咨询与建议

限定检索结果

文献类型

  • 7,420 篇 会议
  • 6,253 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 13,721 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,133 篇 工学
    • 4,669 篇 计算机科学与技术...
    • 3,750 篇 软件工程
    • 2,004 篇 信息与通信工程
    • 1,667 篇 电子科学与技术(可...
    • 1,355 篇 控制科学与工程
    • 1,313 篇 电气工程
    • 961 篇 光学工程
    • 886 篇 生物工程
    • 863 篇 机械工程
    • 800 篇 化学工程与技术
    • 739 篇 仪器科学与技术
    • 713 篇 材料科学与工程(可...
    • 629 篇 生物医学工程(可授...
    • 497 篇 动力工程及工程热...
    • 297 篇 交通运输工程
    • 275 篇 力学(可授工学、理...
    • 270 篇 土木工程
    • 253 篇 建筑学
  • 5,332 篇 理学
    • 2,199 篇 数学
    • 2,068 篇 物理学
    • 991 篇 生物学
    • 791 篇 化学
    • 700 篇 统计学(可授理学、...
    • 484 篇 系统科学
  • 1,915 篇 管理学
    • 1,220 篇 管理科学与工程(可...
    • 736 篇 图书情报与档案管...
    • 451 篇 工商管理
  • 582 篇 医学
    • 480 篇 临床医学
    • 395 篇 基础医学(可授医学...
    • 273 篇 药学(可授医学、理...
  • 289 篇 法学
  • 192 篇 经济学
  • 168 篇 农学
  • 91 篇 教育学
  • 62 篇 军事学
  • 30 篇 文学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 217 篇 deep learning
  • 182 篇 feature extracti...
  • 149 篇 computational mo...
  • 143 篇 optimization
  • 142 篇 machine learning
  • 126 篇 semantics
  • 117 篇 data mining
  • 100 篇 neural networks
  • 95 篇 simulation
  • 91 篇 object detection
  • 90 篇 predictive model...
  • 87 篇 support vector m...
  • 87 篇 bandwidth
  • 87 篇 convolution
  • 86 篇 visualization
  • 83 篇 image segmentati...
  • 82 篇 wireless communi...
  • 81 篇 accuracy
  • 80 篇 training
  • 78 篇 reinforcement le...

机构

  • 101 篇 national enginee...
  • 78 篇 center of materi...
  • 71 篇 school of optica...
  • 62 篇 university of ch...
  • 54 篇 college of infor...
  • 45 篇 school of inform...
  • 42 篇 faculty of infor...
  • 41 篇 university of sc...
  • 41 篇 school of gradua...
  • 39 篇 school of comput...
  • 39 篇 school of inform...
  • 38 篇 huazhong univers...
  • 38 篇 shanghai key lab...
  • 37 篇 state key lab of...
  • 37 篇 school of inform...
  • 37 篇 tianqiao and chr...
  • 36 篇 school of inform...
  • 36 篇 school of comput...
  • 35 篇 school of electr...
  • 35 篇 college of infor...

作者

  • 57 篇 sun qizhen
  • 56 篇 qizhen sun
  • 47 篇 hai jin
  • 45 篇 yang yang
  • 42 篇 shuxiang guo
  • 36 篇 wang jian
  • 36 篇 jin hai
  • 35 篇 jian wang
  • 35 篇 liu yang
  • 35 篇 ming tang
  • 34 篇 zhang wenqiang
  • 32 篇 wei li
  • 31 篇 hao li
  • 30 篇 wang lei
  • 27 篇 chen chen
  • 26 篇 bin wang
  • 24 篇 zhang lei
  • 23 篇 tiger h. tao
  • 22 篇 xiaoling wei
  • 22 篇 li li

