咨询与建议

限定检索结果

文献类型

  • 14,110 篇 会议
  • 11,155 篇 期刊文献
  • 138 册 图书

馆藏范围

  • 25,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,108 篇 工学
    • 10,134 篇 计算机科学与技术...
    • 8,192 篇 软件工程
    • 4,587 篇 信息与通信工程
    • 2,390 篇 电子科学与技术(可...
    • 2,374 篇 控制科学与工程
    • 2,168 篇 电气工程
    • 1,654 篇 生物工程
    • 1,361 篇 光学工程
    • 1,238 篇 机械工程
    • 1,049 篇 仪器科学与技术
    • 918 篇 生物医学工程(可授...
    • 844 篇 化学工程与技术
    • 816 篇 动力工程及工程热...
    • 637 篇 网络空间安全
    • 586 篇 材料科学与工程(可...
    • 579 篇 交通运输工程
    • 516 篇 安全科学与工程
  • 9,238 篇 理学
    • 4,194 篇 数学
    • 3,526 篇 物理学
    • 1,860 篇 生物学
    • 1,447 篇 统计学(可授理学、...
    • 952 篇 化学
    • 759 篇 系统科学
  • 3,926 篇 管理学
    • 2,605 篇 管理科学与工程(可...
    • 1,468 篇 图书情报与档案管...
    • 955 篇 工商管理
  • 1,011 篇 医学
    • 778 篇 临床医学
    • 689 篇 基础医学(可授医学...
    • 440 篇 公共卫生与预防医...
  • 615 篇 法学
    • 509 篇 社会学
  • 336 篇 经济学
  • 222 篇 农学
  • 154 篇 教育学
  • 109 篇 文学
  • 94 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 526 篇 deep learning
  • 498 篇 feature extracti...
  • 399 篇 accuracy
  • 371 篇 internet of thin...
  • 354 篇 training
  • 315 篇 computational mo...
  • 292 篇 simulation
  • 289 篇 computer science
  • 287 篇 optimization
  • 279 篇 semantics
  • 245 篇 wireless communi...
  • 222 篇 machine learning
  • 209 篇 real-time system...
  • 196 篇 reinforcement le...
  • 189 篇 support vector m...
  • 179 篇 object detection
  • 178 篇 image segmentati...
  • 165 篇 computer archite...
  • 163 篇 neural networks
  • 162 篇 educational inst...

机构

  • 1,100 篇 cavendish labora...
  • 1,034 篇 department of ph...
  • 1,009 篇 school of comput...
  • 991 篇 physikalisches i...
  • 971 篇 oliver lodge lab...
  • 794 篇 university of ch...
  • 613 篇 fakultät physik ...
  • 563 篇 school of physic...
  • 551 篇 iccub universita...
  • 548 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 527 篇 department of ph...
  • 525 篇 imperial college...
  • 521 篇 nikhef national ...
  • 519 篇 h.h. wills physi...
  • 517 篇 stfc rutherford ...
  • 514 篇 physik-institut ...
  • 506 篇 school of physic...
  • 504 篇 school of physic...
  • 501 篇 henryk niewodnic...

作者

  • 287 篇 barter w.
  • 268 篇 a. gomes
  • 266 篇 beiter a.
  • 251 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 248 篇 bowcock t.j.v.
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 246 篇 g. spigo
  • 246 篇 blake t.
  • 246 篇 s. chen
  • 243 篇 f. siegert
  • 242 篇 brundu d.
  • 228 篇 betancourt c.
  • 225 篇 borsato m.
  • 224 篇 y. tayalati
  • 222 篇 amato s.

