咨询与建议

限定检索结果

文献类型

  • 19,085 篇 会议
  • 14,620 篇 期刊文献
  • 105 册 图书

馆藏范围

  • 33,810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,449 篇 工学
    • 11,014 篇 计算机科学与技术...
    • 8,739 篇 软件工程
    • 6,320 篇 信息与通信工程
    • 4,902 篇 电子科学与技术(可...
    • 3,933 篇 电气工程
    • 3,106 篇 控制科学与工程
    • 2,476 篇 光学工程
    • 1,949 篇 材料科学与工程(可...
    • 1,928 篇 化学工程与技术
    • 1,872 篇 机械工程
    • 1,871 篇 仪器科学与技术
    • 1,804 篇 生物工程
    • 1,284 篇 动力工程及工程热...
    • 1,124 篇 生物医学工程(可授...
    • 681 篇 冶金工程
    • 632 篇 交通运输工程
    • 593 篇 航空宇航科学与技...
    • 560 篇 网络空间安全
    • 535 篇 安全科学与工程
  • 13,076 篇 理学
    • 5,851 篇 数学
    • 5,484 篇 物理学
    • 2,028 篇 生物学
    • 1,969 篇 化学
    • 1,925 篇 统计学(可授理学、...
    • 1,211 篇 系统科学
  • 4,221 篇 管理学
    • 2,844 篇 管理科学与工程(可...
    • 1,505 篇 图书情报与档案管...
    • 1,034 篇 工商管理
  • 964 篇 医学
    • 821 篇 临床医学
    • 674 篇 基础医学(可授医学...
  • 555 篇 法学
  • 413 篇 经济学
  • 267 篇 农学
  • 262 篇 教育学
  • 138 篇 军事学
  • 86 篇 文学
  • 70 篇 艺术学
  • 5 篇 历史学
  • 3 篇 哲学

主题

  • 613 篇 feature extracti...
  • 568 篇 simulation
  • 513 篇 training
  • 480 篇 deep learning
  • 349 篇 accuracy
  • 335 篇 computational mo...
  • 331 篇 optimization
  • 258 篇 signal to noise ...
  • 248 篇 neural networks
  • 244 篇 object detection
  • 239 篇 wireless communi...
  • 231 篇 internet of thin...
  • 229 篇 reinforcement le...
  • 207 篇 image segmentati...
  • 205 篇 semantics
  • 202 篇 conferences
  • 191 篇 computer science
  • 189 篇 support vector m...
  • 181 篇 task analysis
  • 180 篇 machine learning

机构

  • 1,915 篇 school of inform...
  • 719 篇 school of inform...
  • 677 篇 school of comput...
  • 426 篇 school of commun...
  • 353 篇 school of optica...
  • 269 篇 school of electr...
  • 256 篇 school of electr...
  • 248 篇 university of el...
  • 209 篇 school of electr...
  • 201 篇 school of inform...
  • 183 篇 college of infor...
  • 177 篇 school of electr...
  • 143 篇 school of electr...
  • 139 篇 school of softwa...
  • 131 篇 school of comput...
  • 129 篇 school of electr...
  • 126 篇 school of electr...
  • 124 篇 school of electr...
  • 121 篇 university of el...
  • 113 篇 school of inform...

作者

  • 121 篇 niyato dusit
  • 86 篇 yuen chau
  • 83 篇 cui guolong
  • 76 篇 jian wang
  • 65 篇 qizhen sun
  • 61 篇 li yang
  • 59 篇 li li
  • 57 篇 tamura t.
  • 56 篇 sun qizhen
  • 55 篇 songnian fu
  • 54 篇 zhang lei
  • 54 篇 katayose y.
  • 52 篇 kawakubo y.
  • 52 篇 binns w.r.
  • 52 篇 cherry m.l.
  • 52 篇 castellini g.
  • 52 篇 liu yang
  • 51 篇 wang lei
  • 51 篇 jing zhang
  • 49 篇 bruno a.

