咨询与建议

限定检索结果

文献类型

  • 2,510 篇 会议
  • 1,904 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 4,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,772 篇 工学
    • 1,674 篇 计算机科学与技术...
    • 1,328 篇 软件工程
    • 543 篇 信息与通信工程
    • 435 篇 控制科学与工程
    • 396 篇 电子科学与技术(可...
    • 379 篇 电气工程
    • 305 篇 生物工程
    • 287 篇 光学工程
    • 242 篇 机械工程
    • 208 篇 生物医学工程(可授...
    • 191 篇 仪器科学与技术
    • 147 篇 化学工程与技术
    • 143 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 105 篇 材料科学与工程(可...
    • 94 篇 土木工程
    • 88 篇 建筑学
  • 1,490 篇 理学
    • 692 篇 数学
    • 456 篇 物理学
    • 351 篇 生物学
    • 226 篇 统计学(可授理学、...
    • 161 篇 化学
    • 153 篇 系统科学
  • 702 篇 管理学
    • 463 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 221 篇 医学
    • 186 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 77 篇 经济学
  • 52 篇 农学
  • 38 篇 教育学
  • 14 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 83 篇 deep learning
  • 71 篇 computer science
  • 71 篇 training
  • 69 篇 data mining
  • 67 篇 optimization
  • 67 篇 computational mo...
  • 64 篇 semantics
  • 64 篇 accuracy
  • 62 篇 machine learning
  • 43 篇 object detection
  • 43 篇 protocols
  • 40 篇 reliability
  • 40 篇 mathematical mod...
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 38 篇 data models
  • 36 篇 computer archite...

机构

  • 103 篇 national enginee...
  • 79 篇 school of comput...
  • 48 篇 national enginee...
  • 46 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of cyber ...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 28 篇 huazhong univers...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 school of comput...
  • 25 篇 state key labora...
  • 24 篇 college of compu...
  • 24 篇 school of comput...
  • 24 篇 school of comput...

作者

  • 110 篇 hai jin
  • 98 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 23 篇 liao xiaofei
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 18 篇 zhigang zhang
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 xin xin
  • 15 篇 li peng
  • 15 篇 long zheng

语言

  • 4,055 篇 英文
  • 251 篇 其他
  • 114 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4431 条 记 录,以下是481-490 订阅
排序:
Uplink Performance of Cell-Free Symbiotic Radio With Hardware Impairments for IoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Sun, Qiang Zhou, Yu Shen, Yushi Li, Feiyang Chen, Xiaomin Li, Dong Zhang, Jiayi Nantong University School of Information Science and Technology Nantong226019 China NovNet Computing System Tech Company Beijing100081 China Macau University of Science and Technology School of Computer Science and Engineering Taipa999078 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China
Cell-free massive multiple-input multiple-output symbiotic radio (CF-SR) has recently been introduced as a promising solution for the Internet of Things (IoT), offering cost advantages and more uniform coverage perfor... 详细信息
来源: 评论
LibAMM: empirical insights into approximate computing for accelerating matrix multiplication  24
LibAMM: empirical insights into approximate computing for ac...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing systems
作者: Xianzhi Zeng Wenchao Jiang Shuhao Zhang National Engineering Research Center for Big DataTechnology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China and Nanyang Technological University Singapore University of Technology and Design National Engineering Research Center for Big DataTechnology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Matrix multiplication (MM) is pivotal in fields from deep learning to scientific computing, driving the quest for improved computational efficiency. Accelerating MM encompasses strategies like complexity reduction, pa...
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing systems 2025年 第2期9卷 1-28页
作者: Chao Dong Fang Wang Hong Jiang Dan Feng Key Laboratory of Information Storage System Wuhan National Laboratory for Optoelectronics) Engineering Research Center of data storage systems and Technology School of Computer Science and Technology) Ministry of Education of China Huazhong University of Science and Technology Wuhan Hubei China Department of Computer Science and Engineering University of Texas at Arlington Arlington Texas USA
In large-scale information systems, storage device performance continues to improve while workloads expand in size and access characteristics. This growth puts tremendous pressure on caches and storage hierarchy in te... 详细信息
来源: 评论
ENHANCING TWITTER BOT DETECTION VIA MULTIMODAL INVARIANT REPRESENTATIONS
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Jibing Peng, Jiquan Qu, Jin Du, ShuYing Wang, Kaiyu School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China
Detecting Twitter Bots is crucial for maintaining the integrity of online discourse, safeguarding democratic processes, and preventing the spread of malicious propaganda. However, advanced Twitter Bots today often emp... 详细信息
来源: 评论
Distraction Detection in Driving Using Pose Extraction and Machine Learning Techniques  7
Distraction Detection in Driving Using Pose Extraction and M...
收藏 引用
7th International Conference on Information Technology, Information systems and Electrical engineering, ICITISEE 2023
作者: Bachtiar, Fitra Abdurrachman Arwani, Issa Prasetyo, Ridwan Aji Budi Pangestu, Gusti Soetedjo, Riza Setiawan Mahesa, Al Ravie Muthiar Brawijaya University Informatics Engineering Department Malang Indonesia Brawijaya University Information System Department Malang Indonesia Brawijaya University Psychology Department Malang Indonesia School of Computer Science Bina Nusantara University Jakarta Indonesia
There are a lot of technologies have been implemented in the modern cars these days, ranging from preventive braking system to driving assistance. It is believe that equipping car with modern technology would enhance ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Unlocking Security: A Comprehensive Exploration of Biometric Authentication Techniques
Unlocking Security: A Comprehensive Exploration of Biometric...
收藏 引用
International Conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Jindam Sriman Puneet Thapar Arsalan Ahmed Alyas Urvashi Singh School of Computer Science Engineering Lovely Professional University Phagwara India Information System Technologies Wilmington University United States
Biometric authentication is a rapidly evolving field in information security, providing a personalized and reliable approach to identity verification. This paper explores various biometric methods, including fingerpri...
来源: 评论
Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography
Invertible Mosaic Image Hiding Network for Very Large Capaci...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zihan Chen Tianrui Liu Jun-Jie Huang Wentao Zhao Xing Bi Meng Wang College of Computer Science and Technology National University of Defense Technology China College of System Engineering National University of Defense Technology China School of Computer Science and Information Engineering Hefei University of Technology China
The existing image steganography methods either sequentially conceal secret images or conceal a concatenation of multiple images. In such ways, the interference of information among multiple images will become increas...
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论