咨询与建议

限定检索结果

文献类型

  • 2,348 篇 期刊文献
  • 2,235 篇 会议
  • 66 册 图书

馆藏范围

  • 4,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,915 篇 工学
    • 1,589 篇 计算机科学与技术...
    • 1,288 篇 软件工程
    • 650 篇 信息与通信工程
    • 604 篇 电气工程
    • 556 篇 控制科学与工程
    • 488 篇 电子科学与技术(可...
    • 288 篇 生物工程
    • 267 篇 光学工程
    • 245 篇 机械工程
    • 221 篇 动力工程及工程热...
    • 214 篇 生物医学工程(可授...
    • 155 篇 仪器科学与技术
    • 153 篇 材料科学与工程(可...
    • 152 篇 化学工程与技术
    • 90 篇 交通运输工程
    • 79 篇 力学(可授工学、理...
    • 76 篇 安全科学与工程
  • 1,799 篇 理学
    • 853 篇 数学
    • 640 篇 物理学
    • 324 篇 生物学
    • 286 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 167 篇 化学
  • 621 篇 管理学
    • 440 篇 管理科学与工程(可...
    • 227 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 225 篇 医学
    • 192 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 89 篇 药学(可授医学、理...
  • 102 篇 法学
    • 86 篇 社会学
  • 75 篇 经济学
  • 43 篇 农学
  • 36 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 123 篇 laboratories
  • 83 篇 computational mo...
  • 80 篇 artificial intel...
  • 74 篇 control systems
  • 68 篇 computer archite...
  • 63 篇 feature extracti...
  • 62 篇 neural networks
  • 60 篇 deep learning
  • 60 篇 hardware
  • 57 篇 optimization
  • 54 篇 robustness
  • 53 篇 machine learning
  • 50 篇 training
  • 46 篇 educational inst...
  • 46 篇 delay
  • 45 篇 reinforcement le...
  • 45 篇 computer network...
  • 44 篇 accuracy
  • 43 篇 mathematical mod...
  • 42 篇 algorithm design...

机构

  • 50 篇 department of el...
  • 33 篇 department of ph...
  • 33 篇 faculty of scien...
  • 33 篇 departamento de ...
  • 33 篇 department for p...
  • 33 篇 department of ph...
  • 33 篇 dipartimento di ...
  • 33 篇 yerevan physics ...
  • 32 篇 lehrstuhl für ex...
  • 32 篇 west university ...
  • 32 篇 graduate school ...
  • 32 篇 institute of phy...
  • 32 篇 ieee
  • 31 篇 department of mo...
  • 31 篇 research center ...
  • 31 篇 kirchhoff-instit...
  • 30 篇 faculté des scie...
  • 30 篇 department of ph...
  • 30 篇 department of ph...
  • 30 篇 department of ph...

作者

  • 60 篇 niyato dusit
  • 28 篇 pedrycz witold
  • 26 篇 m. klein
  • 26 篇 buyya rajkumar
  • 25 篇 f. buehrer
  • 25 篇 m. khader
  • 25 篇 a. t. law
  • 25 篇 c. alexa
  • 25 篇 j. d. mansour
  • 25 篇 j. m. izen
  • 25 篇 s. veneziano
  • 25 篇 d. di valentino
  • 25 篇 g. bella
  • 25 篇 j. strandberg
  • 25 篇 d. calvet
  • 25 篇 c. amelung
  • 25 篇 a. grummer
  • 25 篇 k. j. r. cormier
  • 25 篇 n. orlando
  • 25 篇 c. gumpert

