咨询与建议

限定检索结果

文献类型

  • 282,603 篇 会议
  • 17,623 册 图书

馆藏范围

  • 299,995 篇 电子文献
  • 263 种 纸本馆藏

日期分布

学科分类号

  • 281,828 篇 工学
    • 277,751 篇 计算机科学与技术...
    • 67,717 篇 软件工程
    • 14,895 篇 信息与通信工程
    • 8,439 篇 电气工程
    • 8,089 篇 控制科学与工程
    • 4,688 篇 生物医学工程(可授...
    • 974 篇 生物工程
    • 827 篇 光学工程
    • 605 篇 机械工程
    • 568 篇 仪器科学与技术
    • 494 篇 测绘科学与技术
    • 492 篇 交通运输工程
  • 35,837 篇 理学
    • 28,677 篇 数学
    • 5,532 篇 生物学
    • 1,683 篇 物理学
    • 1,126 篇 统计学(可授理学、...
    • 517 篇 系统科学
    • 482 篇 化学
  • 30,399 篇 医学
    • 22,124 篇 临床医学
    • 9,245 篇 特种医学
    • 3,035 篇 基础医学(可授医学...
    • 1,217 篇 医学技术(可授医学...
  • 10,775 篇 管理学
    • 6,492 篇 管理科学与工程(可...
    • 3,323 篇 图书情报与档案管...
    • 1,770 篇 工商管理
    • 743 篇 公共管理
  • 4,314 篇 教育学
    • 4,041 篇 教育学
  • 2,337 篇 法学
    • 1,997 篇 社会学
  • 1,680 篇 文学
    • 1,179 篇 新闻传播学
    • 526 篇 外国语言文学
  • 467 篇 艺术学
  • 372 篇 经济学
  • 149 篇 农学
  • 98 篇 历史学
  • 65 篇 哲学
  • 24 篇 军事学

主题

  • 10,830 篇 artificial intel...
  • 4,631 篇 computer communi...
  • 3,945 篇 deep learning
  • 3,861 篇 information syst...
  • 3,741 篇 computers
  • 3,637 篇 software enginee...
  • 3,332 篇 machine learning
  • 3,243 篇 algorithm analys...
  • 3,223 篇 semantics
  • 2,288 篇 information stor...
  • 2,190 篇 pattern recognit...
  • 1,834 篇 neural networks
  • 1,820 篇 user interfaces ...
  • 1,820 篇 image processing...
  • 1,805 篇 database managem...
  • 1,794 篇 logics and meani...
  • 1,777 篇 mathematical log...
  • 1,770 篇 cryptography
  • 1,757 篇 software enginee...
  • 1,707 篇 data mining and ...

机构

  • 651 篇 univ chinese aca...
  • 541 篇 carnegie mellon ...
  • 403 篇 univ chinese aca...
  • 359 篇 univ calif berke...
  • 353 篇 shanghai jiao to...
  • 318 篇 stanford univ st...
  • 307 篇 chinese acad sci...
  • 288 篇 shanghai jiao to...
  • 285 篇 inria
  • 248 篇 tech univ munich...
  • 241 篇 tech univ darmst...
  • 225 篇 swiss fed inst t...
  • 212 篇 univ waterloo wa...
  • 207 篇 nanjing univ sta...
  • 203 篇 tsinghua univ pe...
  • 199 篇 ist austria klos...
  • 198 篇 natl univ singap...
  • 186 篇 mit cambridge ma...
  • 185 篇 univ maryland co...
  • 183 篇 chinese acad sci...

作者

  • 212 篇 shen dinggang
  • 104 篇 navab nassir
  • 98 篇 zhang lei
  • 94 篇 wang wei
  • 92 篇 susilo willy
  • 85 篇 liu yang
  • 83 篇 rueckert daniel
  • 81 篇 wang lei
  • 81 篇 wang xin
  • 76 篇 auer soeren
  • 66 篇 golland polina
  • 64 篇 weske mathias
  • 61 篇 zhang yong
  • 54 篇 liu wei
  • 52 篇 zhang li
  • 51 篇 zhou jie
  • 49 篇 jiang xiaoyi
  • 47 篇 zhang tao
  • 47 篇 zhang yu
  • 47 篇 ishai yuval

