咨询与建议

限定检索结果

文献类型

  • 457,027 篇 会议
  • 176,778 篇 期刊文献
  • 4,127 册 图书
  • 16 篇 学位论文

馆藏范围

  • 637,945 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 368,839 篇 工学
    • 248,534 篇 计算机科学与技术...
    • 202,523 篇 软件工程
    • 86,876 篇 信息与通信工程
    • 56,616 篇 控制科学与工程
    • 47,510 篇 电气工程
    • 46,322 篇 电子科学与技术(可...
    • 41,486 篇 生物工程
    • 30,982 篇 生物医学工程(可授...
    • 27,004 篇 光学工程
    • 25,773 篇 机械工程
    • 20,574 篇 化学工程与技术
    • 19,545 篇 仪器科学与技术
    • 18,509 篇 动力工程及工程热...
    • 16,289 篇 材料科学与工程(可...
    • 12,946 篇 安全科学与工程
    • 11,880 篇 交通运输工程
    • 11,655 篇 网络空间安全
  • 205,493 篇 理学
    • 105,785 篇 数学
    • 63,875 篇 物理学
    • 46,515 篇 生物学
    • 33,767 篇 统计学(可授理学、...
    • 23,638 篇 系统科学
    • 21,652 篇 化学
  • 94,477 篇 管理学
    • 56,079 篇 管理科学与工程(可...
    • 42,413 篇 图书情报与档案管...
    • 27,034 篇 工商管理
  • 28,344 篇 医学
    • 23,952 篇 临床医学
    • 21,581 篇 基础医学(可授医学...
    • 13,706 篇 药学(可授医学、理...
  • 16,866 篇 法学
    • 13,821 篇 社会学
  • 10,278 篇 经济学
  • 8,065 篇 农学
  • 7,246 篇 教育学
  • 2,893 篇 文学
  • 1,399 篇 军事学
  • 892 篇 艺术学
  • 169 篇 哲学
  • 86 篇 历史学

主题

  • 28,400 篇 computer science
  • 15,021 篇 accuracy
  • 14,844 篇 computational mo...
  • 14,515 篇 feature extracti...
  • 12,387 篇 deep learning
  • 12,290 篇 training
  • 11,257 篇 machine learning
  • 8,724 篇 data mining
  • 8,434 篇 predictive model...
  • 8,253 篇 support vector m...
  • 7,921 篇 computer archite...
  • 7,746 篇 optimization
  • 7,330 篇 neural networks
  • 7,200 篇 data models
  • 7,105 篇 real-time system...
  • 6,951 篇 wireless sensor ...
  • 6,878 篇 convolutional ne...
  • 6,766 篇 testing
  • 6,734 篇 algorithm design...
  • 6,654 篇 costs

机构

  • 2,465 篇 school of comput...
  • 2,203 篇 school of comput...
  • 2,130 篇 chitkara univers...
  • 2,078 篇 school of comput...
  • 1,777 篇 school of comput...
  • 1,679 篇 department of co...
  • 1,462 篇 school of comput...
  • 1,440 篇 school of comput...
  • 1,346 篇 department of co...
  • 1,336 篇 department of el...
  • 1,320 篇 school of electr...
  • 1,293 篇 school of comput...
  • 1,192 篇 school of comput...
  • 1,145 篇 college of compu...
  • 1,103 篇 department of el...
  • 1,016 篇 university of ch...
  • 1,007 篇 school of comput...
  • 971 篇 department of ph...
  • 948 篇 cavendish labora...
  • 935 篇 college of compu...

作者

  • 423 篇 niyato dusit
  • 327 篇 liu yang
  • 273 篇 yang yang
  • 249 篇 barter w.
  • 231 篇 wang wei
  • 226 篇 blake t.
  • 221 篇 j. wang
  • 221 篇 s. chen
  • 219 篇 betancourt c.
  • 218 篇 bellee v.
  • 218 篇 bowcock t.j.v.
  • 217 篇 borsato m.
  • 211 篇 amato s.
  • 209 篇 brundu d.
  • 209 篇 a. gomes
  • 207 篇 boettcher t.
  • 205 篇 beiter a.
  • 194 篇 c. alexa
  • 192 篇 j. m. izen
  • 191 篇 c. amelung

