咨询与建议

限定检索结果

文献类型

  • 14,110 篇 会议
  • 11,155 篇 期刊文献
  • 138 册 图书

馆藏范围

  • 25,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,108 篇 工学
    • 10,134 篇 计算机科学与技术...
    • 8,192 篇 软件工程
    • 4,587 篇 信息与通信工程
    • 2,390 篇 电子科学与技术(可...
    • 2,374 篇 控制科学与工程
    • 2,168 篇 电气工程
    • 1,654 篇 生物工程
    • 1,361 篇 光学工程
    • 1,238 篇 机械工程
    • 1,049 篇 仪器科学与技术
    • 918 篇 生物医学工程(可授...
    • 844 篇 化学工程与技术
    • 816 篇 动力工程及工程热...
    • 637 篇 网络空间安全
    • 586 篇 材料科学与工程(可...
    • 579 篇 交通运输工程
    • 516 篇 安全科学与工程
  • 9,238 篇 理学
    • 4,194 篇 数学
    • 3,526 篇 物理学
    • 1,860 篇 生物学
    • 1,447 篇 统计学(可授理学、...
    • 952 篇 化学
    • 759 篇 系统科学
  • 3,926 篇 管理学
    • 2,605 篇 管理科学与工程(可...
    • 1,468 篇 图书情报与档案管...
    • 955 篇 工商管理
  • 1,011 篇 医学
    • 778 篇 临床医学
    • 689 篇 基础医学(可授医学...
    • 440 篇 公共卫生与预防医...
  • 615 篇 法学
    • 509 篇 社会学
  • 336 篇 经济学
  • 222 篇 农学
  • 154 篇 教育学
  • 109 篇 文学
  • 94 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 526 篇 deep learning
  • 498 篇 feature extracti...
  • 399 篇 accuracy
  • 371 篇 internet of thin...
  • 354 篇 training
  • 315 篇 computational mo...
  • 292 篇 simulation
  • 289 篇 computer science
  • 287 篇 optimization
  • 279 篇 semantics
  • 245 篇 wireless communi...
  • 222 篇 machine learning
  • 209 篇 real-time system...
  • 196 篇 reinforcement le...
  • 189 篇 support vector m...
  • 179 篇 object detection
  • 178 篇 image segmentati...
  • 165 篇 computer archite...
  • 163 篇 neural networks
  • 162 篇 educational inst...

机构

  • 1,100 篇 cavendish labora...
  • 1,034 篇 department of ph...
  • 1,009 篇 school of comput...
  • 991 篇 physikalisches i...
  • 971 篇 oliver lodge lab...
  • 794 篇 university of ch...
  • 613 篇 fakultät physik ...
  • 563 篇 school of physic...
  • 551 篇 iccub universita...
  • 548 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 527 篇 department of ph...
  • 525 篇 imperial college...
  • 521 篇 nikhef national ...
  • 519 篇 h.h. wills physi...
  • 517 篇 stfc rutherford ...
  • 514 篇 physik-institut ...
  • 506 篇 school of physic...
  • 504 篇 school of physic...
  • 501 篇 henryk niewodnic...

作者

  • 287 篇 barter w.
  • 268 篇 a. gomes
  • 266 篇 beiter a.
  • 251 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 248 篇 bowcock t.j.v.
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 246 篇 g. spigo
  • 246 篇 blake t.
  • 246 篇 s. chen
  • 243 篇 f. siegert
  • 242 篇 brundu d.
  • 228 篇 betancourt c.
  • 225 篇 borsato m.
  • 224 篇 y. tayalati
  • 222 篇 amato s.

