咨询与建议

限定检索结果

文献类型

  • 49,005 篇 会议
  • 24,626 篇 期刊文献
  • 401 册 图书

馆藏范围

  • 74,032 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44,626 篇 工学
    • 31,577 篇 计算机科学与技术...
    • 25,729 篇 软件工程
    • 11,512 篇 信息与通信工程
    • 7,731 篇 控制科学与工程
    • 5,671 篇 电气工程
    • 5,344 篇 生物工程
    • 4,906 篇 电子科学与技术(可...
    • 4,249 篇 生物医学工程(可授...
    • 3,336 篇 机械工程
    • 3,297 篇 光学工程
    • 2,626 篇 网络空间安全
    • 2,538 篇 动力工程及工程热...
    • 2,505 篇 化学工程与技术
    • 2,357 篇 仪器科学与技术
    • 2,108 篇 安全科学与工程
    • 1,865 篇 交通运输工程
    • 1,795 篇 材料科学与工程(可...
  • 24,855 篇 理学
    • 12,140 篇 数学
    • 7,686 篇 物理学
    • 6,125 篇 生物学
    • 3,784 篇 统计学(可授理学、...
    • 2,768 篇 化学
    • 2,467 篇 系统科学
  • 13,219 篇 管理学
    • 8,473 篇 管理科学与工程(可...
    • 5,409 篇 图书情报与档案管...
    • 3,449 篇 工商管理
  • 4,585 篇 医学
    • 3,711 篇 临床医学
    • 3,312 篇 基础医学(可授医学...
    • 2,130 篇 公共卫生与预防医...
    • 1,975 篇 药学(可授医学、理...
  • 2,215 篇 法学
  • 1,359 篇 经济学
  • 1,283 篇 农学
  • 763 篇 教育学
  • 347 篇 文学
  • 209 篇 军事学
  • 138 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 2,821 篇 accuracy
  • 2,496 篇 deep learning
  • 2,258 篇 feature extracti...
  • 1,843 篇 machine learning
  • 1,751 篇 training
  • 1,665 篇 computational mo...
  • 1,578 篇 educational inst...
  • 1,462 篇 real-time system...
  • 1,430 篇 internet of thin...
  • 1,344 篇 convolutional ne...
  • 1,336 篇 predictive model...
  • 1,244 篇 support vector m...
  • 1,232 篇 computer science
  • 1,115 篇 optimization
  • 973 篇 security
  • 949 篇 data models
  • 909 篇 data mining
  • 886 篇 artificial intel...
  • 812 篇 neural networks
  • 790 篇 cloud computing

机构

  • 1,222 篇 college of compu...
  • 1,062 篇 college of compu...
  • 1,033 篇 department of ph...
  • 1,011 篇 cavendish labora...
  • 984 篇 college of compu...
  • 982 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 704 篇 college of compu...
  • 675 篇 university of ch...
  • 620 篇 infn sezione di ...
  • 613 篇 infn laboratori ...
  • 598 篇 infn sezione di ...
  • 588 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 540 篇 department of ph...
  • 538 篇 imperial college...
  • 536 篇 school of physic...
  • 518 篇 h.h. wills physi...

作者

  • 277 篇 barter w.
  • 264 篇 a. gomes
  • 246 篇 c. alexa
  • 246 篇 beiter a.
  • 244 篇 j. m. izen
  • 239 篇 bellee v.
  • 237 篇 s. chen
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 235 篇 blake t.
  • 234 篇 brundu d.
  • 227 篇 g. spigo
  • 225 篇 amato s.
  • 225 篇 bencivenni g.
  • 224 篇 betancourt c.
  • 223 篇 bay a.
  • 222 篇 bowcock t.j.v.
  • 222 篇 borsato m.

