咨询与建议

限定检索结果

文献类型

  • 14,153 篇 会议
  • 11,044 篇 期刊文献
  • 138 册 图书

馆藏范围

  • 25,335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,165 篇 工学
    • 10,037 篇 计算机科学与技术...
    • 8,151 篇 软件工程
    • 4,544 篇 信息与通信工程
    • 2,375 篇 电子科学与技术(可...
    • 2,304 篇 控制科学与工程
    • 2,128 篇 电气工程
    • 1,645 篇 生物工程
    • 1,324 篇 光学工程
    • 1,229 篇 机械工程
    • 1,042 篇 仪器科学与技术
    • 908 篇 生物医学工程(可授...
    • 834 篇 化学工程与技术
    • 811 篇 动力工程及工程热...
    • 629 篇 网络空间安全
    • 590 篇 材料科学与工程(可...
    • 574 篇 交通运输工程
    • 507 篇 安全科学与工程
    • 441 篇 核科学与技术
  • 9,169 篇 理学
    • 4,175 篇 数学
    • 3,499 篇 物理学
    • 1,844 篇 生物学
    • 1,452 篇 统计学(可授理学、...
    • 940 篇 化学
    • 754 篇 系统科学
  • 3,889 篇 管理学
    • 2,581 篇 管理科学与工程(可...
    • 1,454 篇 图书情报与档案管...
    • 955 篇 工商管理
  • 994 篇 医学
    • 767 篇 临床医学
    • 679 篇 基础医学(可授医学...
  • 616 篇 法学
    • 510 篇 社会学
  • 336 篇 经济学
  • 220 篇 农学
  • 153 篇 教育学
  • 109 篇 文学
  • 93 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 524 篇 deep learning
  • 509 篇 feature extracti...
  • 408 篇 accuracy
  • 382 篇 internet of thin...
  • 352 篇 training
  • 325 篇 computational mo...
  • 303 篇 optimization
  • 294 篇 simulation
  • 288 篇 computer science
  • 273 篇 semantics
  • 267 篇 wireless communi...
  • 225 篇 real-time system...
  • 215 篇 machine learning
  • 198 篇 reinforcement le...
  • 192 篇 support vector m...
  • 187 篇 image segmentati...
  • 179 篇 object detection
  • 177 篇 neural networks
  • 169 篇 computer archite...
  • 161 篇 reliability

机构

  • 1,099 篇 cavendish labora...
  • 1,035 篇 department of ph...
  • 1,005 篇 school of comput...
  • 992 篇 physikalisches i...
  • 970 篇 oliver lodge lab...
  • 808 篇 university of ch...
  • 611 篇 fakultät physik ...
  • 563 篇 school of physic...
  • 548 篇 iccub universita...
  • 543 篇 horia hulubei na...
  • 538 篇 school of physic...
  • 523 篇 department of ph...
  • 523 篇 imperial college...
  • 516 篇 nikhef national ...
  • 515 篇 h.h. wills physi...
  • 513 篇 stfc rutherford ...
  • 509 篇 physik-institut ...
  • 502 篇 school of physic...
  • 500 篇 school of physic...
  • 498 篇 henryk niewodnic...

作者

  • 291 篇 barter w.
  • 271 篇 a. gomes
  • 266 篇 beiter a.
  • 253 篇 bellee v.
  • 250 篇 c. alexa
  • 250 篇 c. amelung
  • 250 篇 bowcock t.j.v.
  • 250 篇 blake t.
  • 248 篇 j. m. izen
  • 248 篇 g. bella
  • 248 篇 j. strandberg
  • 248 篇 d. calvet
  • 246 篇 g. spigo
  • 246 篇 brundu d.
  • 246 篇 s. chen
  • 244 篇 f. siegert
  • 229 篇 betancourt c.
  • 227 篇 borsato m.
  • 224 篇 y. tayalati
  • 222 篇 amato s.

