咨询与建议

限定检索结果

文献类型

  • 646 篇 会议
  • 373 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 649 篇 工学
    • 436 篇 计算机科学与技术...
    • 356 篇 软件工程
    • 138 篇 信息与通信工程
    • 93 篇 控制科学与工程
    • 69 篇 电气工程
    • 62 篇 电子科学与技术(可...
    • 59 篇 机械工程
    • 54 篇 生物工程
    • 45 篇 仪器科学与技术
    • 39 篇 生物医学工程(可授...
    • 32 篇 交通运输工程
    • 31 篇 光学工程
    • 28 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 24 篇 土木工程
    • 23 篇 航空宇航科学与技...
    • 19 篇 力学(可授工学、理...
    • 19 篇 建筑学
    • 17 篇 动力工程及工程热...
    • 17 篇 网络空间安全
  • 302 篇 理学
    • 178 篇 数学
    • 76 篇 物理学
    • 62 篇 生物学
    • 43 篇 统计学(可授理学、...
    • 33 篇 系统科学
    • 28 篇 化学
  • 181 篇 管理学
    • 105 篇 管理科学与工程(可...
    • 82 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 25 篇 医学
    • 21 篇 临床医学
  • 16 篇 法学
  • 12 篇 经济学
  • 5 篇 农学
  • 4 篇 教育学
  • 3 篇 文学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 training
  • 26 篇 computer science
  • 23 篇 laboratories
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 software enginee...
  • 20 篇 optimization
  • 19 篇 predictive model...
  • 16 篇 data mining
  • 15 篇 computational mo...
  • 15 篇 visualization
  • 14 篇 software
  • 13 篇 application soft...
  • 13 篇 neural networks
  • 13 篇 quality of servi...
  • 13 篇 wireless sensor ...
  • 13 篇 robustness
  • 12 篇 signal processin...
  • 11 篇 software systems

机构

  • 106 篇 national enginee...
  • 99 篇 college of compu...
  • 32 篇 shenzhen city ke...
  • 22 篇 school of softwa...
  • 22 篇 guangdong provin...
  • 21 篇 department of co...
  • 20 篇 school of cyber ...
  • 19 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 17 篇 tianjin key labo...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 17 篇 shenzhen univers...
  • 16 篇 school of softwa...
  • 16 篇 services computi...
  • 15 篇 shenzhen institu...

作者

  • 41 篇 shen linlin
  • 21 篇 ji zhen
  • 18 篇 linlin shen
  • 17 篇 zhen ji
  • 17 篇 li jianqiang
  • 16 篇 hu shengshan
  • 15 篇 li minghui
  • 13 篇 wang jinbao
  • 13 篇 yunhao liu
  • 13 篇 gao can
  • 13 篇 li yan
  • 12 篇 jianqiang li
  • 12 篇 yu hang
  • 11 篇 zhang leo yu
  • 11 篇 zheng changwen
  • 11 篇 jin hai
  • 10 篇 jiang lai
  • 10 篇 jie chen
  • 10 篇 zexuan zhu
  • 10 篇 zhu zexuan

语言

  • 850 篇 英文
  • 143 篇 其他
  • 26 篇 中文
  • 2 篇 日文
检索条件"机构=Software System Engineering Laboratory"
1021 条 记 录,以下是81-90 订阅
排序:
Research on the Remaining Useful Life Prediction Model of Complex Equipment  4
Research on the Remaining Useful Life Prediction Model of Co...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Tang, Lei Tang, Yifei Zhang, Junhao Liu, Mengjuan Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Glasgow College University of Electronic Science and Technology of China Chengdu China
With the rapid advancement of artificial intelligence technology, the development of intelligent manufacturing has become an inevitable trend. Utilizing AI technology to ensure the safe operation of factories is a cru... 详细信息
来源: 评论
sEMG-vision Tra: A Gesture Recognition Method Based on Surface EMG Signal-Vision Fusion
sEMG-vision Tra: A Gesture Recognition Method Based on Surfa...
收藏 引用
2024 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2024
作者: Ding, Weili Zhang, Shuhui Liu, Han Institute of Electrical Engineering Yanshan University Engineering Research Center of Intelligent Control System and Intelligent Equipment Ministry of Education Laboratory of Intelligent Rehabilitation and Neromodulation of Hebei Province Qinhuangdao China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
To address the challenges of gesture recognition accuracy within human-computer interaction technologies, and to overcome the limitations of single-modal biometric feature recognition - which often falls short in prac... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
A Node Confidence Determination Based Moving Target Defense Strategy for SDN  15
A Node Confidence Determination Based Moving Target Defense ...
收藏 引用
15th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2023
作者: Sun, Shimin Xu, Guowei Han, Li Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong Tianjin China Tianjin Univ. of Technol. Natl. Eng. Laboratory for Computer Virus Prevention and Control Technology School of Computer Science and Engineering Tianjin China
With the rapid development of Internet technology, network assets have become an indispensable part of modern society. Especially in the face of high-value network assets, the attacker is faced with paying a greater c... 详细信息
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples  39
Detecting and Corrupting Convolution-based Unlearnable Examp...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all...
来源: 评论
Tree Regularization for Visual Explanations of Cancer Cell Classification
Tree Regularization for Visual Explanations of Cancer Cell C...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Muhammad Umair Raza Jie Chen Li Wang Adil Nawaz Victor C.M. Leung Jianqiang Li College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
The challenge of interpretability remains a significant barrier to adopting deep neural networks in healthcare domains. Although tree regularization aims to align a deep neural network’s decisions with a single axis-... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
Diversified Sequential Recommendation via Evolutionary Multi-Objective Transfer Optimization
Diversified Sequential Recommendation via Evolutionary Multi...
收藏 引用
Artificial Intelligence (CAI), IEEE Conference on
作者: Wei Zhou Xiaolong Luo Hongyue Bao Zexuan Zhu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China
Sequential Recommendation (SR) intends to model user interests based on historical behavior sequences and suggest the next item. Most existing sequential models primarily focus on learning users’ preferences on the r... 详细信息
来源: 评论
Quantum security analysis of SM4 algorithm  6
Quantum security analysis of SM4 algorithm
收藏 引用
6th International Conference on Wireless Communications and Smart Grid, ICWCSG 2024
作者: Yang, Hao Wang, Chunhong Tang, Xueming Cui, Yongquan Lu, Songfeng Cai, Dunbo Qian, Ling Zhang, Runqing Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Maritime Communication Research Institute Wuhan430010 China Software Technology Co. Ltd. Suzhou215153 China
The security of commercial encryption algorithms has always been a focus of attention. The SM4 algorithm, a commercial cryptographic standard, has been recognized by ISO/IEC as an international standard and has shown ... 详细信息
来源: 评论
Automatic Repeat Request Design in AoI-Aware Broadcast With Heterogeneous Direct and Relay-Assisted Users
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Xueer Pan, Haoyuan Chan, Tse-Tin Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen China The Education University of Hong Kong Department of Mathematics and Information Technology Hong Kong Shenzhen University National Engineering Laboratory for Big Data System Computing Technology The College of Computer Science and Software Engineering Shenzhen China
This paper investigates the design of automatic repeat request (ARQ) protocols in age of information (AoI)-aware broadcast systems with heterogeneous users, including both direct and relay-assisted users. In this setu... 详细信息
来源: 评论