咨询与建议

限定检索结果

文献类型

  • 6,261 篇 会议
  • 3,443 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 9,739 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,013 篇 工学
    • 4,281 篇 计算机科学与技术...
    • 3,318 篇 软件工程
    • 1,619 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 630 篇 电子科学与技术(可...
    • 624 篇 电气工程
    • 494 篇 生物工程
    • 401 篇 机械工程
    • 304 篇 仪器科学与技术
    • 274 篇 网络空间安全
    • 273 篇 生物医学工程(可授...
    • 264 篇 光学工程
    • 212 篇 动力工程及工程热...
    • 210 篇 化学工程与技术
    • 172 篇 交通运输工程
    • 171 篇 安全科学与工程
    • 151 篇 材料科学与工程(可...
  • 2,791 篇 理学
    • 1,454 篇 数学
    • 817 篇 物理学
    • 560 篇 生物学
    • 434 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 218 篇 化学
  • 1,649 篇 管理学
    • 1,058 篇 管理科学与工程(可...
    • 643 篇 图书情报与档案管...
    • 385 篇 工商管理
  • 263 篇 法学
    • 171 篇 社会学
  • 253 篇 医学
    • 199 篇 临床医学
    • 167 篇 基础医学(可授医学...
  • 146 篇 经济学
    • 146 篇 应用经济学
  • 131 篇 教育学
  • 70 篇 农学
  • 53 篇 军事学
  • 43 篇 文学
  • 20 篇 艺术学

主题

  • 241 篇 feature extracti...
  • 221 篇 computational mo...
  • 210 篇 computer network...
  • 205 篇 computer science
  • 192 篇 semantics
  • 172 篇 internet
  • 162 篇 protocols
  • 152 篇 deep learning
  • 150 篇 accuracy
  • 146 篇 bandwidth
  • 138 篇 wireless sensor ...
  • 134 篇 routing
  • 127 篇 data mining
  • 121 篇 servers
  • 118 篇 quality of servi...
  • 116 篇 security
  • 111 篇 educational inst...
  • 111 篇 optimization
  • 108 篇 throughput
  • 107 篇 predictive model...

机构

  • 204 篇 computer network...
  • 197 篇 shandong provinc...
  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 146 篇 yerevan physics ...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 key laboratory o...
  • 143 篇 academy of scien...
  • 141 篇 charles universi...
  • 137 篇 università di to...
  • 137 篇 rwth aachen univ...
  • 136 篇 imperial college...
  • 136 篇 university of de...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 128 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 8,681 篇 英文
  • 793 篇 其他
  • 280 篇 中文
  • 3 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Network Technology"
9739 条 记 录,以下是31-40 订阅
排序:
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
收藏 引用
computer Modeling in Engineering & Sciences 2025年 第4期143卷 639-671页
作者: Noveela Iftikhar Mujeeb Ur Rehman Mumtaz Ali Shah Mohammed J.F.Alenazi Jehad Ali Knowledge Unit of Systems and Technology University of Management and TechnologySialkot51310Pakistan Department of Computer Science University ofWahWah Cantt47010Pakistan Department of Computer Engineering College of Computer and Information Sciences(CCIS)King Saud UniversityRiyadh11451Saudi Arabia Department of AI Convergence Network Ajou UniversitySuwon16499Republic of Korea
Intrusion attempts against Internet of Things(IoT)devices have significantly increased in the last few *** devices are now easy targets for hackers because of their built-in security *** a Self-Organizing Map(SOM)hybr... 详细信息
来源: 评论
Double-branch fusion network with a parallel attention selection mechanism for camouflaged object detection
收藏 引用
Science China(Information Sciences) 2023年 第6期66卷 258-266页
作者: Junjiang XIANG Qing PAN Zhengrong ZHANG Songnian FU Yuwen QIN Advanced Institute of Photonics Technology School of Information EngineeringGuangdong University of Technology Guangdong Provincial Key Laboratory of Photonics Information Technology Guangdong University of Technology Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and InformationGuangxi University
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel... 详细信息
来源: 评论
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 248-261页
作者: LI Yumei ZHANG Futai School of Computer Science Hubei University of Technology Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University
As an emerging technology, cloud-assisted wireless body area networks(WBANs) provide more convenient services to users. Recently, many remote data auditing protocols have been proposed to ensure the data integrity and... 详细信息
来源: 评论
DRSC: Dual-Reweighted Siamese Contrastive Learning network for Cross-Domain Rotating Machinery Fault Diagnosis With Multi-Source Domain Imbalanced Data
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23678-23693页
作者: Bi, Yuanguo Fu, Rao Jiang, Cunyu Zhang, Xiaoling Li, Fengyun Zhao, Liang Han, Guangjie Northeastern University School of Computer Science and Engineering Shenyang110169 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110169 China Shenyang University of Technology Institute of Artificial Intelligence Shenyang110870 China Shenyang Aerospace University School of Computer Science Shenyang110135 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education China
To enhance the reliability of rotating machinery, cross-domain fault diagnosis becomes vital for detecting faults under unknown operating conditions. However, multi-source domain imbalanced data present significant ch... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
A Malicious Domain Detection Method Based on DNS Logs  4
A Malicious Domain Detection Method Based on DNS Logs
收藏 引用
4th International Conference on Blockchain technology and Information Security, ICBCTIS 2024
作者: Ma, SiQi Pang, Tong Cui, Rui Yang, DeQuan School of Computer Science Beijing Institute of Technology Beijing China Beijing Institute of Technology Network Information Technology Center Beijing China
As the Internet continues to expand rapidly, the threat posed by malicious domain names to network security is on the rise. Cybercriminals exploit these domains to launch attacks such as malware infections, phishing s... 详细信息
来源: 评论
Towards Image-Based network Traffic Pattern Detection for DDoS Attacks in Cloud Computing Environments: A Comparative Study  14
Towards Image-Based Network Traffic Pattern Detection for DD...
收藏 引用
14th International Conference on Cloud Computing and Services Science, CLOSER 2024
作者: Abdullah, Azizol Bouke, Mohamed Aly Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia
With the increasing adoption of cloud computing and the emergence of Industry 4.0, the need for robust intrusion detection mechanisms to safeguard cloud-based systems against Distributed Denial of Services Attacks (DD... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Named Entity Recognition in Electronic Medical Records Incorporating Pre-trained and Multi-Head Attention
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2024年 第4期51卷 401-408页
作者: Yang, Haotian Wang, Li Yang, Yanpeng School of Computer Science and Software Engineering University of Science and Technology Liaoning CO Anshan114051 China College of Computer Science and Software Engineering University of Science and Technology Liaoning CO Anshan114051 China Network Information Centre University of Science and Technology Liaoning CO Anshan114051 China
Chinese Named Entity Recognition (NER) for Electronic Medical Records (EMR) is a fundamental task in building a digital hospital and is widely considered to be a sequence annotation problem in the Natural Language Pro... 详细信息
来源: 评论
Ground Penetrating Radar Image De-Noising Method Based on Multi-Noise and Self-Supervised Learning  5
Ground Penetrating Radar Image De-Noising Method Based on Mu...
收藏 引用
5th International Conference on Intelligent Control, Measurement and Signal Processing, ICMSP 2023
作者: Huang, Yaoxin Zhou, Wenlong School of Computer and Network Security Chengdu University of Technology Chengdu China
The quality of ground penetrating radar (GPR) images is usually low due to unwanted noise interference such as antenna coupling, soil reflection, and industrial frequency interference, which often affects subsequent s... 详细信息
来源: 评论