咨询与建议

限定检索结果

文献类型

  • 422,339 篇 会议
  • 159,477 篇 期刊文献
  • 3,573 册 图书
  • 103 篇 学位论文

馆藏范围

  • 585,490 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,343 篇 工学
    • 229,511 篇 计算机科学与技术...
    • 187,126 篇 软件工程
    • 82,634 篇 信息与通信工程
    • 53,426 篇 控制科学与工程
    • 45,381 篇 电气工程
    • 44,070 篇 电子科学与技术(可...
    • 38,835 篇 生物工程
    • 28,652 篇 生物医学工程(可授...
    • 25,906 篇 光学工程
    • 24,540 篇 机械工程
    • 19,094 篇 化学工程与技术
    • 18,530 篇 仪器科学与技术
    • 17,613 篇 动力工程及工程热...
    • 14,553 篇 材料科学与工程(可...
    • 12,212 篇 安全科学与工程
    • 11,401 篇 交通运输工程
    • 11,270 篇 网络空间安全
  • 186,829 篇 理学
    • 94,902 篇 数学
    • 58,266 篇 物理学
    • 43,445 篇 生物学
    • 30,572 篇 统计学(可授理学、...
    • 21,717 篇 系统科学
    • 20,098 篇 化学
  • 86,424 篇 管理学
    • 51,880 篇 管理科学与工程(可...
    • 38,144 篇 图书情报与档案管...
    • 24,589 篇 工商管理
  • 26,246 篇 医学
    • 22,036 篇 临床医学
    • 19,953 篇 基础医学(可授医学...
    • 12,691 篇 药学(可授医学、理...
  • 15,424 篇 法学
    • 12,599 篇 社会学
  • 9,484 篇 经济学
  • 7,474 篇 农学
  • 6,319 篇 教育学
  • 2,648 篇 文学
  • 1,323 篇 军事学
  • 845 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,541 篇 computer science
  • 13,630 篇 computational mo...
  • 13,551 篇 accuracy
  • 13,362 篇 feature extracti...
  • 11,440 篇 deep learning
  • 11,245 篇 training
  • 10,463 篇 machine learning
  • 7,932 篇 data mining
  • 7,808 篇 predictive model...
  • 7,487 篇 support vector m...
  • 7,342 篇 computer archite...
  • 7,199 篇 optimization
  • 6,784 篇 neural networks
  • 6,738 篇 wireless sensor ...
  • 6,539 篇 data models
  • 6,445 篇 real-time system...
  • 6,367 篇 costs
  • 6,321 篇 algorithm design...
  • 6,281 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,441 篇 school of comput...
  • 2,184 篇 school of comput...
  • 2,135 篇 chitkara univers...
  • 2,033 篇 school of comput...
  • 1,755 篇 school of comput...
  • 1,668 篇 department of co...
  • 1,448 篇 school of comput...
  • 1,405 篇 school of comput...
  • 1,318 篇 department of co...
  • 1,300 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,285 篇 school of comput...
  • 1,141 篇 school of comput...
  • 1,103 篇 department of el...
  • 1,096 篇 college of compu...
  • 989 篇 university of ch...
  • 976 篇 school of comput...
  • 969 篇 department of ph...
  • 953 篇 college of compu...
  • 943 篇 cavendish labora...

