咨询与建议

限定检索结果

文献类型

  • 735,506 篇 会议
  • 16,401 篇 期刊文献
  • 4,343 册 图书
  • 27 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 756,272 篇 电子文献
  • 16 种 纸本馆藏

日期分布

学科分类号

  • 464,149 篇 工学
    • 342,271 篇 计算机科学与技术...
    • 248,113 篇 软件工程
    • 118,897 篇 信息与通信工程
    • 62,572 篇 控制科学与工程
    • 58,303 篇 电气工程
    • 44,022 篇 生物工程
    • 39,232 篇 电子科学与技术(可...
    • 35,815 篇 机械工程
    • 31,599 篇 生物医学工程(可授...
    • 24,964 篇 光学工程
    • 24,213 篇 仪器科学与技术
    • 21,041 篇 动力工程及工程热...
    • 19,449 篇 化学工程与技术
    • 16,542 篇 安全科学与工程
    • 16,137 篇 交通运输工程
    • 13,610 篇 网络空间安全
  • 189,662 篇 理学
    • 102,105 篇 数学
    • 47,970 篇 生物学
    • 45,691 篇 物理学
    • 30,747 篇 统计学(可授理学、...
    • 20,800 篇 系统科学
    • 19,451 篇 化学
  • 117,892 篇 管理学
    • 74,196 篇 管理科学与工程(可...
    • 49,439 篇 图书情报与档案管...
    • 33,679 篇 工商管理
  • 28,677 篇 医学
    • 24,301 篇 临床医学
    • 21,076 篇 基础医学(可授医学...
  • 19,970 篇 法学
    • 15,857 篇 社会学
  • 15,990 篇 教育学
    • 15,236 篇 教育学
  • 13,846 篇 经济学
    • 13,641 篇 应用经济学
  • 9,261 篇 农学
  • 5,329 篇 文学
  • 2,046 篇 军事学
  • 1,731 篇 艺术学
  • 74 篇 哲学
  • 73 篇 历史学

主题

  • 26,885 篇 computer science
  • 20,464 篇 feature extracti...
  • 19,273 篇 computational mo...
  • 18,128 篇 training
  • 17,086 篇 accuracy
  • 17,046 篇 neural networks
  • 15,498 篇 deep learning
  • 14,113 篇 computer archite...
  • 11,746 篇 wireless sensor ...
  • 10,980 篇 data mining
  • 10,670 篇 machine learning
  • 10,589 篇 convolutional ne...
  • 10,578 篇 predictive model...
  • 10,321 篇 protocols
  • 9,852 篇 computer network...
  • 9,607 篇 data models
  • 8,742 篇 support vector m...
  • 8,585 篇 routing
  • 8,548 篇 educational inst...
  • 8,242 篇 real-time system...

机构

  • 2,409 篇 department of co...
  • 2,083 篇 chitkara univers...
  • 1,425 篇 school of comput...
  • 1,323 篇 university of sc...
  • 1,301 篇 university of ch...
  • 1,296 篇 school of comput...
  • 1,197 篇 university of el...
  • 1,122 篇 college of compu...
  • 798 篇 school of comput...
  • 685 篇 huazhong univers...
  • 643 篇 school of comput...
  • 633 篇 college of compu...
  • 631 篇 school of comput...
  • 581 篇 school of comput...
  • 553 篇 lovely professio...
  • 543 篇 maharishi school...
  • 527 篇 college of compu...
  • 498 篇 state key labora...
  • 493 篇 school of comput...
  • 479 篇 school of comput...

作者

  • 743 篇 wang wei
  • 642 篇 yang yang
  • 589 篇 liu yang
  • 559 篇 wang lei
  • 479 篇 li li
  • 451 篇 zhang lei
  • 410 篇 li yang
  • 363 篇 wei li
  • 345 篇 li wei
  • 312 篇 china
  • 301 篇 zhang wei
  • 297 篇 lei wang
  • 293 篇 wei wang
  • 292 篇 li bo
  • 275 篇 wang jing
  • 274 篇 zhang yan
  • 267 篇 wang jian
  • 254 篇 li xin
  • 253 篇 wei liu
  • 239 篇 kukreja vinay

