咨询与建议

限定检索结果

文献类型

  • 68,035 篇 会议
  • 418 篇 期刊文献
  • 205 册 图书

馆藏范围

  • 68,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,345 篇 工学
    • 31,346 篇 计算机科学与技术...
    • 26,655 篇 软件工程
    • 11,916 篇 信息与通信工程
    • 9,712 篇 控制科学与工程
    • 7,420 篇 生物工程
    • 6,370 篇 电气工程
    • 4,603 篇 生物医学工程(可授...
    • 3,990 篇 电子科学与技术(可...
    • 3,706 篇 机械工程
    • 3,631 篇 光学工程
    • 3,232 篇 动力工程及工程热...
    • 3,159 篇 网络空间安全
    • 2,671 篇 安全科学与工程
    • 2,657 篇 交通运输工程
    • 2,277 篇 化学工程与技术
    • 2,077 篇 仪器科学与技术
  • 21,486 篇 理学
    • 10,260 篇 数学
    • 7,801 篇 生物学
    • 5,408 篇 物理学
    • 3,621 篇 统计学(可授理学、...
    • 2,661 篇 化学
    • 2,021 篇 系统科学
  • 12,162 篇 管理学
    • 7,022 篇 管理科学与工程(可...
    • 5,963 篇 图书情报与档案管...
    • 3,672 篇 工商管理
  • 4,417 篇 医学
    • 3,716 篇 临床医学
    • 3,614 篇 基础医学(可授医学...
    • 2,538 篇 药学(可授医学、理...
    • 2,022 篇 公共卫生与预防医...
  • 2,804 篇 法学
    • 2,250 篇 社会学
  • 1,635 篇 经济学
  • 1,369 篇 农学
  • 1,136 篇 教育学
  • 405 篇 文学
  • 148 篇 军事学
  • 12 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 1,726 篇 deep learning
  • 1,308 篇 machine learning
  • 1,021 篇 internet of thin...
  • 696 篇 support vector m...
  • 686 篇 feature extracti...
  • 675 篇 blockchain
  • 674 篇 computer vision
  • 659 篇 object detection
  • 555 篇 convolutional ne...
  • 522 篇 forecasting
  • 483 篇 training
  • 435 篇 computational mo...
  • 405 篇 artificial intel...
  • 399 篇 covid-19
  • 383 篇 reinforcement le...
  • 337 篇 long short-term ...
  • 317 篇 predictive model...
  • 308 篇 automation
  • 280 篇 big data
  • 279 篇 convolution

机构

  • 506 篇 chitkara univers...
  • 242 篇 school of comput...
  • 201 篇 university of sc...
  • 183 篇 school of automa...
  • 165 篇 computer science...
  • 142 篇 maharishi school...
  • 129 篇 the islamic univ...
  • 115 篇 computer science...
  • 99 篇 karnataka bangal...
  • 92 篇 school of comput...
  • 87 篇 university of el...
  • 86 篇 huazhong univers...
  • 82 篇 department of co...
  • 80 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 university of ch...
  • 76 篇 institute of art...
  • 75 篇 school of comput...
  • 75 篇 medical technica...
  • 74 篇 computer technol...

作者

  • 64 篇 shiva mehta
  • 58 篇 vinay kukreja
  • 54 篇 li yang
  • 48 篇 kukreja vinay
  • 45 篇 sharma vikrant
  • 44 篇 sharma neha
  • 42 篇 wang lei
  • 42 篇 deepak gerard
  • 40 篇 calvo d.
  • 40 篇 wang jing
  • 39 篇 li peng
  • 39 篇 zhang lei
  • 39 篇 rakesh kumar
  • 38 篇 ferrara g.
  • 38 篇 ardid m.
  • 38 篇 gagliardini s.
  • 36 篇 zhang tao
  • 35 篇 vishal jain
  • 34 篇 chen a.
  • 34 篇 benoit d.m.

