咨询与建议

限定检索结果

文献类型

  • 738,686 篇 会议
  • 16,281 篇 期刊文献
  • 904 册 图书
  • 26 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 755,891 篇 电子文献
  • 17 种 纸本馆藏

日期分布

学科分类号

  • 465,835 篇 工学
    • 343,536 篇 计算机科学与技术...
    • 249,051 篇 软件工程
    • 119,648 篇 信息与通信工程
    • 63,349 篇 控制科学与工程
    • 58,983 篇 电气工程
    • 44,044 篇 生物工程
    • 39,809 篇 电子科学与技术(可...
    • 35,882 篇 机械工程
    • 31,666 篇 生物医学工程(可授...
    • 25,092 篇 光学工程
    • 24,262 篇 仪器科学与技术
    • 21,115 篇 动力工程及工程热...
    • 19,490 篇 化学工程与技术
    • 16,644 篇 安全科学与工程
    • 16,220 篇 交通运输工程
    • 13,690 篇 网络空间安全
  • 190,147 篇 理学
    • 102,450 篇 数学
    • 48,010 篇 生物学
    • 45,813 篇 物理学
    • 30,839 篇 统计学(可授理学、...
    • 20,801 篇 系统科学
    • 19,505 篇 化学
  • 118,233 篇 管理学
    • 74,424 篇 管理科学与工程(可...
    • 49,566 篇 图书情报与档案管...
    • 33,804 篇 工商管理
  • 28,831 篇 医学
    • 24,409 篇 临床医学
    • 21,159 篇 基础医学(可授医学...
  • 20,031 篇 法学
    • 15,905 篇 社会学
  • 16,071 篇 教育学
    • 15,315 篇 教育学
  • 13,878 篇 经济学
    • 13,674 篇 应用经济学
  • 9,307 篇 农学
  • 5,332 篇 文学
  • 2,048 篇 军事学
  • 1,734 篇 艺术学
  • 73 篇 哲学
  • 72 篇 历史学

主题

  • 26,895 篇 computer science
  • 20,729 篇 feature extracti...
  • 19,572 篇 computational mo...
  • 18,355 篇 training
  • 17,815 篇 accuracy
  • 17,129 篇 neural networks
  • 15,918 篇 deep learning
  • 14,228 篇 computer archite...
  • 11,772 篇 wireless sensor ...
  • 10,998 篇 data mining
  • 10,888 篇 convolutional ne...
  • 10,814 篇 predictive model...
  • 10,673 篇 machine learning
  • 10,357 篇 protocols
  • 9,848 篇 computer network...
  • 9,792 篇 data models
  • 8,893 篇 support vector m...
  • 8,596 篇 real-time system...
  • 8,592 篇 routing
  • 8,546 篇 educational inst...

机构

  • 2,393 篇 department of co...
  • 2,117 篇 chitkara univers...
  • 1,424 篇 school of comput...
  • 1,319 篇 university of sc...
  • 1,310 篇 university of ch...
  • 1,293 篇 school of comput...
  • 1,186 篇 university of el...
  • 1,126 篇 college of compu...
  • 808 篇 school of comput...
  • 655 篇 huazhong univers...
  • 645 篇 school of comput...
  • 633 篇 college of compu...
  • 631 篇 school of comput...
  • 575 篇 school of comput...
  • 557 篇 lovely professio...
  • 543 篇 maharishi school...
  • 526 篇 college of compu...
  • 497 篇 state key labora...
  • 497 篇 school of comput...
  • 484 篇 school of comput...

作者

  • 744 篇 wang wei
  • 645 篇 yang yang
  • 583 篇 liu yang
  • 560 篇 wang lei
  • 480 篇 li li
  • 451 篇 zhang lei
  • 402 篇 li yang
  • 368 篇 wei li
  • 341 篇 li wei
  • 316 篇 china
  • 294 篇 li bo
  • 293 篇 zhang wei
  • 292 篇 lei wang
  • 292 篇 wei wang
  • 275 篇 wang jing
  • 271 篇 zhang yan
  • 262 篇 wang jian
  • 253 篇 li xin
  • 253 篇 wei liu
  • 239 篇 kukreja vinay

