咨询与建议

限定检索结果

文献类型

  • 33,883 篇 会议
  • 11,541 篇 期刊文献
  • 351 册 图书

馆藏范围

  • 45,775 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26,814 篇 工学
    • 17,437 篇 计算机科学与技术...
    • 13,782 篇 软件工程
    • 9,266 篇 信息与通信工程
    • 5,037 篇 电子科学与技术(可...
    • 4,154 篇 电气工程
    • 4,121 篇 控制科学与工程
    • 2,714 篇 生物工程
    • 2,202 篇 光学工程
    • 2,080 篇 生物医学工程(可授...
    • 1,956 篇 机械工程
    • 1,906 篇 仪器科学与技术
    • 1,683 篇 动力工程及工程热...
    • 1,210 篇 化学工程与技术
    • 1,164 篇 网络空间安全
    • 1,085 篇 安全科学与工程
    • 994 篇 交通运输工程
    • 909 篇 材料科学与工程(可...
  • 13,702 篇 理学
    • 6,799 篇 数学
    • 4,595 篇 物理学
    • 3,014 篇 生物学
    • 2,238 篇 统计学(可授理学、...
    • 1,461 篇 系统科学
    • 1,292 篇 化学
  • 6,471 篇 管理学
    • 4,279 篇 管理科学与工程(可...
    • 2,470 篇 图书情报与档案管...
    • 1,846 篇 工商管理
  • 2,101 篇 医学
    • 1,730 篇 临床医学
    • 1,559 篇 基础医学(可授医学...
    • 1,008 篇 公共卫生与预防医...
    • 910 篇 药学(可授医学、理...
  • 1,084 篇 法学
  • 728 篇 经济学
  • 555 篇 农学
  • 345 篇 教育学
  • 250 篇 文学
  • 139 篇 军事学
  • 74 篇 艺术学
  • 6 篇 历史学
  • 5 篇 哲学

主题

  • 1,172 篇 accuracy
  • 1,043 篇 feature extracti...
  • 953 篇 deep learning
  • 839 篇 internet of thin...
  • 783 篇 computational mo...
  • 685 篇 real-time system...
  • 681 篇 wireless sensor ...
  • 674 篇 training
  • 673 篇 computer science
  • 669 篇 machine learning
  • 661 篇 wireless communi...
  • 588 篇 bandwidth
  • 581 篇 optimization
  • 539 篇 convolutional ne...
  • 461 篇 support vector m...
  • 450 篇 predictive model...
  • 448 篇 throughput
  • 431 篇 quality of servi...
  • 430 篇 protocols
  • 429 篇 security

机构

  • 1,055 篇 school of comput...
  • 308 篇 school of comput...
  • 274 篇 school of comput...
  • 207 篇 department of co...
  • 146 篇 school of comput...
  • 131 篇 department of co...
  • 123 篇 school of comput...
  • 117 篇 school of comput...
  • 114 篇 school of comput...
  • 102 篇 school of inform...
  • 98 篇 department of el...
  • 92 篇 school of inform...
  • 88 篇 school of inform...
  • 84 篇 maharishi school...
  • 83 篇 centre of resear...
  • 80 篇 college of compu...
  • 78 篇 school of comput...
  • 69 篇 jiangsu universi...
  • 68 篇 department of co...
  • 66 篇 hubei key labora...

作者

  • 86 篇 niyato dusit
  • 54 篇 gan yong
  • 52 篇 guo hong
  • 48 篇 j. relin francis...
  • 46 篇 leonard barolli
  • 42 篇 chu-sing yang
  • 40 篇 robbi rahim
  • 40 篇 lee su-ling
  • 39 篇 yong gan
  • 37 篇 mekruksavanich s...
  • 36 篇 zhang lei
  • 35 篇 wang lei
  • 35 篇 jinfu chen
  • 32 篇 hnoohom narit
  • 32 篇 li yang
  • 32 篇 shi zhiguo
  • 31 篇 zhiguo shi
  • 31 篇 li li
  • 31 篇 liang qi
  • 31 篇 jitpattanakul an...

