咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是1001-1010 订阅
排序:
Evaluating and Comparing the IGraph Community detection algorithms
Evaluating and Comparing the IGraph Community Detection Algo...
收藏 引用
Brazilian Conference on Intelligent Systems (BRACIS)
作者: Fabiano Berardo de Sousa Liang Zhao Inst. of Math. & Comput. Sci. Universidade de Sao Paulo Sao Paulo São Paulo BR School of Philosophy Sciences and Literatures University of São Paulo Ribeirão Preto SP Brazil
Complex networks became a very important tool in machine learning field, helping researchers to investigate and mine data. They can model real dynamic networks, aiding to unveil information's about the systems the... 详细信息
来源: 评论
High-knowledge shilling attack detection method based on genetic co-forest
High-knowledge shilling attack detection method based on gen...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Lingvue Su Yongli Wang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Shilling attack is the behavior of malicious users to elevate or suppress ratings in collaborative filtering recommendation system, which can destroy the balance of recommendation and disrupt the order of competition.... 详细信息
来源: 评论
An Overlapping Community detection Algorithm for Label Propagation Based on Node Influence  3
An Overlapping Community Detection Algorithm for Label Propa...
收藏 引用
2021年第三届先进计算机技术、信息科学与通信国际会议(CTISC2021)
作者: QI LIU YAOFENG SU QICHAO PENG KEBIN CHEN YUNJUN LU College of Information and Communication National University of Defense Technology
LPA algorithm is an effective community detection algorithm. based on the original algorithm, a new algorithm based on node importance, similarity between nodes, influence of adjacent nodes and label propagation strat... 详细信息
来源: 评论
IMDoC: Identification of Malicious Domain Campaigns via DNS and Communicating Files
收藏 引用
IEEE ACCESS 2021年 9卷 45242-45258页
作者: Lazar, David Cohen, Kobi Freund, Alon Bartik, Avishay Ron, Aviv Ben Gurion Univ Negev Dept Comp Sci IL-8410501 Beer Sheva Israel Ben Gurion Univ Negev Sch Elect & Comp Engn IL-8410501 Beer Sheva Israel IBM Cyber Secur Ctr Excellence IL-8489325 Beer Sheva Israel
Cyber attacks have become more sophisticated and frequent over the years. Detecting the components operated during a cyber attack and relating them to a specific threat actor is one of the main challenges facing cyber... 详细信息
来源: 评论
Deep learning model for speech emotion classification based on GCI and GOI detection
Deep learning model for speech emotion classification based ...
收藏 引用
Emerging Trends in Industry 4.0 (ETI 4.0)
作者: Omkar Vernekar S.R. Nirmala Kavita Chachadi KLE Technological University Hubballi India
The temporal regions of considerable stimulation to the vocal tract during the production of spoken speech are referred to as glottal closure instants (GCIs) and glottal opening instants (GOIs). These instants from sp... 详细信息
来源: 评论
Towards De-Anonymization of Google Play Search Rank Fraud
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2021年 第11期33卷 3648-3661页
作者: Rahman, Mizanur Hernandez, Nestor Carbunar, Bogdan Chau, Duen Horng Florida Int Univ Miami FL 33199 USA Florida Int Univ SCIS Miami FL 33199 USA Georgia Tech Atlanta GA 30332 USA
Search rank fraud, the fraudulent promotion of products hosted on peer-review sites, is driven by expert workers recruited online, often from crowdsourcing sites. In this paper we introduce the fraud de-anonymization ... 详细信息
来源: 评论
Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points
收藏 引用
IEEE ACCESS 2021年 9卷 74275-74285页
作者: Jeon, Youngbae Jung, Ji Hyuk Yoon, Ji Won Korea Univ Sch Cybersecur Seoul 02841 South Korea
Correlation Power Analysis (CPA) uses a lot of computational resources for deploying side-channel analysis to power traces. For every guessing key, it searches all data points and all power traces to reveal the secret... 详细信息
来源: 评论
Design and Implementation of Mask detection System Based on Improved YOLOv5s
Design and Implementation of Mask Detection System Based on ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changyu Zhao Zhuo Yan Huangxin Xu Xueliang Chen Zheng Li Xinyu Zhong Cuiwei Liu Anyan Xiao Xingyan Lv School of Artificial Intelligence Shenyang Aerospace University Shenyang China School of Computer Science Shenyang Aerospace University Shenyang China
In this paper, we propose a lightweight mask detection algorithm and implement an intelligent vehicle system. The algorithm uses YOLOv5s as the backbone network, and at the same time incorporates the SE attention mech... 详细信息
来源: 评论
Rhythm-based accuracy improvement of heart beat detection algorithms
Rhythm-based accuracy improvement of heart beat detection al...
收藏 引用
Computers in Cardiology (CinC)
作者: Zoltán Gilián Péter Kovács Kaveh Samiee Department of Numerical Analysis Eötvös Loránd University Budapest Hungary Department of Signal Processing Tampere University of Technology Tampere Finland
Aims: Our aim is to improve the accuracy of existing heart beat detection algorithms in order to provide reliable heart beat locations in a multi-modal beat detection scheme. Methods: A rhythm-based algorithm is prese... 详细信息
来源: 评论
Improved blood cell detection method based on YOLOv5 algorithm
Improved blood cell detection method based on YOLOv5 algorit...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Meigen Huang Binjie Wang Jiangcheng Wan Cheng Zhou College of Computer Chongqing University of Posts and Telecommunications Chongqing China Laboratory of Broadband Network Innovation Chongqing China
The proposed blood cell target detection algorithm based on YOLOv5 addresses the issue of low average accuracy and serious miss detection due to small blood cells and serious cell adhesion in blood cell detection by t... 详细信息
来源: 评论