咨询与建议

限定检索结果

文献类型

  • 171,237 篇 会议
  • 78,751 篇 期刊文献
  • 2,298 册 图书

馆藏范围

  • 252,285 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 147,626 篇 工学
    • 101,899 篇 计算机科学与技术...
    • 81,798 篇 软件工程
    • 35,298 篇 信息与通信工程
    • 22,648 篇 控制科学与工程
    • 18,583 篇 电气工程
    • 17,736 篇 电子科学与技术(可...
    • 16,416 篇 生物工程
    • 12,658 篇 生物医学工程(可授...
    • 10,778 篇 光学工程
    • 9,939 篇 机械工程
    • 8,107 篇 化学工程与技术
    • 7,516 篇 仪器科学与技术
    • 7,387 篇 动力工程及工程热...
    • 6,545 篇 材料科学与工程(可...
    • 5,742 篇 网络空间安全
    • 5,447 篇 安全科学与工程
  • 84,052 篇 理学
    • 43,315 篇 数学
    • 26,476 篇 物理学
    • 18,656 篇 生物学
    • 13,633 篇 统计学(可授理学、...
    • 9,265 篇 系统科学
    • 8,683 篇 化学
  • 39,628 篇 管理学
    • 23,906 篇 管理科学与工程(可...
    • 17,345 篇 图书情报与档案管...
    • 11,093 篇 工商管理
  • 12,312 篇 医学
    • 10,348 篇 临床医学
    • 9,247 篇 基础医学(可授医学...
    • 5,733 篇 药学(可授医学、理...
    • 5,142 篇 公共卫生与预防医...
  • 7,134 篇 法学
    • 5,851 篇 社会学
  • 4,288 篇 经济学
  • 3,354 篇 农学
  • 2,830 篇 教育学
  • 1,316 篇 文学
  • 530 篇 军事学
  • 411 篇 艺术学
  • 78 篇 哲学
  • 45 篇 历史学

主题

  • 11,858 篇 computer science
  • 6,354 篇 accuracy
  • 5,588 篇 feature extracti...
  • 5,421 篇 computational mo...
  • 5,264 篇 deep learning
  • 4,859 篇 machine learning
  • 4,356 篇 training
  • 3,584 篇 data mining
  • 3,426 篇 support vector m...
  • 3,131 篇 predictive model...
  • 3,101 篇 artificial intel...
  • 2,983 篇 optimization
  • 2,903 篇 internet of thin...
  • 2,827 篇 real-time system...
  • 2,813 篇 convolutional ne...
  • 2,764 篇 computer archite...
  • 2,705 篇 algorithm design...
  • 2,704 篇 wireless sensor ...
  • 2,574 篇 neural networks
  • 2,537 篇 protocols

机构

  • 4,993 篇 department of co...
  • 1,085 篇 cavendish labora...
  • 984 篇 department of ph...
  • 929 篇 university of ch...
  • 917 篇 physikalisches i...
  • 914 篇 oliver lodge lab...
  • 822 篇 department of el...
  • 667 篇 department of el...
  • 655 篇 department of co...
  • 569 篇 infn sezione di ...
  • 560 篇 infn laboratori ...
  • 556 篇 infn sezione di ...
  • 551 篇 department of co...
  • 537 篇 chitkara univers...
  • 526 篇 horia hulubei na...
  • 521 篇 infn sezione di ...
  • 514 篇 fakultät physik ...
  • 508 篇 department of ph...
  • 505 篇 school of physic...
  • 503 篇 school of physic...

作者

  • 260 篇 barter w.
  • 240 篇 j. wang
  • 239 篇 s. chen
  • 236 篇 a. gomes
  • 233 篇 blake t.
  • 228 篇 c. alexa
  • 224 篇 j. m. izen
  • 224 篇 bellee v.
  • 224 篇 amato s.
  • 222 篇 betancourt c.
  • 222 篇 boettcher t.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 216 篇 brundu d.
  • 212 篇 beiter a.
  • 211 篇 g. bella
  • 211 篇 bencivenni g.
  • 210 篇 c. amelung
  • 209 篇 j. strandberg
  • 208 篇 d. calvet

