咨询与建议

限定检索结果

文献类型

  • 3,622 篇 会议
  • 2,307 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 5,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,595 篇 工学
    • 2,049 篇 计算机科学与技术...
    • 1,650 篇 软件工程
    • 716 篇 信息与通信工程
    • 600 篇 控制科学与工程
    • 571 篇 电气工程
    • 553 篇 电子科学与技术(可...
    • 405 篇 生物工程
    • 361 篇 光学工程
    • 332 篇 机械工程
    • 290 篇 生物医学工程(可授...
    • 259 篇 动力工程及工程热...
    • 253 篇 仪器科学与技术
    • 197 篇 化学工程与技术
    • 149 篇 材料科学与工程(可...
    • 145 篇 交通运输工程
    • 120 篇 土木工程
    • 109 篇 建筑学
  • 1,950 篇 理学
    • 926 篇 数学
    • 610 篇 物理学
    • 451 篇 生物学
    • 291 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 209 篇 化学
  • 869 篇 管理学
    • 577 篇 管理科学与工程(可...
    • 307 篇 图书情报与档案管...
    • 230 篇 工商管理
  • 281 篇 医学
    • 237 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 112 篇 药学(可授医学、理...
  • 128 篇 法学
    • 107 篇 社会学
  • 101 篇 经济学
  • 66 篇 农学
  • 50 篇 教育学
  • 19 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学

主题

  • 130 篇 feature extracti...
  • 97 篇 deep learning
  • 96 篇 computational mo...
  • 86 篇 data mining
  • 86 篇 accuracy
  • 86 篇 training
  • 83 篇 optimization
  • 82 篇 semantics
  • 74 篇 machine learning
  • 71 篇 computer science
  • 63 篇 mathematical mod...
  • 55 篇 neural networks
  • 53 篇 object detection
  • 52 篇 analytical model...
  • 51 篇 wireless sensor ...
  • 51 篇 predictive model...
  • 50 篇 bandwidth
  • 48 篇 reliability
  • 48 篇 computer archite...
  • 47 篇 support vector m...

机构

  • 101 篇 national enginee...
  • 80 篇 school of comput...
  • 75 篇 school of contro...
  • 53 篇 purdue universit...
  • 45 篇 school of comput...
  • 45 篇 national enginee...
  • 43 篇 school of comput...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 state key labora...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 30 篇 department of el...
  • 29 篇 school of electr...
  • 28 篇 school of comput...
  • 27 篇 huazhong univers...
  • 26 篇 school of comput...
  • 26 篇 hubei province k...
  • 25 篇 hubei key labora...

作者

  • 101 篇 hai jin
  • 72 篇 jin hai
  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 xiaofei liao
  • 30 篇 hamid soltanian-...
  • 30 篇 shu-ching chen
  • 26 篇 chen shu-ching
  • 26 篇 soltanian-zadeh ...
  • 26 篇 shen linlin
  • 25 篇 robbi rahim
  • 22 篇 f. malek
  • 22 篇 hu shengshan
  • 19 篇 wang xingjun
  • 19 篇 liao xiaofei
  • 19 篇 shyu mei-ling
  • 18 篇 xiao feng
  • 17 篇 deqing zou
  • 17 篇 ai bo
  • 16 篇 shen yulong