语言

  • 735,502 篇 英文
  • 13,609 篇 其他
  • 8,411 篇 中文
  • 40 篇 俄文
  • 38 篇 法文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
755900 条 记 录,以下是321-330 订阅
排序:
Forensic authentication examination of webcam videos
Forensic authentication examination of webcam videos
收藏 引用
2023 international conference on computer Application and Information Security, ICCAIS 2023
作者: Li, Shengnan Yang, Mengxuan Zeng, Jinhua School of Software Engineering Chengdu University of Information Technology Sichuan Chengdu China Academy of Forensic Science Shanghai China
With the rise of network cameras, the authenticity of video data they capture has become a common challenge in forensic science and expertise. There are many camera manufacturers and brands available, and videos from ... 详细信息
来源: 评论
BiLSTM and Attention-Based Modulation Classification of Realistic Wireless Signals  15
BiLSTM and Attention-Based Modulation Classification of Real...
收藏 引用
15th international conference on Signal Processing and Communications (SPCOM)
作者: Udaiwal, Rohit Baishya, Nayan Gupta, Yash Manoj, B. R. Indian Inst Technol Guwahati Dept Elect & Elect Engn Gauhati Assam India
This work proposes a novel and efficient quad-stream BiLSTM-Attention network, abbreviated as QSLA network, for robust automatic modulation classification (AMC) of wireless signals. The proposed model exploits multipl... 详细信息
来源: 评论
Research on Big Data Center System Based on computer Internet technology
Research on Big Data Center System Based on Computer Interne...
收藏 引用
2023 IEEE international conference on Control, Electronics and computer technology, ICCECT 2023
作者: Huang, Changjiang Zhan, Liuchun Guangzhou College of Applied Science and Technology College of Computer Science Guangzhou Guangdong China
In this paper, the introduction of big data technology, from the hardware and software two aspects of communication security protection system design research. With the support of hardware equipment, the secure commun... 详细信息
来源: 评论
Reliability of Half Hypercube networks under Cluster Faults  27
Reliability of Half Hypercube Networks under Cluster Faults
收藏 引用
27th international conference on computer Supported Cooperative Work in Design (CSCWD)
作者: Liu, Xuanli Lv, Mengjie Fan, Weibei Sun, Xueli Dong, Zhenjiang Xiao, Fu Nanjing Univ Posts & Telecommun Sch Comp Nanjing 210023 Peoples R China
Malicious attackers frequently aim to partition the network into disjointed segments to facilitate specific attacks. Consequently, enhancing network reliability stands as an effective preventive measure. Connectivity ... 详细信息
来源: 评论
Analysis of Corporate Community of Interest Relationships in Combination with Multiple network  40th
Analysis of Corporate Community of Interest Relationships in...
收藏 引用
40th computer Graphics international conference (CGI)
作者: Liu, Yipan Wang, Song Hu, Hao Chen, Shijie Southwest Univ Sci & Technol Sch Comp Sci & Technol Mianyang 621010 Sichuan Peoples R China
Visualizing the complex relationship among enterprises is ponderable to help enterprises and institutions to find potential risks. Small and medium-size enterprises' (SMEs) loans have higher risk and non-performin... 详细信息
来源: 评论
Optimization and Implementation of network Security Incident Handling Process Based on Secure Arrangement  2
Optimization and Implementation of Network Security Incident...
收藏 引用
2nd IEEE international conference on Sensors, Electronics and computer Engineering, ICSECE 2024
作者: Ni, Lin Qian, Yang Zhang, Shuai Tong, Sicheng Bao, Chakun College of Electronic Science and Technology College of Information and Communication National University of Defense Technology Hunan Changsha China College of Information and Communication National University of Defense Technology Hubei Wuhan China College of Computer Science and Technology College of Information and Communication National University of Defense Technology Hunan Changsha China
This article addresses the issues of low efficiency and fragmented processes in network security incident response, proposing an innovative solution that utilizes security orchestration technology to optimize the hand... 详细信息
来源: 评论
Design of intelligent teaching assistant for college English based on human-computer collaboration  5
Design of intelligent teaching assistant for college English...
收藏 引用
5th international conference on Signal Processing and computer science, SPCS 2024
作者: Ma, Yu Guangzhou Institute of Science and Technology Guangzhou China
Based on the design concept of "human-computer collaboration", this research aims to design intelligent college English teaching assistants with the core goal of promoting the deep integration of technical w... 详细信息
来源: 评论
Deep Learning and EEG Signal Based Biometric System: An Application of Brain computer Interface
Deep Learning and EEG Signal Based Biometric System: An Appl...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Sah, Chandan Kumar Kumar Ahirwal, Mitul Tomar, Deepak Singh Maulana Azad National Institute of Technology Computer Science and Engineering Bhopal India
User identification is explored through EEG-based biometric analysis using different auditory stimuli, using the distinctiveness and security of EEG signals for reliable biometric authentication. The impact on system ... 详细信息
来源: 评论
Attacker Detection Based on Multi-Level Tenant Classification  21
Attacker Detection Based on Multi-Level Tenant Classificatio...
收藏 引用
21st international computer conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: Qimin, Jing Shaoming, Wang Yanping, Xiang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Co-resident attacks in the cloud environment have always been a concern. Different from other network attacks, it is a cache-based side-channel attack. Many studies have shown that it can be co-located with the target... 详细信息
来源: 评论
SNR and RSSI Based an Optimized Machine Learning Based Indoor Localization Approach:Multistory Round Building Scenario over LoRa network
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1927-1945页
作者: Muhammad Ayoub Kamal Muhammad Mansoor Alam Aznida Abu Bakar Sajak Mazliham Mohd Su’ud Malaysian Institute of Information Technology(MIIT) Universiti Kuala LumpurKuala Lumpur50250Malaysia Faculty of Computing and Informatics Multimedia UniversityCyberjaya63100Malaysia Depertment of Computer Science DHA Suffa UniversityKarachiSindh75500Pakistan Riphah Institute of System Engineering(RISE) Faculty of ComputingRiphah International UniversityIslamabad46000Pakistan Malaysian France Institute(MFI) Universiti Kuala LumpurKuala Lumpur50250Malaysia Faculty of Engineering and Information Technology School of Computer ScienceUniversity of Technology SydneyUltimoNSW 2007Australia
In situations when the precise position of a machine is unknown,localization becomes *** research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-... 详细信息
来源: 评论