咨询与建议

限定检索结果

文献类型

  • 13,929 篇 会议
  • 10,934 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 24,867 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,788 篇 工学
    • 9,943 篇 计算机科学与技术...
    • 8,129 篇 软件工程
    • 4,517 篇 信息与通信工程
    • 2,330 篇 电子科学与技术(可...
    • 2,252 篇 控制科学与工程
    • 2,103 篇 电气工程
    • 1,646 篇 生物工程
    • 1,347 篇 光学工程
    • 1,214 篇 机械工程
    • 1,038 篇 仪器科学与技术
    • 906 篇 生物医学工程(可授...
    • 837 篇 化学工程与技术
    • 803 篇 动力工程及工程热...
    • 623 篇 网络空间安全
    • 574 篇 材料科学与工程(可...
    • 568 篇 交通运输工程
    • 508 篇 安全科学与工程
  • 9,149 篇 理学
    • 4,159 篇 数学
    • 3,490 篇 物理学
    • 1,847 篇 生物学
    • 1,434 篇 统计学(可授理学、...
    • 947 篇 化学
    • 757 篇 系统科学
  • 3,901 篇 管理学
    • 2,593 篇 管理科学与工程(可...
    • 1,455 篇 图书情报与档案管...
    • 952 篇 工商管理
  • 993 篇 医学
    • 767 篇 临床医学
    • 682 篇 基础医学(可授医学...
    • 432 篇 公共卫生与预防医...
  • 615 篇 法学
    • 510 篇 社会学
  • 338 篇 经济学
  • 221 篇 农学
  • 152 篇 教育学
  • 110 篇 文学
  • 94 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 506 篇 deep learning
  • 486 篇 feature extracti...
  • 385 篇 accuracy
  • 370 篇 internet of thin...
  • 334 篇 training
  • 317 篇 computational mo...
  • 291 篇 simulation
  • 287 篇 computer science
  • 286 篇 optimization
  • 272 篇 semantics
  • 249 篇 wireless communi...
  • 215 篇 machine learning
  • 204 篇 real-time system...
  • 189 篇 reinforcement le...
  • 187 篇 support vector m...
  • 175 篇 image segmentati...
  • 172 篇 object detection
  • 169 篇 neural networks
  • 167 篇 educational inst...
  • 165 篇 computer archite...

机构

  • 1,098 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 997 篇 school of comput...
  • 993 篇 physikalisches i...
  • 969 篇 oliver lodge lab...
  • 788 篇 university of ch...
  • 611 篇 fakultät physik ...
  • 558 篇 school of physic...
  • 552 篇 iccub universita...
  • 550 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 529 篇 department of ph...
  • 527 篇 imperial college...
  • 523 篇 nikhef national ...
  • 521 篇 h.h. wills physi...
  • 519 篇 stfc rutherford ...
  • 516 篇 physik-institut ...
  • 508 篇 school of physic...
  • 508 篇 school of physic...
  • 503 篇 henryk niewodnic...

作者

  • 287 篇 barter w.
  • 271 篇 a. gomes
  • 267 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 249 篇 g. spigo
  • 248 篇 bowcock t.j.v.
  • 247 篇 s. chen
  • 246 篇 f. siegert
  • 246 篇 blake t.
  • 242 篇 brundu d.
  • 229 篇 betancourt c.
  • 227 篇 y. tayalati
  • 227 篇 borsato m.
  • 222 篇 amato s.

