咨询与建议

限定检索结果

文献类型

  • 738,757 篇 会议
  • 16,285 篇 期刊文献
  • 4,375 册 图书
  • 27 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 759,439 篇 电子文献
  • 17 种 纸本馆藏

日期分布

学科分类号

  • 465,904 篇 工学
    • 343,575 篇 计算机科学与技术...
    • 249,085 篇 软件工程
    • 119,663 篇 信息与通信工程
    • 63,357 篇 控制科学与工程
    • 58,985 篇 电气工程
    • 44,044 篇 生物工程
    • 39,818 篇 电子科学与技术(可...
    • 35,897 篇 机械工程
    • 31,667 篇 生物医学工程(可授...
    • 25,093 篇 光学工程
    • 24,274 篇 仪器科学与技术
    • 21,119 篇 动力工程及工程热...
    • 19,490 篇 化学工程与技术
    • 16,646 篇 安全科学与工程
    • 16,220 篇 交通运输工程
    • 13,694 篇 网络空间安全
  • 190,166 篇 理学
    • 102,464 篇 数学
    • 48,010 篇 生物学
    • 45,818 篇 物理学
    • 30,840 篇 统计学(可授理学、...
    • 20,804 篇 系统科学
    • 19,505 篇 化学
  • 118,250 篇 管理学
    • 74,436 篇 管理科学与工程(可...
    • 49,571 篇 图书情报与档案管...
    • 33,808 篇 工商管理
  • 28,832 篇 医学
    • 24,410 篇 临床医学
    • 21,160 篇 基础医学(可授医学...
  • 20,031 篇 法学
    • 15,905 篇 社会学
  • 16,072 篇 教育学
    • 15,316 篇 教育学
  • 13,879 篇 经济学
    • 13,675 篇 应用经济学
  • 9,307 篇 农学
  • 5,332 篇 文学
  • 2,048 篇 军事学
  • 1,736 篇 艺术学
  • 73 篇 哲学
  • 72 篇 历史学

主题

  • 26,895 篇 computer science
  • 20,729 篇 feature extracti...
  • 19,572 篇 computational mo...
  • 18,355 篇 training
  • 17,815 篇 accuracy
  • 17,131 篇 neural networks
  • 15,918 篇 deep learning
  • 14,228 篇 computer archite...
  • 11,773 篇 wireless sensor ...
  • 10,999 篇 data mining
  • 10,888 篇 convolutional ne...
  • 10,814 篇 predictive model...
  • 10,802 篇 machine learning
  • 10,357 篇 protocols
  • 9,848 篇 computer network...
  • 9,792 篇 data models
  • 8,893 篇 support vector m...
  • 8,596 篇 real-time system...
  • 8,592 篇 routing
  • 8,546 篇 educational inst...

机构

  • 2,406 篇 department of co...
  • 2,115 篇 chitkara univers...
  • 1,425 篇 school of comput...
  • 1,326 篇 university of sc...
  • 1,307 篇 university of ch...
  • 1,300 篇 school of comput...
  • 1,203 篇 university of el...
  • 1,127 篇 college of compu...
  • 796 篇 school of comput...
  • 688 篇 huazhong univers...
  • 646 篇 school of comput...
  • 637 篇 college of compu...
  • 629 篇 school of comput...
  • 579 篇 school of comput...
  • 561 篇 lovely professio...
  • 543 篇 maharishi school...
  • 527 篇 college of compu...
  • 497 篇 state key labora...
  • 497 篇 school of comput...
  • 476 篇 school of comput...

作者

  • 742 篇 wang wei
  • 645 篇 yang yang
  • 583 篇 liu yang
  • 560 篇 wang lei
  • 480 篇 li li
  • 451 篇 zhang lei
  • 407 篇 li yang
  • 369 篇 wei li
  • 341 篇 li wei
  • 314 篇 china
  • 299 篇 lei wang
  • 297 篇 wei wang
  • 293 篇 zhang wei
  • 292 篇 li bo
  • 275 篇 wang jing
  • 271 篇 zhang yan
  • 262 篇 wang jian
  • 253 篇 li xin
  • 253 篇 wei liu
  • 239 篇 kukreja vinay

