咨询与建议

限定检索结果

文献类型

  • 3,614 篇 会议
  • 2,330 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 5,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,622 篇 工学
    • 2,066 篇 计算机科学与技术...
    • 1,664 篇 软件工程
    • 723 篇 信息与通信工程
    • 605 篇 控制科学与工程
    • 577 篇 电气工程
    • 554 篇 电子科学与技术(可...
    • 406 篇 生物工程
    • 368 篇 光学工程
    • 333 篇 机械工程
    • 290 篇 生物医学工程(可授...
    • 260 篇 动力工程及工程热...
    • 254 篇 仪器科学与技术
    • 194 篇 化学工程与技术
    • 149 篇 材料科学与工程(可...
    • 146 篇 交通运输工程
    • 117 篇 土木工程
    • 106 篇 建筑学
  • 1,970 篇 理学
    • 940 篇 数学
    • 614 篇 物理学
    • 456 篇 生物学
    • 297 篇 统计学(可授理学、...
    • 219 篇 系统科学
    • 206 篇 化学
  • 876 篇 管理学
    • 581 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 290 篇 医学
    • 245 篇 临床医学
    • 181 篇 基础医学(可授医学...
    • 112 篇 药学(可授医学、理...
  • 126 篇 法学
    • 105 篇 社会学
  • 102 篇 经济学
  • 68 篇 农学
  • 52 篇 教育学
  • 19 篇 文学
  • 18 篇 军事学
  • 9 篇 艺术学

主题

  • 127 篇 feature extracti...
  • 97 篇 deep learning
  • 95 篇 computational mo...
  • 86 篇 accuracy
  • 86 篇 training
  • 85 篇 optimization
  • 85 篇 data mining
  • 81 篇 semantics
  • 76 篇 machine learning
  • 71 篇 computer science
  • 64 篇 mathematical mod...
  • 55 篇 neural networks
  • 53 篇 analytical model...
  • 52 篇 object detection
  • 51 篇 wireless sensor ...
  • 51 篇 predictive model...
  • 50 篇 bandwidth
  • 48 篇 protocols
  • 47 篇 reliability
  • 47 篇 computer archite...

机构

  • 102 篇 national enginee...
  • 79 篇 school of comput...
  • 76 篇 school of contro...
  • 52 篇 purdue universit...
  • 46 篇 school of comput...
  • 45 篇 national enginee...
  • 44 篇 school of comput...
  • 41 篇 state key labora...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of electr...
  • 29 篇 department of el...
  • 29 篇 school of comput...
  • 27 篇 huazhong univers...
  • 26 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...

作者

  • 101 篇 hai jin
  • 64 篇 jin hai
  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 xiaofei liao
  • 30 篇 hamid soltanian-...
  • 30 篇 shu-ching chen
  • 27 篇 shen linlin
  • 26 篇 chen shu-ching
  • 26 篇 soltanian-zadeh ...
  • 22 篇 robbi rahim
  • 22 篇 f. malek
  • 22 篇 hu shengshan
  • 19 篇 wang xingjun
  • 19 篇 liao xiaofei
  • 18 篇 xiao feng
  • 18 篇 shyu mei-ling
  • 17 篇 deqing zou
  • 17 篇 ai bo
  • 16 篇 shen yulong

语言

  • 5,535 篇 英文
  • 262 篇 其他
  • 148 篇 中文
  • 11 篇 日文
  • 5 篇 朝鲜文
检索条件"机构=School of System and Computer Engineering"
5962 条 记 录,以下是611-620 订阅
排序:
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast
LightDAG: A Low-latency DAG-based BFT Consensus through Ligh...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Xiaohai Dai Guanxiong Wang Jiang Xiao Zhengxuan Guo Rui Hao Xia Xie Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China School of Computer Science and Artificial Intelligence Wuhan University of Technology China School of Computer Science and Technology Hainan University China
To improve the throughput of Byzantine Fault Tolerance (BFT) consensus protocols, the Directed Acyclic Graph (DAG) topology has been introduced to parallel data processing, leading to the development of DAG-based BFT ... 详细信息
来源: 评论
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic  29
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Wang, Min Li, Peng Cheng, Zhang Liu, Wenmao Nie, Lei Bao, Haizhou Liu, Qin Zhang, Kai Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China Nsfocus Technologies Group Co. Ltd China Wuhan University School of Cyber Science and Engineering China
5G Core network (5GC) employs a Service Based Architecture (SBA). This architecture decomposes the control plane into multiple independent Network Functions (NFs). NFs open interfaces to provide services to other NFs,... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography
Invertible Mosaic Image Hiding Network for Very Large Capaci...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zihan Chen Tianrui Liu Jun-Jie Huang Wentao Zhao Xing Bi Meng Wang College of Computer Science and Technology National University of Defense Technology China College of System Engineering National University of Defense Technology China School of Computer Science and Information Engineering Hefei University of Technology China
The existing image steganography methods either sequentially conceal secret images or conceal a concatenation of multiple images. In such ways, the interference of information among multiple images will become increas...
来源: 评论
Monocular Depth Estimation with Boundary Attention Mechanism and Shifted Window Adaptive Bins
SSRN
收藏 引用
SSRN 2024年
作者: Liang, Mengnan Wang, Congcong Zhao, Meng Shi, Fan Zhang, Chao Han, Yilin School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Laboratory of Computer Vision System of Ministry of Education Tianjin University of Technology Tianjin300384 China
Monocular depth estimation is a classic research topic in computer vision. In recent years, development of Convolutional Neural Networks (CNNs) has facilitated significant breakthroughs in this field. However, there s... 详细信息
来源: 评论
Virtual sample generation for model-based prognostics and health management of on-board high-speed train control system
收藏 引用
High-Speed Railway 2023年 第3期1卷 153-161页
作者: Jiang Liu Baigen Cair Jinlan Wang Jian Wang School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China Frontiers Science Center for Smart High-speed Railway System Bejing Jiaotong UniversityBeijing 100044China School of Computer and Information Technology Bejing Jiaotong UniversityBejing 100044China Guangzhou Railway Polytechnic Guangzhou 511300China
In view of class imbalance in data-driven modeling for Prognostics and Health Management(PHM),existing classification methods may fail in generating effective fault prediction models for the on-board high-speed train ... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Multi-secret Sharing Scheme for Zero Trust Environment  14
Multi-secret Sharing Scheme for Zero Trust Environment
收藏 引用
14th IEEE International Conference on Software engineering and Service Science, ICSESS 2023
作者: Zhou, Qin Yang, Rumiao Zhou, Hao Cai, Lei Yongyou Network Technology Co. Ltd Beijing China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China North China Institute of Computing Technology The 4th System Department Beijing China
The zero-trust concept of 'never trust, always verify' injected new vitality into the development of network security. However, the related research on zero trust is still preliminary, and the research on secu... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Zhangqian Bi Yao Wan Zhaoyang Chu Yufei Hu Junyi Zhang Hongyu Zhang Guandong Xu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论