语言

  • 58,180 篇 英文
  • 14,847 篇 其他
  • 1,171 篇 中文
  • 47 篇 日文
  • 16 篇 斯洛文尼亚文
  • 14 篇 德文
  • 14 篇 法文
  • 4 篇 阿拉伯文
  • 3 篇 朝鲜文
  • 1 篇 西班牙文
检索条件"机构=College of Software Engineering and College of Computer Science and Technology"
74032 条 记 录,以下是291-300 订阅
排序:
Sparse Adversarial Learning for FDIA Attack Sample Generation in Distributed Smart
收藏 引用
computer Modeling in engineering & sciences 2024年 第5期139卷 2095-2115页
作者: Fengyong Li Weicheng Shen Zhongqin Bi Xiangjing Su College of Computer Science and Technology Shanghai University of Electric PowerShanghai201306China College of Electrical Engineering Shanghai University of Electric PowerShanghai201306China
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad *** FDIA detection methods usually employ complex neural networkmod... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
A Multimodal Micro-gesture Classification Model Based on CLIP
A Multimodal Micro-gesture Classification Model Based on CLI...
收藏 引用
2024 IJCAI Workshop and Challenge on Micro-Gesture Analysis for Hidden Emotion Understanding, MiGA 2024
作者: Wang, Yiwen Dong, Zhenyang Li, Pengxia Liu, Yujie College of Computer Science and Technology Qingdao Software College China University of Petroleum Qingdao266580 China
This paper primarily introduces our approach in the 2nd MiGA-IJCAI Challenge Track 1, which focuses on micro-gesture recognition. The micro-gesture dataset has the characteristics of small action amplitude, short dura... 详细信息
来源: 评论
Enhancing Interest Message Forwarding in NDN-based VANETs using Black Hole Optimization  2
Enhancing Interest Message Forwarding in NDN-based VANETs us...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Devi, S. Padma Dhanalakshmi, K. Velammal College of Engineering and Technology Department of Computer Science and Engineering Madurai India Psna College of Engineering and Technology Department of Computer Science and Engineering Dindigul India
In Intelligent Transportation Systems (ITS) and smart cities, Vehicular Ad hoc Networks (VANETs) are vital but face challenges due to their dynamic topology, making traditional IP-based content retrieval impractical. ... 详细信息
来源: 评论
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs  22
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lu, Jincheng Cai, Miao Ye, Baoliu Hohai University College of Computer Science and Software Engineering Nanjing China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
High fan-out requests are prevalent in systems employing multi-tier architectures. These requests are divided into several sub-requests for parallel processing. However, a high fan-out request must await all sub-reque... 详细信息
来源: 评论
An implementation of personalized therapy in Clinical Decision Support System using adaptive transformer and hybrid deep learning network
收藏 引用
Australian Journal of Electrical and Electronics engineering 2025年 第1期22卷 105-120页
作者: Praveena Rachel Kamala, S. T, Saraswathi. Kaliraj, V. Nithya, A. Hema, R. Ramyadevi, R. Department of Information Technology Easwari Engineering college Tamil Nadu Chennai India Department of CSE S.A Engineering College Tamil Nadu Chennai India Department of Computer Science and Engineering St.Joseph’s College of Engineering Tamil Nadu Chennai India Department of Electronics and Communication Engineering Easwari Engineering College Tamil Nadu Chennai India Department of Computer Science and Applications SRM Institute of Science and Technology Tamil Nadu Chennai India
This paper suggests a new mechanism from deep learning concept for personalised therapy in Clinical Decision Support Systems (CDSS). Basically, the texts used for the observation are acquired from the standard data so... 详细信息
来源: 评论
Deeply‐Recursive Attention Network for video steganography
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第4期8卷 1507-1523页
作者: Jiabao Cui Liangli Zheng Yunlong Yu Yining Lin Huajian Ni Xin Xu Zhongfei Zhang College of Computer Science and Technology Zhejiang UniversityHangzhouChina School of Software Technology Zhejiang UniversityNingboChina College of Information Science and Electronic Engineering Zhejiang UniversityHangzhouChina Shanghai SUPREMIND Technology Co. Ltd.ShanghaiChina College of Intelligence Science and Technology National University of Defense TechnologyChangshaChina Department of Computer Science Binghamton UniversityBinghamtonNew YorkUSA
Video steganography plays an important role in secret communication that conceals a secret video in a cover video by perturbing the value of pixels in the cover *** is the first and foremost requirement of any stegano... 详细信息
来源: 评论
Optimized Visual Recognition Through a Deep Convolutional Neural Network With Hierarchical Modular Organization
收藏 引用
IEEE Access 2024年 12卷 95517-95528页
作者: Clinton Sitepu, Ade Liu, Chuan-Ming National Taipei University of Technology College of Electrical Engineering and Computer Science Taipei10608 Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ... 详细信息
来源: 评论
A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-20页
作者: Kalpana, Ponugoti Tappari, Sunitha Smitha, L. Madhavi, Dasari Naresh, K. Vijayalakshmi, Maddala Department of Computer Science and Engineering AVN Institute of Engineering and Technology Telangana Hyderabad501510 India Department of Electronics and Telematics Engineering G Narayanamma Institute of Technology and Science Telangana Hyderabad India Department of Information Technology G Narayanamma Institute of Technology and Science Telangana Hyderabad India Sridevi Women’s Engineering College Telangana Hyderabad India Department of Computer Science and Engineering TKR College of Engineering & Technology Telangana Hyderabad500097 India
Healthcare 4.0 is considered to be the most resilient technology with the integration of Internet of Things (IoT), Artificial Intelligence (AI), and 5G wireless communication. These Internet-enabled devices compile hu... 详细信息
来源: 评论
ECOSAUR - Empowering Sustainable Choices: A Mobile Application for Carbon Footprint Awareness and Mitigation
ECOSAUR - Empowering Sustainable Choices: A Mobile Applicati...
收藏 引用
2025 International Conference on Artificial Intelligence and Data engineering, AIDE 2025
作者: Arunasakthi, K. Akilandeswari, V. Girisha Malni, N. Arun, S.K. Yamuna, B. Velammal College of Engineering and Technology Computer Science and Engineering Madurai India
Climate change poses a critical global challenge, requiring urgent action to mitigate its impacts. One of the most effective ways to address this issue is by empowering individuals to make sustainable lifestyle choice... 详细信息
来源: 评论