咨询与建议

限定检索结果

文献类型

  • 6,437 篇 会议
  • 961 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 7,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,187 篇 工学
    • 1,125 篇 电气工程
    • 924 篇 计算机科学与技术...
    • 665 篇 信息与通信工程
    • 272 篇 控制科学与工程
    • 203 篇 仪器科学与技术
    • 165 篇 机械工程
    • 164 篇 软件工程
    • 128 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 101 篇 生物医学工程(可授...
    • 88 篇 测绘科学与技术
    • 72 篇 航空宇航科学与技...
    • 34 篇 土木工程
    • 29 篇 生物工程
    • 24 篇 环境科学与工程(可...
    • 19 篇 网络空间安全
    • 17 篇 船舶与海洋工程
    • 16 篇 光学工程
  • 284 篇 理学
    • 80 篇 系统科学
    • 62 篇 物理学
    • 50 篇 地球物理学
    • 34 篇 数学
    • 34 篇 生物学
    • 22 篇 地理学
  • 180 篇 医学
    • 120 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 164 篇 管理学
    • 155 篇 管理科学与工程(可...
  • 49 篇 农学
    • 26 篇 作物学
    • 22 篇 农业资源与环境
  • 35 篇 文学
    • 35 篇 新闻传播学
  • 14 篇 艺术学
  • 6 篇 军事学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 法学

主题

  • 7,403 篇 detection algori...
  • 757 篇 detectors
  • 754 篇 feature extracti...
  • 621 篇 algorithm design...
  • 576 篇 object detection
  • 531 篇 image edge detec...
  • 383 篇 testing
  • 364 篇 robustness
  • 330 篇 cameras
  • 307 篇 computer science
  • 283 篇 monitoring
  • 277 篇 accuracy
  • 274 篇 data mining
  • 265 篇 computational mo...
  • 255 篇 image segmentati...
  • 234 篇 signal to noise ...
  • 233 篇 clustering algor...
  • 199 篇 change detection...
  • 195 篇 pixel
  • 191 篇 electrocardiogra...

机构

  • 17 篇 school of electr...
  • 15 篇 beijing universi...
  • 13 篇 department of el...
  • 13 篇 department of el...
  • 11 篇 institute for in...
  • 11 篇 department of el...
  • 10 篇 national mobile ...
  • 9 篇 department of el...
  • 9 篇 wireless theorie...
  • 8 篇 department of el...
  • 8 篇 graduate school ...
  • 8 篇 department of au...
  • 8 篇 institute of com...
  • 7 篇 beijing key labo...
  • 7 篇 school of electr...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 mit lincoln labo...
  • 7 篇 southeast univ n...

作者

  • 13 篇 wei li
  • 13 篇 bin wu
  • 9 篇 dacheng yang
  • 9 篇 ming chen
  • 9 篇 h. wang
  • 9 篇 r. raheli
  • 8 篇 xin liu
  • 8 篇 jaeseok kim
  • 8 篇 shixin cheng
  • 8 篇 keiichi tamura
  • 8 篇 v.k. garg
  • 8 篇 j. mcnames
  • 8 篇 xin zhang
  • 7 篇 lei wang
  • 7 篇 a. schaum
  • 7 篇 hajime kitakami
  • 7 篇 hui zhao
  • 7 篇 giulio colavolpe
  • 7 篇 hui li
  • 7 篇 yong li

