咨询与建议

限定检索结果

文献类型

  • 3,765 篇 会议
  • 1,659 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 5,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,313 篇 工学
    • 2,296 篇 计算机科学与技术...
    • 1,899 篇 软件工程
    • 850 篇 信息与通信工程
    • 524 篇 控制科学与工程
    • 402 篇 电气工程
    • 393 篇 生物工程
    • 340 篇 电子科学与技术(可...
    • 298 篇 生物医学工程(可授...
    • 263 篇 光学工程
    • 252 篇 机械工程
    • 205 篇 化学工程与技术
    • 199 篇 网络空间安全
    • 173 篇 安全科学与工程
    • 168 篇 仪器科学与技术
    • 167 篇 动力工程及工程热...
    • 149 篇 材料科学与工程(可...
    • 147 篇 交通运输工程
  • 1,888 篇 理学
    • 885 篇 数学
    • 664 篇 物理学
    • 428 篇 生物学
    • 307 篇 统计学(可授理学、...
    • 219 篇 化学
    • 177 篇 系统科学
  • 962 篇 管理学
    • 614 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 270 篇 医学
    • 206 篇 临床医学
    • 204 篇 基础医学(可授医学...
    • 137 篇 公共卫生与预防医...
  • 165 篇 法学
    • 135 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 47 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 204 篇 accuracy
  • 174 篇 deep learning
  • 140 篇 feature extracti...
  • 132 篇 computational mo...
  • 126 篇 training
  • 124 篇 machine learning
  • 100 篇 hadron colliders
  • 100 篇 convolutional ne...
  • 99 篇 predictive model...
  • 91 篇 support vector m...
  • 91 篇 real-time system...
  • 90 篇 data models
  • 78 篇 security
  • 77 篇 artificial intel...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 68 篇 data mining
  • 68 篇 cloud computing
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 134 篇 yerevan physics ...
  • 131 篇 national and kap...
  • 131 篇 centro brasileir...
  • 131 篇 istanbul technic...
  • 129 篇 university of sp...
  • 129 篇 indian institute...
  • 128 篇 universidad iber...
  • 127 篇 brunel universit...
  • 126 篇 università di to...
  • 126 篇 academy of scien...
  • 126 篇 infn sezione di ...
  • 125 篇 charles universi...
  • 125 篇 zhejiang univers...
  • 124 篇 department of ph...
  • 123 篇 infn sezione di ...
  • 122 篇 university of de...
  • 120 篇 imperial college...
  • 120 篇 rwth aachen univ...
  • 118 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,152 篇 英文
  • 230 篇 其他
  • 82 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5464 条 记 录,以下是51-60 订阅
排序:
Data Exchange for SysML: A Review  4th
Data Exchange for SysML: A Review
收藏 引用
4th International Conference on Mechanical Design and Simulation, MDS 2024
作者: Zhou, Chen An, Baoran Yu, Bin Li, Suicheng Institute of Computer Application China Academy of Engineering Physics Mian Yang621900 China
In the practice of Model-Based Systems engineering (MBSE), where SysML models serve as the foundation for system integration frameworks, the maintenance of consistency of shared information across system models and ot... 详细信息
来源: 评论
DLD: Defending Against Backdoors Using Differential Logits  6
DLD: Defending Against Backdoors Using Differential Logits
收藏 引用
6th IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2024
作者: Yi, Ming Wang, Yulong Deng, Kai Yin, Mingyong Meng, Fanzhi Duan, Yubing China Academy of Engineering Physics Institute of Computer Application Mianyang621900 China
The existing research has shown that deep learning models are vulnerable to backdoor attacks, in which malicious actors can manipulate the model's predictions by embedding backdoors. As the stealthiness of these b... 详细信息
来源: 评论
A Random Walk-Based Approach for Clustering of Food Items  2nd
A Random Walk-Based Approach for Clustering of Food Items
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Das, Priyanka Bhattacharya, Rupam Department of Computer Application Institute of Engineering and Management West Bengal Kolkata India
Most of the recipe sites have a distinct page structure comprising a title, list of ingredients, preparation instructions, comments, and thus it is very challenging to cluster similar recipes. The work presented here ... 详细信息
来源: 评论
A Crime Knowledge Discovery Scheme Based on Entity Recognition, Relation Extraction, and Development of Criminal Profiling Using Modus Operandi  11th
A Crime Knowledge Discovery Scheme Based on Entity Recognit...
收藏 引用
