咨询与建议

限定检索结果

文献类型

  • 65,035 篇 会议
  • 41,362 篇 期刊文献
  • 788 册 图书

馆藏范围

  • 107,185 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 67,115 篇 工学
    • 42,929 篇 计算机科学与技术...
    • 35,235 篇 软件工程
    • 16,109 篇 信息与通信工程
    • 10,487 篇 控制科学与工程
    • 8,702 篇 电气工程
    • 8,475 篇 电子科学与技术(可...
    • 7,512 篇 生物工程
    • 5,752 篇 光学工程
    • 5,474 篇 机械工程
    • 5,236 篇 生物医学工程(可授...
    • 5,041 篇 化学工程与技术
    • 3,787 篇 仪器科学与技术
    • 3,559 篇 动力工程及工程热...
    • 3,432 篇 材料科学与工程(可...
    • 2,534 篇 网络空间安全
    • 2,503 篇 交通运输工程
    • 2,282 篇 安全科学与工程
  • 37,826 篇 理学
    • 18,502 篇 数学
    • 12,200 篇 物理学
    • 8,475 篇 生物学
    • 6,040 篇 统计学(可授理学、...
    • 4,999 篇 化学
    • 3,776 篇 系统科学
  • 17,520 篇 管理学
    • 11,156 篇 管理科学与工程(可...
    • 7,019 篇 图书情报与档案管...
    • 4,362 篇 工商管理
  • 5,010 篇 医学
    • 4,035 篇 临床医学
    • 3,588 篇 基础医学(可授医学...
    • 2,228 篇 药学(可授医学、理...
  • 2,674 篇 法学
    • 2,182 篇 社会学
  • 1,722 篇 经济学
  • 1,309 篇 农学
  • 950 篇 教育学
  • 437 篇 文学
  • 255 篇 军事学
  • 206 篇 艺术学
  • 10 篇 历史学
  • 8 篇 哲学

主题

  • 2,747 篇 feature extracti...
  • 2,711 篇 accuracy
  • 2,414 篇 deep learning
  • 2,375 篇 training
  • 2,177 篇 computational mo...
  • 2,066 篇 computer science
  • 1,785 篇 machine learning
  • 1,534 篇 optimization
  • 1,405 篇 semantics
  • 1,357 篇 predictive model...
  • 1,162 篇 internet of thin...
  • 1,154 篇 data mining
  • 1,152 篇 support vector m...
  • 1,124 篇 data models
  • 1,110 篇 real-time system...
  • 1,084 篇 neural networks
  • 1,053 篇 convolutional ne...
  • 1,010 篇 image segmentati...
  • 959 篇 educational inst...
  • 913 篇 artificial intel...

机构

  • 2,446 篇 school of comput...
  • 1,536 篇 school of comput...
  • 1,361 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 978 篇 school of comput...
  • 944 篇 physikalisches i...
  • 942 篇 oliver lodge lab...
  • 881 篇 university of ch...
  • 819 篇 college of compu...
  • 693 篇 school of comput...
  • 538 篇 horia hulubei na...
  • 537 篇 school of comput...
  • 535 篇 fakultät physik ...
  • 533 篇 school of physic...
  • 526 篇 school of physic...
  • 524 篇 department of ph...
  • 520 篇 chitkara univers...
  • 518 篇 imperial college...
  • 512 篇 h.h. wills physi...

作者

  • 292 篇 niyato dusit
  • 270 篇 a. gomes
  • 258 篇 barter w.
  • 250 篇 c. alexa
  • 248 篇 j. m. izen
  • 244 篇 g. bella
  • 243 篇 j. strandberg
  • 243 篇 c. amelung
  • 242 篇 d. calvet
  • 235 篇 beiter a.
  • 233 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 216 篇 g. spigo

