咨询与建议

限定检索结果

文献类型

  • 21,896 篇 会议
  • 19,961 篇 期刊文献
  • 236 册 图书

馆藏范围

  • 42,093 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,694 篇 工学
    • 15,403 篇 计算机科学与技术...
    • 12,332 篇 软件工程
    • 4,973 篇 信息与通信工程
    • 3,697 篇 电子科学与技术(可...
    • 3,496 篇 电气工程
    • 3,068 篇 控制科学与工程
    • 2,898 篇 生物工程
    • 2,874 篇 光学工程
    • 2,315 篇 生物医学工程(可授...
    • 1,854 篇 化学工程与技术
    • 1,783 篇 机械工程
    • 1,534 篇 材料科学与工程(可...
    • 1,509 篇 仪器科学与技术
    • 1,122 篇 动力工程及工程热...
    • 794 篇 力学(可授工学、理...
  • 17,368 篇 理学
    • 8,091 篇 物理学
    • 6,758 篇 数学
    • 3,409 篇 生物学
    • 2,344 篇 统计学(可授理学、...
    • 2,105 篇 化学
    • 1,242 篇 系统科学
    • 913 篇 地球物理学
  • 5,975 篇 管理学
    • 3,606 篇 管理科学与工程(可...
    • 2,520 篇 图书情报与档案管...
    • 1,449 篇 工商管理
  • 2,252 篇 医学
    • 1,863 篇 临床医学
    • 1,506 篇 基础医学(可授医学...
    • 939 篇 药学(可授医学、理...
    • 684 篇 公共卫生与预防医...
  • 952 篇 法学
    • 761 篇 社会学
  • 576 篇 农学
  • 518 篇 经济学
  • 466 篇 教育学
  • 166 篇 文学
  • 92 篇 军事学
  • 79 篇 艺术学
  • 8 篇 历史学
  • 7 篇 哲学

主题

  • 985 篇 computer science
  • 722 篇 feature extracti...
  • 709 篇 deep learning
  • 553 篇 computational mo...
  • 543 篇 training
  • 520 篇 machine learning
  • 466 篇 semantics
  • 449 篇 accuracy
  • 290 篇 data mining
  • 277 篇 support vector m...
  • 262 篇 data models
  • 254 篇 image segmentati...
  • 244 篇 internet of thin...
  • 229 篇 reinforcement le...
  • 226 篇 artificial intel...
  • 222 篇 computer archite...
  • 221 篇 predictive model...
  • 210 篇 routing
  • 210 篇 optimization
  • 208 篇 neural networks

机构

  • 1,082 篇 cavendish labora...
  • 1,010 篇 department of ph...
  • 961 篇 oliver lodge lab...
  • 947 篇 physikalisches i...
  • 790 篇 university of ch...
  • 599 篇 infn laboratori ...
  • 593 篇 infn sezione di ...
  • 571 篇 infn sezione di ...
  • 562 篇 fakultät physik ...
  • 556 篇 school of physic...
  • 548 篇 infn sezione di ...
  • 518 篇 horia hulubei na...
  • 504 篇 school of physic...
  • 503 篇 iccub universita...
  • 494 篇 department of ph...
  • 493 篇 imperial college...
  • 487 篇 h.h. wills physi...
  • 485 篇 center for high ...
  • 480 篇 nikhef national ...
  • 479 篇 stfc rutherford ...

作者

  • 255 篇 beiter a.
  • 252 篇 barter w.
  • 248 篇 a. gomes
  • 243 篇 bellee v.
  • 234 篇 c. alexa
  • 231 篇 j. m. izen
  • 225 篇 c. amelung
  • 225 篇 s. chen
  • 224 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 218 篇 j. wang
  • 217 篇 g. spigo
  • 215 篇 f. siegert
  • 215 篇 bowcock t.j.v.
  • 214 篇 brundu d.
  • 214 篇 blake t.
  • 208 篇 amato s.
  • 207 篇 r. ströhmer
  • 204 篇 betancourt c.

