咨询与建议

限定检索结果

文献类型

  • 68,511 篇 会议
  • 37,226 篇 期刊文献
  • 496 册 图书
  • 1 篇 专利

馆藏范围

  • 106,234 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 64,780 篇 工学
    • 45,656 篇 计算机科学与技术...
    • 37,443 篇 软件工程
    • 15,448 篇 信息与通信工程
    • 10,018 篇 控制科学与工程
    • 7,481 篇 生物工程
    • 7,433 篇 电气工程
    • 6,621 篇 电子科学与技术(可...
    • 5,703 篇 生物医学工程(可授...
    • 4,796 篇 机械工程
    • 4,643 篇 光学工程
    • 3,488 篇 化学工程与技术
    • 3,453 篇 仪器科学与技术
    • 3,245 篇 动力工程及工程热...
    • 3,124 篇 网络空间安全
    • 2,659 篇 安全科学与工程
    • 2,421 篇 交通运输工程
  • 37,169 篇 理学
    • 18,528 篇 数学
    • 11,327 篇 物理学
    • 8,641 篇 生物学
    • 5,806 篇 统计学(可授理学、...
    • 3,872 篇 化学
    • 3,556 篇 系统科学
  • 19,089 篇 管理学
    • 11,815 篇 管理科学与工程(可...
    • 8,137 篇 图书情报与档案管...
    • 4,801 篇 工商管理
  • 6,058 篇 医学
    • 4,986 篇 临床医学
    • 4,388 篇 基础医学(可授医学...
    • 2,618 篇 公共卫生与预防医...
    • 2,604 篇 药学(可授医学、理...
  • 3,066 篇 法学
    • 2,443 篇 社会学
  • 1,940 篇 经济学
  • 1,818 篇 农学
  • 1,295 篇 教育学
  • 459 篇 文学
  • 307 篇 军事学
  • 212 篇 艺术学
  • 24 篇 哲学
  • 17 篇 历史学

主题

  • 3,267 篇 accuracy
  • 3,016 篇 feature extracti...
  • 2,977 篇 deep learning
  • 2,841 篇 educational inst...
  • 2,379 篇 computer science
  • 2,332 篇 training
  • 2,298 篇 machine learning
  • 2,289 篇 computational mo...
  • 1,659 篇 predictive model...
  • 1,656 篇 internet of thin...
  • 1,646 篇 support vector m...
  • 1,597 篇 convolutional ne...
  • 1,532 篇 real-time system...
  • 1,522 篇 data mining
  • 1,383 篇 optimization
  • 1,298 篇 data models
  • 1,171 篇 semantics
  • 1,151 篇 security
  • 1,146 篇 neural networks
  • 1,082 篇 image segmentati...

机构

  • 2,507 篇 college of compu...
  • 2,389 篇 college of compu...
  • 1,098 篇 college of compu...
  • 1,038 篇 college of compu...
  • 1,020 篇 department of ph...
  • 998 篇 cavendish labora...
  • 948 篇 physikalisches i...
  • 946 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 609 篇 infn sezione di ...
  • 582 篇 infn sezione di ...
  • 565 篇 infn laboratori ...
  • 562 篇 imperial college...
  • 550 篇 department of ph...
  • 539 篇 fakultät physik ...
  • 535 篇 horia hulubei na...
  • 534 篇 school of physic...
  • 534 篇 infn sezione di ...
  • 532 篇 school of physic...
  • 527 篇 h.h. wills physi...

作者

  • 255 篇 barter w.
  • 245 篇 a. gomes
  • 233 篇 s. chen
  • 229 篇 blake t.
  • 228 篇 c. alexa
  • 228 篇 j. m. izen
  • 226 篇 beiter a.
  • 226 篇 betancourt c.
  • 225 篇 bellee v.
  • 224 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 224 篇 c. amelung
  • 223 篇 bencivenni g.
  • 221 篇 bowcock t.j.v.
  • 221 篇 bay a.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 214 篇 boettcher t.

