咨询与建议

限定检索结果

文献类型

  • 2,510 篇 会议
  • 1,904 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 4,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,772 篇 工学
    • 1,674 篇 计算机科学与技术...
    • 1,328 篇 软件工程
    • 543 篇 信息与通信工程
    • 435 篇 控制科学与工程
    • 396 篇 电子科学与技术(可...
    • 379 篇 电气工程
    • 305 篇 生物工程
    • 287 篇 光学工程
    • 242 篇 机械工程
    • 208 篇 生物医学工程(可授...
    • 191 篇 仪器科学与技术
    • 147 篇 化学工程与技术
    • 143 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 105 篇 材料科学与工程(可...
    • 94 篇 土木工程
    • 88 篇 建筑学
  • 1,490 篇 理学
    • 692 篇 数学
    • 456 篇 物理学
    • 351 篇 生物学
    • 226 篇 统计学(可授理学、...
    • 161 篇 化学
    • 153 篇 系统科学
  • 702 篇 管理学
    • 463 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 221 篇 医学
    • 186 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 77 篇 经济学
  • 52 篇 农学
  • 38 篇 教育学
  • 14 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 89 篇 feature extracti...
  • 83 篇 deep learning
  • 71 篇 computer science
  • 71 篇 training
  • 69 篇 data mining
  • 67 篇 optimization
  • 67 篇 computational mo...
  • 64 篇 semantics
  • 64 篇 accuracy
  • 62 篇 machine learning
  • 43 篇 object detection
  • 43 篇 protocols
  • 40 篇 reliability
  • 40 篇 mathematical mod...
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 38 篇 data models
  • 36 篇 computer archite...

机构

  • 103 篇 national enginee...
  • 79 篇 school of comput...
  • 48 篇 national enginee...
  • 46 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of cyber ...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 28 篇 huazhong univers...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 school of comput...
  • 25 篇 state key labora...
  • 24 篇 college of compu...
  • 24 篇 school of comput...
  • 24 篇 school of comput...

作者

  • 110 篇 hai jin
  • 98 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 23 篇 liao xiaofei
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 18 篇 zhigang zhang
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 xin xin
  • 15 篇 li peng
  • 15 篇 long zheng

语言

  • 4,055 篇 英文
  • 251 篇 其他
  • 114 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4431 条 记 录,以下是541-550 订阅
排序:
APSeg: Auto-Prompt Network for Cross-Domain Few-Shot Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: He, Weizhao Zhang, Yang Zhuo, Wei Shen, Linlin Yang, Jiaqi Deng, Songhe Sun, Liang Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China School of Computer Science University of Nottingham China
Few-shot semantic segmentation (FSS) endeavors to segment unseen classes with only a few labeled samples. Current FSS methods are commonly built on the assumption that their training and application scenarios share si... 详细信息
来源: 评论
The Effect of Digital Marketing on Micro, Small and Medium Enterprise in Indonesia  1
收藏 引用
International Conference on Applied Informatics and Media Design, AIMD 2019
作者: Sasongko, Alvin Igo Widjaja, Gregorius Christian Theodore, Jason Afriliana, Nunik Matsuo, Tokuro Gaol, Ford Lumban School of Information System Bina Nusantara University Jakarta Indonesia Faculty of Engineering and Informatics Universitas Multimedia Nusantara Tangerang Indonesia Computer Science Department Bina Nusantara University Jakarta Indonesia Graduate School of Industrial Technology Advanced Institute of Industrial Technology Tokyo Japan
Digital Marketing is a product marketing strategy using digital media and internet networks. Nowadays, digital marketing is a necessity for companies that thrive in the digital world. It greatly affects the growth of ... 详细信息
来源: 评论
Resilient Cooperative Control of Multiple DC Microgrids With Interconnection Networks Against Cyber Attacks
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical systems 2025年 3卷 116-126页
作者: Xiao, Feng Liu, Shiyu Wei, Bo Fang, Fang Qin, Jiahu North China Electric Power University State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources Beijing102206 China North China Electric Power University School of Control and Computer Engineering Beijing102206 China North China Electric Power University New Energy Generation National Engineering Research Center Beijing102206 China University of Science and Technology of China Department of Automation Hefei230027 China
The two control objectives of voltage regulation and precise current sharing are conflicting in multi-bus DC microgrids. In this paper, a distributed control strategy is proposed, and it can achieve accurate current s... 详细信息
来源: 评论
A Scalable, Efficient, and Robust Dynamic Memory Management Library for HLS-based FPGAs
A Scalable, Efficient, and Robust Dynamic Memory Management ...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Qinggang Wang Long Zheng Zhaozeng An Shuyi Xiong Runze Wang Yu Huang Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Nowadays, high-level synthesis (HLS) has gained prominence for FPGA-based architecture prototyping, enhancing productivity significantly. Despite this advancement, HLS tools are impeded by a critical drawback: they la...
来源: 评论
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
Feature Map Guided Strategy for Robust Multi-Resolution Image Dehazing
Feature Map Guided Strategy for Robust Multi-Resolution Imag...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Kumar, Avishek Kumar, Nagendra Mishra, Akhilesh Kumar Pathak, Gouransh Chatterjee, Amit IIT Delhi Centre for Sensors Instrumentation and Cyber-Physical System Engineering New Delhi110016 India NIT Jamshedpur Department of Electronics and Communication Engineering Jamshedpur831014 India IILM Univeristy Department of Electrical and Electronics Engineering Greater Noida201306 India PIEMR-Indore Department of Computer Science and Engineering Indore452010 India DIT University School of Computing Dehradun248009 India
Presence of haze in digital images poses significant challenges in computer vision applications, adversely impacting tasks like image segmentation and object detection. To tackle this issue, this paper introduces a fu... 详细信息
来源: 评论
CFD Simulation of Flight Vehicle Optical Dome and Flow Field Based on Solid-Fluid Coupling Approach
CFD Simulation of Flight Vehicle Optical Dome and Flow Field...
收藏 引用
system Simulation Technology and its Application (CCSSTA), IEEE China Conference on
作者: Jing Li Qilong Wang Liang Xu Ziming Wan Yan Zhao Xuewen Zhao School of Computer Science and Engineering Tianjin University of Technology Tianjin China School of Electrical Engineering and Automation Tianjin University of Technology Tianjin China Beijing Institude of Electronic System Engineering Beijing China
At high velocity flight, the infrared imaging system encounters significant aero-optical disturbances due to the uneven gas flow around the aircraft’s forward section and the elevated temperatures of the optical dome... 详细信息
来源: 评论
Multiple Sclerosis Detection with Reinforcement Learning and Differential Evolution
Multiple Sclerosis Detection with Reinforcement Learning and...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yang, Jing Yang, Jin Wu, Chenwei Jiang, Gaozhe Lv, Yaning Liu, Bingyan Xu, Feng Department of Computer System and Technology Universiti Malaya Kuala Lumpur Malaysia Mallinckrodt Institute of Radiology Washington University School of Medicine St. Louis United States Evident Battery Inc. Massachusetts United States Institute of Operations Research and Analytics National University of Singapore Singapore School of Mathematics and Statistics Xi'an University of Electronic Science and Technology Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China School of Engineering and Design Technical University of Munich Munich Germany
Multiple Sclerosis (MS) disrupts nerve communication, potentially leading to permanent damage. Convolutional Neural Networks (CNNs) are commonly recommended to accelerate magnetic resonance imaging (MRI) analysis for ... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论