语言

  • 42,801 篇 英文
  • 2,288 篇 其他
  • 656 篇 中文
  • 21 篇 日文
  • 17 篇 朝鲜文
  • 8 篇 德文
  • 7 篇 法文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Communication and Computer Engineering"
45775 条 记 录,以下是21-30 订阅
排序:
Fake Face Detection Based on Fusion of Spatial Texture and High-Frequency Noise
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 212-221页
作者: Dengyong Zhang Feifan Qi Jiahao Chen Jiaxin Chen Rongrong Gong Yuehong Tian Lebing Zhang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Changsha University of Science and Technology School of Computer and Communication Engineering Changsha University of Science and Technology Changsha Social Work College Changkuangao Beijing Technology Co. Ltd. School of Computer and Artificial Intelligence Huaihua University
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the... 详细信息
来源: 评论
VoWi-Fi security threats: Address resolution protocol attack and countermeasures
收藏 引用
IET Networks 2024年 第2期13卷 129-146页
作者: Lu, Kuan-Chu Liu, I.-Hsien Chang, Keng-Hao Li, Jung-Shian Department of Electrical Engineering Institute of Computer and Communication Engineering National Cheng Kung University Tainan Taiwan
B5G/6G networks are facing challenges in the deployment of additional base stations. However, Taiwan's four major operators have launched VoWi-Fi calling services to maintain signal quality and coverage for custom... 详细信息
来源: 评论
Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system
收藏 引用
IET Networks 2024年 第5-6期13卷 546-559页
作者: Lu, Kuan-Chu Liu, I-Hsien Liu, Zong-Chao Li, Jung-Shian Department of Electrical Engineering Institute of Computer and Communication Engineering National Cheng Kung University Tainan Taiwan
Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency,... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
Science China(Information Sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Adversarial attacks and defenses for digital communication signals identification
收藏 引用
Digital communications and Networks 2024年 第3期10卷 756-764页
作者: Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China College of Information and Communication Engineering Harbin Engineering UniversityHarbin150000China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849USA
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi... 详细信息
来源: 评论
Intelligent integrated sensing and communication:a survey
收藏 引用
Science China(Information Sciences) 2025年 第3期68卷 5-46页
作者: Jifa ZHANG Weidang LU Chengwen XING Nan ZHAO Naofal AL-DHAHIR George K.KARAGIANNIDIS Xiaoniu YANG School of Information and Communication Engineering Dalian University of Technology College of Information Engineering Zhejiang University of Technology School of Information and Electronics Beijing Institute of Technology Department of Electrical and Computer Engineering The University of Texas at Dallas Department of Electrical and Computer Engineering Aristotle University of Thessaloniki
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
Sentiment analysis algorithm based on word embedding in text mining
收藏 引用
International Journal of Speech Technology 2025年 第1期28卷 141-151页
作者: Hu, Qiong School of Computer and Communication Engineering Nanjing Tech University Pujiang Institute Nanjing210000 China
This study proposes a sentiment analysis algorithm model that combines word embedding and machine learning algorithms to address issues such as data shortage, low accuracy, and limited coverage. The proposed model use... 详细信息
来源: 评论
Preamble slice orderly queue access scheme in cell-free dense communication systems
收藏 引用
Digital communications and Networks 2025年 第1期11卷 126-135页
作者: Jun Sun Mengzhu Guo Jian Liu School of Telecommunications and Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Computer and Communication Engineering University of Science and TechnologyBeijing 100083China
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type communication(MTC)devices in cell-free communication systems,an inte... 详细信息
来源: 评论
An Energy Distribution Correlation Judgment Method for Interrupted Sampling Repeater Jamming Suppression
收藏 引用
Progress In Electromagnetics Research B 2024年 105卷 59-78页
作者: Li, Ji Su, Fan Wang, Wei Yan, Rui Li, Jialiang College of Computer and Communication Engineering Changsha University of Science & Technology Changsha410000 China
Interrupted Sampling Repeater Jamming (ISRJ) can produce several false targets through intermittent sampling and forwarding of the intercepted signals. The paper proposes an interference identification and suppression... 详细信息
来源: 评论