语言

  • 5,252 篇 英文
  • 533 篇 其他
  • 147 篇 中文
  • 11 篇 日文
  • 5 篇 朝鲜文
检索条件"机构=School of System and Computer Engineering"
5946 条 记 录,以下是621-630 订阅
排序:
Monocular Depth Estimation with Boundary Attention Mechanism and Shifted Window Adaptive Bins
SSRN
收藏 引用
SSRN 2024年
作者: Liang, Mengnan Wang, Congcong Zhao, Meng Shi, Fan Zhang, Chao Han, Yilin School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Laboratory of Computer Vision System of Ministry of Education Tianjin University of Technology Tianjin300384 China
Monocular depth estimation is a classic research topic in computer vision. In recent years, development of Convolutional Neural Networks (CNNs) has facilitated significant breakthroughs in this field. However, there s... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
arXiv
收藏 引用
arXiv 2025年
作者: Bi, Zhangqian Wan, Yao Chu, Zhaoyang Hu, Yufei Zhang, Junyi Zhang, Hongyu Xu, Guandong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography
Invertible Mosaic Image Hiding Network for Very Large Capaci...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zihan Chen Tianrui Liu Jun-Jie Huang Wentao Zhao Xing Bi Meng Wang College of Computer Science and Technology National University of Defense Technology China College of System Engineering National University of Defense Technology China School of Computer Science and Information Engineering Hefei University of Technology China
The existing image steganography methods either sequentially conceal secret images or conceal a concatenation of multiple images. In such ways, the interference of information among multiple images will become increas...
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Multi-secret Sharing Scheme for Zero Trust Environment  14
Multi-secret Sharing Scheme for Zero Trust Environment
收藏 引用
14th IEEE International Conference on Software engineering and Service Science, ICSESS 2023
作者: Zhou, Qin Yang, Rumiao Zhou, Hao Cai, Lei Yongyou Network Technology Co. Ltd Beijing China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China North China Institute of Computing Technology The 4th System Department Beijing China
The zero-trust concept of 'never trust, always verify' injected new vitality into the development of network security. However, the related research on zero trust is still preliminary, and the research on secu... 详细信息
来源: 评论
How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
How to Select Pre-Trained Code Models for Reuse? A Learning ...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Zhangqian Bi Yao Wan Zhaoyang Chu Yufei Hu Junyi Zhang Hongyu Zhang Guandong Xu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Big Data and Software Engineering Chongqing University Chongqing China School of Computer Science University of Technology Sydney Sydney Australia
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de... 详细信息
来源: 评论
Fast Foothold Planning for Quadruped Robot Locomotion Using Topological Perception
Fast Foothold Planning for Quadruped Robot Locomotion Using ...
收藏 引用
International Electronics Symposium (IES)
作者: Azhar Aulia Saputra Masaya Shoji Fernando Ardilla Naoyuki Kubota Department of Mechanical Systems Engineering Graduate School of System Design Tokyo Metropolitan University Japan Department of Informatics and Computer Engineering Politeknik Elektronika Negeri Surabaya Indonesia
Recent advancements in legged robot locomotion systems have led to significant improvements in their agility and overall performance. However, for these systems to effectively handle sudden obstacles, especially in fo... 详细信息
来源: 评论
A Speed Measurement Method of Rail Transit Based on Millimeter-Wave Radar  1
收藏 引用
5th International Symposium for Intelligent Transportation and Smart City, ITASC 2022
作者: Shen, Tuo Xie, Lanxin Luo, Jinnan Zeng, Xiaoqing Shanghai Key Laboratory of Rail Infrastructure Durability and System Safety Shanghai201804 China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China Institute of Rail Transit Tongji University Shanghai China
The growing use of millimeter-wave radars in the intelligent transportation field and increasing accuracy provide new possibilities for train speed measurement. This paper proposes a measuring train speed method by us... 详细信息
来源: 评论
Joint Resource Allocation and Blocklength Assignment in Star-Ris and Noma-Assisted Urllc systems
SSRN
收藏 引用
SSRN 2024年
作者: Yang, Shuhui Chen, Jian Jie, Jia Guo, Liang Wang, Xingwei School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China
This paper investigates a novel non-orthogonal multiple access (NOMA) assisted ultra-reliable low-latency communications (URLLC) paradigm. By allowing multiple users to occupy the same time or frequency resource block... 详细信息
来源: 评论
A Robust Anomaly Detection Framework Utilizing Feature engineering and Ensemble Techniques with BETH Data
A Robust Anomaly Detection Framework Utilizing Feature Engin...
收藏 引用
2024 International Conference on Intelligent systems for Cybersecurity, ISCS 2024
作者: Neeraja, Kondamudi Naga Rao, T. Prabhakara Rao, Peluru Janardhana Pbv, Raja Rao Moses, G. Jose Lakshmanarao, A. Andhra University College of Engineering Au Department of Computer Science and System's Engineering Visakhapatnam India Aditya Unviersity Department of Cse Surampalem India Avanthi's Research Technological Academy Department of Cse A.P Vizianagaram India Department of Cse A.P Bhimavaram India School of Engineering Malla Reddy University Hyderabad India Aditya Unviersity Department of It Surampalem India
Anomaly detection holds a critical role in cybersecurity, with the aim of identifying suspicious activities or behaviors that deviated from normal patterns. In this paper, the BPF-extended tracking honeypot (BETH) dat... 详细信息
来源: 评论