咨询与建议

限定检索结果

文献类型

  • 2,005 篇 期刊文献
  • 1,807 篇 会议
  • 1 册 图书

馆藏范围

  • 3,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,507 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,333 篇 软件工程
    • 639 篇 信息与通信工程
    • 333 篇 电气工程
    • 281 篇 电子科学与技术(可...
    • 280 篇 生物工程
    • 252 篇 光学工程
    • 240 篇 控制科学与工程
    • 194 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 154 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 63 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,465 篇 理学
    • 688 篇 数学
    • 555 篇 物理学
    • 306 篇 生物学
    • 219 篇 统计学(可授理学、...
    • 164 篇 化学
    • 100 篇 系统科学
  • 597 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 156 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 89 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 111 篇 semantics
  • 93 篇 deep learning
  • 79 篇 accuracy
  • 79 篇 training
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 52 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 40 篇 object detection
  • 40 篇 visualization
  • 38 篇 image segmentati...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 37 篇 convolutional ne...
  • 36 篇 machine learning
  • 34 篇 contrastive lear...

机构

  • 271 篇 university of ch...
  • 269 篇 iccub universita...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 258 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 254 篇 h.h. wills physi...
  • 254 篇 infn sezione di ...
  • 253 篇 van swinderen in...
  • 250 篇 horia hulubei na...
  • 245 篇 department of ph...
  • 239 篇 institute of par...
  • 238 篇 imperial college...
  • 237 篇 stfc rutherford ...
  • 223 篇 shandong provinc...
  • 222 篇 infn sezione di ...
  • 208 篇 infn sezione di ...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 154 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 152 篇 bencivenni g.
  • 151 篇 bowcock t.j.v.
  • 151 篇 byczynski w.
  • 150 篇 barbetti m.

语言

  • 3,528 篇 英文
  • 198 篇 其他
  • 93 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3813 条 记 录,以下是41-50 订阅
排序:
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2023年 第2期5卷 81-85页
作者: Sun, Jianwei Zhang, Heng Wang, Xin Yang, Ming Zhang, Jian Li, Hongran Gong, Chenglong Jiangsu Ocean University School of Electronic Engineering Lianyungang222000 China Jiangsu Ocean University School of Computer Engineering Lianyungang222000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center Jinan250014 China
In this letter, a novel application method of reconfigurable intelligent surfaces (RIS) is proposed, which installs a RIS on an unmanned aerial vehicle (UAV) rather than fixed to buildings. When the location informati... 详细信息
来源: 评论
Research on drill bit sound anomaly detection method based on deep learning  9
Research on drill bit sound anomaly detection method based o...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and computer Engineering, ISAEECE 2024
作者: Zhang, Xu Wang, Fuqiang Zhao, Wei Yang, Shumei Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Detecting anomalies in mechanical equipment is crucial in the manufacturing industry, which helps to prevent accidents and thus minimize economic losses. However, due to the complexity of drilling sound waveform, shor... 详细信息
来源: 评论
Heterogeneous many-core optimization method for PipeBCGs solver in PETSc on SW26010-pro  3
Heterogeneous many-core optimization method for PipeBCGs sol...
收藏 引用
3rd International Conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2024
作者: Wang, Xinhua Pan, Jingshan Tian, Min Xu, Chaoshuai Liu, Huazeng Wei, Zhenguo Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PETSc (Portable, Extensible Toolkit for Scientific Computation) library is one of the fundamental general-purpose numerical libraries in high-performance computing environments. It is widely employed for solving p... 详细信息
来源: 评论
Research on a robust sensor maneuvering target tracking algorithm  4
Research on a robust sensor maneuvering target tracking algo...
收藏 引用
4th International Conference on Digital Signal and computer Communications, DSCC 2024
作者: Xu, Gexing Wang, Fuqiang Zhao, Wei Zhang, Jianan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In multi-sensor tracking, tracking targets stably and accurately is one of the primary tasks. Aiming at the problems of outlier interference during measurement and unstable tracking filtering in complex scenarios, thi... 详细信息
来源: 评论
Adversarial example generation method based on normal distribution function optimization iterative gradient  9
Adversarial example generation method based on normal distri...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and computer Engineering, ISAEECE 2024
作者: Jin, Xing Wang, Fuqiang Zhao, Wei Wang, Kun Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Adversarial attack refers to the destruction of deep learning models by adding perturbations to the image. At present, there remains room for improvement in black box attacks, particularly when dealing with the models... 详细信息
来源: 评论
A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy Automation  29
A Drug Box Recognition System Based on Deep Learning and Clo...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhu, Honglei Dong, Anming Yu, Jiguo School of Computer Science and Technology Jinan China Big Data Institute Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Drug box recognition is an integral part of the pharmacy automation system (PAS), which checks for discrepancies between the drugs provided by the system and the doctor's prescription with the help of modern image... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
Ferroelectrically gated two-dimensional bismuth oxyselenides for strain-invariant flexible synaptic thin-film transistors
收藏 引用
science China(Information sciences) 2025年 第5期68卷 396-403页
作者: Jie WEN Fei XIAO Zheng-Dong LUO Dongxin TAN Xuetao GAN Dawei ZHANG Zhufei CHU Yinshui XIA Yan LIU Genquan HAN Hangzhou Institute of Technology Xidian University State Key Discipline Laboratory of Wide Band Gap Semiconductor Technology School of MicroelectronicsXidian University Key Laboratory of Light Field Manipulation and Information Acquisition Ministry of Industry and Information Technology Shaanxi Key Laboratory of Optical Information Technology School of Physical Science and Technology Northwestern Polytechnical University School of Materials Science and Engineering The University of New South Wales ARC Centre of Excellence in Future Low-Energy Electronics Technologies (FLEET) The University of New South Wales Faculty of Electrical Engineering Computer Science Ningbo University
Two-dimensional van der Waals(2D vdW) semiconductors have proven to be of great importance for flexible thinfilm transistors(TFTs) owing to their intrinsic mechanical flexibility and superior electronic *** partic... 详细信息
来源: 评论