咨询与建议

限定检索结果

文献类型

  • 18,088 篇 会议
  • 6,853 篇 期刊文献
  • 237 册 图书

馆藏范围

  • 25,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,936 篇 工学
    • 10,508 篇 计算机科学与技术...
    • 8,408 篇 软件工程
    • 4,914 篇 信息与通信工程
    • 2,451 篇 控制科学与工程
    • 2,221 篇 电子科学与技术(可...
    • 2,076 篇 电气工程
    • 1,744 篇 生物工程
    • 1,289 篇 生物医学工程(可授...
    • 1,139 篇 机械工程
    • 1,139 篇 光学工程
    • 1,020 篇 仪器科学与技术
    • 922 篇 动力工程及工程热...
    • 838 篇 网络空间安全
    • 683 篇 安全科学与工程
    • 652 篇 化学工程与技术
    • 559 篇 交通运输工程
  • 7,539 篇 理学
    • 3,759 篇 数学
    • 2,216 篇 物理学
    • 1,949 篇 生物学
    • 1,261 篇 统计学(可授理学、...
    • 759 篇 化学
    • 751 篇 系统科学
  • 4,006 篇 管理学
    • 2,611 篇 管理科学与工程(可...
    • 1,568 篇 图书情报与档案管...
    • 1,156 篇 工商管理
  • 1,465 篇 医学
    • 1,177 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
    • 728 篇 公共卫生与预防医...
    • 606 篇 药学(可授医学、理...
  • 727 篇 法学
    • 600 篇 社会学
  • 460 篇 经济学
  • 342 篇 农学
  • 207 篇 教育学
  • 135 篇 文学
  • 89 篇 军事学
  • 48 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 811 篇 accuracy
  • 773 篇 deep learning
  • 636 篇 internet of thin...
  • 625 篇 feature extracti...
  • 464 篇 real-time system...
  • 412 篇 computational mo...
  • 398 篇 computer science
  • 382 篇 support vector m...
  • 374 篇 training
  • 373 篇 machine learning
  • 366 篇 convolutional ne...
  • 313 篇 optimization
  • 308 篇 wireless communi...
  • 306 篇 wireless sensor ...
  • 268 篇 predictive model...
  • 252 篇 routing
  • 248 篇 artificial intel...
  • 246 篇 reliability
  • 241 篇 throughput
  • 232 篇 image segmentati...

机构

  • 1,071 篇 school of comput...
  • 165 篇 maharishi school...
  • 148 篇 school of comput...
  • 131 篇 department of co...
  • 130 篇 school of inform...
  • 123 篇 school of comput...
  • 117 篇 school of comput...
  • 98 篇 department of el...
  • 83 篇 university of sc...
  • 80 篇 lovely professio...
  • 78 篇 school of comput...
  • 66 篇 school of inform...
  • 66 篇 centre of resear...
  • 64 篇 department of el...
  • 62 篇 school of comput...
  • 61 篇 karnataka bangal...
  • 56 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 department of el...
  • 53 篇 centre of interd...

作者

  • 71 篇 niyato dusit
  • 48 篇 j. relin francis...
  • 45 篇 yang yang
  • 43 篇 guo hong
  • 38 篇 srinivasan c.
  • 38 篇 leonard barolli
  • 33 篇 liang qi
  • 33 篇 liu yang
  • 33 篇 mekruksavanich s...
  • 32 篇 hnoohom narit
  • 31 篇 zhiguo shi
  • 31 篇 shi zhiguo
  • 31 篇 jitpattanakul an...
  • 29 篇 wang lei
  • 29 篇 ming li
  • 29 篇 othman mohamed
  • 28 篇 raj j. relin fra...
  • 27 篇 li yang
  • 27 篇 luo xiong
  • 25 篇 tao yang