语言

  • 7,323 篇 英文
  • 39 篇 其他
  • 36 篇 中文
  • 4 篇 西班牙文
  • 1 篇 土耳其文
检索条件"主题词=detection algorithms"
7403 条 记 录,以下是1101-1110 订阅
排序:
Analyzing Dependency Clusters and Security Risks in the Maven Central Repository
Analyzing Dependency Clusters and Security Risks in the Mave...
收藏 引用
International Mining Software Repositories, MSR
作者: George Lake Minhaz F. Zibran Department of Computer Science Idaho State University Pocatello ID USA
We present a cluster analysis of the Maven Central Repository’s dependency structure to identify and assess vulnerability risks using the Goblin framework. Through analysis of over 15 million artifacts using the Leid... 详细信息
来源: 评论
Computer Vision Based Recognition Algorithm for Sea Buckthorn Harvesting Robot
Computer Vision Based Recognition Algorithm for Sea Buckthor...
收藏 引用
International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON)
作者: Jurijs Timofejevs Mikhail Gorobetz Andrejs Potapovs Riga Technical University Riga Latvia
Sea buckthorn harvesting presents challenges in labour requirements and costs, urging the need for technological advancements. This paper discusses the applicability of adaptive systems, computer vision, and robotics ... 详细信息
来源: 评论
Graph-based low complexity detection algorithms in multiple-input-multiple-out systems: an edge selection approach
收藏 引用
IET COMMUNICATIONS 2013年 第12期7卷 1202-1210页
作者: Lv, Tiejun Long, Feichi Beijing Univ Posts & Telecommun Sch Informat & Commun Engn Beijing 100876 Peoples R China
In this study, the problem of low complexity multiple-input-multiple-out signal detection based on belief propagation (BP) is addressed. The authors propose an edge selection approach that works on factor graph model ... 详细信息
来源: 评论
Efficient Compressed Sensing for Real-Time Electrocardiogram Acquisition on Low-Power Medical Devices
Efficient Compressed Sensing for Real-Time Electrocardiogram...
收藏 引用
IEEE EMBS International Conference on Information Technology Applications in Biomedicine (ITAB)
作者: Mitchell Terrell Jon Weissman Dept. of Computer Science and Engineering University of Minnesota Minneapolis Minnesota
Low cost wearable and implantable cardiac monitoring devices (WCM & ICM), combined with increasingly accurate disease and arrhythmia detection algorithms have proven effective to help slow the impact of cardiovasc... 详细信息
来源: 评论
Identification of Unknown Malicious Flow Based on Adaptive Annotation and Deep Neural Networks
Identification of Unknown Malicious Flow Based on Adaptive A...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Zhaoyun Ding Yi Wang Wangqun Lin National Key Laboratory of Information Systems Engineering National University of Defense Technology Changsha Academy of Military Sciences Beijing
With the explosive growth of Internet flow, the problems of network security are becoming more and more prominent. The identification and detection of malicious flow in the network have become important topics. Most o... 详细信息
来源: 评论
Malicious Request Identification Based on a Hybrid Model of BP Neural Network
Malicious Request Identification Based on a Hybrid Model of ...
收藏 引用
Electronic Information Engineering and Computer Technology (EIECT), International Conference on
作者: Zhiqiang Zhang Jiaji Zhang Jiaqi Guo Siying Chen Jingxi Wang Yongzheng Li Department of Network Security Shanxi Police College Taiyuan Shanxi China Science and Technology Communication Detachment Taiyuan Public Security Bureau Taiyuan Shanxi China
Malicious request identification is a key issue in the field of cybersecurity. Existing methods for identifying malicious requests often face limitations when dealing with unknown malicious requests. To address the pr... 详细信息
来源: 评论
A Review of Automatic Speaker Verification Systems with Feature Extractions and Spoofing Attacks
A Review of Automatic Speaker Verification Systems with Feat...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: Krithikaa Venket VS Safia Naveed Dept. of Information Technology KCG College of Technology Chennai India
Automatic Speaker Verification (ASV) technology is gaining traction in various applications due to its reliance on a unique and natural biometric identifier: a person's voice. This review provides a comprehensive ... 详细信息
来源: 评论
Automating Security in Blockchain: ML-Driven Smart Contract Vulnerability Analysis
Automating Security in Blockchain: ML-Driven Smart Contract ...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Sumithra V Shahsidhara R Akansha Singh School of Computer Science Engineering and Technology Bennett University Greater Noida India OnDevice AI Samsung Research Institute Bangalore Maratahalli Bangalore India
As with the increasing usage of blockchain especially in decentralized systems, the need for solid security measures increases to stop vulnerabilities in smart contracts. Our method is an ML-based solution to automate... 详细信息
来源: 评论
Image Transformation-Based Defense Against Adversarial Perturbation on Deep Learning Models
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021年 第5期18卷 2106-2121页
作者: Agarwal, Akshay Singh, Richa Vatsa, Mayank Ratha, Nalini K. IIIT Delhi Dept Comp Sci & Engn Delhi 110020 India IIT Jodhpur Dept Comp Sci & Engn Karwar 342037 Rajasthan India SUNY Buffalo Buffalo NY 14260 USA
Deep learning algorithms provide state-of-the-art results on a multitude of applications. However, it is also well established that they are highly vulnerable to adversarial perturbations. It is often believed that th... 详细信息
来源: 评论
Eigenvalues-Based Universal Spectrum Sensing Algorithm in Cognitive Radio Networks
收藏 引用
IEEE SYSTEMS JOURNAL 2021年 第3期15卷 3391-3402页
作者: Zhao, Wenjing Li, He Jin, Minglu Liu, Yang Yoo, Sang-Jo Dalian Univ Technol Sch Informat & Commun Engn Dalian 116024 Peoples R China Inner Mongolia Univ Coll Elect Informat Engn Hohhot 010021 Peoples R China INHA Univ Dept Informat & Commun Engn Incheon 402751 South Korea
The eigenvalues of the sample covariance matrix can capture signal correlations and noise characteristics well, which are widely used for spectrum sensing in cognitive radio networks. Some totally blind spectrum sensi... 详细信息
来源: 评论