语言

  • 100,189 篇 英文
  • 4,200 篇 其他
  • 1,900 篇 中文
  • 52 篇 日文
  • 16 篇 法文
  • 11 篇 德文
  • 10 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Technology and College of Data Science"
106234 条 记 录,以下是71-80 订阅
排序:
Bidirectional Authentication Protocol for RFID Systems Based on Mms
收藏 引用
International Journal of Network Security 2025年 第1期27卷 72-80页
作者: He, Xiao-ping Liu, Dao-wei Wu, Yang School of Data and Computer Science Guangdong Peizheng College Guangzhou510800 China Engineering College Guangzhou College of Technology and Business Guangzhou510006 China College of Information and Communication National University of Defense Technology Wuhan430010 China
data exchange between electronic tags and the reader-writer in RFID systems is based on the wireless channel. Due to the inherent openness of the wireless channel, the transmitted data information is easy to be eavesd... 详细信息
来源: 评论
A Novel Community Detection Algorithm Based on Node Propagation and Attraction
收藏 引用
IEEE Access 2025年 13卷 69161-69174页
作者: Fu, Lidong Xie, Xinxing Dou, Zengfa Bai, Yun Zhao, Xi Xi'an University of Science and Technology College of Computer Science and Technology Xi'an710600 China Qinghai Institute of Technology School of Computer and Information Science Xining810016 China Xi'an University School of Information Engineering Xi'an710065 China Xi'an Big Data Service Center Xi'an710007 China
High-quality community detection in complex networks typically relies on the similarity between nodes to select communities. However, when a node exhibits the same similarity with different communities, it becomes amb... 详细信息
来源: 评论
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3467-3497页
作者: Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... 详细信息
来源: 评论
Algorithms for online fault tolerance server consolidation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 514-523页
作者: Boyu Li Bin Wu Meng Shen Hao Peng Weisheng Li Hong Zhang Jie Gan Zhihong Tian Guangquan Xu College of Intelligence and Computing Tianjin University School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer Science and Technology Zhejiang Normal University School of Computer Science and Technology Chongqing University of Posts and Telecommunications School of Astronautics Beihang University School of Computer Science University of Sydney Cyberspace Institute of Advanced Technology Guangzhou University
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server failures. In this mechanism, each item represents a computing task and is replicated into ξ + 1 servers for som... 详细信息
来源: 评论
Enhancing Predictive Capabilities for Cyber Physical Systems Through Supervised Learning
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第16期49卷 77-86页
作者: Dhanalakshmi, B. Tamije Selvy, P. Department of Computer Science and Engineering Dr.N.G. P Institute of technology India Department of Computer Science and Engineering Hindusthan College of Engineering and Technology India
The rapid advancement and proliferation of Cyber-Physical Systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ... 详细信息
来源: 评论
A Single Source Generalization Model via Spatial Amplitude Perturbation and Sensitivity Guidance for Colored Medical Image Segmentation  27th
A Single Source Generalization Model via Spatial Amplitude ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Yang, Zeyuan Yu, Chunyan College of Computer and Data Science/College of Software Fuzhou University Fuzhou350108 China
For medical images, domain shift is a very common phenomenon. To address this issue, researchers have proposed unsupervised domain adaptation and multi-source domain generalization. However, these methods are sometime... 详细信息
来源: 评论
Optimizing Coverage in Wireless Sensor Networks Using the Tumbleweed Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 250-261页
作者: Zhang, Mengfei Chu, Shu-Chuan Liu, Nengxian Huang, Kuan-Chun Pan, Jeng-Shyang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Department of Industrial and Systems Engineering Chung Yuan Christian University Taoyuan320314 Taiwan School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte... 详细信息
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
SrTLS: Secure TLS Handshake on Corrupted Machines
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 3137-3154页
作者: Liu, Jiahao Wang, Yi Tang, Xincheng Chen, Rongmao Huang, Xinyi Su, Jinshu National University of Defense Technology College of Computer Science and Technology Hunan Changsha410073 China Jinan University College of Cyber Security Guangzhou China Academy of Military Science Beijing China
TLS 1.3 is widely used to realize secure communication over the Internet. Existing security analyses of TLS 1.3 primarily focus on its handshake protocol which is indeed an authenticated key exchange (AKE) protocol, a... 详细信息
来源: 评论