咨询与建议

限定检索结果

文献类型

  • 627 篇 期刊文献
  • 594 篇 会议

馆藏范围

  • 1,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 834 篇 工学
    • 628 篇 计算机科学与技术...
    • 512 篇 软件工程
    • 184 篇 信息与通信工程
    • 119 篇 电气工程
    • 101 篇 控制科学与工程
    • 99 篇 生物工程
    • 68 篇 生物医学工程(可授...
    • 54 篇 光学工程
    • 49 篇 电子科学与技术(可...
    • 44 篇 化学工程与技术
    • 39 篇 机械工程
    • 38 篇 网络空间安全
    • 31 篇 动力工程及工程热...
    • 26 篇 安全科学与工程
    • 24 篇 建筑学
  • 398 篇 理学
    • 208 篇 数学
    • 125 篇 生物学
    • 75 篇 物理学
    • 74 篇 统计学(可授理学、...
    • 45 篇 化学
    • 31 篇 系统科学
  • 223 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 77 篇 医学
    • 66 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
    • 28 篇 公共卫生与预防医...
  • 54 篇 法学
    • 35 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 23 篇 农学
  • 7 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 46 篇 feature extracti...
  • 44 篇 deep learning
  • 37 篇 semantics
  • 33 篇 computational mo...
  • 30 篇 training
  • 23 篇 blockchain
  • 22 篇 federated learni...
  • 21 篇 machine learning
  • 21 篇 cloud computing
  • 20 篇 internet of thin...
  • 19 篇 data privacy
  • 19 篇 convolution
  • 19 篇 privacy
  • 17 篇 big data
  • 17 篇 neural networks
  • 16 篇 image segmentati...
  • 16 篇 predictive model...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 data models

机构

  • 126 篇 state key labora...
  • 76 篇 state key labora...
  • 36 篇 college of compu...
  • 33 篇 key laboratory o...
  • 32 篇 college of compu...
  • 32 篇 fujian provincia...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 20 篇 school of econom...
  • 20 篇 college of compu...
  • 20 篇 guizhou universi...
  • 19 篇 college of compu...
  • 19 篇 guizhou provinci...
  • 18 篇 state key labora...
  • 18 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 14 篇 guizhou provinci...
  • 14 篇 college of compu...

作者

  • 36 篇 tian youliang
  • 32 篇 chen yuling
  • 29 篇 yuling chen
  • 28 篇 youliang tian
  • 21 篇 pan jeng-shyang
  • 17 篇 peng changgen
  • 16 篇 qin yongbin
  • 16 篇 li shaobo
  • 14 篇 shen linlin
  • 13 篇 shaobo li
  • 13 篇 chen yanping
  • 13 篇 xiong jinbo
  • 12 篇 nguyen trong-the
  • 12 篇 shi yong
  • 12 篇 changgen peng
  • 12 篇 wang lihui
  • 12 篇 chu shu-chuan
  • 11 篇 tan weijie
  • 11 篇 huang ruizhang
  • 11 篇 tao li

