咨询与建议

限定检索结果

文献类型

  • 22,777 篇 期刊文献
  • 1,673 篇 会议
  • 2 册 图书

馆藏范围

  • 24,452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,600 篇 工学
    • 5,612 篇 计算机科学与技术...
    • 3,048 篇 软件工程
    • 2,820 篇 电子科学与技术(可...
    • 2,561 篇 控制科学与工程
    • 2,418 篇 机械工程
    • 1,910 篇 仪器科学与技术
    • 1,568 篇 材料科学与工程(可...
    • 1,511 篇 信息与通信工程
    • 964 篇 网络空间安全
    • 955 篇 化学工程与技术
    • 800 篇 光学工程
    • 588 篇 电气工程
    • 407 篇 航空宇航科学与技...
    • 317 篇 地质资源与地质工...
    • 284 篇 环境科学与工程(可...
    • 270 篇 测绘科学与技术
    • 256 篇 交通运输工程
    • 246 篇 动力工程及工程热...
  • 6,740 篇 理学
    • 2,278 篇 数学
    • 1,649 篇 物理学
    • 711 篇 系统科学
    • 592 篇 化学
    • 484 篇 生物学
    • 376 篇 大气科学
  • 3,132 篇 管理学
    • 2,778 篇 管理科学与工程(可...
  • 2,651 篇 医学
    • 1,933 篇 临床医学
  • 760 篇 农学
  • 563 篇 经济学
    • 538 篇 应用经济学
  • 336 篇 教育学
    • 267 篇 教育学
  • 332 篇 文学
  • 319 篇 军事学
    • 307 篇 军队指挥学
  • 292 篇 艺术学
    • 257 篇 设计学(可授艺术学...
  • 246 篇 法学
  • 20 篇 哲学
  • 18 篇 历史学

主题

  • 639 篇 deep learning
  • 274 篇 machine learning
  • 129 篇 network
  • 121 篇 analysis
  • 117 篇 internet of thin...
  • 111 篇 image
  • 108 篇 clustering
  • 104 篇 simulation
  • 97 篇 optimization
  • 77 篇 blockchain
  • 69 篇 computer
  • 69 篇 reinforcement le...
  • 68 篇 classification
  • 65 篇 artificial intel...
  • 60 篇 security
  • 59 篇 system
  • 53 篇 model
  • 52 篇 random forest
  • 52 篇 information syst...
  • 50 篇 sensor

机构

  • 154 篇 university of ch...
  • 128 篇 ieee
  • 69 篇 school of comput...
  • 62 篇 department of co...
  • 54 篇 school of comput...
  • 43 篇 university of ch...
  • 41 篇 school of comput...
  • 35 篇 college of compu...
  • 31 篇 school of inform...
  • 31 篇 school of comput...
  • 30 篇 school of inform...
  • 29 篇 school of comput...
  • 28 篇 school of electr...
  • 27 篇 school of comput...
  • 26 篇 school of inform...
  • 25 篇 school of electr...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 beijing academy ...
  • 23 篇 school of comput...

作者

  • 49 篇 jing zhang
  • 41 篇 jian wang
  • 41 篇 jun wang
  • 34 篇 li zhang
  • 31 篇 cheng-wei qiu
  • 31 篇 wei sun
  • 29 篇 rui wang
  • 29 篇 mehedi masud
  • 28 篇 xin liu
  • 25 篇 wei liu
  • 24 篇 jun zhang
  • 23 篇 hui wang
  • 22 篇 chen chen
  • 22 篇 jian chen
  • 22 篇 wei wang
  • 21 篇 wei he
  • 21 篇 abdelwahed motwa...
  • 20 篇 jin wang
  • 20 篇 yu zhang
  • 19 篇 tao yang

