咨询与建议

限定检索结果

文献类型

  • 2,478 篇 会议
  • 1,861 篇 期刊文献

馆藏范围

  • 4,339 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 1,641 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 538 篇 信息与通信工程
    • 412 篇 控制科学与工程
    • 391 篇 电子科学与技术(可...
    • 378 篇 电气工程
    • 302 篇 生物工程
    • 284 篇 光学工程
    • 241 篇 机械工程
    • 204 篇 生物医学工程(可授...
    • 191 篇 仪器科学与技术
    • 147 篇 化学工程与技术
    • 141 篇 动力工程及工程热...
    • 126 篇 交通运输工程
    • 103 篇 材料科学与工程(可...
    • 92 篇 土木工程
    • 86 篇 建筑学
  • 1,471 篇 理学
    • 691 篇 数学
    • 447 篇 物理学
    • 346 篇 生物学
    • 226 篇 统计学(可授理学、...
    • 160 篇 化学
    • 151 篇 系统科学
  • 705 篇 管理学
    • 467 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 192 篇 工商管理
  • 215 篇 医学
    • 180 篇 临床医学
    • 127 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 79 篇 经济学
  • 51 篇 农学
  • 35 篇 教育学
  • 13 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 85 篇 feature extracti...
  • 81 篇 deep learning
  • 71 篇 computer science
  • 68 篇 data mining
  • 67 篇 computational mo...
  • 67 篇 training
  • 63 篇 optimization
  • 63 篇 semantics
  • 62 篇 accuracy
  • 61 篇 machine learning
  • 43 篇 object detection
  • 43 篇 protocols
  • 41 篇 mathematical mod...
  • 39 篇 reliability
  • 39 篇 wireless sensor ...
  • 38 篇 neural networks
  • 38 篇 analytical model...
  • 37 篇 data models
  • 36 篇 computer archite...
  • 36 篇 predictive model...

机构

  • 99 篇 national enginee...
  • 77 篇 school of comput...
  • 47 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 national enginee...
  • 39 篇 school of cyber ...
  • 38 篇 school of optica...
  • 36 篇 school of inform...
  • 36 篇 school of comput...
  • 28 篇 huazhong univers...
  • 28 篇 national enginee...
  • 28 篇 school of comput...
  • 26 篇 hubei province k...
  • 25 篇 school of comput...
  • 25 篇 state key labora...
  • 24 篇 school of comput...
  • 24 篇 department of co...
  • 23 篇 hubei key labora...
  • 23 篇 department of el...
  • 23 篇 school of electr...

作者

  • 105 篇 hai jin
  • 101 篇 jin hai
  • 30 篇 xiaofei liao
  • 27 篇 yang yang
  • 27 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 liao xiaofei
  • 21 篇 chen shu-ching
  • 19 篇 hu shengshan
  • 18 篇 zhigang zhang
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 xin xin
  • 15 篇 li peng
  • 15 篇 陈景标
  • 14 篇 long zheng