语言

  • 21,425 篇 英文
  • 3,332 篇 其他
  • 593 篇 中文
  • 8 篇 法文
  • 6 篇 德文
  • 5 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Computer and Communication Engineering of University of Science and Technology Beijing"
25335 条 记 录,以下是561-570 订阅
排序:
Traffic Sign Recognition Based on Improved YOLOv5s  9
Traffic Sign Recognition Based on Improved YOLOv5s
收藏 引用
9th International Conference on Systems and Informatics, ICSAI 2023
作者: Zhang, Jin Cao, Fan Zhang, Jianming Li, Ying Wu, Sheng Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China
In the field of autonomous driving, it is of great significance for autonomous driving to detect traffic signs accurately. This paper proposes a method named MR_YOLO. This method addresses the issue of inadequate accu... 详细信息
来源: 评论
Heterogeneous Device Collaboration Based Federated Learning for Big Data Applications
收藏 引用
IEEE Transactions on Big Data 2024年 1-11页
作者: Wang, Wenhua Yang, Quan Liang, Yuzhu Xu, Yang Liu, Qin Wang, Tian School of Artificial Intelligence Beijing Normal University Beijing China College of Computer Science and Technology Huaqiao University Xiamen China College of Computer Science and Electronic Engineering Hunan University Changsha China BNU-UIC Institute of Artificial Intelligence and Future Networks Beijing Normal University Zhuhai China
In the era of Big Data, artificial intelligence and information science are the key technologies to extract the value of data and enhance the competitiveness of enterprises. The characteristics of distributed, small-s... 详细信息
来源: 评论
Stealthy False Data Injection Attack Using Improved Singular Value Decomposition in Smart Grid  7
Stealthy False Data Injection Attack Using Improved Singular...
收藏 引用
7th International Conference on Information and computer Technologies, ICICT 2024
作者: Yang, Liqun Li, Chunan Wei, Chaoren Yang, Jian Qu, Gang Zhang, Liang Zhang, Yipeng Li, Tongliang Beihang University School Of Cyber Science And Technology Beijing China Beihang University School Of Computer Science And Engineering Beijing China State Grid Corporation Of China East China Branch Shanghai China North China University Of Technology School Of Information Science And Technology Beijing China Beijing Information Science And Technology University Computer School Beijing China
Smart grid is a crucial Cyber-Physical system and is prone to cyber-attacks. In this paper, we propose a novel false data injection attack (FDIA) construction mechanism. Firstly, the measurements are preprocessed to e... 详细信息
来源: 评论
KSKV:Key-Strategy for Key-Value Data Collection with Local Differential Privacy
收藏 引用
computer Modeling in engineering & sciences 2024年 第6期139卷 3063-3083页
作者: Dan Zhao Yang You Chuanwen Luo Ting Chen Yang Liu Artificial Intelligence Development Research Center Institute of Scientific and Technical Information of ChinaBeijing100038China Industry Development Department NSFOCUS Inc.BeijingChina School of Information Science and Technology Beijing Forestry UniversityBeijing100083China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu610054China Institute of Computing Technology China Academy of Railway Sciences Corporation LimitedBeijing10081China
In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph ***,our co... 详细信息
来源: 评论
Joint Uplink and Downlink Robust Transmission for Cell-Free Networks
收藏 引用
IEEE Transactions on Wireless communications 2024年 第10期23卷 15308-15321页
作者: Zhang, Guangyang Lu, Yang Li, Mingchun Zhong, Zhangdui Quek, Tony Q. S. Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China Beijing Jiaotong University School of Electronic and Information Engineering Key Laboratory of Railway Industry of Broadband Mobile Information Communications Beijing100044 China Singapore University of Technology and Design Tampines487372 Singapore Yonsei University Seoul03722 Korea Republic of
This paper investigates the joint uplink (UL) and downlink (DL) robust transmission design for cell-free networks. The total data amount of the UL and DL transmissions is maximized in the presence of the statistical c... 详细信息
来源: 评论
Reinforcement Learning Based Edge Microservice Migration Strategy under Resource Constraints  5
Reinforcement Learning Based Edge Microservice Migration Str...
收藏 引用
5th International science and technology Conference Modern Network Technologies, MoNeTec 2024
作者: Dong, Mengxue Huo, Dongkun Zhang, Hong Zhang, Yan Hao, Yixue Hu, Long Chen, Min Huazhong University of Science and Technology School of Computer Science & Technology Wuhan China South China University of Technology School of Computer Science & Engineering Guangzhou China National University of Defense Technology College of Information and Communication Changsha China
Service migration can solve the issue of frequent user switching caused by the restricted coverage of edge cloud, which is currently a major focus of research. Simultaneously, microservice architecture gains traction ... 详细信息
来源: 评论
High-quality Trajectory Generation for Autonomous Driving: A Lightweight Federated Learning-based Diffusion Model
High-quality Trajectory Generation for Autonomous Driving: A...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Gao, Runquan Kang, Jiawen Lai, Bingkun Xu, Minrui Sun, Geng Zhang, Tao Zhang, Weiting Yang, Dong Guangdong University of Technology School of Automation Guangzhou China Nanyang Technological University School of Computer Science and Engineering Singapore Jilin University College of Computer Science and Technology Changchun China Beijing Jiaotong University School of Software Engineering Beijing China Beijing Jiaotong University School of Electronic and Information Engineering Beijing China
Vehicle trajectory data plays a pivotal role in simulation testing for autonomous driving. Hence, there exist well-established trajectory generation methods employing deep generative models to generate trajectories ma... 详细信息
来源: 评论
Privacy-Preserving Arbitrary Hollow Polygon Geometric Range Query Scheme in Fog Computing-Based IoVs  9
Privacy-Preserving Arbitrary Hollow Polygon Geometric Range ...
收藏 引用
9th International Conference on Systems and Informatics, ICSAI 2023
作者: Chen, Dongdong Jiang, Luyao Wang, Yi Gu, Ke Changsha University of Science & Technology School of Computer and Communication Engineering Changsha China
Geometric range query is an essential operation in many applications, including location-based service, querying on sensor networks, and computational geometry. In the Internet of Vehicles (IoVs) environment, the rang... 详细信息
来源: 评论
Adjusting Exploitation and Exploration Rates of Differential Evolution: A Novel Mutation Strategy  20th
Adjusting Exploitation and Exploration Rates of Differenti...
收藏 引用
20th International Forum on Digital TV and Wireless Multimedia communications, IFTC 2023
作者: Duan, Danting Zhang, Yuhui Zhong, Wei Ye, Long Zhang, Qin Ministry of Education Beijing China School of Computer Science and Technology Dongguan University of Technology Dongguan China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China
Differential evolution (DE) has attracted significant attention in recent years owing to its high performance in solving continuous problems. Up to now, a large number of variants of DE mutation strategy have been pro... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of computer science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论