咨询与建议

限定检索结果

文献类型

  • 1,927 篇 会议
  • 1,702 篇 期刊文献
  • 50 册 图书

馆藏范围

  • 3,679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,364 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,203 篇 软件工程
    • 574 篇 信息与通信工程
    • 370 篇 电子科学与技术(可...
    • 357 篇 电气工程
    • 346 篇 控制科学与工程
    • 340 篇 生物工程
    • 322 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 178 篇 化学工程与技术
    • 141 篇 机械工程
    • 138 篇 仪器科学与技术
    • 122 篇 动力工程及工程热...
    • 113 篇 材料科学与工程(可...
    • 64 篇 建筑学
    • 60 篇 土木工程
  • 1,461 篇 理学
    • 633 篇 数学
    • 534 篇 物理学
    • 388 篇 生物学
    • 215 篇 统计学(可授理学、...
    • 203 篇 化学
    • 131 篇 系统科学
  • 525 篇 管理学
    • 287 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 288 篇 医学
    • 233 篇 临床医学
    • 205 篇 基础医学(可授医学...
    • 135 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 94 篇 法学
    • 75 篇 社会学
  • 47 篇 经济学
  • 45 篇 农学
  • 32 篇 教育学
  • 12 篇 文学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 78 篇 machine learning
  • 69 篇 training
  • 68 篇 deep learning
  • 56 篇 artificial intel...
  • 51 篇 feature extracti...
  • 45 篇 semantics
  • 44 篇 computational mo...
  • 43 篇 neural networks
  • 38 篇 optimization
  • 37 篇 robustness
  • 36 篇 bandwidth
  • 35 篇 computer archite...
  • 31 篇 predictive model...
  • 30 篇 reinforcement le...
  • 30 篇 wireless communi...
  • 30 篇 accuracy
  • 28 篇 internet of thin...
  • 28 篇 visualization
  • 28 篇 costs
  • 27 篇 protocols

机构

  • 38 篇 department of el...
  • 22 篇 zhejiang enginee...
  • 20 篇 tencent ai lab
  • 19 篇 microsoft resear...
  • 19 篇 department of co...
  • 18 篇 national enginee...
  • 17 篇 yonsei frontier ...
  • 17 篇 department of co...
  • 17 篇 department of co...
  • 16 篇 national mobile ...
  • 15 篇 university of sc...
  • 15 篇 zhejiang lab
  • 14 篇 college of compu...
  • 14 篇 research center ...
  • 13 篇 department of el...
  • 13 篇 cognitive applic...
  • 12 篇 imsight ai resea...
  • 12 篇 department of co...
  • 12 篇 university of ch...
  • 12 篇 department of co...

作者

  • 21 篇 chen hao
  • 19 篇 yu kai
  • 19 篇 mirjalili seyeda...
  • 18 篇 timofte radu
  • 17 篇 dezfouli behnam
  • 17 篇 shiqiang zhu
  • 16 篇 zhu shiqiang
  • 15 篇 paul aditya jyot...
  • 15 篇 li haizhou
  • 14 篇 lannon john m.
  • 14 篇 jason gu
  • 14 篇 jin hai
  • 13 篇 maier andreas
  • 13 篇 hai jin
  • 12 篇 bakas spyridon
  • 12 篇 rashid tarik a.
  • 12 篇 yang yang
  • 12 篇 gu jason
  • 11 篇 wang shuai
  • 11 篇 lin lanfen