语言

  • 11,977 篇 英文
  • 1,279 篇 其他
  • 436 篇 中文
  • 32 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Science and Technology on Information System Engineering Lab"
13721 条 记 录,以下是151-160 订阅
排序:
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1280-1284页
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
LOWER LIMB GAIT RECOGNITION METHOD BASED ON KNOWLEDGE DISTILLATION  10
LOWER LIMB GAIT RECOGNITION METHOD BASED ON KNOWLEDGE DISTIL...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Wang, Mengdi Wang, Shaohong Ma, Chao Key Laboratory of Modern Measurement and Control Technology Ministry of Edu. Beijing Information Science and Technology Beijing China Beijing Key Lab of Measurement and Control of Mechanical and Electrical System Beijing Information Science and Technology Beijing China
The need for assistive devices such as lower limb exoskeletons is steadily growing, making quick and precise gait recognition essential for optimal operation of these apparatuses. The knowledge distillation method was... 详细信息
来源: 评论
PERIODIC STATISTICAL ANALYSIS OF GAIT PHASE SEGMENTATION  10
PERIODIC STATISTICAL ANALYSIS OF GAIT PHASE SEGMENTATION
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Fu, Mingkai Wang, Shaohong Ma, Chao Key Laboratory of Modern Measurement and Control Technology Ministry of Edu. Beijing Information Science and Technology Beijing China Beijing Key Lab of Measurement and Control of Mechanical and Electrical System Beijing Information Science and Technology Beijing China
In order to achieve accurate segmentation of gait phases for precise real-time control of lower limb exoskeleton robots, the periodic statistical analysis of human motion posture by using the inertial measurement unit... 详细信息
来源: 评论
FedRKG: A Privacy-Preserving Federated Recommendation Framework via Knowledge Graph Enhancement  18th
FedRKG: A Privacy-Preserving Federated Recommendation Framew...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Yao, Dezhong Liu, Tongtong Cao, Qi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computing Science University of Glasgow Glasgow United Kingdom
Federated Learning (FL) has emerged as a promising approach for preserving data privacy in recommendation systems by training models locally. Recently, Graph Neural Networks (GNN) have gained popularity in recommendat... 详细信息
来源: 评论
On-Body Antenna with Ultra-Wide Operation Band and Dynamically Broad Notch Band for IoT Applications
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21144-21157页
作者: Chen, Zhao-Min Liang, Xinhua Li, Jia-Ning Chen, Ze-Hui Yang, Wu Lu, Wei-Bing Nanjing University of Aeronautics and Astronautics Department of Electronic and Information Engineering Nanjing211106 China Southeast University State Key Lab of Millimeter Waves School of Information Science and Engineering Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China
This paper presents an on-body antenna characterized by low structural complexity, low spatial power density (SPD), and high robustness. This antenna features unique dual-wideband capability, offering ultra-wideband o... 详细信息
来源: 评论
Deep Learning to Classify Bacterial Species in the same Genus
Deep Learning to Classify Bacterial Species in the same Genu...
收藏 引用
2024 International Conference on Electronics, information, and Communication, ICEIC 2024
作者: Sheela, Sherin Piang, May Phu Sakorntanant, Sakda Poomrittigul, Suvit Treebupachatsakul, Treesukon School of Engineering King Mongkut's Institute of Technology Ladkrabang Department of Biomedical Engineering Thailand Pathumwan Institute of Technology Faculty of Science and Technology Department of Software Engineering and Information System Bangkok Thailand School of Information Technology King Mongkut's Institute of Technology Ladkrabang Thailand
Bacterial strains in the same genus share highly similar morphology, gram-staining characteristics, colony sizes, and spatial arrangements. Therefore, identifying them by deep learning can be quite challenging. This s... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Recent Progress in Reinforcement Learning and Adaptive Dynamic Programming for Advanced Control Applications
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 18-36页
作者: Ding Wang Ning Gao Derong Liu Jinna Li Frank L.Lewis IEEE the Faculty of Information Technology Beijing Key Laboratory of Computational Intelligence and Intelligent SystemBeijing Laboratory of Smart Environmental Protectionand Beijing Institute of Artificial IntelligenceBeijing University of TechnologyBeijing 100124China the School of System Design and Intelligent Manufacturing Southern University of Science and TechnologyShenzhen 518055China the Department of Electrical and Computer Engineering University of Illinois at ChicagoChicago IL 60607 USA the School of Information and Control Engineering Liaoning Petrochemical UniversityFushun 113001China the UTA Research Institute the University of Texas at ArlingtonArlington TX 76118 USA
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ... 详细信息
来源: 评论
R3 - Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic systems
收藏 引用
IEEE Access 2023年 11卷 119284-119312页
作者: Gabr, Mohamed Korayem, Yousef Chen, Yen-Lin Yee, Por Lip Ku, Chin Soon Alexan, Wassim Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch... 详细信息
来源: 评论