咨询与建议

限定检索结果

文献类型

  • 2,511 篇 会议
  • 1,864 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,729 篇 工学
    • 1,641 篇 计算机科学与技术...
    • 1,318 篇 软件工程
    • 537 篇 信息与通信工程
    • 418 篇 控制科学与工程
    • 389 篇 电子科学与技术(可...
    • 370 篇 电气工程
    • 303 篇 生物工程
    • 282 篇 光学工程
    • 241 篇 机械工程
    • 207 篇 生物医学工程(可授...
    • 193 篇 仪器科学与技术
    • 150 篇 化学工程与技术
    • 143 篇 动力工程及工程热...
    • 122 篇 交通运输工程
    • 104 篇 材料科学与工程(可...
    • 98 篇 土木工程
    • 92 篇 建筑学
  • 1,469 篇 理学
    • 680 篇 数学
    • 452 篇 物理学
    • 348 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 162 篇 化学
    • 148 篇 系统科学
  • 695 篇 管理学
    • 458 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 213 篇 医学
    • 179 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 101 篇 法学
    • 84 篇 社会学
  • 77 篇 经济学
  • 50 篇 农学
  • 39 篇 教育学
  • 14 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 90 篇 feature extracti...
  • 83 篇 deep learning
  • 71 篇 computer science
  • 71 篇 training
  • 70 篇 data mining
  • 68 篇 computational mo...
  • 67 篇 accuracy
  • 65 篇 semantics
  • 63 篇 optimization
  • 60 篇 machine learning
  • 44 篇 object detection
  • 42 篇 protocols
  • 41 篇 reliability
  • 41 篇 mathematical mod...
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 38 篇 data models
  • 37 篇 computer archite...

机构

  • 101 篇 national enginee...
  • 80 篇 school of comput...
  • 46 篇 school of comput...
  • 46 篇 national enginee...
  • 45 篇 school of cyber ...
  • 43 篇 school of comput...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 28 篇 school of comput...
  • 28 篇 hubei province k...
  • 27 篇 huazhong univers...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 24 篇 department of co...
  • 24 篇 hubei engineerin...
  • 24 篇 cluster and grid...

作者

  • 110 篇 hai jin
  • 90 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 19 篇 liao xiaofei
  • 19 篇 shyu mei-ling
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 17 篇 zhigang zhang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 陈景标
  • 15 篇 long zheng
  • 15 篇 xin xin

语言

  • 3,820 篇 英文
  • 444 篇 其他
  • 116 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4391 条 记 录,以下是1101-1110 订阅
排序:
Shared Incentive system for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
MVC-VPR: Mutual Learning of Viewpoint Classification and Visual Place Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Gu, Qiwen Wang, Xufei Zhang, Fenglin Zhao, Junqiao Tao, Siyue Ye, Chen Feng, Tiantian Jiang, Changjun Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The Shanghai Research Institute for Intelligent Autonomous System Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China School of Surveying and Geo-Informatics Tongji University Shanghai China
Visual Place Recognition (VPR) aims to robustly identify locations by leveraging image retrieval based on descriptors encoded from environmental images. However, drastic appearance changes of images captured from diff... 详细信息
来源: 评论
Secure Relay Selection for UAV-empowered Two Way Untrusted Relaying Networks
Secure Relay Selection for UAV-empowered Two Way Untrusted R...
收藏 引用
Mobile Internet, Cloud Computing and Information Security (MICCIS), International Conference on
作者: Kan Yu Zhiyong Feng Lin Yang Dianxia Chen Dong Li Xiaoshan Ma The School of Computer Science and Engineering Macau University of Science and Technology Taipa P. R. China The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China School of Computer Science and Engineering Macau University of Science and Technolog China The National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute AMS PLA Beijing P.R. China The Education Tianjin Ren’ai College Tianjin P.R. China The School of Computer Science and Engineering Macau University of Science and Technology P. R. China The Academy of Military Sciences of PLA Beijing P.R. China
In this paper, we examine the security aspects of two-way untrusted relaying networks (TWURNs) through the lens of physical layer security (PLS). These networks involve the exchange of confidential information between... 详细信息
来源: 评论
Dynamic Random Route Mutation Mechanism for Moving Target Defense in SDN  6
Dynamic Random Route Mutation Mechanism for Moving Target De...
收藏 引用
6th International Symposium on computer and Information Processing Technology, ISCIPT 2021
作者: Zhang, Bofeng Han, Li Sun, Shimin Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China Tiangong University Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tianjin China
Moving Target Defense (MTD) is commonly used in changing the asymmetric situation between attack and defense in cyberspace. Route mutation is a vital branch of MTD. Current route mutation methods still have some limit... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论
Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yang Wan, Yao Zhang, Hongyu Sui, Yulei Wei, Wucai Zhao, Wei Xu, Guandong Jin, Hai Huazhong University of Science and Technology China Chongqing University China University of New South Wales Australia University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
The Natural Language to Visualization (NL2Vis) task aims to transform natural-language descriptions into visual representations for a grounded table, enabling users to gain insights from vast amounts of data. Recently... 详细信息
来源: 评论
A Dual-Path Framework with Frequency-and-Time Excited Network for Anomalous Sound Detection
A Dual-Path Framework with Frequency-and-Time Excited Networ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yucong Zhang Juan Liu Yao Tian Haifeng Liu Ming Li School of Computer Science Wuhan University Wuhan China Suzhou Municipal Key Laboratory of Multimodal Intelligent Systems Duke Kunshan University Kunshan China Oppo Data & AI Engineering System Beijing China University of Science and Technology of China Hefei China
In contrast to human speech, machine-generated sounds of the same type often exhibit consistent frequency characteristics and discernible temporal periodicity. However, leveraging these dual attributes in anomaly dete...
来源: 评论
Advanced Data Segmentation and Encryption Approach using Fog Computing
Advanced Data Segmentation and Encryption Approach using Fog...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Kamred Udham Singh Neeraj Varshney Pushpendra Kumar Pradeep Kumar Sharma Umang Deep Mishra Teekam Singh School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering & Applications GLA University Mathura UP India Scanno System Greater Noida HCL Technology UP Unique Institute of Management & Technology Muradnagar Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun
Data security in conventional applications was only available at the application layer. Within the scope of the intended research, the safety of the merchandise is ensured. The deficiencies that are present in the sec...
来源: 评论
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Jia, Zian Xiong, Yun Nan, Yuhong Zhang, Yao Zhao, Jinjing Wen, Mi Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Software Engineering Sun Yat-sen University China National Key Laboratory of Science and Technology on Information System Security China Shanghai University of Electric Power China
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on provenance graphs has em... 详细信息
来源: 评论