咨询与建议

限定检索结果

文献类型

  • 2,503 篇 会议
  • 1,888 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 4,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,751 篇 工学
    • 1,656 篇 计算机科学与技术...
    • 1,331 篇 软件工程
    • 543 篇 信息与通信工程
    • 422 篇 控制科学与工程
    • 389 篇 电子科学与技术(可...
    • 373 篇 电气工程
    • 303 篇 生物工程
    • 289 篇 光学工程
    • 242 篇 机械工程
    • 207 篇 生物医学工程(可授...
    • 193 篇 仪器科学与技术
    • 147 篇 化学工程与技术
    • 142 篇 动力工程及工程热...
    • 123 篇 交通运输工程
    • 104 篇 材料科学与工程(可...
    • 95 篇 土木工程
    • 89 篇 建筑学
  • 1,487 篇 理学
    • 691 篇 数学
    • 457 篇 物理学
    • 352 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 159 篇 化学
    • 151 篇 系统科学
  • 701 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 222 篇 医学
    • 187 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 78 篇 经济学
  • 52 篇 农学
  • 41 篇 教育学
  • 14 篇 文学
  • 13 篇 军事学
  • 5 篇 艺术学

主题

  • 88 篇 feature extracti...
  • 82 篇 deep learning
  • 71 篇 computer science
  • 71 篇 training
  • 69 篇 data mining
  • 67 篇 computational mo...
  • 64 篇 optimization
  • 64 篇 semantics
  • 63 篇 accuracy
  • 62 篇 machine learning
  • 43 篇 object detection
  • 43 篇 protocols
  • 41 篇 mathematical mod...
  • 40 篇 reliability
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 38 篇 data models
  • 36 篇 computer archite...

机构

  • 102 篇 national enginee...
  • 79 篇 school of comput...
  • 47 篇 national enginee...
  • 46 篇 school of comput...
  • 44 篇 school of comput...
  • 44 篇 school of cyber ...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 27 篇 huazhong univers...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 state key labora...
  • 23 篇 college of compu...
  • 23 篇 department of co...

作者

  • 110 篇 hai jin
  • 96 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 21 篇 liao xiaofei
  • 18 篇 zhigang zhang
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 xin xin
  • 15 篇 li peng
  • 15 篇 long zheng

