咨询与建议

限定检索结果

文献类型

  • 6,459 篇 会议
  • 966 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,428 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,194 篇 工学
    • 1,130 篇 电气工程
    • 928 篇 计算机科学与技术...
    • 667 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 204 篇 仪器科学与技术
    • 165 篇 机械工程
    • 165 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 90 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 20 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 287 篇 理学
    • 80 篇 系统科学
    • 63 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 24 篇 地理学
  • 184 篇 医学
    • 123 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 166 篇 管理学
    • 156 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,428 篇 detection algori...
  • 765 篇 feature extracti...
  • 759 篇 detectors
  • 620 篇 algorithm design...
  • 582 篇 object detection
  • 533 篇 image edge detec...
  • 384 篇 testing
  • 370 篇 robustness
  • 331 篇 cameras
  • 307 篇 computer science
  • 291 篇 accuracy
  • 284 篇 monitoring
  • 276 篇 data mining
  • 273 篇 computational mo...
  • 255 篇 image segmentati...
  • 236 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 198 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,344 篇 英文
  • 43 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=Detection Algorithms"
7428 条 记 录,以下是1001-1010 订阅
排序:
An Improved Support Vector Machine Attack detection Algorithm for Industry Controls System
An Improved Support Vector Machine Attack Detection Algorith...
收藏 引用
Power Electronics, Computer Applications (ICPECA), IEEE International Conference on
作者: Shangqing Cui Dongqin Feng College of Control Science and Engineering Zhejiang University Hangzhou China
With the application of Internet technologies in the industrial field, industrial control systems (ICS) have the possibility of suffering malicious network attacks. Because ICS is widely used in critical infrastructur... 详细信息
来源: 评论
Change Point detection with Neural Online Density-Ratio Estimator
Change Point Detection with Neural Online Density-Ratio Esti...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiuheng Wang Ricardo Augusto Borsoi Cédric Richard Jie Chen Université Côte d’Azur CNRS OCA Nice France Université de Lorraine CNRS CRAN Vandoeuvre-lès-Nancy France School of Marine Science and Technology Northwestern Polytechnical University Xi’an China
Detecting change points in streaming time series data is a long standing problem in signal processing. A plethora of methods have been proposed to address it, depending on the hypotheses at hand. Non-parametric approa... 详细信息
来源: 评论
A Density-based Clustering Approach to detect Colluding SSDF Attackers in Cognitive Radio Networks  37
A Density-based Clustering Approach to detect Colluding SSDF...
收藏 引用
37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)
作者: Taggu, Amar Marchang, Ningrinla North Eastern Reg Inst Sci & Technol NERIST Dept Comp Sci & Engn Nirjuli India
Among the many attacks that Cognitive Radio Networks (CRN) are vulnerable to, Spectrum Sensing Data Falsification (SSDF) attack is one of the most common attacks. The current work focusses on an advanced form of SSDF ... 详细信息
来源: 评论
Research on Automatic detection Algorithm for Lumbar Disc Herniation Based on FCOS
Research on Automatic Detection Algorithm for Lumbar Disc He...
收藏 引用
Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), IEEE International Conference on
作者: Tingqiang Guan Ziming Wang Wei Hu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Department of Spine and Osteopathy Ward Liuzhou Peoples' Hospital Guilin China
Lumbar disc herniation is a common spinal disease, and its diagnosis and treatment usually rely on medical imaging technology. Traditional medical image diagnosis methods require high labor and time costs. This articl... 详细信息
来源: 评论
YOLO-LF: An Ultra-Lightweight and Fast Forest Fire detection Algorithm for Edge Devices
YOLO-LF: An Ultra-Lightweight and Fast Forest Fire Detection...
收藏 引用
Networking Systems of AI (INSAI), International Conference on
作者: Zhuoyue Ding Run Ye Xiaojia Zhuo Qilin Li Lei Huang Bin Yan School of Automation Engineering University of Electronic Science and Technology of China Chengdu China Metering Center State Grid Sichuan Electric Power Company Chengdu China School of Resources and Environment University of Electronic Science and Technology of China Chengdu China
In recent years, there has been signification progress in deep learning-based forest fire detection techniques for natural environment monitoring. However, existing object detection algorithms designed for forest fire... 详细信息
来源: 评论
SLAM Loop Closure detection Algorithm Based on 3D Bag-of-Words Model
SLAM Loop Closure Detection Algorithm Based on 3D Bag-of-Wor...
收藏 引用
Computer, Internet of Things and Smart City (CIoTSC), International Conference on
作者: Wu Liangdong Zou Yaping Wang Dong Chen Ling School of Computer Engineering and Design Hunan Normal University Changsha China
In outdoor environments, the loop closure detection in laser-based SLAM faces challenges such as complex lighting variations, low-texture regions, occlusions, and dynamic objects, which limit the accuracy and efficien... 详细信息
来源: 评论
A DDoS attack detection algorithm based on improved grid search to optimize SVM in SDN environment
A DDoS attack detection algorithm based on improved grid sea...
收藏 引用
Electrical Engineering, Big Data and algorithms (EEBDA), IEEE International Conference on
作者: Meigen Huang Boqi Zhao Chongqing University of Posts and Telecommunications Chongqing China
Software defined network has proposed a new architecture idea, but the controller is vulnerable to distributed denial of service attacks, resulting in a single point of failure. This paper proposes a DDoS attack detec... 详细信息
来源: 评论
Spatially-Coupled Faster-than-Nyquist Signaling  33
Spatially-Coupled Faster-than-Nyquist Signaling
收藏 引用
33rd IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Lu, Qingya Li, Shuangyang Bai, Baoming Yuan, Jinhong Xidian Univ State Key Lab ISN Xian Peoples R China Univ New South Wales Sch Elect Engn & Telecommun Sydney NSW Australia
A spatially-coupled faster-than-Nyquist (SC-FTN) signaling is proposed in this paper. The signal of SC-FTN signaling is generated continuously by interleaving and repeating the coded FTN signals and a graph-based iter... 详细信息
来源: 评论
Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities
收藏 引用
IEEE ACCESS 2021年 9卷 104261-104280页
作者: Vaccari, Ivan Narteni, Sara Aiello, Maurizio Mongelli, Maurizio Cambiaso, Enrico IEIIT Inst Consiglio Nazl Ric CNR I-16149 Genoa Italy Univ Genoa Dept Informat Bioengn Robot & Syst Engn DIBRIS I-16145 Genoa Italy
Internet of Things is a widely adopted and pervasive technology, but also one of the most relevant in cyber-security, given the volume and sensitivity of shared data and the availability of affordable but insecure pro... 详细信息
来源: 评论
A Temporal Network Community detection Method Based on Steady Labels and Label Propagation SteadyProp (A Temporal Network Community detection Algorithm with Steady Labels and Label Propagation)
A Temporal Network Community Detection Method Based on Stead...
收藏 引用
Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), IEEE International Conference on
作者: Zhixaing Yang Yuxia Zheng Zhihao Gong Taolue Long Yuan Jiang Nanchang Hangkong University Nanchang China
Accurate community detection is crucial for timely comprehension of network structures, understanding evolutionary patterns, and predicting future network behaviors. It greatly enhances applications in social network ... 详细信息
来源: 评论