语言

  • 23,207 篇 英文
  • 1,624 篇 其他
  • 340 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Communication Technology"
25178 条 记 录,以下是111-120 订阅
排序:
Text Watermarking-Based Federated Learning Backdoor Attack Detection Scheme  6
Text Watermarking-Based Federated Learning Backdoor Attack D...
收藏 引用
6th International Conference on Next Generation Data-Driven Networks, NGDN 2024
作者: Zuo, Yiming Yang, Zheng Chen, Dongdong Gu, Ke Jiang, Luyao Changsha University of Science & Technology School of Computer and Communication Engineering ChangSha China
With the widespread application of federated learning across various domains, backdoor attacks pose a serious threat to the security of models. In this paper, we proposes a text watermarking-based federated learning b... 详细信息
来源: 评论
Security to text (S2T): multi-layered based security approaches for secret text content
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15151-15171页
作者: Kashid, Shamal Awasthi, Lalit K. Berwal, Krishan Department of Computer Science and Engineering National Institute of Technology Uttarakhand IN Srinagar India Faculty of Communication Engineering Military College of Telecommunication Engineering IN Mhow India
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from such data with security is crucial and requires the development of tech... 详细信息
来源: 评论
Dispersed Computing Resource Discovery Model and Algorithm for Polymorphic Migration Network Architecture
收藏 引用
Chinese Journal of Electronics 2023年 第4期32卷 821-839页
作者: ZHOU Chengcheng ZHANG Lukai ZENG Guangping LIN Fuhong School of Computer and Communication Engineering University of Science and Technology Beijing Transport Planning and Research Institute Ministry of Transport
Dynamic resource discovery in a network of dispersed computing resources is an open problem. The establishment and maintenance of resource pool information are critical, which involves both the polymorphic migration o... 详细信息
来源: 评论
Class-conditional domain adaptation for semantic segmentation
收藏 引用
Computational Visual Media 2024年 第5期10卷 1013-1030页
作者: Yue Wang Yuke Li James H.Elder Runmin Wu Huchuan Lu School of Information and Communication Engineering Dalian University of TechnologyDalian 116024China School of Computer Science Wuhan UniversityWuhan 430072China Department of Electrical Engineering and Computer Science York UniversityToronto M3J 1P3Canada Department of Computer Science the University of Hong KongHong Kong 999077China
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can... 详细信息
来源: 评论
A Coherent Analytical Model to Strengthen Vehicular communication in VANET Using Droptail Priority Queue
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 1-12页
作者: Kumar, Satyam Sinha, Bam Bahadur Khare, Priyank Electronics and Communication Engineering Indian Institute of Information Technology Ranchi Jharkhand Ranchi834004 India Computer Science and Engineering National Institute of Technology Sikkim Sikkim Ravangla737139 India
People’s demand for vehicles has been increasing day by day over the last few decades. A survey tells us that over 50,000 vehicles run on the roads per day. Such a large number of vehicles causes traffic. A survey te... 详细信息
来源: 评论
A Review of Memory Management Mechanisms Based on Hot Page Monitoring  3
A Review of Memory Management Mechanisms Based on Hot Page M...
收藏 引用
3rd International Conference on Artificial Intelligence and computer Information technology, AICIT 2024
作者: Yue, Lei Wu, Tao Shen, Yang Zhang, Jin School of Computer and Communication Engineering Changsha University Of Science and Technology Changsha China College of Computer Science National University of Defense Technology Changsha China
'Memory hot pages' usually refer to memory pages that are frequently accessed within a period of time. Using faster memory pages for these hot pages can optimize application performance. Using 'fast memory... 详细信息
来源: 评论
Geometric prior guided hybrid deep neural network for facial beauty analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 467-480页
作者: Tianhao Peng Mu Li Fangmei Chen Yong Xu David Zhang The School of Computer Science and Technology Guizhou UniversityGuiyangChina Department of Automation Moutai InstituteRenhuaiGuizhouChina The School of Computer Science and Technology Harbin Institute of TechnologyShenzhenShenzhenChina The Information and Communication Engineering Department Dalian Minzu UniversityDalianChina The School of Data Science The Chinese University of Hong KongShenzhenShenzhenChina
Facial beauty analysis is an important topic in human *** may be used as a guidance for face beautification applications such as cosmetic *** neural networks(DNNs)have recently been adopted for facial beauty analysis ... 详细信息
来源: 评论
Pupillometry Analysis of Rapid Serial Visual Presentation at Five Presentation Rates
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 543-552页
作者: Xi Luo Yanfei Lin Rongxiao Guo Xirui Zhao Shangen Zhang Xiaorong Gao School of Integrated Circuits and Electronics Beijing Institute of TechnologyBeijing 100081China School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China School of Medicine Tsinghua UniversityBeijing 100084China
In this study,the effect of presentation rates on pupil dilation is investigated for target recognition in the Rapid Serial Visual Presentation(RSVP)*** this experiment,the RSVP paradigm with five different presentati... 详细信息
来源: 评论
A Hybrid Security Algorithm in Container-based Virtualization Environments Using Residue Number Systems  8
A Hybrid Security Algorithm in Container-based Virtualizatio...
收藏 引用
8th Conference on Information communication technology and Society, ICTAS 2024
作者: Modey, Prince Freeman, Emmanuel Opoku-Yeboah, Stanley Avulekpor, Ebenezer Ghana Communication Technology University Department of Computer Science Accra Ghana University of Ghana Department of Computer Science Accra Ghana
The need for vigorous security methods becomes a great concern as container-based virtualization continues to gain close attention in modern edge computing environments. This study proposed a novel hybrid security alg... 详细信息
来源: 评论
MCBAN: A Small Object Detection Multi-Convolutional Block Attention Network
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2243-2259页
作者: Hina Bhanbhro Yew Kwang Hooi Mohammad Nordin Bin Zakaria Worapan Kusakunniran Zaira Hassan Amur Computer and Information Science Department Universiti Teknologi PETRONASSeri Iskandar31750Malaysia Faculty of Information and Communication Technology Mahidol UniversityNakhon Pathom73170Thailand
Object detection has made a significant leap forward in recent ***,the detection of small objects continues to be a great difficulty for various reasons,such as they have a very small size and they are susceptible to ... 详细信息
来源: 评论