咨询与建议

限定检索结果

文献类型

  • 9,093 篇 会议
  • 8,192 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 17,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,686 篇 工学
    • 8,060 篇 计算机科学与技术...
    • 6,798 篇 软件工程
    • 2,614 篇 信息与通信工程
    • 1,793 篇 生物工程
    • 1,391 篇 控制科学与工程
    • 1,279 篇 电气工程
    • 1,187 篇 生物医学工程(可授...
    • 1,006 篇 光学工程
    • 890 篇 电子科学与技术(可...
    • 582 篇 机械工程
    • 532 篇 化学工程与技术
    • 442 篇 网络空间安全
    • 432 篇 动力工程及工程热...
    • 430 篇 交通运输工程
    • 411 篇 仪器科学与技术
    • 408 篇 安全科学与工程
  • 6,448 篇 理学
    • 3,229 篇 数学
    • 2,042 篇 生物学
    • 1,716 篇 物理学
    • 1,236 篇 统计学(可授理学、...
    • 660 篇 化学
    • 589 篇 系统科学
  • 3,113 篇 管理学
    • 1,764 篇 管理科学与工程(可...
    • 1,484 篇 图书情报与档案管...
    • 895 篇 工商管理
  • 1,128 篇 医学
    • 937 篇 临床医学
    • 851 篇 基础医学(可授医学...
    • 517 篇 药学(可授医学、理...
    • 477 篇 公共卫生与预防医...
  • 558 篇 法学
    • 479 篇 社会学
  • 338 篇 经济学
  • 275 篇 农学
  • 166 篇 教育学
  • 61 篇 文学
  • 31 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 663 篇 deep learning
  • 596 篇 accuracy
  • 440 篇 machine learning
  • 436 篇 feature extracti...
  • 398 篇 computational mo...
  • 384 篇 training
  • 324 篇 predictive model...
  • 323 篇 real-time system...
  • 301 篇 semantics
  • 258 篇 internet of thin...
  • 237 篇 optimization
  • 223 篇 support vector m...
  • 217 篇 convolutional ne...
  • 196 篇 neural networks
  • 193 篇 reinforcement le...
  • 185 篇 data mining
  • 183 篇 data models
  • 159 篇 image segmentati...
  • 145 篇 artificial intel...
  • 144 篇 visualization