语言

  • 31,004 篇 英文
  • 1,779 篇 其他
  • 1,032 篇 中文
  • 15 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Information and software Engineering in University of Electronic Science and Technology"
33810 条 记 录,以下是381-390 订阅
排序:
Boosting Adversarial Training with Learnable Distribution
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3247-3265页
作者: Kai Chen Jinwei Wang James Msughter Adeke Guangjie Liu Yuewei Dai School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of EducationNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Nanjing Center for Applied Mathematics Nanjing211135China
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe... 详细信息
来源: 评论
Evaluating Public Sentiments of Covid-19 Vaccine Tweets Using Machine Learning Techniques
收藏 引用
Informatica (Slovenia) 2022年 第1期46卷 69-75页
作者: Akpatsa, Samuel Kofi Lei, Hang Li, Xiaoyu Obeng, Victor-Hillary Kofi Setornyo School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Province Chengdu610054 China
The quest to create a vaccine for covid-19 has rekindled hope for most people worldwide, with the anticipation that a vaccine breakthrough would be one step closer to the end of the deadly Covid-19. The pandemic has h... 详细信息
来源: 评论
Breaking the energy-eficiency barriers for smart sensing applications with “Sensing with Computing” architectures
收藏 引用
science China(information sciences) 2023年 第10期66卷 162-177页
作者: Xinghua YANG Zheyu LIU Kechao TANG Xunzhao YIN Cheng ZHUO Qi WEI Fei QIAO Department of Electronic Engineering Tsinghua University College of Science Beijing Forestry University Make Sens AI Technology (Beijing) Co. Ltd. School of Integrated Circuits Peking University College of Information Science and Electronic Engineering Zhejiang University
With the developing technologies of artificial intelligence and the Internet of Things, intelligent IoT(iIoT) is prevailing currently. Design and implementation of integrated IoT nodes with continuous perception capab... 详细信息
来源: 评论
Remote Charging for Cardiac Pacemakers Using Transcutaneous Optical Energy Transmission System
收藏 引用
Sensors and Materials 2024年 第8期36卷 3335-3350页
作者: Yang, Shang-Kuo Chen, Chia-Hong Zhu, Yong-Jun Chen, Kai-Jung Department of Mechanical Engineering National Chin Yi University of Technology Taichung41170 Taiwan School of Electronic and Information Engineering Suzhou University of Science and Technology Jiangsu Suzhou215009 China
For cardiopathy patients with an implanted cardiac pacemaker, supplying power to the pacemaker is a challenging problem. In this study, we aim to design a transcutaneous optical energy transmission system that transmi... 详细信息
来源: 评论
FairCoRe: Fairness-Aware Recommendation Through Counterfactual Representation Learning
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 4049-4062页
作者: Bin, Chenzhong Liu, Wenqiang Zhang, Feng Chang, Liang Gu, Tianlong Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Guilin University of Electronic Technology School of Business Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin541004 China Jinan University College of Cyber Security Engineering Research Center of Trustworthy AI Ministry of Education Guangzhou510632 China
Eliminating bias from data representations is crucial to ensure fairness in recommendation. Existing studies primarily focus on weakening the correlation between data representations and sensitive attributes, yet may ... 详细信息
来源: 评论
RM-CSTV:An effective high-resolution method of non-line-of-sight millimeter-wave radar 3-D imaging
收藏 引用
National science Open 2024年 第5期3卷 36-52页
作者: Xinyuan Liu Shunjun Wei Wei Pu Xiang Cai Yanbo Wen Shisheng Guo Lingjiang Kong Xiaoling Zhang School of Information and Communication Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Non-line-of-sight(NLOS)imaging is a novel radar sensing technology that enables the reconstruction of hidden ***,it may suffer from synthetic aperture length reduction caused by ambient *** this study,a complex total ... 详细信息
来源: 评论
Flexible Inverse Design of Microwave Filter Customized on Demand With Wavelet Transform Deep Learning
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年 第3期44卷 806-817页
作者: Xu, Kuiwen Wang, Jianguo Cai, Jialin Ma, Xuetiao Lv, Qinyi Chen, Shichang Liu, Jie Liu, Jun Hangzhou Dianzi University Innovation Center for Electronic Design Automation Technology The Key Laboratory of RF Circuits and Systems Ministry of Education Hangzhou310018 China Chang'an Campus Northwestern Polytechnical University School of Electronic Information Xi'an710060 China University of Electronic Science and Technology of China School of Electronic Science and Engineering Chengdu610054 China Information Science Academy China Electronics Technology Group Corporation Beijing100846 China
Artificial intelligence (AI) techniques are increasingly being used for the inverse design of microwave devices. However, several challenges, including intensive computation costs for training samples, high-dimensiona... 详细信息
来源: 评论
LPT-One and BFD-One Search Algorithms for Load Balance and Bin-Packing of Cloud Computing  9
LPT-One and BFD-One Search Algorithms for Load Balance and B...
收藏 引用
9th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2023
作者: Zhou, Guangyao Tian, Wenhong Buyya, Rajkumar University of Electronic Science and Technology of China School of Information and Software Engineering China The University of Melbourne School of Computing and Information Systems Australia
Cloud computing contains large-scale tasks and resources. Currently, the local search is a considerable choice in ensuring both computational complexity and optimization. Based on our previous research on multi-route ... 详细信息
来源: 评论
Adversarial Domain Adaptation for Non-Intrusive LOAD Monitoring  20
Adversarial Domain Adaptation for Non-Intrusive LOAD Monitor...
收藏 引用
20th International Computer Conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2023
作者: Bongyi, Gao Bei, Hui School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
Non-Intrusive Load Monitoring (NILM), known as energy disaggregation, is a method for determining the usage of separated devices by analyzing the overall energy consumption of an entire household. Understanding indivi... 详细信息
来源: 评论
Revealing Security Flaws in Cross-Modal Retrieval Models through Video Poisoning
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第6期35卷 6184-6194页
作者: Jin, Ming Hu, Wenbo Hong, Richang Zhu, Lei Hefei University of Technology School of Computer and Information Hefei China Data Space Research Institute Hefei Comprehensive National Science Center China Tongji University School of Electronic and Information Engineering Shanghai China
Video-text cross-modal retrieval is widely studied to improve retrieval accuracy. However, the security of video-text cross-modal retrieval models receives little attention. If attackers exploit the security vulnerabi... 详细信息
来源: 评论