11th International Conference on Intelligent Computing and applications, ICRTC 2023
作者: Das, Priyanka Dhar, Sayan Banerjee, Shreedatri Basak, Shirsha Nandi, Sneha Saha, Sneha Department of Computer Application Institute of Engineering and Management West Bengal Kolkata India
In this paper, a criminal knowledge discovery scheme is proposed for analysing the crime situation in India. The approach pulls information regarding crime against women in Indian states and union territories from a s... 详细信息
来源: 评论
Pruning Optimization of Deep Learning Model Based on Generalization Estimation
Pruning Optimization of Deep Learning Model Based on General...
收藏 引用
2024 International Conference on Artificial Intelligence, Deep Learning and Neural Networks, AIDLNN 2024
作者: Li, Xuanzhe Ke, Wenjun Wen, Wantao Liu, Shaotong Sheng, Xiaojuan School of Computer Science and Engineering Southeast University China Beijing Institute of Computer Technology and Application China
Existing research has shown that deep learning models contain considerable redundancy, requiring compression optimization to eliminate unnecessary parameters and improve computational efficiency. In model compression ... 详细信息
来源: 评论
A Few-Shot Semantic Segmentation Network with Mixed Prototypes and Base Learner  7
A Few-Shot Semantic Segmentation Network with Mixed Prototyp...
收藏 引用
7th IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2024
作者: Wang, Han Meng, Ziyang Zhang, Yakun Institute of Computer Application China Academy of Engineering Physics Sichuan 621900 China
Few-shot semantic segmentation methods aim to segment new object categories with limited labeled samples. Existing approaches struggle to extract comprehensive semantic matching information from target regions and mit... 详细信息
来源: 评论
Classification of Foods based on Bijective Soft Set  15
Classification of Foods based on Bijective Soft Set
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Das, Priyanka Bhattacharya, Rupam Dept. of Computer Application and Science Institute of Engineering & Management Kolkata India
Cuisine data is typically classified using images of the cuisine, cooking methods, cooking utensils, and, most importantly, ingredients. The vast amount of recipe data available on the internet necessitates the creati... 详细信息
来源: 评论
Research on Program Change Impact Analysis Methods Based on Software Networks  24
Research on Program Change Impact Analysis Methods Based on ...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Li, Shiyong Deng, Fei Guo, Xinglin Sun, Zhenxiao Zou, Zhuoliang Institute of Computer Application China Academy of Engineering Physics Sichuan Mianyang China
Aiming at the problem that the current program change impact analysis methods have coarse calculation granularity and without considering the actual situation of program change, results in overstating the impact propa... 详细信息
来源: 评论
Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
收藏 引用
Multimedia Tools and applications 2025年 第15期84卷 14273-14304页
作者: Anoop, M. Mary, L. William Wilson, Allan J. Kiran, W.S. Department of Computer Science and Application SRM Institute of Science and Technology Ramapuram campus Chennai600089 India Department of Electronics and Communication Engineering Amrita College of Engineering and Technology Nagercoil India
In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique challenges due to their limited resources and diverse composition, high c... 详细信息
来源: 评论
A Graph Based Approach For Detecting Sybil Node In Online Social Networks  15
A Graph Based Approach For Detecting Sybil Node In Online So...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Chandra, Sucheta Das, Priyanka Institute of Engineering & Management Dept. of Computer Application and Science Kolkata India
Sybil attacks pose a significant threat to the security and integrity of online social networks by allowing malicious actors to create multiple fake identities to manipulate network behavior. The abstract outlines a m... 详细信息
来源: 评论