咨询与建议

限定检索结果

文献类型

  • 2,288 篇 会议
  • 1,869 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,520 篇 工学
    • 1,537 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 475 篇 信息与通信工程
    • 434 篇 控制科学与工程
    • 359 篇 电气工程
    • 297 篇 电子科学与技术(可...
    • 276 篇 光学工程
    • 271 篇 生物工程
    • 239 篇 生物医学工程(可授...
    • 171 篇 机械工程
    • 153 篇 化学工程与技术
    • 129 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 110 篇 材料科学与工程(可...
    • 96 篇 安全科学与工程
    • 87 篇 交通运输工程
  • 1,534 篇 理学
    • 671 篇 数学
    • 579 篇 物理学
    • 323 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 187 篇 系统科学
    • 178 篇 化学
  • 578 篇 管理学
    • 362 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 180 篇 工商管理
  • 262 篇 医学
    • 223 篇 临床医学
    • 176 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 86 篇 公共卫生与预防医...
  • 99 篇 法学
    • 75 篇 社会学
  • 62 篇 经济学
  • 61 篇 教育学
  • 46 篇 农学
  • 20 篇 军事学
  • 16 篇 文学
  • 8 篇 艺术学

主题

  • 136 篇 software enginee...
  • 97 篇 computer science
  • 71 篇 machine learning
  • 66 篇 deep learning
  • 63 篇 neural networks
  • 60 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 55 篇 optimization
  • 52 篇 computational mo...
  • 52 篇 accuracy
  • 49 篇 artificial intel...
  • 48 篇 computer archite...
  • 46 篇 predictive model...
  • 45 篇 software testing
  • 45 篇 humans
  • 44 篇 costs
  • 42 篇 testing
  • 40 篇 software systems
  • 40 篇 pattern recognit...

机构

  • 86 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 64 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 57 篇 infn sezione di ...
  • 56 篇 warsaw
  • 56 篇 university of ci...

作者

  • 64 篇 beiter a.
  • 64 篇 barter w.
  • 64 篇 brundu d.
  • 64 篇 bellee v.
  • 57 篇 ao d.
  • 56 篇 bobulska d.
  • 56 篇 afsharnia h.
  • 55 篇 aliouche z.
  • 55 篇 blake t.
  • 55 篇 andersson m.
  • 55 篇 borsato m.
  • 55 篇 betancourt c.
  • 55 篇 belin s.
  • 55 篇 carus l.
  • 55 篇 barbetti m.
  • 55 篇 beck a.
  • 55 篇 cali s.
  • 54 篇 casse g.
  • 54 篇 amato s.
  • 54 篇 baryshnikov f.

语言

  • 3,952 篇 英文
  • 174 篇 其他
  • 47 篇 中文
  • 2 篇 日文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4177 条 记 录,以下是61-70 订阅
排序:
School Start Time Selection for the Morning Commute Problem: A Regional Modeling and Optimization Approach  27
School Start Time Selection for the Morning Commute Problem:...
收藏 引用
27th IEEE International Conference on Intelligent Transportation Systems, ITSC 2024
作者: Georgantas, Antonios Timotheou, Stelios Panayiotou, Christos G. University of Cyprus 2109 Kios Research and Innovation Center of Excellence Department of Electrical and Computer Engineering Panepistimiou 1 Avenue Cyprus
Urban traffic congestion during morning rush hour is a source of severe discomfort for commuters. Some commuters must make an intermediate stop at a school to drop off their children before heading to their destinatio... 详细信息
来源: 评论
A Survey of Cyber Attacks on Cyber Physical Systems:Recent Advances and Challenges
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第5期9卷 784-800页
作者: Wenli Duo MengChu Zhou Abdullah Abusorrah Macao Institute of Systems Engineering Macao University of Science and TechnologyMacao 999078China IEEE Department of Electrical and Computer Engineering K.A.CARE Energy Research and Innovation Center Department of Electrical and Computer Engineering K.A.CARE Energy Research and Innovation Center and Center of Research Excellence in Renewable Energy and Power SystemsKing Abdulaziz University
A cyber physical system(CPS)is a complex system that integrates sensing,computation,control and networking into physical processes and objects over *** plays a key role in modern industry since it connects physical an... 详细信息
来源: 评论
Digital Twin, Metaverse and Smart Cities in a Race to the Future  24
Digital Twin, Metaverse and Smart Cities in a Race to the Fu...
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Zainab, Hijab E Bawanay, Narmeen Zakaria Jinnah University for Women Center for Computing Research Department of Computer Science and Software Engineering Karachi Pakistan
In the dynamic landscape of urban development, the synergy of the Metaverse, Digital Twins, and Smart Cities emerges as a potent catalyst for transformation. The Metaverse, a vibrant virtual space, collaborates with c... 详细信息
来源: 评论
Deep Learning for Violence Detection in Surveillance: The Role of Transfer Learning and Pre-Trained Models  24
Deep Learning for Violence Detection in Surveillance: The Ro...
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Ilyas, Anum Obaid, Surayya Bawany, Narmeen Zakaria Center for Computing Research Jinah University for Women Department of Computer Science and Software Engineering Karachi Pakistan
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q... 详细信息
来源: 评论
A Blockchain based Framework for Verifying Drug Authenticity  24
A Blockchain based Framework for Verifying Drug Authenticity
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Hamid, Soomaiya Bawany, Narmeen Zakaria Fatima, Kiran Jinnah University for Women Center for Computing Research Department of Computer Science and Software Engineering Karachi Pakistan
Counterfeit drugs are fake medicines that are potentially harmful for health. Safeguarding the integrity of pharmaceutical distribution plays a crucial role in preventing the circulation of counterfeit drugs. Traditio... 详细信息
来源: 评论
Machine Learning for Real-Time Anomaly Detection in Optical Networks  23
Machine Learning for Real-Time Anomaly Detection in Optical ...
收藏 引用
23rd International Conference on Transparent Optical Networks, ICTON 2023
作者: Behera, Sadananda Panayiotou, Tania Ellinas, Georgios University of Cyprus KIOS Research and Innovation Center of Excellence Department of Electrical and Computer Engineering Nicosia Cyprus
This work proposes a real-time anomaly detection scheme that leverages the multi-step ahead prediction capabilities of encoder-decoder (ED) deep learning models with recurrent units. Specifically, an encoder-decoder i... 详细信息
来源: 评论
A Curious Case of Searching for the Correlation between Training Data and Adversarial Robustness of Transformer Textual Models  62
A Curious Case of Searching for the Correlation between Trai...
收藏 引用
Findings of the 62nd Annual Meeting of the Association for Computational Linguistics, ACL 2024
作者: Dang, Cuong Le, Dung D. Le, Thai FPT Software AI Center Viet Nam College of Engineering and Computer Science VinUniversity Viet Nam Department of Computer Science Indiana University United States
Existing works have shown that fine-tuned textual transformer models achieve state-of-the-art prediction performances but are also vulnerable to adversarial text perturbations. Traditional adversarial evaluation is of... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论