语言

  • 4,059 篇 英文
  • 156 篇 其他
  • 113 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of Computer Science and System Engineering"
4339 条 记 录,以下是131-140 订阅
排序:
A CNN-LSTM Network for Classification of Attention Deficit Hyperactivity Disorder from EEG Data  41
A CNN-LSTM Network for Classification of Attention Deficit H...
收藏 引用
第41届中国控制会议
作者: Yaru Zhang Xiangxin Tan Yue Gu Key Laboratory of Computer Vision and System (Ministry of Education) School of Computer Science and EngineeringTianjin University of Technology Engineering Research Center of Learning-Based Intelligent system Ministry of Education
Attention deficit hyperactivity disorder(ADHD) is one of the most common neuropsychiatric disorders in children,with core symptoms of inattention,impulsivity,and *** a result,early detection and treatment are *** this... 详细信息
来源: 评论
Enhancing Data Security in Networking Through AES Encryption and Steganography: A Comparative Analysis of DES and AES Algorithms  3
Enhancing Data Security in Networking Through AES Encryption...
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Balodi, Ayush Malik, Priyansh Rawat, Prerna Das, Purushottam Singh, Karan Manjul, Manisha Graphic Era Hill University Computer Science and Engineering Uttarakhand India Graphic Era Deemed to Be University Computer Science and Engineering Uttarakhand India School of Computer and System Science Jawaharlal Nehru University New Delhi India Dseu Gb Pant Okhla Campus I Computer Science and Engineering New Delhi India
Information transfer has accelerated in the modern era. Numerous security difficulties were caused by the increasing transmission. The most popular methods to address this issue are cryptography and steganography. Ste... 详细信息
来源: 评论
Data science based Recommendation system - An Application of computer science  14
Data Science based Recommendation System - An Application of...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Khan, Zeba Rahman, Abdul Applied College Jazan University Department of Computer and Information System Jazan Saudi Arabia Presidency University School of Computer Science and Engineering & Information Science Rajanukunte Yelahanka Bangalore India
Recommender system (RS) has emanated as the most popular application of e-commerce websites. In the e-commerce business, collaborative filtering based RS systems suggest products to the customers and find the interest... 详细信息
来源: 评论
Adaptive Confidence Threshold for ByteTrack in Multi-Object Tracking  12
Adaptive Confidence Threshold for ByteTrack in Multi-Object ...
收藏 引用
12th IEEE International Conference on Control, Automation and Information sciences, ICCAIS 2023
作者: Ma, Linh Van Hussain, Muhammad Ishfaq Park, JongHyun Kim, Jeongbae Jeon, Moongu Gwangju Institute of Science and Technology School of Electrical Engineering and Computer Science Korea Republic of Pusan National University Department of Mechanical-IT Convergence System Engineering Busan Korea Republic of
We investigate the application of ByteTrack in the realm of multiple object tracking. ByteTrack, a simple tracking algorithm, enables the simultaneous tracking of multiple objects by strategically incorporating detect... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd International Conference on Blockchain Technology and Information Security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Position Encoding Based Convolutional Neural Networks for Machine Remaining Useful Life Prediction
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1427-1439页
作者: Ruibing Jin Min Wu Keyu Wu Kaizhou Gao Zhenghua Chen Xiaoli Li Institute for Infocomm Research Agency for ScienceTechnology and Research(A*STAR)Singapore 138632Singapore School of Computer Science Liaocheng UniversityLiaocheng 252000 Macao Institute of System Engineering Macao University of Science and TechnologyTaipaMacao 999078China
Accurate remaining useful life(RUL)prediction is important in industrial *** prevents machines from working under failure conditions,and ensures that the industrial system works reliably and ***,many deep learning bas... 详细信息
来源: 评论
Demystifying Ethereum account diversity:observations,models and analysis
收藏 引用
Frontiers of computer science 2022年 第4期16卷 119-130页
作者: Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin Clusters and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Centre for Distributed and High Performance Computing School of Information TechnologiesThe University of SydneyCamperdownNew South Wales2006Australia
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,toke... 详细信息
来源: 评论
Strategies for classifying water quality in the Cauvery River using a federated learning technique
收藏 引用
International Journal of Cognitive Computing in engineering 2023年 第1期4卷 187-193页
作者: J, Vellingiri K, Kalaivanan P, Gopinath M C, Gobinath Subramaniam, Prabhakar Rontala Rangarajan, Sarathkumar School of Information Technology and Engineering Vellore Institute of Technology Vellore632014 India School of Computer Science and Engineering Vellore Institute of Technology Vellore632014 India Information System and Technology University of KwaZulu-Natal Durban South Africa Victorian Institute of Technology Melbourne Australia
Artificial intelligence methods are emerging techniques used in the field of environmental protection, especially in the analysis of air, water, and soil quality. AI analyzes vast amounts of environmental data to pred... 详细信息
来源: 评论
Towards High-throughput and Low-latency Billion-scale Vector Search via CPU/GPU Collaborative Filtering and Re-ranking  23
Towards High-throughput and Low-latency Billion-scale Vector...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Tian, Bing Liu, Haikun Tang, Yuhang Xiao, Shihai Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Xuecang Zhu, Junhua Zhang, Yu National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Huawei Technologies Co. Ltd. China
Approximate nearest neighbor search (ANNS) has emerged as a crucial component of database and AI infrastructure. Ever-increasing vector datasets pose significant challenges in terms of performance, cost, and accuracy ... 详细信息
来源: 评论