语言

  • 23,229 篇 英文
  • 1,049 篇 其他
  • 590 篇 中文
  • 7 篇 法文
  • 6 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Communication Engineering of University of Science and Technology Beijing"
24867 条 记 录,以下是51-60 订阅
排序:
Hybrid IT? Algorithm for Large-Scale Colored Traveling Salesman Problem
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1337-1345页
作者: Xueshi DONG College of Computer Science and Technology Qingdao University Beijing Key Laboratory of Urban Spatial Information Engineering School of Computer Science Wuhan University
In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem(CTSP). When solving large-scale CTSP with a scale of more than 1000d... 详细信息
来源: 评论
High-speed encrypted traffic classification by using payload features
收藏 引用
Digital communications and Networks 2025年 第2期11卷 412-423页
作者: Xinge Yan Liukun He Yifan Xu Jiuxin Cao Liangmin Wang Guyang Xie School of Cyber Science and Engineering Southeast University Nanjing Huafei Data Technology Co. Ltd. School of Computer Science and Communication Engineering Jiangsu University
Traffic encryption techniques facilitate cyberattackers to hide their presence and activities. Traffic classification is an important method to prevent network threats. However, due to the tremendous traffic volume an... 详细信息
来源: 评论
EAODroid: Android Malware Detection Based on Enhanced API Order
收藏 引用
Chinese Journal of Electronics 2023年 第5期32卷 1169-1178页
作者: HUANG Lu XUE Jingfeng WANG Yong QU Dacheng CHEN Junbao ZHANG Nan ZHANG Li School of Computer Science and Technology Beijing Institute of Technology Department of Media Engineering Communication University of Zhejiang
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ... 详细信息
来源: 评论
A Holistic Secure communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4417-4452页
作者: Fauziyah Zhaoshun Wang Mujahid Tabassum School of Computer and Communication Engineering University of Science and TechnologyBeijing100000China Noroff School of Technology and Digital Media(Noroff Accelerate) Noroff University CollegeKristiansand4612Norway
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in... 详细信息
来源: 评论
Overcoming Spatial Constraints in VR:A Survey of Redirected Walking Techniques
收藏 引用
Journal of computer science & technology 2024年 第4期39卷 841-870页
作者: Jia-Hong Liu Yang-Fu Ren Qi Wen Gan Kui Huang Fiona Xiao Yu Chen Er-Xia Luo Khang Yeu Tang Yue-Yao Fu Cheng-Wei Fan Sen-Zhe Xu Song-Hai Zhang Academy of Arts and Design Tsinghua UniversityBeijing 100084China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China College of Computer Technology and Application Qinghai UniversityXining 810016China Zhili College Tsinghua UniversityBeijing 100084China School of Computer Beijing Information Science and Technology UniversityBeijing 100192China Department of Physics Tsinghua UniversityBeijing 100084China School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
As the virtual reality(VR)technology strives to provide immersive and natural user experiences,the challenge of aligning vast virtual environments with limited physical spaces remains *** survey comprehensively explor... 详细信息
来源: 评论
Synergistic Spotting and Recognition of Micro-Expression via Temporal State Transition
Synergistic Spotting and Recognition of Micro-Expression via...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zou, Bochao Guo, Zizheng Qin, Wenfeng Li, Xin Wang, Kangsheng Ma, Huimin School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China School of Intelligence Science and Technology University of Science and Technology Beijing Beijing China
Micro-expressions are involuntary facial movements that cannot be consciously controlled, conveying subtle cues with substantial real-world applications. The analysis of micro-expressions generally involves two main t... 详细信息
来源: 评论
Selective sampling and temporal positional encoding for monocular video based 3D human pose and shape estimation  5
Selective sampling and temporal positional encoding for mono...
收藏 引用
5th International Conference on Signal Processing and computer science, SPCS 2024
作者: Hou, Yupeng Wen, Han Zeng, Guangping School of Computer & Communication Engineering University of Science and Technology Beijing Beijing100083 China
This study introduces a novel framework for video-based 3D human pose and shape estimation, termed Selective sampling and Temporal Positional Encoding (STPE). Our method leverages selective sampling and advanced posit... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its Security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论
Unsupervised Multi-view Pedestrian Detection  24
Unsupervised Multi-view Pedestrian Detection
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Mengyin Zhu, Chao Ren, Shiqi Yin, Xu-Cheng School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China
With the prosperity of the intelligent surveillance, multiple cameras have been applied to localize pedestrians more accurately. However, previous methods rely on laborious annotations of pedestrians in every frame an... 详细信息
来源: 评论
Analyzing Public Disputation of Autonomous Driving technology: A Study Based on Data Mining  4
Analyzing Public Disputation of Autonomous Driving Technolog...
收藏 引用
4th IEEE International Conference on Digital Twins and Parallel Intelligence, DTPI 2024
作者: Lv, Lehao Chen, Yuan Ma, Fanshu Li, Yongwei University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China
With the rapid development of autonomous driving technology, public's opinion of this technology shows diversification and complexity. The discussion about autonomous driving online has a large quantity and divers... 详细信息
来源: 评论