语言

  • 21,819 篇 英文
  • 2,633 篇 中文
检索条件"机构=1. School of Computer and Information"
24452 条 记 录,以下是41-50 订阅
排序:
An Effective Power Optimization Approach Based on Whale Optimization Algorithm with Two-Populations and Mutation Strategies
收藏 引用
Chinese Journal of Electronics 2024年 第2期33卷 423-435页
作者: Juncai HE Zhenxue HE Jia LIU Yan ZHANG Fan ZHANG Fangfang LIANG Tao WANG Limin XIAO Xiang WANG Hebei Agricultural University Beijing information Science and Technology University school of {1. Science and Engineering Beihang University school of Electronic and {1. Engineering Beihang University
Power is an issue that must be considered in the design of logic circuits. Power optimization is a combinatorial optimization problem, since it is necessary to search for a logical expression that consumes the least a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Unleashing potentials with deep learning: decoding the complex events for distributed fiber optic sensing applications
收藏 引用
Science China(information Sciences) 2024年 第5期67卷 337-338页
作者: Yujiao LI Liqin HU Kuanglu YU Institute of information Science School of Computer and Information Technology Beijing Jiaotong University Beijing Key Laboratory of Advanced information Science and Network Technology Beijing Jiaotong University
After decades of research, distributed fiber optic sensors have become essential tools for precise long-distance measurements. They are applied across various sectors such as railway transportation, gas and petroleum,... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei school of {1. and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and information Security Jiujiang332005China school of {1. and Software Nanjing University of Information Science&TechnologyNanjing210044China school of {1. Engineering Hubei University of Arts and ScienceXiangyang441053China school of Modern {1. Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China school of Mathematics and {1. Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1095-1113页
作者: Fang Xu Songhao Jiang Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu school of {1. and information Science Hubei Engineering UniversityXiaogan432000China school of {1. Science and information Engineering Hubei UniversityWuhan430062China Artificial Intelligence Industrial Technology Research Institute Hubei Engineering UniversityXiaogan432000China
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relatio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Verification of quantum networks using the GHZ paradox
收藏 引用
Communications in Theoretical Physics 2024年 第10期76卷 57-63页
作者: Huan Ye Xue Yang Ming-Xing Luo school of {1. Science and Technology Southwest Jiaotong University school of {1. Science and Cyber Security Chengdu University of Technology
The Greenberger–Horne–Zeilinger(GHZ) paradox shows that it is possible to create a multipartite state involving three or more particles in which the measurement outcomes of the particles are correlated in a way that... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Compact Filtering Antenna System with Wide-Angle Scanning Capability for V2I Communication
收藏 引用
Chinese Journal of Electronics 2024年 第2期33卷 516-526页
作者: Chuang HAN Tong LI Zhaolin ZHANG Ling WANG Guangwei YANG school of Electronics and {1. Northwestern Polytechnical University school of Electronic Engineering and {1. Science Queen Mary University of London
A compact filtering antenna system with wide-angle scanning is proposed for vehicle to infrastructure(V2I) communication which would handle complex communication scenarios. In this work, a wide beam filtering antenna ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of information Engineering Chinese Academy of Sciences school of Cyber Security University of Chinese Academy of Sciences school of {1. Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Rethinking attribute localization for zero-shot learning
收藏 引用
Science China(information Sciences) 2024年 第7期67卷 184-196页
作者: Shuhuang CHEN Shiming CHEN Guo-Sen XIE Xiangbo SHU Xinge YOU Xuelong LI school of Electronic {1. and Communication Huazhong University of Science and Technology school of {1. Science and Engineering Nanjing University of Science and Technology school of Artificial Intelligence Optics and Electronics Northwestern Polytechnical University
Recent advancements in attribute localization have showcased its potential in discovering the intrinsic semantic knowledge for visual feature representations, thereby facilitating significant visual-semantic interacti... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang school of {1. and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China school of Electrical and {1. Engineering University ofWaterlooWaterlooN2L 3G1Canada
Software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Gradient sparsification for efficient wireless federated learning with differential privacy
收藏 引用
Science China(information Sciences) 2024年 第4期67卷 272-288页
作者: Kang WEI Jun LI Chuan MA Ming DING Feng SHU Haitao ZHAO Wen CHEN Hongbo ZHU school of Electronic and Optical Engineering Nanjing University of Science and Technology Zhejiang Lab Key Laboratory of computer Network and {1. Integration(Southeast University) Ministry of Education Data61 Commonwealth Scientific and Industrial Research Organisation school of {1. and Communication Engineering Hainan University school of Communications and {1. Engineering Nanjing University of Posts and Telecommunications school of Electronic {1. and Electrical Engineering Shanghai Jiao Tong University
Federated learning(FL) enables distributed clients to collaboratively train a machine learning model without sharing raw data with each other. However, it suffers from the leakage of private information from uploading... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论