语言

  • 23,092 篇 英文
  • 1,712 篇 其他
  • 605 篇 中文
  • 5 篇 法文
  • 5 篇 日文
  • 4 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Computer and Communication Engineering of University of Science and Technology Beijing"
25403 条 记 录,以下是4971-4980 订阅
排序:
TopicDVC: Dense Video Captioning with Topic Guidance
TopicDVC: Dense Video Captioning with Topic Guidance
收藏 引用
Edge Computing and Scalable Cloud (EdgeCom), IEEE International Conference on
作者: Wei Chen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China
Dense video captioning involves detecting and describing multiple events within a video coherently. Events within a video typically share a common topic, and incorporating this topic information into the model can enh... 详细信息
来源: 评论
An Advanced Approach for performing Cyber Fraud using Banner Grabbing  5
An Advanced Approach for performing Cyber Fraud using Banner...
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kaushik, Keshav Punhani, Ishika Sharma, Smita Martolia, Mamta University of Petroleum and Energy Studies School of Computer Science Dehradun India Amity University Department of Electronics and Communication Engineering Uttar Pradesh India G L Bajaj Institute of Technology Management Greater Noida Department of Computer Science and Engineering Uttar Pradesh India
In this paper, the authors have discussed how cyber-attackers or hackers can do cyber fraud or can steal information from some systems using the banner grabbing approach. Cybercriminals and security personnel utilize ... 详细信息
来源: 评论
Deep Unfolding 3D Non-Local Transformer Network for Hyperspectral Snapshot Compressive Imaging
Deep Unfolding 3D Non-Local Transformer Network for Hyperspe...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zheng Zhou Zongxin Liu Yongyong Chen Bingzhi Chen Biqing Zeng Yicong Zhou School of Electronics and Communication Engineering Guangzhou University Guangzhou China School of Software South China Normal University Foshan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of Computer and Information Science University of Macau Macau China
Hyperspectral compressive imaging has shown remarkable advancements through the adoption of deep unfolding frameworks, which integrate the proximal mapping prior into the data fidelity term to formulate the reconstruc... 详细信息
来源: 评论
Frequency Agile Strategy Design of Radar Network for Wideband Sweep Jamming via Coalition Formation Game
收藏 引用
IEEE Transactions on Aerospace and Electronic Systems 2025年 第3期61卷 7906-7919页
作者: Liao, Maosen Xiong, Kui Zhang, Long Yu, Xianxiang Cui, Guolong University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Laboratory of Electromagnetic Space Cognition and Intelligent Control Technology Beijing100089 China School of Information and Communication Engineering Chengdu611731 China UESTC Shenzhen Institute for Advanced Study Chengdu611731 China
This article proposes an intelligent frequency agile design strategy for radar network using coalition game theory to counter wideband sweep jamming, which is formulated as a two-stage decision-making problem. In the ... 详细信息
来源: 评论
Toward Realistic Camouflaged Object Detection: Benchmarks and Method
arXiv
收藏 引用
arXiv 2025年
作者: Xin, Zhimeng Wu, Tianxu Chen, Shiming Ye, Shuo Xie, Zijing Zou, Yixiong You, Xinge Guo, Yufei The School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China The School of Computer Science & Technology Huazhong University of Science and Technology Wuhan430074 China The Intelligent Science and Technology Academy of CASIC Beijing100041 China
Camouflaged object detection (COD) primarily relies on semantic or instance segmentation methods. While these methods have made significant advancements in identifying the contours of camouflaged objects, they may be ... 详细信息
来源: 评论
Secure Node Identification Through Covert Clock Feature Extraction
Secure Node Identification Through Covert Clock Feature Extr...
收藏 引用
IEEE Conference on computer communications Workshops, INFOCOM Wksps
作者: Xintao Huan Wen Chen Changfan Wu Jiamin Liu Yixuan Zou Shengkang Zhang School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China School of Electronic Engineering and Computer Science Queen Mary University of London London U.K. Beijing Institute of Radio Metrology and Measurement Beijing China
Node identification is the first line of defense for wireless networks' security that prevents illegal devices from accessing the network. Hardware features originating from innate hardware imperfections are consi... 详细信息
来源: 评论
A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model  21
A Novel Malware Detection Approach Based on Behavioral Seman...
收藏 引用
21st IEEE International Conference on communication technology, ICCT 2021
作者: Han, Weijie Xue, Jingfeng Qian, Kechang Space Engineering University School of Space Information Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
Malware has been a major security threat to cyberspace. To identify the maliciousness of a program, researchers usually extract relevant semantic features from the program to analyze the operational intent of the prog... 详细信息
来源: 评论
Improved YOLOv5 Algorithm for Intensive Pedestrian Detection  29th
Improved YOLOv5 Algorithm for Intensive Pedestrian Detection
收藏 引用
29th International Conference on Computational and Experimental engineering and sciences, ICCES 2023
作者: Zhao, Siqi Tian, Ye Hao, Ning Zhou, Jianbo Zhang, Xian College of Computer Science and Technology Harbin Engineering University Harbin150001 China Modeling and Emulation in E-Government National Engineering Laboratory Harbin150001 China Hangzhou Institute of Technology Xidian University Hangzhou311200 China Beijing Institute of Spacecraft Environment Engineering Haidian District Space City Beijing100048 China Hangzhou Hikvision Digital Technology Co. Ltd Hangzhou310051 China School of Physics Mathematics and Computing University of Western Australia PerthWA6009 Australia
Pedestrian detection is an important basic research topic in the field of target detection, which can provide effective information support for public places with large flow density such as shopping malls and scenic s... 详细信息
来源: 评论
Robust Dual-Modal Speech Keyword Spotting for XR Headsets
arXiv
收藏 引用
arXiv 2024年
作者: Cai, Zhuojiang Ma, Yuhan Lu, Feng State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China
While speech interaction finds widespread utility within the Extended Reality (XR) domain, conventional vocal speech keyword spotting systems continue to grapple with formidable challenges, including suboptimal perfor... 详细信息
来源: 评论
Adaptive Trajectory Planning in Autonomous Vehicles: A Hierarchical Reinforcement Learning Approach with Soft Actor-Critic
Adaptive Trajectory Planning in Autonomous Vehicles: A Hiera...
收藏 引用
International Symposium on Advanced Networks and Telecommunication Systems (ANTS)
作者: Amit Kumar Sharma Amit Choudhary Rajat Chaudhary Aditya Bhardwaj Anjum Mohd Aslam Electronics and Communication Sir Chhotu Ram Institute of Engineering and Technology Meerut Uttar Pradesh India Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden School of Computer Science and Engineering Technology Bennett University Greater Noida India
This study introduces a methodology enabling automated vehicles to perform lane changes effectively within complex road systems. It emphasizes a hierarchical driver behavior framework that integrates decision-making w... 详细信息
来源: 评论