction with Deep Recurrent Learning
EEG Prediction with Deep Recurrent Learning
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Zou, Jiadao Zhang, Qingxue Purdue Univeristy School of Engineering and Technology Electrical and Computer Engineering IN United States Purdue Univeristy School of Engineering and Technology Electrical and Computer Engineering Biomedical Engineering IN United States
Electroencephalogram (EEG) reveals the brain dynamics that are of a great value in clinical applications, e.g., epilepsy diagnosis, cognitive status, and other disorders. Intracranial Electroencephalogram (iEEG) is en... 详细信息
来源: 评论
Principle of subtraction ghost imaging in scattering medium
收藏 引用
Chinese Physics B 2023年 第6期32卷 250-254页
作者: 付芹 白艳锋 谭威 黄贤伟 南苏琴 傅喜泉 College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China School of Computer and Information Engineering Hunan University of Technology and BusinessChangsha 410205China
Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost *** disturbance is usually eliminated by the method of *** deduce the intensity fluctuation... 详细信息
来源: 评论
Two-Way Neural Network Performance PredictionModel Based onKnowledge Evolution and Individual Similarity
收藏 引用
computer Modeling in engineering & Sciences 2024年 第2期138卷 1183-1206页
作者: Xinzheng Wang Bing Guo Yan Shen College of Computer Science Sichuan UniversityChengdu610065China School of Information Science and Engineering Guilin University of TechnologyGuilin541004China School of Control Engineering Chengdu University of Information TechnologyChengdu610225China
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelatedd... 详细信息
来源: 评论
Analytical Verification of Performance of Deep Neural Network Based Time-synchronized Distribution System State Estimation
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第4期12卷 1126-1134页
作者: Behrouz Azimian Shiva Moshtagh Anamitra Pal Shanshan Ma School of Electrical Computer and Energy EngineeringArizona State UniversityTempeAZ 85281USA Quanta Technology RaleighNC 27607USA
Recently,we demonstrated the success of a time-synchronized state estimator using deep neural networks(DNNs)for real-time unobservable distribution *** this paper,we provide analytical bounds on the performance of the... 详细信息
来源: 评论