语言

  • 3,452 篇 英文
  • 190 篇 其他
  • 36 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Engineering Research Lab EECS Department"
3679 条 记 录,以下是201-210 订阅
排序:
A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks  15
A Trust Based DNS System to Prevent Eclipse Attack on Blockc...
收藏 引用
15th IEEE International Conference on Security of Information and Networks, SIN 2022
作者: Yildiz, Ali Kerem Atmaca, Aykut Solak, Ali Ozgur Tursun, Yekta Can Bahtiyar, Serif Istanbul Technical University Ayazaga Campus Cyber Security and Privacy Research Lab SPFLab Department of Computer Engineering Maslak Istanbul Turkey
The blockchain network is often considered a reliable and secure network. However, some security attacks, such as eclipse attacks, have a significant impact on blockchain networks. In order to perform an eclipse attac... 详细信息
来源: 评论
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT
收藏 引用
Digital Communications and Networks 2022年 第6期8卷 900-910页
作者: M.S.Mekala Gautam Srivastava Ju H.Park Ho-Youl Jung Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38544South Korea RLRC LAb for Autonomous Vehicle Parts and Materials Innovation Yeungnam UniversityGyeongsan38544South Korea Department of Math and Computer Science Brandon UniversityBrandonCanada Department of Electrical Engineering Yeungnam UniversityGyeongsanSouth Korea Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina
Social Edge Service(SES)is an emerging mechanism in the Social Internet of Things(SIoT)orchestration for effective user-centric reliable communication and *** services are affected by active and/or passive attacks suc... 详细信息
来源: 评论
Characterizing Speed Performance of Multi-Agent Reinforcement Learning∗
Characterizing Speed Performance of Multi-Agent Reinforcemen...
收藏 引用
12th International Conference on Data Science, Technology and Applications, DATA 2023
作者: Wiggins, Samuel Meng, Yuan Kannan, Rajgopal Prasanna, Viktor Ming Hsieh Department of Electrical and Computer Engineering University of Southern California Los Angeles United States DEVCOM Army Research Lab Los Angeles United States
Multi-Agent Reinforcement Learning (MARL) has achieved significant success in large-scale AI systems and big-data applications such as smart grids, surveillance, etc. Existing advancements in MARL algorithms focus on ... 详细信息
来源: 评论
Towards Cluster-Based Split Federated Learning Approach for Continuous User Authentication  7
Towards Cluster-Based Split Federated Learning Approach for ...
收藏 引用
7th Cyber Security in Networking Conference, CSNet 2023
作者: Wazzeh, Mohamad Arafeh, Mohamad Ould-Slimane, Hakima Talhi, Chamseddine Mourad, Azzam Otrok, Hadi Department of Software and It Engineering Montreal Canada Department of Mathematics and Computer Science Trois-Rivières Canada Cyber Security Systems and Applied Ai Research Center Lebanese American University Department of Csm Beirut Lebanon New York University Division of Science Abu Dhabi United Arab Emirates Khalifa University Department of Eecs Abu Dhabi United Arab Emirates
In today's rapidly evolving technological landscape, ensuring the security of systems requires continuous authentication over sessions and comprehensive access management during user interaction with a device. Wit... 详细信息
来源: 评论
Probabilistic Graph Modeling based Safety Classifier Algorithm for Smart Transportation
Probabilistic Graph Modeling based Safety Classifier Algorit...
收藏 引用
2023 International Symposium on Green Technologies and Applications, ISGTA 2023
作者: Karkouri, Najib El Tigani, Smail Saadane, Rachid Chehri, Abdelah Pierre, Samuel Neya, Noureddine Mathematics and Informatics Lab Faculty of Sciences University Ibno Toufial Kenitra Morocco Research and Development Unit Accsellium LLC Fez Morocco SIRC-LaGeS Hassania School of Public Labors Casablanca20250 Morocco Department of Mathematics and Computer Science Royal Military College of Canada Kingston Canada Department of Computer and Software Engineering Polytechnique Montreal Canada
This research introduces a novel Probabilistic Graph Modeling-based Safety Classifier Algorithm designed for the purpose of classifying road safety in smart transportation systems. Leveraging a combination of numerica... 详细信息
来源: 评论
Optimization of 5G Antenna Using Machine Learning
Optimization of 5G Antenna Using Machine Learning
收藏 引用
IEEE Middle East and North Africa Communications Conference (MENACOMM)
作者: Aline Hassan Aya Sharanek Rayan Hamzeh Dina Serhal Rached Zantout Electrical and Computer Engineering Department American University of Beirut Beirut Lebanon Electrical and Computer Engineering Department Rafik Hariri University Mechref Lebanon EFREI Research Lab EFREI Paris Paris France
This paper presents a machine learning (ML)-based approach to optimize 5G base station patch antennas operating in the 3.3-4.2 GHz range. Traditional antenna design methods are often complex and time-consuming, partic... 详细信息
来源: 评论
Big Data Value Graph: Enhancing Security and Generating New Value from Big Data
Big Data Value Graph: Enhancing Security and Generating New ...
收藏 引用
2023 Italian Conference on Cyber Security, ITASEC 2023
作者: Gervasi, Massimiliano Totaro, Nicolò G. Fornaio, Anna Caivano, Danilo Department of Innovation Engineering University of Salento Lecce Italy University of Salento Lecce Italy Cybersecurity Research Lab - CRLab University of Salento Lecce Italy Department of Computer Science University of Bari "Aldo Moro" Bari Italy
The opportunity to extract value from data has become a key capability for organisations, especially with the spread of Big Data. The Data Mesh is a model that proposes a solution for Big Data management. In this pape... 详细信息
来源: 评论
An Efficient Attention-Based Strategy for Anomaly Detection in Surveillance Video
收藏 引用
computer Systems Science & engineering 2023年 第9期46卷 3939-3958页
作者: Sareer Ul Amin Yongjun Kim Irfan Sami Sangoh Park Sanghyun Seo Department of Computer Science and Engineering Chung-Ang UniversitySeoul06974Korea Intelligent Convergence Research Lab. ETRIDaeJeon34129Korea Department of Electrical and Electronics Engineering Chung-Ang UniversitySeoul06974Korea College of Art and Technology Chung-Ang UniversityAnseong17546Korea
In the present technological world,surveillance cameras generate an immense amount of video data from various sources,making its scrutiny tough for computer vision *** is difficult to search for anomalous events manua... 详细信息
来源: 评论
Automatic Assistance to Mitigate Rollback Inconsistencies in Collaborative Edits
Research Square
收藏 引用
research Square 2025年
作者: Mondal, Saikat Uddin, Gias Roy, Chanchal K. York University Canada Software Research Lab Department of Computer Science University of Saskatchewan Canada Lab Department of Electrical and Software Engineering University of Calgary Canada
The success of technical Q&A sites such as Stack Overflow depends on two key factors: (a) active user participation and (b) the quality of the shared knowledge. Stack Overflow introduced an edit system that allows...
来源: 评论
Efficient Optimization in RIS-Assisted UAV System Using Deep Reinforcement Learning for mmWave-NOMA 6G Communications
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Sobhi-Givi, Sima Nouri, Mahdi Shayesteh, Mahrokh G. Behroozi, Hamid Kwon, Hyun Han Piran, Md. Jalil Urmia University Electrical and Computer Engineering Department Urmia Iran University of Mohaghegh Ardabili Electrical and Computer Engineering Department Ardabil Iran Sharif University of Technology Electrical Engineering Department Tehran Iran Sharif University of Technology Wireless Research Lab ACRI Electrical Engineering Department Tehran Iran Sejong University Department of Civil and Environmental Engineering Seoul05006 Korea Republic of Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
In the evolving landscape of wireless communications for 5G, 6G, and beyond, the deployment of unmanned aerial vehicles (UAVs) has emerged as a groundbreaking strategy to expand coverage areas due to their flexibility... 详细信息
来源: 评论