语言

  • 1,093 篇 英文
  • 115 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=State Key Laboratory of Public Big Data College of Computer Science and Technology"
1221 条 记 录,以下是931-940 订阅
排序:
Differentially-Fed Rectangular Patch Antenna under TM21and TM03Modes for Enhanced Bandwidth and Stable High Gain  13
Differentially-Fed Rectangular Patch Antenna under TM21and T...
收藏 引用
13th International Conference on Microwave and Millimeter Wave technology, ICMMT 2021
作者: Xu, Zhi-Yong Zhang, Xiao Hong, Kai-Dong Zhu, Lei Yuan, Tao Shenzhen University Guangdong Prov. Mobile Terminal Microwave And Millimeter-Wave Antenna Engineering Research Center College Of Electronics And Information Engineering Shenzhen518060 China Guangdong-Hong Kong Joint Laboratory For Big Data Imaging And Communication Shenzhen Guangdong518048 China ATR National Key Laboratory Of Defense Technology College Of Electronics And Information Engineering Shenzhen University Shenzhen Guangdong518060 China Department Of Electrical And Computer Engineering Faculty Of Science And Technology University Of Macau China Postgraduate Education Branch Of The China Education Society Of Electronics China
A differentially-fed rectangular patch antenna under TM21 and TM03 modes is proposed to realize bandwidth enhancement and stable high gain. Firstly, two open slots along the median of patch are introduced to reconstru... 详细信息
来源: 评论
Universal deep network for steganalysis of color image based on channel representation
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Kangkang Luo, Weiqi Tan, Shunquan Huang, Jiwu The Guangdong Key Lab of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Up to now, most existing steganalytic methods are designed for grayscale images, and they are not suitable for color images that are widely used in current social networks. In this paper, we design a universal color i... 详细信息
来源: 评论
Detail retention and enhancement for camouflaged object detection
收藏 引用
Neurocomputing 2025年 648卷
作者: Shangjing Chen Feng Xu Tao Zeng Xin Li Jiale Chen Xin Lyu College of Computer Science and Software Engineering Hohai University Nanjing 211100 China School of Computer Engineering Jiangsu Ocean University Lianyungang 222005 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing 211100 China
The objective of camouflaged object detection is to segment objects that share similar visual attributes with their backgrounds. Existing methods leverage the consistency and variability of the object to pinpoint its ... 详细信息
来源: 评论
Cryptanalysis of a Pairing-Based Anonymous key Agreement Scheme for Smart Grid  15th
Cryptanalysis of a Pairing-Based Anonymous Key Agreement Sch...
收藏 引用
15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2019, held in conjunction with the 12th International Conference on Frontiers of Information technology, Applications and Tools, FITAT 2019
作者: Liang, Xiao-Cong Wu, Tsu-Yang Lee, Yu-Qi Chen, Chien-Ming Yeh, Jyh-Haw Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Computer Science Boise State University Idaho United States
Authentication and key agreement schemes in smart grid have received much attentions by researchers in recent years. Recently, Mahmood et al. proposed a secure pairing-based anonymous key exchange scheme in smart grid... 详细信息
来源: 评论
Motif Graph Neural Network
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Xuexin Cai, Ruichu Fang, Yuan Wu, Min Li, Zijian Hao, Zhifeng The School of Computer Science Guangdong University of Technology Guangzhou510006 China The School of Computer Science Guangdong University of Technology Guangdong Provincial Key Laboratory of Public Finance and Taxation with Big Data Application Guangzhou China Peng Cheng Laboratory Shenzhen518066 China The School of Computing and Information Systems Singapore Management University 178902 Singapore A*STAR 138632 Singapore The College of Science Shantou University Shantou515063 China
Graphs can model complicated interactions between entities, which naturally emerge in many important applications. These applications can often be cast into standard graph learning tasks, in which a crucial step is to... 详细信息
来源: 评论
Plagiarism detection of multi-threaded programs using frequent behavioral pattern mining  32
Plagiarism detection of multi-threaded programs using freque...
收藏 引用
32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
作者: Wang, Qing Tian, Zhenzhou Gao, Cong Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an China College of Information Sciences and Technology Pennsylvania State University PA United States
Software dynamic birthmark techniques construct birthmarks using the captured execution traces from running the programs, which serve as one of the most promising methods for obfuscation-resilient software plagiarism ... 详细信息
来源: 评论
Secure and Privacy-preserving data-sharing Framework based on Blockchain technology for Al-Najaf/Iraq Oil Refinery
Secure and Privacy-preserving Data-sharing Framework based o...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Samir M. Umran SongFeng Lu Zaid Ameen Abduljabbar Zhi Lu Bingyan Feng Lu Zheng Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Ministry of Industry and Minerals Iraqi Cement State Company Baghdad Iraq Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen China College of Education for Pure Sciences University of Basrah Technical Computer Engineering Department Al-Kunooze University College Basrah Iraq School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Wuhan Huazhong Numerical Control Co. Ltd Industrial Internet Research Institute Wuhan China College of Computer Science South-Central University for Nationalities Wuhan China
The Industrial Internet of Things or Industry 4.0 efficiently enhances the manufacturing process in terms of raising productivity, system performance, cost reduction, and building large-scale systems. It enables the c...
来源: 评论
Random Forest-Based Ensemble Estimator for Concrete Compressive Strength Prediction via AdaBoost Method  15th
Random Forest-Based Ensemble Estimator for Concrete Compress...
收藏 引用
15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2019
作者: Lv, Yuanxin Shi, Xiaoyu Ran, Longyu Shang, Mingsheng College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China University of Chinese Academy of Sciences Beijing100049 China
As one of the most important building materials, the quality of concrete directly affects the safety of buildings. Hence, it is an important and hot issue to predict the compressive strength of concrete with highly ac... 详细信息
来源: 评论
Deep Sentiment Learning Network for Temporal-aware Recommendation Based on User Reviews
Deep Sentiment Learning Network for Temporal-aware Recommend...
收藏 引用
IEEE International Conference on big data Analysis (ICBDA)
作者: Xinxin Li Tianqi Shang Dezhong Peng Xiaoyu Shi School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China College of Computer Science Sichuan University Chengdu China Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing China
Recently, many websites encourage users to fill in reviews on items and services to improve the quality of personalized recommendation, because of the rich sentiment information hidden in user reviews. However, most e... 详细信息
来源: 评论
Adjusting the inheritance of topic for dynamic document clustering  37th
Adjusting the inheritance of topic for dynamic document clus...
收藏 引用
37th National Conference of Theoretical computer science, NCTCS 2019
作者: Huang, Ruizhang Zhu, Yingxue Chen, Yanping Yang, Yue Xu, Weijia Yang, Jian Meng, Yaru College of Computer Science and Technology Guizhou University GuiyangGuizhou China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University GuiyangGuizhou China
Organizing streaming documents from time-varying dataset is meaningful but difficult because topics evolve over time. Dynamic document clustering is a vital research problem, which helps to group the time-varying docu... 详细信息
来源: 评论