语言

  • 736,892 篇 英文
  • 12,611 篇 其他
  • 8,454 篇 中文
  • 41 篇 法文
  • 41 篇 俄文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
756281 条 记 录,以下是91-100 订阅
排序:
Comparative Analysis of Traditional and Ensemble Learning Models for network Security System
Comparative Analysis of Traditional and Ensemble Learning Mo...
收藏 引用
2025 IEEE international conference on Computational, Communication and Information technology, ICCCIT 2025
作者: Verma, Anand Rathod, Maya Oriental University Department of Computer Science and Engineering Indore India
In this paper use CIC-IDS2017 dataset to illustrate a comparative analysis of traditional and proposed models for intrusion detection in network security systems. The comparison includes DT, RF, ET and XGBoost classif... 详细信息
来源: 评论
Dynamic Trust Management and AI-Based Multi-Factor Authentication for 6G Machine Type Communications  1
Dynamic Trust Management and AI-Based Multi-Factor Authentic...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Sinha, Garima Agarwal, Ankita Faculty of Engineering and Technology Department of Computer Science Engineering Ramnagar District Karnataka India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
New security concerns about the transmission of sensitive data over enormous networks of linked devices have arisen with the advent of the 6G era and the broad adoption of massive machine-type communication (MTC). The... 详细信息
来源: 评论
NID-TGN: Spatiotemporal Intrusion Detection System for IoT networks  14th
NID-TGN: Spatiotemporal Intrusion Detection System for IoT N...
收藏 引用
14th international conference on Security, Privacy and Applied Cryptographic Engineering (SPACE)
作者: Sai, Jonna Likith Majumder, Souptik Verma, Rohit Bagade, Priyanka Indian Inst Technol Kanpur Kanpur 208016 Uttar Pradesh India Indian Inst Technol Kanpur Dept Comp Sci & Engn Kanpur Uttar Pradesh India
The present network infrastructure is safeguarded against cyber threats using network Intrusion Detection Systems (NIDS). Many existing methods, including basic deep learning approaches on graph data, struggle to capt... 详细信息
来源: 评论
Trusted measurement technology for Power Internet of Things  24
Trusted measurement technology for Power Internet of Things
收藏 引用
14th international conference on Communication and network Security, ICCNS 2024
作者: Kang, Chaoqun Zhu, Keqi Li, Yuling Peng, Jin Deng, Zhiheng State Grid Shanghai Energy Interaction Research Institute Co. LTD. Shanghai China College of Computer Science Beijing University of Technology Beijing China
This paper explores trusted measurement technologies for Power Internet of Things (IoT) terminals, advocating for a dual-system architecture with a Trusted Platform Control Module (TPCM) at its core. The TPCM systemat... 详细信息
来源: 评论
Research on simulation of human brain neural network and signal processing technology  5
Research on simulation of human brain neural network and sig...
收藏 引用
5th international conference on Signal Processing and computer science, SPCS 2024
作者: Wang, Haochen Xuteli College Beijing Institute of Technology Beijing China
With the cross development of computational neuroscience and artificial intelligence, research on human brain neural network simulation and signal processing technology has become a hot topic of common concern in both... 详细信息
来源: 评论
Sampling-Based Density Peaks Clustering for Energy-Aware Industrial IoT networks
Sampling-Based Density Peaks Clustering for Energy-Aware Ind...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Rajkumar, S. Gopalakrishnan, R. Shreeraksha, T.S. Dhanaraj, S. Kabiyashwanth, V. K. S. Rangasamy College of Technology Computer Science and Engineering 637 215 India K. S. Rangasamy College of Technology Electrical and Electronics Engineering 637 215 India
In Industrial Internet of Things (IIoT) settings, effective data processing and energy management are essential due to the resource-limited characteristics of the linked equipment. This research introduces a unique Sa... 详细信息
来源: 评论
Bio-inspired visual neural network for stop-and-go wave perception in high-density crowd  4
Bio-inspired visual neural network for stop-and-go wave perc...
收藏 引用
4th international conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Jiang, Wei Hu, Bin State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Department of Computer Science College of Computer Science & Technology Guizhou University Guiyang550025 China Artificial Intelligence Research Institute of Guizhou University Guizhou University Guiyang550025 China
In high-density crowd, a unique visual motion effect called stop-and-go wave occurs, which could evolve to trampling and compression incidents. However, few computational models have been reported for stop-and-go wave... 详细信息
来源: 评论
DLIoMT: Deep Learning Approaches for IoMT-Overview, challenges and the future
DLIoMT: Deep Learning Approaches for IoMT-Overview, challeng...
收藏 引用
2025 international conference on computer, Electrical and Communication Engineering, ICCECE 2025
作者: Harshni, V. Singh, Satyendr Indhumathi, R. Kumar, Neelam Sanjeev Chowdhury, Subrata Patra, Sudhansu Shekhar Srm Institute of Science and Technology Department of Bme Ramapuram campus Chennai India Bml Munjal University Computer Science & Engg Department Gurugram India Vadapalani Campus Chennai India Sreenivasa Institute of Technology and Management Studies Department of Computer Science and Engineering Andra Pradesh Chittoor India Deemed to be University School of Compter Applications Odisha Bhubaneswar India
An artificial intelligence (AI) system works by combining a computer program and algorithms to make a device more efficient and intelligent for tasks that are typically performed by humans. Deep learning, machine lear... 详细信息
来源: 评论
Deep Convolutional Multi-Relational Graph Attention network for Autonomous Drone Navigation in Urban Wind Zones
Deep Convolutional Multi-Relational Graph Attention Network ...
收藏 引用
2025 international conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Pabitha, C. Joshua, K. Paul Pradeep, S. Sophia, S. Sharma, R. Rajesh Prabhu, D. Karthik Srm Valliammai Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Scad College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Tirunelveli India MAlla Reddy Engineering College for Women Department of Computer Science and Engineering Telangana Secunderabad India Karunya Institute of Technology and Sciences Department of computer Science and Engineering Tamil Nadu Coimbatore India Alliance University Department of Computer Technology Alliance College of Engineering and Design Bangalore India Ramco Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Rajapalaiyam India
Drones are essential for civil engineering operations like logistics and data collecting. Current autonomous drone studies mainly concerns itself with safe path planning in static scenarios;however one of the major ch... 详细信息
来源: 评论
Blockchain for Cybersecurity_ Securing Data Transactions and Enhancing Privacy in Digital Systems  1
Blockchain for Cybersecurity_ Securing Data Transactions and...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Rajababu, Durgam Surya, S. Padhiary, Mrutyunjay Modi, Harshadkumar School of Engineering SR University Department of EEE Telangana Warangal India Porur Chennai600116 India Triguna Sen School of Technology Assam University Department of Agricultural Engineering Assam Silchar788011 India Government Polytechnic Gandhinagar India
The feasibility of using blockchain technology as a method to improve cybersecurity through data security transactions and users' anonymity is discussed in this paper. It scans network traffic, sings out abnormiti... 详细信息
来源: 评论