咨询与建议

限定检索结果

文献类型

  • 25,693 篇 期刊文献
  • 17,408 篇 会议
  • 35 册 图书

馆藏范围

  • 43,136 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 29,704 篇 工学
    • 11,194 篇 计算机科学与技术...
    • 8,952 篇 软件工程
    • 5,917 篇 电子科学与技术(可...
    • 5,280 篇 信息与通信工程
    • 5,068 篇 电气工程
    • 4,409 篇 化学工程与技术
    • 3,984 篇 材料科学与工程(可...
    • 3,677 篇 光学工程
    • 3,626 篇 控制科学与工程
    • 2,820 篇 机械工程
    • 2,471 篇 仪器科学与技术
    • 2,075 篇 生物工程
    • 1,923 篇 动力工程及工程热...
    • 1,550 篇 生物医学工程(可授...
    • 1,374 篇 冶金工程
    • 1,192 篇 力学(可授工学、理...
    • 890 篇 航空宇航科学与技...
    • 873 篇 土木工程
    • 799 篇 交通运输工程
  • 19,642 篇 理学
    • 9,814 篇 物理学
    • 6,644 篇 数学
    • 3,865 篇 化学
    • 2,568 篇 生物学
    • 2,142 篇 统计学(可授理学、...
    • 1,411 篇 系统科学
  • 4,708 篇 管理学
    • 3,203 篇 管理科学与工程(可...
    • 1,593 篇 图书情报与档案管...
    • 1,034 篇 工商管理
  • 1,536 篇 医学
    • 1,236 篇 临床医学
    • 918 篇 基础医学(可授医学...
  • 680 篇 农学
  • 599 篇 法学
  • 489 篇 经济学
  • 193 篇 教育学
  • 187 篇 军事学
  • 81 篇 文学
  • 57 篇 艺术学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 498 篇 feature extracti...
  • 459 篇 deep learning
  • 427 篇 simulation
  • 383 篇 training
  • 332 篇 semantics
  • 271 篇 optimization
  • 268 篇 accuracy
  • 230 篇 object detection
  • 224 篇 reinforcement le...
  • 206 篇 computational mo...
  • 194 篇 conferences
  • 178 篇 machine learning
  • 163 篇 support vector m...
  • 161 篇 laboratories
  • 143 篇 task analysis
  • 136 篇 image segmentati...
  • 135 篇 neural networks
  • 128 篇 robustness
  • 127 篇 wireless communi...
  • 120 篇 reliability

机构

  • 632 篇 university of ch...
  • 271 篇 center of materi...
  • 233 篇 university of sc...
  • 186 篇 science and tech...
  • 169 篇 department of ph...
  • 169 篇 departamento de ...
  • 166 篇 faculty of scien...
  • 155 篇 department of ph...
  • 153 篇 faculté des scie...
  • 151 篇 department of ph...
  • 146 篇 department for p...
  • 139 篇 institute of hig...
  • 129 篇 department of ph...
  • 126 篇 department of ph...
  • 126 篇 peng cheng labor...
  • 124 篇 department of mo...
  • 123 篇 department of ph...
  • 122 篇 physics division...
  • 122 篇 department of ph...
  • 118 篇 centre de calcul...

作者

  • 154 篇 j. m. izen
  • 150 篇 c. alexa
  • 149 篇 g. bella
  • 149 篇 j. strandberg
  • 149 篇 d. calvet
  • 149 篇 c. amelung
  • 149 篇 n. orlando
  • 148 篇 y. tayalati
  • 147 篇 g. spigo
  • 145 篇 v. chiarella
  • 143 篇 h. a. gordon
  • 142 篇 f. siegert
  • 136 篇 a. c. könig
  • 134 篇 a. dimitrievska
  • 132 篇 f. deliot
  • 130 篇 m. klein
  • 129 篇 r. ströhmer
  • 125 篇 s. veneziano
  • 125 篇 feng c.f.
  • 124 篇 h. sakamoto