语言

  • 4,050 篇 英文
  • 229 篇 其他
  • 115 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4408 条 记 录,以下是531-540 订阅
排序:
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Neural network-driven parallel accelerated selective image encryption with semantic understanding
收藏 引用
The European Physical Journal Special Topics 2025年 1-16页
作者: Song, Wei Fu, Chong Zheng, Yu Chen, Junxin Zhang, Yanfeng School of Computer Science and Engineering Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China University of California Irvine Irvine USA School of Software Dalian University of Technology Dalian China
Existing batch image encryption schemes often directly encrypt images without considering their source. However, in real-life scenarios, these images are typically part of a larger collection stored in a directory on ...
来源: 评论
An intelligent cylindrical reflector for airborne virus detection  20
An intelligent cylindrical reflector for airborne virus dete...
收藏 引用
20th International Multi-Conference on systems, Signals and Devices, SSD 2023
作者: Hadded, Ahmed Ayed, Mossaad Ben Alshaya, Shaya A. Sfax University Computer and Embedded System Laboratory National Engineering School of Sfax Sfax3038 Tunisia Sousse University Electronic Industrial ENISo Tunisia Sfax University Tunisia Computer and Embedded System Laboratory ENIS Sfax3038 Tunisia Majmaah University Digital Transformation and E-Transactions Faculty of Sciences and Humanities Sciences Prince Sultan University Department of Computer Science Majmaah11952 Saudi Arabia
In 2020, the world suffered from the COVID-19 pandemic. This situation highlighted the considerable need for systems to detect viruses quickly. Providing an accurate e-health system that detects, monitors, and control... 详细信息
来源: 评论
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network  36
Vulnerability Detection Based on Pre-trained Code Language M...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Liao, Tingfeng Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
Graphene-based dual-function acoustic transducers for machine learning-assisted human-robot interfaces
收藏 引用
InfoMat 2023年 第2期5卷 66-79页
作者: Hao Sun Xin Gao Liang-Yan Guo Lu-Qi Tao Zi Hao Guo Yangshi Shao Tianrui Cui Yi Yang Xiong Pu Tian-Ling Ren Institute of Microelectronics and Beijing National Research Center for Information Science and Technology(BNRist) Tsinghua UniversityBeijingPeople's Republic of China CAS Center for Excellence in Nanoscience Beijing Key Laboratory of Micro-nano Energy and SensorBeijing Institute of Nanoenergy and NanosystemsChinese Academy of SciencesBeijingPeople's Republic of China State Key Laboratory of Power Transmission Equipment and System Security and New Technology School of Electrical EngineeringChongqing UniversityChongqingPeople's Republic of China School of Computer Science&Technology Beijing Institute of TechnologyBeijingPeople's Republic of China School of Automation and Electrical Engineering University of Science and Technology BeijingBeijingPeople's Republic of China
Human–robot interface(HRI)electronics are critical for realizing robotic ***,we report graphene-based dual-function acoustic transducers for machine learning-assisted human–robot interfaces(GHRI).The GHRI functions ... 详细信息
来源: 评论
PSMiner: A Pattern-Aware Accelerator for High-Performance Streaming Graph Pattern Mining  23
PSMiner: A Pattern-Aware Accelerator for High-Performance St...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Hao Qi Yu Zhang Ligang He Kang Luo Jun Huang Haoyu Lu Jin Zhao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China and Zhejiang-HUST Joint Research Center for Graph Processing Zhejiang Lab China Department of Computer Science University of Warwick United Kingdom
Streaming Graph Pattern Mining (GPM) has been widely used in many application fields. However, the existing streaming GPM solution suffers from many unnecessary explorations and isomorphism tests, while the existing s...
来源: 评论
Enhanced Condition Monitoring of Low Voltage Motors in Harsh Environments with Ladybug Beetle Optimization and Context-Aware Graph Convolutional Networks  4
Enhanced Condition Monitoring of Low Voltage Motors in Harsh...
收藏 引用
4th International Conference on Sustainable Expert systems, ICSES 2024
作者: Rajasekar, P. Tiwari, Praveen Prakash Sharmila, L. Garg, Akriti Srinivas, Rayudu Tallapragada, V. V. Satyanarayana Srm Institute of Science and Technology Department of Data Science and Business System Tamil Nadu Kattankulathur603203 India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai600062 India Mahatma Jyotiba Phule Rohilkhand University Department of Electrical Engineering Uttar Pradesh Bareilly243006 India Aditya College of Engineering & Technology Department of Electrical and Electronics Engineering Andhra Pradesh Surampalem533437 India School of Engineering Mohan Babu University Department of Electronics and Communication Engineering Andhra Pradesh Tirupati517102 India
Low voltage motors are essential in many applications in contemporary industrial settings, as they power machines and guarantee efficient operations. However, these motors often operate in harsh environments where the... 详细信息
来源: 评论
UICopilot: Automating UI Synthesis via Hierarchical Code Generation from Webpage Designs  25
UICopilot: Automating UI Synthesis via Hierarchical Code Gen...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Gui, Yi Wan, Yao Li, Zhen Zhang, Zhongyi Chen, Dongping Zhang, Hongyu Su, Yi Chen, Bohua Zhou, Xing Jiang, Wenbin Zhang, Xiangliang Huazhong University of Science and Technology Wuhan China Chongqing University Chongqing China Hubei University of Automotive Technology Shiyan China Rabbitpre AI Shenzhen China University of Notre Dame Notre Dame United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology China
Automating the synthesis of User Interfaces (UIs) plays a crucial role in enhancing productivity and accelerating the development lifecycle, reducing both development time and manual effort. Recently, the rapid develo... 详细信息
来源: 评论
APSeg: Auto-Prompt Network for Cross-Domain Few-Shot Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: He, Weizhao Zhang, Yang Zhuo, Wei Shen, Linlin Yang, Jiaqi Deng, Songhe Sun, Liang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China School of Computer Science University of Nottingham China
Few-shot semantic segmentation (FSS) endeavors to segment unseen classes with only a few labeled samples. Current FSS methods are commonly built on the assumption that their training and application scenarios share si... 详细信息
来源: 评论