语言

  • 4,367 篇 英文
  • 210 篇 其他
  • 71 篇 中文
检索条件"机构=School of Electrical and Computer Engineering Computing Systems Laboratory"
4649 条 记 录,以下是151-160 订阅
排序:
Dynamic Event-Triggered Composite Learning Robot Control With Exponential Tracking
收藏 引用
IEEE Transactions on Industrial Electronics 2025年
作者: Wang, Qian Shi, Tian Wen, Changyun Pan, Yongping Sun Yat-sen University School of Intelligent Systems Engineering Shenzhen 518107 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou 510006 China Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore Peng Cheng Laboratory Shenzhen 518057 China
Composite learning can guarantee the exponential stability of adaptive robot control under a condition termed interval excitation (IE) that is strictly weaker than the classical condition of persistent excitation. How... 详细信息
来源: 评论
Enhancing Sample Utilization in Noise-robust Deep Metric Learning with Subgroup-based Positive-pair Selection
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Zhipeng Xu, Qianqian Jiang, Yangbangyan Sun, Yingfei Huang, Qingming The School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China
The existence of noisy labels in real-world data negatively impacts the performance of deep learning models. Although much research effort has been devoted to improving the robustness towards noisy labels in classific... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Efficient Hybrid Multi-Population Genetic Algorithm for Multi-UAV Task Assignment in Consumer Electronics Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Bai, Xiaoshan Jiang, Haoyu Li, Chao Ullah, Inam Dabel, Maryam M. Al Bashir, Ali Kashif Wu, Zongze Sam, Shuzhi Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China Shenzhen University Shenzhen City Joint Laboratory of Autonomous Unmanned Systems and Intelligent Manipulation Shenzhen518060 China Tashkent State University of Economics Department of Artificial Intelligence Tashkent100066 Uzbekistan University of Hafr Al Batin Department of Computer Science and Engineering College of Computer Science and Engineering Saudi Arabia Manchester Metropolitan University Manchester United Kingdom Shenzhen518060 China National University of Singapore Department of Electrical and Computer Engineering Singapore117576 Singapore
In recent years, as people’s living standards have improved and consumption concepts have been transformed, the demand for purchasing consumer electronics online has continued to grow, further stimulating the develop... 详细信息
来源: 评论
OpenLS-DGF: An Adaptive Open-Source Dataset Generation Framework for Machine Learning Tasks in Logic Synthesis
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Ni, Liwei Wang, Rui Liu, Miao Meng, Xingyu Lin, Xiaoze Liu, Junfeng Luo, Guojie Chu, Zhufei Qian, Weikang Yang, Xiaoyan Xie, Biwei Li, Xingquan Li, Huawei Chinese Academy of Sciences State Key Lab of Processors Institute of Computing Technology Beijing100190 China Pengcheng Laboratory Shenzhen518055 China University of Chinese Academy of Sciences Beijing101408 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing100049 China Peking University School of Computer Science Center for Energy-Efficient Computing and Applications Beijing100871 China Ninbo University Faculty of Electrical Engineering and Computer Science Ninbo315211 China Shanghai Jiao Tong University University of Michigan-Shanghai Jiao Tong University Joint Institute MoE Key Laboratory of Artificial Intelligence Shanghai200240 China Hangzhou Dianzi University School of Electronics and Information Engineering Hangzhou311121 China
This paper introduces OpenLS-DGF, an adaptive logic synthesis dataset generation framework, to enhance machine learning (ML) applications within the logic synthesis process. Previous dataset generation flows were tail... 详细信息
来源: 评论
PrivBox: Privacy-Preserving Deep Packet Inspection with Dual Double-masking Obfuscated Rule Generation
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Pengfei Ning, Jianting Huang, Xinyi Chen, Rongmao Zhang, Kai Liang, Kaitai Wuhan University School of Cyber Science and Engineering Wuhan China Singapore Management University School of Computing and Information Systems Singapore City University of Macau Faculty of Data Science Macau China Fujian Normal University College of Computer and Cyber Security Fuzhou China Jinan University College of Cyber Security Guangzhou China National University of Defense Technology College of Computer Changsha China Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Netherlands
Many network middleboxes have been deployed to perform deep packet inspection (DPI) over packet payloads. However, such middleboxes cannot accomplish their tasks when the traffic is encrypted. BlindBox (SIGCOMM 2015) ... 详细信息
来源: 评论
Gemini+: Enhancing Real-Time Video Analytics with Dual-Image FPGAs
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wu, Jingrou Hu, Chuang Zhang, Jin Wang, Dan Jiang, Jing University of Technology Sydney Australian Artificial Intelligence Institute SydneyNSW2007 Australia Southern University of Science and Technology Research Institute of Trustworthy Autonomous Systems The Department of Computer Science and Engineering Shenzhen518055 China Wuhan University School of Computer Science Wuhan430072 China Southern University of Science and Technology Department of Computer Science and Engineering The Research Institute of Trustworthy Autonomous Systems Shenzhen518055 China Peng Cheng Laboratory Shenzhen518055 China Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
Real-time video analytics demand intensive computing resources, often exceeding device capabilities. Heterogeneous computing resources like CPU and GPU, usually work collaboratively to ensure real-time performance. GP... 详细信息
来源: 评论
Provably Secure and Efficient One-to-Many Authentication and Key Agreement Protocol for Resource-Asymmetric Smart Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Long Hsu, Chingfang Cui, Jianqun Au, Man Ho Harn, Lein Li, Quanrun Central China Normal University Computer School Wuhan430079 China Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Wuhan430079 China Department of Computing Hong Kong Polytechnic University 25809 Hong Kong University of Missouri-Kansas City Department of Computer Science Electrical Engineering MO64110 United States Zhejiang Sci-Tech University School of Cyber Science and Engineering Hangzhou310020 China
The smart environment is a crucial application of the Internet of Things(IoT). Due to its growing security and efficiency needs, recent years have seen the proposal of numerous authentication and key agreement (AKA) p... 详细信息
来源: 评论
HEART: Achieving Timely Multi-Model Training for Vehicle-Edge-Cloud-Integrated Hierarchical Federated Learning
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Xiaohong Liwang, Minghui Wang, Xianbin Cheng, Zhipeng Hosseinalipour, Seyyedali Dai, Huaiyu Jiao, Zhenzhen School of Informatics Xiamen University Fujian China Department of Control Science and Engineering The National Key Laboratory of Autonomous Intelligent Unmanned Systems Japan Frontiers Science Center for Intelligent Autonomous Systems Ministry of Education Tongji University Shanghai China Department of Electrical and Computer Engineering Western University ON Canada School of Future Science and Engineering Soochow University Suzhou China Department of Electrical Engineering University at Buffalo-SUNY BuffaloNY United States Department of Electrical and Computer Engineering NC State University RaleighNC United States iF-Labs Beijing Teleinfo Technology Company Ltd. CAICT Beijing China
The rapid growth of AI-enabled Internet of Vehicles (IoV) calls for efficient machine learning (ML) solutions that can handle high vehicular mobility and decentralized data. This has motivated the emergence of Hierarc... 详细信息
来源: 评论
UAV-Aided Covert Federated Learning Networks
收藏 引用
IEEE Network 2025年
作者: Wang, Chao Guo, Shaoyong Xiong, Zehui Xing, Chengwen Zhao, Nan Niyato, Dusit Karagiannidis, George Dalian University of Technology School of Information and Communication Engineering Dalian116024 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Singapore University of Technology and Design Information Systems Technology and Design Pillar 487372 Singapore Beijing Institute of Technology School of Information and Electronics Beijing100081 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Greece
With the increasing emphasis on data privacy, federated learning (FL) networks show great potential through distributed training without directly sharing the raw data. However, the coverage of FL terrestrial servers i... 详细信息
来源: 评论