语言

  • 565,606 篇 英文
  • 65,393 篇 其他
  • 7,272 篇 中文
  • 382 篇 日文
  • 110 篇 朝鲜文
  • 103 篇 德文
  • 69 篇 法文
  • 67 篇 斯洛文尼亚文
  • 30 篇 俄文
  • 23 篇 西班牙文
  • 12 篇 阿拉伯文
  • 8 篇 捷克文
  • 7 篇 意大利文
  • 7 篇 葡萄牙文
  • 7 篇 土耳其文
  • 5 篇 荷兰文
  • 4 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science Faculty of Computer Science and Engineering"
637948 条 记 录,以下是441-450 订阅
排序:
Data Hiding Methods Using Voting Strategy and Mapping Table
收藏 引用
Journal of Internet Technology 2024年 第3期25卷 365-377页
作者: Chi, Hengxiao Chang, Chin-Chen Lin, Chia-Chen Department of Information Engineering and Computer Science Feng Chia University Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan
With advancements in technology, the study of data hiding (DH) in images has become more and more important. In this paper, we introduce a novel data hiding scheme that employs a voting strategy to predict pixels base... 详细信息
来源: 评论
SECURE COMPUTATION ON SENSITIVE DATA USING HOMOMORPHIC ENCRYPTION ON ETHEREUM BLOCKCHAIN
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2024年 第2期86卷 273-284页
作者: Şerban, Răzvan Vochescu, Alexandru Dosaru, Daniel Faculty of Automatic Control and Computer Science University POLITEHNICA of Bucharest Romania
Due to the proliferation of electronic devices, there is an ongoing creation of new data for each and every human. There is an ongoing debate about data because of the trade off that happens: security of the data vers... 详细信息
来源: 评论
MDCN:Modified Dense Convolution Network Based Disease Classification in Mango Leaves
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2511-2533页
作者: Chirag Chandrashekar K.P.Vijayakumar K.Pradeep A.Balasundaram School of Computer Science and Engineering Vellore Institute of Technology(VIT)ChennaiIndia Center for Cyber Physical Systems School of Computer Science and EngineeringVellore Institute of Technology(VIT)ChennaiIndia
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is... 详细信息
来源: 评论
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 239-258页
作者: Long Cai Ke Gu Jiaqi Lei School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer... 详细信息
来源: 评论
Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection
收藏 引用
Chinese Physics B 2025年 第5期34卷 289-301页
作者: Fei Yu Dan Su Shaoqi He Yiya Wu Shankou Zhang Huige Yin School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha 410114China
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin... 详细信息
来源: 评论
IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 1027-1045页
作者: Sharad Saxena Shailendra Mishra Mohammed Baljon Shamiksha Mishra Sunil Kumar Sharma Prakhar Goel Shubham Gupta Vinay Kishore Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatialaPunjab147001India Department of Computer Engineering College of Computer&Information ScienceMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Science and Engineering National Institute of TechnologyJamshedpur831001India
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s... 详细信息
来源: 评论
A narrative review on the characterisation of automated human emotion detection systems using biomedical sensors and machine intelligence
收藏 引用
International Journal of Reasoning-based Intelligent Systems 2023年 第3-4期15卷 266-276页
作者: Dutta, Stobak Mishra, Brojo Kishore Mitra, Anirban Chakraborty, Amartya Department of Computer Science and Engineering GIET University Odisha India Department of Computer Science and Engineering Amity University Kolkata India Department of Computer Science and Engineering University of Engineering and Management Kolkata India
In our day-To-day life, emotion plays an essential role in decision-making and human interaction. For many years, psychologists have been trying to develop many emotional models to explain the human emotional or affec... 详细信息
来源: 评论
Concurrent Consideration of Technical and Human Aspects in Security Requirements engineering
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第2期48卷 283-284页
作者: Fujs, Damjan University of Ljubljana Faculty of Computer and Information Science Ljubljana Slovenia
This article is an extended abstract of the doctoral dissertation entitled "Tailoring security-related software and training requirements to users based on their categorization" [1]. Security has traditional... 详细信息
来源: 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 评论