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 375 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 306 篇 university of ch...
  • 293 篇 nikhef national ...
  • 292 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 168 篇 bediaga i.
  • 157 篇 baker s.
  • 151 篇 amato s.
  • 147 篇 niyato dusit
  • 147 篇 baryshnikov f.
  • 147 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 16,094 篇 英文
  • 1,200 篇 其他
  • 109 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science & Engineering Data Science"
17386 条 记 录,以下是161-170 订阅
排序:
Real-time distance field acceleration based free-viewpoint video synthesis for large sports fields
收藏 引用
Computational Visual Media 2024年 第2期10卷 331-353页
作者: Yanran Dai Jing Li Yuqi Jiang Haidong Qin Bang Liang Shikuan Hong Haozhe Pan Tao Yang School of Telecommunications Engineering Xidian UniversityXi’an 710071China National Engineering Laboratory for Integrated AeroSpace-Ground-Ocean Big Data Application Technology SAIIPthe School of Computer ScienceNorthwestern Polytechnical UniversityXi’an 710129China
Free-viewpoint video allows the user to view objects from any virtual perspective,creating an immersive visual *** technology enhances the interactivity and freedom of multimedia ***,many free-viewpoint video synthesi... 详细信息
来源: 评论
Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android
收藏 引用
Cyber-Physical Systems 2025年 第1期11卷 1-46页
作者: Khaliq, Zubair Khan, Dawood Ashraf Baba, Asif Iqbal Ali, Shahbaz Farooq, Sheikh Umar Department of Computer Science University of Kashmir Jammu and Kashmir Srinagar India AI Thndr Dubai United Arab Emirates Department of Computer Science Tuskegee University TuskegeeAL United States Data Engineering hyke.ai Dubai United Arab Emirates
Botnets have become a severe security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic, and the ever-larger number of cybercrim... 详细信息
来源: 评论
Optimizing Coverage in Wireless Sensor Networks Using the Tumbleweed Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 250-261页
作者: Zhang, Mengfei Chu, Shu-Chuan Liu, Nengxian Huang, Kuan-Chun Pan, Jeng-Shyang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Department of Industrial and Systems Engineering Chung Yuan Christian University Taoyuan320314 Taiwan School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte... 详细信息
来源: 评论
dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone  23
dTEE: A Declarative Approach to Secure IoT Applications Usin...
收藏 引用
23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024
作者: Sun, Tong Li, Borui Teng, Yixiao Gao, Yi Dong, Wei Zhejiang University The State Key Laboratory of Blockchain and Data Security College of Computer Science China Southeast University School of Computer Science and Engineering China
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu... 详细信息
来源: 评论
Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4322-4343页
作者: Al-Maliki, Shawqi Qayyum, Adnan Ali, Hassan Abdallah, Mohamed Qadir, Junaid Hoang, Dinh Thai Niyato, Dusit Al-Fuqaha, Ala Division College of Science and Engineering Doha34110 Qatar Information Technology University Lahore54000 Pakistan University of New South Wales Sydney Sydney2052 Australia Qatar University Department of Computer Science and Engineering College of Engineering Doha34110 Qatar University of Technology Sydney School of Electrical and Data Engineering Sydney2052 Australia Nanyang Technological University College of Computing and Data Science 639798 Singapore
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have be... 详细信息
来源: 评论
Internet of Brain, Thought, Thinking, and Creation
收藏 引用
Chinese Journal of Electronics 2022年 第6期31卷 1025-1042页
作者: ZHANG Zhimin YIN Rui NING Huansheng School of Computer and Communication Engineering University of Science and Technology Beijing Beijing Engineering Research Center for Cyberspace Data Analysis and Applications
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and... 详细信息
来源: 评论
Less Traces Are All It Takes: Efficient Side-Channel Analysis on AES
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2024年 第6期44卷 2080-2092页
作者: Xiao, Zhiyuan Wang, Chen Shen, Jian Wu, Q. M. Jonathan He, Debiao Zhejiang Sci-Tech University School of Information Science and Engineering School of Cyber Science and Technology the Zhejiang Provincial Key Laboratory of Digital Fashion and Data Governance Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Hangzhou310018 China University of Windsor Department of Electrical and Computer Engineering WindsorON Canada Wuhan University State Key Laboratory of Software Engineering Computer School Wuhan430072 China
In cryptography, side-channel analysis (SCA) is a technique used to recover cryptographic keys by examining the physical leakages that occur during the operation of cryptographic devices. Recent advancements in Deep L... 详细信息
来源: 评论
An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1309-1324页
作者: Junaid Rashid Sumera Kanwal Muhammad Wasif Nisar Jungeun Kim Amir Hussain Department of Computer Science and Engineering Kongju National UniversityCheonan31080Korea Department of Computer Science COMSATS University IslamabadWah CampusIslamabad47040Pakistan Centre of AI and Data Science Edinburgh Napier UniversityEdinburghEH114DYUK
In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given ***,finding the best estimation results in softwar... 详细信息
来源: 评论
Enhancing the blockchain interoperability through federated learning with directed acyclic graph
IET Blockchain
收藏 引用
IET Blockchain 2023年 第4期3卷 238-248页
作者: Xia, Feng Kaiye, Li Songze, Wu yan, Xin Faculty of Data Science City University of Macau Avenida Padre Tomás Pereira China School of Computer Science and Communication Engineering Jiangsu Univestity Zhenjiang China
The use of federated learning to achieve blockchain interoperability has become a hot topic in research, because it enables data exchange without revealing any private information. However, the previous work, such as ... 详细信息
来源: 评论
A Digital Twin and Consensus Empowered Cooperative Control Framework for Platoon-Based Autonomous Driving
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1096-1111页
作者: Jiayu Cao Supeng Leng Kai Xiong Xiaosha Chen School of Information and Communication Engineering University of Electronic Science and Technology of ChinaChengdu 611731China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of ChinaShenzhen 518110China College of Computer Science and Technology and also with College of Data Science Taiyuan University of TechnologyTaiyuan 030024China
Platoon-based autonomous driving is indispensable for traffic automation,but it confronts substantial constraints in rugged terrains with unreliable links and scarce communication *** paper proposes a novel hierarchic... 详细信息
来源: 评论