作者

  • 423 篇 niyato dusit
  • 336 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 237 篇 wang wei
  • 234 篇 s. chen
  • 232 篇 j. wang
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 560,582 篇 英文
  • 17,984 篇 其他
  • 6,848 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 40 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
585492 条 记 录,以下是4961-4970 订阅
排序:
Leveraging Feature engineering and Machine Learning for Internet of Things (IoT) Cyberattack Detection: A Scalable Approach
Leveraging Feature Engineering and Machine Learning for Inte...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Arafat Asim Peter J. Hawrylak School of Cyber Studies College of Engineering and Computer Science The University of Tulsa Tulsa OK USA Electrical & Computer Engineering College of Engineering and Computer Science The University of Tulsa Tulsa OK USA
Internet of Things (IoT) devices are a fast-growing market, but they also possess a great challenge in terms of cyber-security, and therefore need a strong intrusion detection system (IDS). We present a machine learni... 详细信息
来源: 评论
NVMS-Net: A Novel Constrained Noise-View Multiscale Network for Detecting General Image Processing Based Manipulations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1233-1247页
作者: Singh, Gurinder Rana, Kapil Goyal, Puneet Kumar, Sathish Cleveland State University Electrical Engineering and Computer Science ClevelandOH44115 United States Indian Institute of Technology Ropar Punjab Rupnagar140001 India Thapar Institute of Engineering and Technology Punjab Patiala147004 India NIMS University Rajasthan Jaipur303121 India
Ensuring the authenticity and integrity of digital images is a major concern in multimedia forensics, driving research on universal schemes for detecting diverse image manipulations (or processing operations). Althoug... 详细信息
来源: 评论
Introduction to the Special Issue on PADS 2023
收藏 引用
ACM Transactions on Modeling and computer Simulation 2025年 第2期35卷 1-3页
作者: Dong Jin Christopher Carothers Electrical Engineering and Computer Science University of Arkansas Fayetteville Fayetteville United States Computer Science Rensselaer Polytechnic Institute Troy United States
来源: 评论
Energy-Efficient Multi-Path Selection to Achieve Hard Reliability for Mission-Critical Data Transmission in Industrial IoT
Energy-Efficient Multi-Path Selection to Achieve Hard Reliab...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Soumya Nandan Mishra Manas Khatua Computer Science and Engineering IIT Guwahati India
Industry 4.0 applications demand strict reliability guarantee of 99%. For example, repeated packet losses can cause communication failures in supply chain systems. Now-a-days, many such industrial applications use the... 详细信息
来源: 评论
Brain-Conditional Multimodal Synthesis: A Survey and Taxonomy
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1080-1099页
作者: Mai, Weijian Zhang, Jian Fang, Pengfei Zhang, Zhijun South China University of Technology School of Automation Science and Engineering Guangzhou510640 China Southeast University School of Computer Science and Engineering Nanjing210096 China South China University of Technology Key Library of Autonomous Systems and Network Control Ministry of Education The School of Automation Science and Engineering Guangzhou510640 China Institute for Super Robotics Huangpu Guangzhou510555 China Nanchang University Jiangxi Thousand Talents Plan Nanchang330031 China Jishou University College of Computer Science and Engineering Jishou416000 China Guangdong Artificial Intelligence and Digital Economy Laboratory Pazhou Lab Guangzhou510335 China Shaanxi University of Technology Shaanxi Provincial Key Laboratory of Industrial Automation School of Mechanical Engineering Hanzhong723001 China Changsha Normal University School of Information Science and Engineering Changsha410100 China Guangdong University of Petrochemical Technology School of Automation Science and Engineering Institute of Artificial Intelligence and Automation Maoming525000 China
In the era of artificial intelligence generated content (AIGC), conditional multimodal synthesis technologies (e.g., text-to-image) are dynamically reshaping the natural content. Brain signals, serving as potential re... 详细信息
来源: 评论
Relationships Among Organizational-Level Maturities in Artificial Intelligence, Cybersecurity, and Digital Transformation: A Survey-Based Analysis
收藏 引用
IEEE Access 2025年 13卷 88399-88411页
作者: Burak Kubilay Baris Celiktas Computer Science Engineering Department Işik University Istanbul Türkiye
The rapid development of digital technology across industries has highlighted the growing need for enhanced competencies in Artificial Intelligence (AI), Cyber security (CS), and Digital Transformation (DT). While the... 详细信息
来源: 评论
Reconstruction of a realistic 3D human model from a single 2D image
收藏 引用
Procedia computer science 2025年 260卷 701-707页
作者: Mohit Kushwaha Jaytrilok Choudhary Dhirendra Pratap Singh Department of Computer Science & Engineering MANIT Bhopal Madhya Pradesh INDIA-462003
Generation of human 3D models has become one of the most interesting topics in the domain of computer vision. This is because the process of reconstructing 3D human body models from 2D images has of course attracted a... 详细信息
来源: 评论
Evaluating climate adaptation strategies for coastal resilience using multi-criteria decision-making framework
收藏 引用
Marine Pollution Bulletin 2025年 217卷 118060页
作者: Teng, Meng Zhang, Fuli Gong, Zhi Park, Jong Hyuk School of Computer Science and Engineering Hunan University of Information Technology Changsha410151 China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul01811 Korea Republic of
Coastal regions face significant challenges due to climate change, requiring effective adaptation strategies to protect ecosystems, infrastructure, and communities. Selecting appropriate strategies remains complex due... 详细信息
来源: 评论
Flexible Hybrid Electronics for Printing of Nano and Chip Scale Structures  1
Flexible Hybrid Electronics for Printing of Nano and Chip Sc...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Singh, Neelima Gupta, Radha Singh, Rakesh Kumar Shruthi, T.S. Gupta, Parbhat Singhal, Abhinav Uttaranchal University Department of Computer Science and Engineering Dehradun India Dayananda Sagar College of Engineering Department of Mathematics Bangalore560078 India IIMT College of Engineering U.P. Greater Noida India Nitte Meenakshi Institute of Technology Department of Mathematics Karnataka Bangalore India SRM Institute of Science and Technology Delhi NCR Campus Ghaziabad Modinagar India Tula's Institute Department of Computer Science and Engineering Dehradun248197 India
Adaptable sensors, circuits, and substrates are joined with unbending electronic parts to make adaptable flexible hybrid electronics (FHE). The printing of nanomaterials has benefits over the costly, multi-step, and b... 详细信息
来源: 评论
A Novel Remote Desktop Protocol Data Security Approach Using Hybrid Cryptographic Algorithm and Unsupervised Neural Network
A Novel Remote Desktop Protocol Data Security Approach Using...
收藏 引用
Computing and Information Technology (ICCIT-1441), 2020 International Conference on
作者: Most. Mazriha Akter Mohua Ali Ameen Abdu Saif Nishita Aktar Md.Nazmus Sakib Computer Science and Engineering World University of Bangladesh Dhaka Bangladesh Computer Science Lincoln University Petaling Jaya Malaysia Communication and Computer Engineering Taiz University Taiz Yemen
An empirical investigation uses AES, RSA, and a character replacement approach, along with the unsupervised neural network RBM, to enhance the security of Remote Desktop Protocol communication. It was discovered that ... 详细信息
来源: 评论