咨询与建议

限定检索结果

文献类型

  • 2,380 篇 会议
  • 1,974 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,868 篇 工学
    • 1,961 篇 计算机科学与技术...
    • 1,517 篇 软件工程
    • 590 篇 信息与通信工程
    • 372 篇 控制科学与工程
    • 356 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 220 篇 机械工程
    • 204 篇 光学工程
    • 168 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 90 篇 材料科学与工程(可...
    • 90 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 81 篇 土木工程
    • 77 篇 建筑学
  • 1,444 篇 理学
    • 711 篇 数学
    • 382 篇 物理学
    • 313 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 153 篇 化学
    • 148 篇 系统科学
  • 760 篇 管理学
    • 506 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 198 篇 工商管理
  • 184 篇 医学
    • 150 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 116 篇 法学
  • 72 篇 经济学
  • 57 篇 农学
  • 22 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 100 篇 feature extracti...
  • 90 篇 semantics
  • 77 篇 computational mo...
  • 72 篇 computer science
  • 70 篇 deep learning
  • 67 篇 training
  • 62 篇 computer archite...
  • 58 篇 cloud computing
  • 56 篇 laboratories
  • 55 篇 optimization
  • 53 篇 servers
  • 52 篇 grid computing
  • 51 篇 scalability
  • 50 篇 protocols
  • 49 篇 accuracy
  • 48 篇 bandwidth
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 analytical model...
  • 43 篇 machine learning

机构

  • 128 篇 school of comput...
  • 102 篇 national enginee...
  • 93 篇 hubei province k...
  • 88 篇 school of comput...
  • 75 篇 department of co...
  • 54 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 national enginee...
  • 43 篇 state key labora...
  • 43 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 34 篇 key laboratory o...
  • 34 篇 university of ch...

作者

  • 234 篇 hai jin
  • 189 篇 jin hai
  • 52 篇 xiaofei liao
  • 36 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 28 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 22 篇 li peng
  • 20 篇 liu yang
  • 19 篇 liu jun
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 17 篇 li bo

语言

  • 3,938 篇 英文
  • 299 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4370 条 记 录,以下是601-610 订阅
排序:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
A Method of Constructing and Automatically Labeling Radio Frequency Signal Training Dataset for UAV  48
A Method of Constructing and Automatically Labeling Radio Fr...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Liu, Chao Ma, Ruipeng Si, Zheng Chi, Mingmin Fudan University School of Computer Science Shanghai Key Laboratory of Data Science China Zhengzhou Zhongke Institute of Integrated Circuit and System Application China Zhengzhou University School of Cyber Science and Engineering China Zhengzhou University Henan Institute of Advanced Technology China
The problem of signal detection and classification of multiple UAVs can be solved using object detection techniques in computer vision. However, this requires collecting and labeling a large amount of reliable raw dat... 详细信息
来源: 评论
Toward Comprehensive Semantic Prompt for Region Contrastive Learning Underwater Image Enhancement
Toward Comprehensive Semantic Prompt for Region Contrastive ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiao Wang Yongsheng Fu Wei Wang Wei Liu School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System
Underwater image enhancement (UIE) focuses on mitigating image quality degradation due to light absorption and scattering. However, most existing methods enhance images via a global and uniform manner, neglecting the ... 详细信息
来源: 评论
Event-based Video Person Re-identification via Cross-Modality and Temporal Collaboration
arXiv
收藏 引用
arXiv 2025年
作者: Li, Renkai Yuan, Xin Liu, Wei Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China
Video-based person re-identification (ReID) has become increasingly important due to its applications in video surveillance applications. By employing events in video-based person ReID, more motion information can be ... 详细信息
来源: 评论
VAGeo: View-specific Attention for Cross-View Object Geo-Localization
arXiv
收藏 引用
arXiv 2025年
作者: Li, Zhongyang Yuan, Xin Liu, Wei Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System China
Cross-view object geo-localization (CVOGL) aims to locate an object of interest in a captured ground- or drone-view image within the satellite image. However, existing works treat ground-view and drone-view query imag... 详细信息
来源: 评论
Arrayed Waveguide Grating for Visible Light Application  14
Arrayed Waveguide Grating for Visible Light Application
收藏 引用
Holography, Diffractive Optics, and Applications XIV 2024
作者: Sun, Quancheng Feng, Zhihua Li, Yuhong Wang, Dongcheng Wang, Yan Liu, Haipeng Li, Junhao Yang, Cunliang Feng, Jijun Shanghai Key Laboratory of Modern Optical System Engineering Research Center of Optical Instrument and System Ministry of Education School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China School of Physics Xidian University Shaanxi Xi'an710071 China Nanjing Electronic Devices Institute Jiangsu210016 China
Miniaturized spectrometers, owing to their compact dimensions, high sensitivity, and low cost, have been extensively applied in environmental monitoring, biomedical diagnostics, industrial inspection, and other fields... 详细信息
来源: 评论
Vulnerability Detection Based on Adapter Tuning and Enhanced Feature Learning  36
Vulnerability Detection Based on Adapter Tuning and Enhanced...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Luo, Hui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China PengCheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China
Pre-trained code models have achieved promising results in the vulnerability detection field. The prevailing approach is to adapt these models with vulnerability datasets using inefficient full-model fine-tuning. Thes... 详细信息
来源: 评论
MG6D: A Deep Fusion Approach for 6D Pose Estimation with Mamba and Graph Convolution Network
收藏 引用
IEEE Access 2025年 13卷 100433-100445页
作者: Zhu, Jiaqi Li, Bin Zhao, Xinhua Tianjin University of Technology School of Computer Science and Engineering Tianjin 300384 China Tianjin University of Technology Tianjin Key Laboratory for Advanced Mechatronic System Design and Intelligent Control School of Mechanical Engineering Tianjin 300384 China
Accurate and efficient 6D pose estimation is a fundamental technology in many industrial applications. While existing dense correspondence methods have shown progress, they face challenges in multimodal feature fusion... 详细信息
来源: 评论
A practical conflicting role-based cloud security risk evaluation method
Recent Advances in Computer Science and Communications
收藏 引用
Recent Advances in computer science and Communications 2021年 第3期14卷 874-886页
作者: Han, Jin Zhan, Jing Xia, Xiaoqing Fan, Xue School of Computer Science Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Faculty of Information Technology Beijing University of Technology Beijing100124 China
Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but to accept them. However, since cloud ... 详细信息
来源: 评论
Coverage Probability of Distributed CoMP UAV-Assisted Cellular Networks
Coverage Probability of Distributed CoMP UAV-Assisted Cellul...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Yan Li Qingmin Long Qiang Tang Shiming He Bing Xiong School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China Science and Technology on Information System Engineering Laboratory National University of Defense Technology Changsha China
It is well-established that terrestrial communication systems may fail during emergencies such as earthquakes, tsunamis, and floods. Fortunately, with the rapid advancement of unmanned aerial vehicle (UAV) network tec... 详细信息
来源: 评论