语言

  • 36,074 篇 英文
  • 5,162 篇 其他
  • 1,960 篇 中文
  • 32 篇 法文
  • 27 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Science and Technology on Information Systems Engineering Key Laboratory"
43136 条 记 录,以下是581-590 订阅
排序:
Attacker-Defender Game for Infrastructure Networks Based on Intuitionistic Fuzzy Sets
Attacker-Defender Game for Infrastructure Networks Based on ...
收藏 引用
2023 IEEE International Conference on Unmanned systems, ICUS 2023
作者: Li, Zhe Liu, Jin Dong, Yibo Ren, Jiaqi Li, Weili National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha China
In order to solve the problem that it is difficult to effectively express and quantify various uncertain factors in infrastructure network attacker-defender game modelling, an infrastructure network attacker-defender ... 详细信息
来源: 评论
DADN: Data Augmentation-Driven Dual Network Framework for Node Classification  2
DADN: Data Augmentation-Driven Dual Network Framework for No...
收藏 引用
2nd International Conference on Automation, Robotics and Computer engineering, ICARCE 2023
作者: Liu, Dengfeng Pan, Zhiqiang Wang, Siyuan Li, Peihong Liu, Shixian Mao, Yanying National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha China
Node classification is an important task in graph neural networks (GNNs), aiming to predict the category of nodes in the graph according to their neighbours and their own characteristics. Current methods mainly focus ... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Recent Progress in All-Solution-Processed Organic Solar Cells
收藏 引用
Chinese Journal of Chemistry 2024年 第2期42卷 190-198页
作者: Yixuan Xu Qian Wang Wentao Zou Xu Zhang Yanna Sun Yuanyuan Kan Ping Cai Ke Gao School of Materials Science and Engineering&Guangxi Key Laboratory of Information Materials Guilin University of Electronic TechnologyGuilinGuangxi 541004China Shandong Provincial Key Laboratory for Science of Material Creation and Energy Conversion Science Center for Material Creation and Energy ConversionInstitute of Frontier and Interdisciplinary ScienceShandong UniversityQingdaoShandong 266237China
All-solution-processed organic solar cells(OSCs)(from the bottom electrode to the top electrode)are highly attractive thanks to their low cost,lightweight and high-throughput ***,achieving highly efficient all-solutio... 详细信息
来源: 评论
Collaborative Learning for Cross-Organizational Data Sharing Using Hyperledger Fabric  8
Collaborative Learning for Cross-Organizational Data Sharing...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Zheng, Yaling Cheng, Ziwen Liu, Yi Wang, Bowen Zhu, Cheng National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha China
The rise of edge networking presents both opportunities and challenges. The ever-expanding array of IoT devices generates vast amounts of data, enabling collaboration and smart applications. However, managing decentra... 详细信息
来源: 评论
Unveiling the Impact of Network Structure in Enhancing information Dissemination Efficiency for Military Command and Control : A SIR Modeling Study  9
Unveiling the Impact of Network Structure in Enhancing Infor...
收藏 引用
9th International Conference on Big Data and information Analytics, BigDIA 2023
作者: Liu, Shixian Jiang, Miao Chen, Honghui Li, Peihong Mao, Yanying Wang, Siyuan Liu, Dengfeng National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha China
At the intersection of network science, communication models, and military command and control, this study explores the critical impact of network structure on the efficiency of information dissemination. We discuss h... 详细信息
来源: 评论
A Survey on Security of UAV Authentication Based on Blockchain under New C2 paradigm  9
A Survey on Security of UAV Authentication Based on Blockcha...
收藏 引用
9th International Conference on Big Data and information Analytics, BigDIA 2023
作者: Zheng, Yaling Liu, Yi Cheng, Ziwen Pan, Yongqi Zhu, Cheng National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha China
Advancements in information technology and artificial intelligence have given rise to a new military command and control (C2) paradigm where unmanned aerial vehicles (UAVs) play a critical role. However, due to open w... 详细信息
来源: 评论
Federated Learning in Heterogeneous Cloud Computing Environment  9
Federated Learning in Heterogeneous Cloud Computing Environm...
收藏 引用
9th International Conference on Big Data and information Analytics, BigDIA 2023
作者: Li, Yaoyu Jin, Shuai Zhu, Jianghan National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Changsha China
This study examines key characteristics of cloud computing technology within the domain of federated learning, with the primary objective of exploring the principles concerning distributed computing acceleration ratio... 详细信息
来源: 评论
CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic Visual Cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年 第6期35卷 5501-5517页
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University College of Cyber Security The College of Information Science and Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Auckland University of Technology Department of Computer and Information Systems Auckland1010 New Zealand Jinan University Dynamics and Space Science Department of Computer Science The Sino-French Joint Laboratory for Astrometry Guangzhou510632 China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 5577-5587页
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论