语言

  • 221,657 篇 英文
  • 27,736 篇 其他
  • 3,069 篇 中文
  • 182 篇 日文
  • 50 篇 德文
  • 50 篇 斯洛文尼亚文
  • 34 篇 法文
  • 20 篇 朝鲜文
  • 15 篇 俄文
  • 5 篇 阿拉伯文
  • 5 篇 西班牙文
  • 3 篇 意大利文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=.Department of Computer Science and Technology"
252286 条 记 录,以下是81-90 订阅
排序:
OpBench: an operator-level GPU benchmark for deep learning
收藏 引用
science China(Information sciences) 2024年 第9期67卷 76-87页
作者: Qingwen GU Bo FAN Zhengning LIU Kaicheng CAO Songhai ZHANG Shimin HU Department of Computer Science and Technology Tsinghua University National Innovation Institute of Defense Technology Academy of Military Science Beijing Fitten Technology Co. Ltd.
Operators(such as Conv and ReLU) play an important role in deep neural networks. Every neural network is composed of a series of differentiable operators. However, existing AI benchmarks mainly focus on accessing mode... 详细信息
来源: 评论
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3331-3345页
作者: Das, Sangjukta Singh, Maheshwari Prasad Namasudra, Suyel Department of Computer Science and Engineering National Institute of Technology Patna Bihar India Department of Computer Science and Engineering National Institute of Technology Agartala Tripura India
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In... 详细信息
来源: 评论
GAN-Based Federated Adversarial Learning for Enhancing Security Towards Consumer Digital Ecosystems
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1102-1114页
作者: Murmu, Anita Kumar, Piyush Namasudra, Suyel Reddy, M Rajasekhar National Institute of Technology Patna Department of Computer Science and Engineering Patna India Bennett University School of Computer Science Engineering and Technology India National Institute of Technology Department of Computer Science and Engineering Patna India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura India Amrita Vishwa Vidyapeetham Amrita School of Computing Andhra Pradesh India
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before... 详细信息
来源: 评论
Silver Lining in the Fake News Cloud: Can Large Language Models Help Detect Misinformation?
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 14-24页
作者: Kumar, Raghvendra Goddu, Bhargav Saha, Sriparna Jatowt, Adam Indian Institute of Technology Department of Computer Science and Engineering Patna801106 India University of Innsbruck Department of Computer Science Innsbruck6020 Austria
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua... 详细信息
来源: 评论
Robust Network Security:A Deep Learning Approach to Intrusion Detection in IoT
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4149-4169页
作者: Ammar Odeh Anas Abu Taleb Department of Computer Science Princess Sumaya University of TechnologyAmman1196Jordan
The proliferation of Internet of Things(IoT)technology has exponentially increased the number of devices interconnected over networks,thereby escalating the potential vectors for cybersecurity *** response,this study ... 详细信息
来源: 评论
Low-light image enhancement using the illumination boost algorithm along with the SKWGIF method
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18651-18685页
作者: Radmand, Elnaz Saberi, Erfan Sorkhi, Ali Ghanbari Pirgazi, Jamshid Department of Computer Engineering University of Science and Technology of Mazandaran Behshahr Iran
Low-light image enhancement is highly desirable for outdoor image processing and computer vision applications. Research conducted in recent years has shown that images taken in low-light conditions often pose two main... 详细信息
来源: 评论
Implementation of ANN and response surface method for dual-fuel CI engine optimization and prediction using water infusion and biofuel
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Pramanik, Sabyasachi Department of Computer Science & Engineering Haldia Institute of Technology Haldia India
In this study, tests were done to see what would happen if hydrogen (H2) and lemon grass oil (LO) were used for a lone-cylinder compression ignition engine as a partial diesel replacement. After starting the trial wit... 详细信息
来源: 评论
SCRR: Stable Malware Detection under Unknown Deployment Environment Shift by Decoupled Spurious Correlations Filtering
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-12页
作者: Yang, Yuchen Yuan, Bo Lou, Jian Qin, Zhan Department of Computer Science and Technology Zhejiang University Hangzhou China
Machine learning models have been prevalently deployed for malware detection. When properly trained under the training environment, they can deliver highly accurate detection results in the deployment environment prov... 详细信息
来源: 评论
A novel hybrid method for the registration of deformable medical images using common subregions
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7401-7424页
作者: Alam, Fakhre Rahman, Sami Ur Ahmad, Jamil Department of Computer Science and Information Technology University of Malakand Dir Pakistan
Deformable image registration is a fundamental technique in medical image analysis and provide physicians with a more complete understanding of patient anatomy and function. Deformable image registration has potential... 详细信息
来源: 评论
GaitFFDA:Feature Fusion and Dual Attention Gait Recognition Model
收藏 引用
Tsinghua science and technology 2025年 第1期30卷 345-356页
作者: Zhixiong Wu Yong Cui Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
Gait recognition has a wide range of application scenarios in the fields of intelligent security and *** recognition currently faces challenges:inadequate feature methods for environmental interferences and insufficie... 详细信息
来源: 评论