语言

  • 298,284 篇 英文
  • 1,937 篇 中文
  • 1 篇 加泰罗尼亚文
  • 1 篇 法文
检索条件"丛书名=Lecture Notes in Computer Science"
300226 条 记 录,以下是1141-1150 订阅
排序:
How Much Should I Double Spend My Bitcoin? Game Theory of Quantum Mining  15th
How Much Should I Double Spend My Bitcoin? Game Theory of Qu...
收藏 引用
15th International Conference on Decision and Game Theory for Security
作者: Li, Zhen Liao, Qi Albion Coll Dept Econ & Management Albion MI 49224 USA Cent Michigan Univ Dept Comp Sci Mt Pleasant MI 48859 USA
Quantum computing as an inevitable technology can revolutionize many aspects of our society. One potential impact is on cryptocurrency such as Bitcoin, which relies on proof-of-work mining to secure the underlying blo... 详细信息
来源: 评论
Multi-agent Based Simulation for Investigating Centralized Charging Strategies and Their Impact on Electric Vehicle Home Charging Ecosystem  4th
Multi-agent Based Simulation for Investigating Centralized C...
收藏 引用
4th Energy Informatics Academy Conference
作者: Christensen, Kristoffer Jorgensen, Bo Norregaard Ma, Zheng Grace Univ Southern Denmark Maersk McKinney Moeller Inst SDU Ctr Energy Informat Fac Engn Odense Denmark
This paper addresses the critical integration of electric vehicles (EVs) into the electricity grid, which is essential for achieving carbon neutrality by 2050. The rapid increase in EV adoption poses significant chall... 详细信息
来源: 评论
Robust Document Presentation Attack Detection via Diffusion Models and Knowledge Distillation  7th
Robust Document Presentation Attack Detection via Diffusion ...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Li, Bokang Chen, Changsheng Shenzhen Univ Guangdong Prov Key Lab Intelligent Informat Proc Shenzhen Peoples R China Shenzhen Univ Shenzhen Key Lab Media Secur Shenzhen Peoples R China
Online document presentation attack detection (DPAD) in the wild is now advancing towards generalization and robustness. This paper proposes a teacher-student framework with a robust student network capable of handlin... 详细信息
来源: 评论
Enhancing Multi-modal Contrastive Learning via Optimal Transport-Based Consistent Modality Alignment  7th
Enhancing Multi-modal Contrastive Learning via Optimal Trans...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Zhu, Sidan Luo, Dixin Beijing Inst Technol Sch Comp Sci & Technol Beijing Peoples R China Minist Educ Key Lab Artificial Intelligence Shanghai Peoples R China
Multi-modal contrastive learning has gained significant attention in recent years due to the rapid growth of multi-modal data and the increasing application demands in practice, e.g., multi-modal pre-training, retriev... 详细信息
来源: 评论
AIREG: Enhanced Educational Recommender System with Large Language Models and Knowledge Graphs
AIREG: Enhanced Educational Recommender System with Large La...
收藏 引用
21st International Conference on The Semantic Web (ESWC)
作者: Fathi, Fatemeh Rhein Westfal TH Aachen Aachen Germany
In the nowadays modern digital era, the overwhelming amount of available online data has established challenges for individuals seeking personalized educational and career pathways with relevant skill dependencies, es... 详细信息
来源: 评论
Spatial-Frequency Dual-Stream Reconstruction for Deepfake Detection  7th
Spatial-Frequency Dual-Stream Reconstruction for Deepfake De...
收藏 引用
7th Chinese Conference on Pattern Recognition and computer Vision
作者: Peng, Chunlei Chen, Tao Liu, Decheng Zheng, Yu Wang, Nannan Xidian Univ State Key Lab Integrated Serv Networks Sch Cyber Xian 710071 Peoples R China Xidian Univ Sch Telecommun Engn State Key Lab Integrated Serv Networks Xian 710071 Peoples R China
The widespread usage of Deepfake technology poses a significant threat to societal security, making the detection of Deepfakes a critical area of research. In recent years, forgery detection methods based on reconstru... 详细信息
来源: 评论
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles  27th
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles
收藏 引用
27th International Conference on Information Security
作者: Kaneko, Shohei Lafourcade, Pascal Mallordy, Lola-Baie Miyahara, Daiki Puys, Maxime Sakiyama, Kazuo Univ Electrocommun Tokyo Japan Univ Clermont Auvergne LIMOS Clermont Auvergne INP CNRSMines St Etienne F-63000 Clermont Ferrand France Univ Clermont Auvergne LIMOS CNRS UMR 6158 Aubiere France Natl Inst Adv Ind Sci & Technol Tokyo Japan
In this paper, we propose zero-knowledge proof (ZKP) protocols using physical objects for four pencil-and-paper puzzles: the well-known Sudoku as well as Makaro, Futoshiki, and Kakuro. That is, our protocols allow a p... 详细信息
来源: 评论
Using Diffusion Models for Data Augmentation on Limited Rodent OCT Datasets  25th
Using Diffusion Models for Data Augmentation on Limited Rode...
收藏 引用
25th International Conference on Intelligent Data Engineering and Automated Learning
作者: Garcia-Torres, Fernando del Amor, Roefo Morales-Martinez, Sandra Barroso, Alvaro Kemper, Bjoern Schnekeriburger, Jurgen Naranjo, Valery Univ Politecn Valencia Inst Univ Invest Tecnol Centrada Ser Humano Valencia Spain Univ Munster Biomed Technol Ctr Med Fac Mendelstr 17 D-48149 Munster Germany
Optical coherence tomography (OCT) has transformed ophthalmology by enabling accurate diagnosis of retinal diseases. OCT in rodents is used in research studies of ophthalmic diseases and treatment evaluation. However,... 详细信息
来源: 评论
Augmenting Interpolation-Based Model Checking with Auxiliary Invariants  30th
Augmenting Interpolation-Based Model Checking with Auxiliary...
收藏 引用
30th International Symposium on Model Checking Software
作者: Beyer, Dirk Chien, Po-Chun Lee, Nian-Ze Ludwig Maximilians Univ Munchen Munich Germany
Software model checking is a challenging problem, and generating relevant invariants is a key factor in proving the safety properties of a program. Program invariants can be obtained by various approaches, including l... 详细信息
来源: 评论
Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and More  30th
Registered FE Beyond Predicates: (Attribute-Based) Linear Fu...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Datta, Pratish Pal, Tapas Yamada, Shota NTT Res Sunnyvale CA 94085 USA Karlsruhe Inst Technol KASTEL SRL D-76131 Karlsruhe Germany Natl Inst Adv Ind Sci & Technol Tokyo 1350064 Japan
This paper introduces the first registered functional encryption RFE scheme tailored for linear functions. Distinctly different from classical functional encryption (FE), RFE addresses the key-escrow issue and negates... 详细信息
来源: 评论