语言

  • 39,269 篇 英文
  • 2,110 篇 其他
  • 681 篇 中文
  • 34 篇 日文
  • 8 篇 俄文
  • 6 篇 德文
  • 3 篇 法文
  • 3 篇 朝鲜文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center of Computer Science and Technology"
42093 条 记 录,以下是4911-4920 订阅
排序:
A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted Network Traffic
A Knowledge Distillation-Driven Lightweight CNN Model for De...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yuecheng Wen Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quancheng Provincial Laboratory Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the realm of cybersecurity, efficiently and precisely identifying and mitigating potential threats from malicious encrypted traffic is crucial. As deep learning evolves, methods relying on Convolutional Neural Netw... 详细信息
来源: 评论
SFMNet:focusing on feature attention for image classification  9
SFMNet:focusing on feature attention for image classificatio...
收藏 引用
9th International Conference on Digital Home, ICDH 2022
作者: Wu, Wenwei Luo, Xiaonan Xu, Songhua Chen, Ruiai School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guilin Huigu Institute of Artificial Intelligence Industrial Technology Guilin China Zhaoqing Br. Center of Guangdong Laboratory for Lingnan Modern Agricultural Science and Technology China Guilin University of Electronic Technology National Local Joint Engineering Research Center of Satellite Navigation and Location Service Guilin541004 China
In the process of convolution network processing, a convolution of each layer can be regarded as a mapping operation of image features. As we all know, when the human eye maps the prescene capture to the brain neurons... 详细信息
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference
PTGFI: A Prompt-Based Two-Stage Generative Framework for Fun...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Menglu Wang Xiaohui Han Peipei Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
In the field of cybersecurity, analyzing malicious software or programs is crucial for preventing network attacks. Malicious code often exists in a stripped binary form to thwart analysis, presenting challenges for an... 详细信息
来源: 评论
SalientPoint: A Self-Supervised Keypoint Detection Based on Saliency of Descriptor
SalientPoint: A Self-Supervised Keypoint Detection Based on ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Keyu Zhou Wangshu Yao Siyu Yang Siyuan Peng School of Computer Science & Technology Soochow University Suzhou China School of Software Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization China
This paper introduces a novel self-supervised frame-work designed to train keypoint detectors model across various descriptor models, named SalientPoint. The core of our method includes three modules: Homographic Augm... 详细信息
来源: 评论
Optimal Fusion-Based Handcrafted with Deep Features for Brain Cancer Classification
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 801-815页
作者: Mahmoud Ragab Sultanah M.Alshammari Amer H.Asseri Waleed K.Almutiry Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Center for Artificial Intelligence in Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Mathematics Department Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Biochemistry Department Faculty of ScienceKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics College of Science and Arts in Ar RassQassim UniversityBuryadah52571Saudi Arabia
Brain cancer detection and classification is done utilizing distinct medical imaging modalities like computed tomography(CT),or magnetic resonance imaging(MRI).An automated brain cancer classification using computer a... 详细信息
来源: 评论
Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV Videos
Similarity Algorithm Based on Minimum Tilt Outer Rectangle C...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Wei Ding Luyao Wang Wei Zhang Myung Jin Lee Ling Wang Kwang Woo Nam Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Industry-University Cooperstion Foundation Chungbuk National University Cheongju Korea School of Computer Science Northeast Electric Power University Jilin China School of Computer Science and Engineering Kunsan National University Gunsan Korea
In this paper, we propose a new UAV video similarity measurement algorithm to cluster and analyze UAV videos by measuring the similarity between UAV videos and train them in sub-groups, which in turn improves the effi... 详细信息
来源: 评论
Page Layout Analysis of Complex Document Images  15
Page Layout Analysis of Complex Document Images
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Swarup, Lakshya Shalini, M. Chaudhary, Anisha Adarsha, H. Wanjale, Kirti H. Yuvaraj, K. Chitkara University Centre of Research Impact and Outcome Punjab Rajpura140417 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Quantum University Research Center Quantum University India School of Engineering and Technology Mechaical Engineering Karnataka Bangalore India Vishwakarma Institute of Technology Department of Computer Engineering Pune India Karpagam Academy of Higher Education Department of Computer Science Coimbatore641021 India
Page format evaluation of complex document pictures is the process of information on the shape of report pictures and extracting the visible content material inside them. General page format, text partitioning, and vi... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
CaptchaGG: A linear graphical CAPTCHA recognition model based on CNN and RNN  9
CaptchaGG: A linear graphical CAPTCHA recognition model base...
收藏 引用
9th International Conference on Digital Home, ICDH 2022
作者: Chen, Yang Luo, Xiaonan Xu, Songhua Chen, Ruiai Guilin University of Electronic Technology School of Computer Science and Information Security China Zhaoqing Br. Center of Guangdong Laboratory for Lingnan Modern Agricultural Science and Technology China Guilin Huigu Institute of Artificial Intelligence Industrial Technology Guilin China Guilin University of Electronic Technology National Local Joint Engineering Research Center of Satellite Navigation and Location Service Guilin541004 China
This paper presents CaptchaGG, a model for recognizing linear graphical CAPTCHAs. As in the previous society, CAPTCHA is becoming more and more complex, but in some scenarios, complex CAPTCHA is not needed, and usuall... 详细信息
来源: 评论