语言

  • 100,865 篇 英文
  • 4,310 篇 其他
  • 1,993 篇 中文
  • 68 篇 日文
  • 17 篇 法文
  • 16 篇 德文
  • 8 篇 朝鲜文
  • 5 篇 荷兰文
  • 4 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering ChangChun University of Technology"
107185 条 记 录,以下是111-120 订阅
排序:
Interleaved Group Quantization Algorithm for Key Extraction in Random Modulation Channel Sharing  4
Interleaved Group Quantization Algorithm for Key Extraction ...
收藏 引用
4th International Conference on Electronic Information engineering and computer science, EIECS 2024
作者: Wanglst, Fang Chen, Chunyi Yu, Haiyang Tian, Zhuozhan School of Computer Science and Technology Changchun University of Science and Technology Changchun China
Extracting characteristic information from atmospheric optical channels can be utilized to generate shared keys for communication parties. However, the autocorrelation of channel feature information within the correla... 详细信息
来源: 评论
A Heterogeneous Federated Learning Method Based on Global Classifier and Mean Regularization  7
A Heterogeneous Federated Learning Method Based on Global Cl...
收藏 引用
7th International Conference on computer Information science and Application technology, CISAT 2024
作者: Shi, Yongqiang Feng, Xin Zhang, Jianfei Changchun University of Science and Technology School of Computer Science and Technology Changchun China
Federated learning is an emerging distributed machine learning paradigm that can protect data privacy security in collaborative training of shared models by multiple parties. However, the shared global model cannot sa... 详细信息
来源: 评论
Chess Puzzle: Evolution of Cyber Deception Strategies for IoT Security Enhancement
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16668-16680页
作者: Wang, Xiran Shi, Leyi Zhao, Zhihao Luo, Wenbin Ding, Bingtao School of Computer Science and Technology Qingdao266580 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
Nowadays, the proliferation of open Internet of Things (IoT) devices has made IoT systems increasingly vulnerable to cyber attacks. It is of great practical significance to solve the security issues of IoT systems. Dr... 详细信息
来源: 评论
Event-based nonsingular fixed-time containment control for nonlinear multiagent systems with dynamic uncertainties
收藏 引用
science China(Information sciences) 2025年 第5期68卷 413-414页
作者: Yuanbo SU Qihe SHAN Tieshan LI C.L.Philip CHEN Navigation College Dalian Maritime University School of Automation Engineering University of Electronic Science and Technology of China School of Computer Science and Engineering South China University of Technology
Owing to the extensive applications in many areas such as networked systems,formation flying of unmanned air vehicles,and coordinated manipulation of multiple robots,the distributed containment control for nonlinear m...
来源: 评论
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 239-258页
作者: Long Cai Ke Gu Jiaqi Lei School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer... 详细信息
来源: 评论
Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection
收藏 引用
Chinese Physics B 2025年 第5期34卷 289-301页
作者: Fei Yu Dan Su Shaoqi He Yiya Wu Shankou Zhang Huige Yin School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha 410114China
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin... 详细信息
来源: 评论
Video Colorization:A Survey
收藏 引用
Journal of computer science & technology 2024年 第3期39卷 487-508页
作者: 彭中正 杨艺新 唐金辉 潘金山 School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China CCF IEEE ACM
Video colorization aims to add color to grayscale or monochrome *** existing methods have achieved substantial and noteworthy results in the field of image colorization,video colorization presents more formidable obst... 详细信息
来源: 评论
An efficient schedulability analysis based on worst-case interference time for real-time systems
收藏 引用
science China(Information sciences) 2024年 第9期67卷 88-104页
作者: Hongbiao LIU Mengfei YANG Lei QIAO Xi CHEN Jian GONG School of Computer Science and Technology Xidian University China Academy of Space Technology Beijing Institute of Control Engineering
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-ti... 详细信息
来源: 评论
Semantic segmentation of UAV remote sensing images based on improved U-Net  8
Semantic segmentation of UAV remote sensing images based on ...
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Zhang, Hua Jiang, Zhengang Zheng, Guoxun Yao, Xuekun Changchun University of Science and Technology School of Computer Science and Technology Changchun China Changchun Institute of Technology School of Computer Technology and Engineering Changchun China
Semantic segmentation of unmanned aerial vehicle (UAV) remote sensing images has been widely used in various fields of remote sensing;however, manual visual interpretation methods are inefficient and highly dependent ... 详细信息
来源: 评论
Effects of feature selection and normalization on network intrusion detection
收藏 引用
Data science and Management 2025年 第1期8卷 23-39页
作者: Umar, Mubarak Albarka Chen, Zhanfang Shuaib, Khaled Liu, Yan College of Information Technology United Arab Emirates University Al Ain15551 United Arab Emirates School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Department of Computer Science Shantou University Guangdong Shantou515063 China
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence (AI) techniques (such as machine learning (ML) and deep learning (DL)) to build... 详细信息
来源: 评论