语言

  • 23,092 篇 英文
  • 1,712 篇 其他
  • 605 篇 中文
  • 5 篇 法文
  • 5 篇 日文
  • 4 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Computer and Communication Engineering University of Science and Technology Beijing"
25403 条 记 录,以下是251-260 订阅
排序:
A Dam Deformation Prediction Model Based on SVM-RFE  3rd
A Dam Deformation Prediction Model Based on SVM-RFE
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and Intelligent Mining, MLCCIM 2024
作者: Cai, Shuo Zhang, Jie Gao, Huixin School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410076 China
Dams play a pivotal part in national economic development, and to protect the operation of dams, monitoring and prediction of dam deformation are crucial. In response to the fact that the commonly used HST (hydrostati... 详细信息
来源: 评论
Community Topic Propagation Prediction-Based Malicious User Detection Scheme in Overlapping Community Networks  6
Community Topic Propagation Prediction-Based Malicious User ...
收藏 引用
6th International Conference on Next Generation Data-Driven Networks, NGDN 2024
作者: Deng, Yang Liu, Jian Gu, Ke Chen, Dongdong Li, Yongkang Jiang, LuYao Changsha University of Science & Technology School of Computer and Communication Engineering ChangSha China
In this paper, we propose a malicious user detection scheme for overlapping communities based on community topic propagation prediction. First, we construct a malicious topic classification model based on topic text f... 详细信息
来源: 评论
BEFNet: A Hybrid CNN-Mamba Architecture for Accurate Skin Lesion Image Segmentation
BEFNet: A Hybrid CNN-Mamba Architecture for Accurate Skin Le...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Wei Luo, Yuewen Wang, Xin Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China
Accurate image segmentation of skin lesions is crucial for the detection and treatment of skin cancer. Based on the modern state space model Mamba, a novel hybrid CNN-Mamba network (BEFNet) is proposed. Specifically, ... 详细信息
来源: 评论
Cross-Coupling Matrix Reconfiguration Using the Levenberg-Marquardt Algorithm on Orthogonal Groups
收藏 引用
IEEE Microwave and Wireless technology Letters 2025年 第4期35卷 380-383页
作者: Wang, Xiyuan Ding, Hai Di, Yingjie Beijing Information Science and Technology University School of Information and Communication Engineering Beijing100101 China Comba Telecom Ltd. Guangdong Guangzhou510663 China
This letter introduces a Levenberg-Marquardt (LM) algorithm on the orthogonal group to reconfigure the coupling matrix (CM) for cross-coupled resonator filters of general topology. By leveraging the framework of Lie g... 详细信息
来源: 评论
Multi-Stage Interaction and Multi-Scale Reconstruction: A Hybrid Attention Network for Skin Lesion Image Segmentation  10
Multi-Stage Interaction and Multi-Scale Reconstruction: A Hy...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wang, Wei Luo, Yuewen Wang, Xin Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China
Accurate segmentation of skin lesion areas is significant for the diagnosis and analysis of skin diseases. Due to the irregular and blurred boundaries between healthy skin and lesion areas and sometimes the interferen... 详细信息
来源: 评论
Emergency Events-Based Users Privacy Protection Scheme in Social Networks  6
Emergency Events-Based Users Privacy Protection Scheme in So...
收藏 引用
6th International Conference on Next Generation Data-Driven Networks, NGDN 2024
作者: Li, Yongkang Zuo, Yiming Gu, Ke Deng, Yang Liu, Jian Changsha University of Science & Technology School of Computer and Communication Engineering Changsha China
Aiming at the problem of user privacy protection under social network emergencies, this paper proposes a social network user privacy protection scheme based on user-event correlation model. In this scheme, firstly, we... 详细信息
来源: 评论
Security, Privacy, and Reliability in Ubiquitous Intelligence Empowered Internet of Vehicles
收藏 引用
IEEE Internet of Things Magazine 2023年 第3期6卷 92-96页
作者: Zhang, Chuan Hu, Chenfei Zhang, Weiting Liang, Haotian Lei, Dian Zhu, Liehuang School of Cyberspace Science and Technology Beijing Institute of Technology China School of Computer Science and Technology Beijing Institute of Technology China School of Electronic and Information Engineering Beijing Jiaotong University China
Ubiquitous intelligence empowered internet of vehicles (UIIoV) is an emerging paradigm where network entities such as mobile vehicles, edge/cloud servers, and intermediate nodes interact to achieve effective data sens... 详细信息
来源: 评论
Geometric prior guided hybrid deep neural network for facial beauty analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 467-480页
作者: Tianhao Peng Mu Li Fangmei Chen Yong Xu David Zhang The School of Computer Science and Technology Guizhou UniversityGuiyangChina Department of Automation Moutai InstituteRenhuaiGuizhouChina The School of Computer Science and Technology Harbin Institute of TechnologyShenzhenShenzhenChina The Information and Communication Engineering Department Dalian Minzu UniversityDalianChina The School of Data Science The Chinese University of Hong KongShenzhenShenzhenChina
Facial beauty analysis is an important topic in human *** may be used as a guidance for face beautification applications such as cosmetic *** neural networks(DNNs)have recently been adopted for facial beauty analysis ... 详细信息
来源: 评论
Image Splicing Detection Based on Hybrid CNN-Transfarmer Network  2
Image Splicing Detection Based on Hybrid CNN-Transfarmer Net...
收藏 引用
2nd International Conference on Machine Vision, Image Processing and Imaging technology, MVIPIT 2024
作者: Jiang, Ningjing Zhang, Dengyong Li, Feng School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China
-Image splicing is widely recognized as the predominant technique in image manipulation. Most current splicing detection methods have low accuracy and poor localization of small-sized splicing areas. Therefore, we des... 详细信息
来源: 评论
Comprehensive Influence-Based Social User Hiding Scheme in Overlapping Community Networks  6
Comprehensive Influence-Based Social User Hiding Scheme in O...
收藏 引用
6th International Conference on Next Generation Data-Driven Networks, NGDN 2024
作者: Liu, Jian Gu, Ke Deng, Yang Lei, Jiaqi Changsha University of Science & Technology School of Computer and Communication Engineering ChangSha China
As overlapping community detection algorithms continue to mature, the issue of information being over-mined has also become apparent. Existing overlapping community hiding algorithms are inadequate. Therefore, in this... 详细信息
来源: 评论