语言

  • 67,100 篇 英文
  • 1,534 篇 其他
  • 386 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2023 International Conference on Computer Science and Automation Technology, CSAT 2023"
68658 条 记 录,以下是251-260 订阅
排序:
Adaptive Filtering for Low-Energy Data Aggregation  5th
Adaptive Filtering for Low-Energy Data Aggregation
收藏 引用
5th international conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Panwar, Govind Singh Mrutyunjaya, M.S. Agarwal, Trapty Kamalraj, R. Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India
Hyper Spectral Imaging (HSI) is a powerful approach used in far flung sensing packages that captures spatially contiguous set of spectrum statistics from a scene. HSI information incorporates beneficial facts about th... 详细信息
来源: 评论
FSMM: An Efficient Matrix Multiplication Accelerator Supporting Flexible Sparsity  24
FSMM: An Efficient Matrix Multiplication Accelerator Support...
收藏 引用
43rd international conference on computer-Aided Design, ICCAD 2024
作者: Qiao, Yuxuan Yang, Fan Zhang, Yecheng Xiong, Xiankui Yao, Xiao Yao, Haidong State Key Laboratory of Integrated Chips and Systems Fudan University Shanghai China School of Microelectronics Fudan University Shanghai China State Key Laboratory of Mobile Network and Mobile Multimedia Technology ZTE Corporation Shenzhen China
Sparse matrix multiplication is a critical operation in deep learning. However, matrix sparsity leads to irregular data flow, which would degrade the efficiency of matrix multiplication. Traditional accelerators, equi... 详细信息
来源: 评论
The Smart and Secured Communication Using Applied Cryptography Algorithms  5th
The Smart and Secured Communication Using Applied Cryptograp...
收藏 引用
5th international conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Jebakumari, S. Adlin Hemlata Ayesha, Amreen Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u... 详细信息
来源: 评论
Data Augmentation for Messenger Phishing Detection Using Large Language Models
Data Augmentation for Messenger Phishing Detection Using Lar...
收藏 引用
2025 international conference on Electronics, Information, and Communication, ICEIC 2025
作者: Noh, Keonwoong Oh, Seokjin Kim, Sunyub An, Dohyung Jung, Woohwan Hanyang University Dept. of Applied Artificial Intelligence Seoul Korea Republic of Hanyang University Dept. of Computer Science Ansan Korea Republic of
In this study, we introduce a new dataset specifically designed for detecting messenger phishing, an increasingly significant issue in cybercrime. To overcome the scarcity of labeled phishing data, we employ large lan... 详细信息
来源: 评论
Decentralized Continuous Group Key Agreement for UAV Ad-Hoc Network  6th
Decentralized Continuous Group Key Agreement for UAV Ad-Hoc...
收藏 引用
6th international conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Hong, Shijia Zhou, Tianqi Yang, Huijie Shen, Mingdi Zheng, Wenying School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China School of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China
With the rise of the Industrial Internet of Things (IIoT), Unmanned Aerial Vehicles (UAVs) have emerged as the preferred sensing tools for data collection. However, resource-constrained UAVs often face challenges in h... 详细信息
来源: 评论
An Ensemble Machine Learning-Based Approach for Detecting Malicious Websites Using URL Features  3rd
An Ensemble Machine Learning-Based Approach for Detecting Ma...
收藏 引用
3rd international conference on Trends in Electronics and Health Informatics, TEHI 2023
作者: Uddin, Khandaker Mohammad Mohi Islam, Md. Ashraful Hasan, Md. Nahid Ahmad, Kawsar Haque, Mir Aminul Department of Computer Science andEngineering Southeast University Dhaka1208 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1205 Bangladesh Department of Computer Science and Engineering Jahangirnagar Univerisity Dhaka Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka1216 Bangladesh
The Internet has transformed into a hub for a wide array of illegal activities, ranging from annoying spam ads to financial scams, all thanks to advancements in modern technology. With the constant enhancements in net... 详细信息
来源: 评论
Design and Implementation of Smart Home Control System Based on STM32  7th
Design and Implementation of Smart Home Control System Based...
收藏 引用
7th international conference on Wireless Communications, Networking and Applications, WCNA 2023
作者: Gao, Lang Li, Guo College of Computer Science and Engineering Guangxi Normal University Guilin541004 China
With the rapid development of Internet of Things (IoT) technology, smart home control has become an indispensable part of modern life. This study designs a smart home control system based on the STM32 microcontroller,... 详细信息
来源: 评论
MiDedup: A Restore-Friendly Deduplication Method on Docker Image Storage Systems  20th
MiDedup: A Restore-Friendly Deduplication Method on Docker ...
收藏 引用
20th IFIP WG 10.3 international conference on Network and Parallel Computing, NPC 2024
作者: Qin, Lisha Tan, Haoliang Zou, Xiangyu Ou, Wenhao Wei, Yan Huang, Rubing Xia, Wen Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory Shenzhen China Zhongruan International Technology Service Co. Ltd. Shenzhen China Macau University of Science and Technology Macao China
Docker image storage systems, like Docker registry, often employ deduplication to reduce storage overhead. Existing deduplication methods for these systems detect redundancy at either layer or file level, each with it... 详细信息
来源: 评论
Improving Messenger Phishing Detection Using Heterogeneous Phishing Data
Improving Messenger Phishing Detection Using Heterogeneous P...
收藏 引用
2025 international conference on Electronics, Information, and Communication, ICEIC 2025
作者: Oh, Seokjin Noh, Keonwoong Kim, Sunyub An, Dohyung Jung, Woohwan Hanyang University Dept. of Applied Artificial Intelligence Seoul Korea Republic of Hanyang University Dept. of Computer Science Ansan Korea Republic of
Recently, as messenger phishing has been occurring more frequently, the need for its detection has increased;however, datasets for messenger phishing detection are publicly unavailable. In this paper, we address the d... 详细信息
来源: 评论
SACR: Self-training with Saliency-Augmented Consistency Regularization for Few-Shot Learners
SACR: Self-training with Saliency-Augmented Consistency Regu...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Feng, Yanyan Zhou, Yue Xue, Yun Li, Fenghuan Lin, Zehong School of Electronics and Information Engineering South China Normal University Foshan China Department of Artiffcial Intelligence School of Informatics Xiamen University Xiamen China School of Computer Science and Technology Guangdong University of Technology Guangzhou China
Pre-trained language models have made significant strides in natural language processing tasks, enabling flexible fine-tuning for downstream applications. However, in few-shot learning scenarios, pre-trained models fa... 详细信息
来源: 评论