语言

  • 739,050 篇 英文
  • 13,609 篇 其他
  • 8,411 篇 中文
  • 40 篇 俄文
  • 38 篇 法文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
759448 条 记 录,以下是341-350 订阅
排序:
Ensemble Learning-Based Electricity Theft Detection: Combining Deep & Cross network and Transformer  5
Ensemble Learning-Based Electricity Theft Detection: Combini...
收藏 引用
5th IEEE international conference on Power, Electronics and computer Applications, ICPECA 2025
作者: Zhang, Kaiyang Wang, Jun Zhu, Yonghai Zhu, Tianci Henan University of Science and Technology Luoyang China Guangdong Nanhai Power Design & Engineering Co. LTD Foshan China
Eletheft, as a core issue of non-technical losses, has become more complex with the emergence of new network attack methods. Studies indicate that machine learning models relying solely on raw data have limitations wh... 详细信息
来源: 评论
Harnessing AI for Cybersecurity: Performance Evaluation of Machine Learning Techniques in Intrusion Detection Systems  1
Harnessing AI for Cybersecurity: Performance Evaluation of M...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Kumar, Naween Sharma, Supragya Gupta, Sahil Jain, Sajal Singh, Sujal School of Computer Science Engineering & Technology Bennett University Greater Noida India
Due to the current development of networked systems and the emergence of global cyber threats, efficient and fast NIDS are required. The suggested article aims to analyse new and improved AI and Machine Learning (ML) ... 详细信息
来源: 评论
network Analysis of Indian Corporate Interlocks Patterns, Players and Sectors  16th
Network Analysis of Indian Corporate Interlocks Patterns, Pl...
收藏 引用
16th international conference on Social networks Analysis and Mining
作者: Gupta, Yayati Seth, Aaditeshwar Sukhija, Sanatan Mahindra Univ Hyderabad India Indian Inst Technol Delhi Delhi India
Corporate interlock networks have received significant attention, especially in developed economies such as the USA, Japan, Germany, etc. However, their significance in developing Asian countries, where corporate gove... 详细信息
来源: 评论
Plastic Type Classification for Edge Devices Without Internet
Plastic Type Classification for Edge Devices Without Interne...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Clement Andrew, A. Sathyavani, M. Kavitha Devi, M.K. Thigarajar College of Engineering Department of Computer Science and Engineering Madurai625015 India
The management of plastic waste in our ecosystem represents a significant environmental issue, necessitating effective sorting and categorization to facilitate efficient recycling practices. This study introduces a me... 详细信息
来源: 评论
SVRM: Composing Various network Service Fuzzing Corpus with One Single Model
SVRM: Composing Various Network Service Fuzzing Corpus with ...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Lin, Wenfeng Jiang, Zhiyuan Xu, Fangliang Su, Yunfei Li, Zhiwei Mao, Lingchu Tang, Chaojing College of Electronic Science and Technology College of Computer Science and Technology National University of Defense Technology Changsha China
Discovering vulnerabilities in network service is of great significance. Currently, coverage-guided fuzzing (CGF) is widely regarded as the most effective method. However, the efficiency of CGF depends on the quality ... 详细信息
来源: 评论
Hierarchical Perceptual Distillation network for Lightweight Image Super-Resolution Reconstruction
Hierarchical Perceptual Distillation Network for Lightweight...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Tang, Qingting Guo, Zhiqing Wang, Liejun School of Computer Science and Technology Xinjiang University Urumqi China Xinjiang Multimodal Intelligent Processing and Information Security Engineering Technology Research Center Urumqi China
Recently, the image super-resolution (SR) has made remarkable progress. However, due to the proliferation of resource-constrained scenarios, the computational-intensive SR technology is limited in portable devices. Th... 详细信息
来源: 评论
Enhanced Spatial Adaptive Fusion network For Video Super-Resolution  7th
Enhanced Spatial Adaptive Fusion Network For Video Super-Res...
收藏 引用
7th Chinese conference on Pattern Recognition and computer Vision
作者: Li, Boyue Zhao, Xin Yuan, Shiqian Lan, Rushi Luo, Xiaonan Guilin Univ Elect Technol Guangxi Key Lab Image & Graph Intelligent Proc Guilin 541004 Peoples R China Guilin Univ Elect Technol Int Joint Res Lab Spatiotemporal Informat & Intel Guilin 541004 Peoples R China
In the field of Video Super-Resolution (VSR), recurrent structures are frequently used in the designed network architectures, yet they face significant challenges in effective information transmission and accurate ali... 详细信息
来源: 评论
Efficient Online Path Selection and Workload Allocation for In-network Computing in MEC  18th
Efficient Online Path Selection and Workload Allocation for...
收藏 引用
18th international conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Ouyang, Sheng Zhang, Fanlong Mai, Junyu Chai, Yuan Chen, Quan Tao, Yongchao School of Computer Science and Technology Guangdong University of Technology Guangzhou China Shenzhen Academy of Aerospace Technology Shenzhen China
In this paper, we study the joint optimization problem of computation path selection and workload allocation for in-network computing at the edge. The existing works, which only consider the end-to-end latency, ignore... 详细信息
来源: 评论
Information technology in Cross-border Supply Chain: Application in the Banking Industry  24
Information Technology in Cross-border Supply Chain: Applica...
收藏 引用
5th international conference on computer science and Management technology, ICCSMT 2024
作者: Hsu, Hsing-Hua Wang, Lingfeng School of Economics and Management Quanzhou University of Information Engineering Fujian Quanzhou China
Under the trend of global business operation, the role of financial institutions in supply chain finance is no longer limited to providing financing service for regional customers, but can be extended to cross-regiona... 详细信息
来源: 评论
Convolutional recurrent neural network-based EEG signal classification in motor imagery  4
Convolutional recurrent neural Network-based EEG signal clas...
收藏 引用
4th international conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Hui, Qiang Zhang, Yuxiang College of Mechanical Engineering Anhui University of Technology Ma'anshan243002 China
Brain-computer interface(BCI) is a method of extracting EEG signals by specific means and decoding them using signal processing algorithms to help people with motor disabilities to interact with the outside world thro... 详细信息
来源: 评论