咨询与建议

限定检索结果

文献类型

  • 13,115 篇 会议
  • 12,614 篇 期刊文献
  • 159 册 图书

馆藏范围

  • 25,887 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 15,620 篇 工学
    • 8,894 篇 计算机科学与技术...
    • 7,097 篇 软件工程
    • 3,060 篇 信息与通信工程
    • 2,499 篇 电子科学与技术(可...
    • 2,403 篇 电气工程
    • 1,971 篇 控制科学与工程
    • 1,847 篇 生物工程
    • 1,789 篇 光学工程
    • 1,532 篇 生物医学工程(可授...
    • 1,239 篇 化学工程与技术
    • 1,057 篇 材料科学与工程(可...
    • 1,056 篇 机械工程
    • 961 篇 仪器科学与技术
    • 792 篇 动力工程及工程热...
    • 474 篇 力学(可授工学、理...
    • 444 篇 交通运输工程
  • 10,617 篇 理学
    • 5,106 篇 物理学
    • 3,784 篇 数学
    • 2,242 篇 生物学
    • 1,435 篇 化学
    • 1,306 篇 统计学(可授理学、...
    • 700 篇 系统科学
  • 3,461 篇 管理学
    • 2,153 篇 管理科学与工程(可...
    • 1,355 篇 图书情报与档案管...
    • 932 篇 工商管理
  • 1,613 篇 医学
    • 1,337 篇 临床医学
    • 1,060 篇 基础医学(可授医学...
    • 654 篇 药学(可授医学、理...
    • 481 篇 公共卫生与预防医...
  • 593 篇 法学
    • 487 篇 社会学
  • 360 篇 农学
  • 333 篇 经济学
  • 266 篇 教育学
  • 90 篇 文学
  • 65 篇 军事学
  • 48 篇 艺术学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 603 篇 computer science
  • 453 篇 deep learning
  • 361 篇 feature extracti...
  • 287 篇 training
  • 270 篇 machine learning
  • 249 篇 accuracy
  • 247 篇 image segmentati...
  • 246 篇 computational mo...
  • 221 篇 semantics
  • 202 篇 computer archite...
  • 168 篇 neural networks
  • 167 篇 internet of thin...
  • 147 篇 throughput
  • 146 篇 application soft...
  • 144 篇 support vector m...
  • 141 篇 predictive model...
  • 138 篇 bandwidth
  • 132 篇 reinforcement le...
  • 131 篇 cameras
  • 131 篇 data mining

机构

  • 946 篇 cavendish labora...
  • 887 篇 department of ph...
  • 815 篇 physikalisches i...
  • 806 篇 oliver lodge lab...
  • 574 篇 school of physic...
  • 500 篇 infn laboratori ...
  • 476 篇 university of ch...
  • 467 篇 infn sezione di ...
  • 456 篇 fakultät physik ...
  • 445 篇 infn sezione di ...
  • 445 篇 infn sezione di ...
  • 398 篇 iccub universita...
  • 398 篇 horia hulubei na...
  • 396 篇 school of physic...
  • 386 篇 department for p...
  • 380 篇 department of ph...
  • 375 篇 center for high ...
  • 374 篇 nikhef national ...
  • 373 篇 imperial college...
  • 366 篇 stfc rutherford ...

作者

  • 270 篇 a. gomes
  • 257 篇 c. alexa
  • 255 篇 j. m. izen
  • 248 篇 s. chen
  • 245 篇 c. amelung
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 236 篇 g. spigo
  • 235 篇 f. siegert
  • 224 篇 j. wang
  • 218 篇 y. tayalati
  • 217 篇 r. ströhmer
  • 214 篇 m. rijssenbeek
  • 207 篇 s. jin
  • 205 篇 g. gaudio
  • 199 篇 m. gandelman
  • 199 篇 t. gershon
  • 197 篇 s. mohapatra
  • 195 篇 r. mountain

语言

  • 24,043 篇 英文
  • 1,474 篇 其他
  • 360 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 4 篇 朝鲜文
  • 2 篇 法文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Center for Computer Vision Research"
25888 条 记 录,以下是111-120 订阅
排序:
Accurate threat hunting in industrial internet of things edge devices
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1123-1130页
作者: Abbas Yazdinejad Behrouz Zolfaghari Ali Dehghantanha Hadis Karimipour Gautam Srivastava Reza M.Parizi Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical and Software Engineering University of CalgaryAlbertaCanada Department of Mathematics and Computer Science Brandon UniversityBrandonCanada College of Computing and Software Engineering Kennesaw State UniversityGAUSA Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Department of Computer Science and Mathematics Lebanese American UniversityBeirut1102Lebanon
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18115-18124页
作者: Gao, Suo Zhang, Zheyi Iu, Herbert Ho-Ching Ding, Siqi Mou, Jun Erkan, Uğur Toktas, Abdurrahim Li, Qi Wang, Chunpeng Cao, Yinghong Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering PerthWA6009 Australia Dalian University of Technology School of Mathematical Sciences Dalian116024 China Karamanoglu Mehmetbey University Faculty of Engineering Department of Computer Engineering Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This article aims to develop a color image encryption algorithm that enhanc... 详细信息
来源: 评论
Socially Aware V2X Localized QoS
收藏 引用
IEEE Internet of Things Journal 2024年 第15期11卷 25925-25938页
作者: Kaliski, Rafael Han, Yue-Hua National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan Academia Sinica Research Center for Information Technology Innovation Taipei115 Taiwan National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan
Vehicle to Everything (V2X) is a core 5G technology. V2X and its enabler, Device-to-Device (D2D), are essential for the Internet of Things (IoT) and the Internet of Vehicles (IoV). V2X enables vehicles to communicate ... 详细信息
来源: 评论
SEED-VII: A Multimodal Dataset of Six Basic Emotions with Continuous Labels for Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 969-985页
作者: Jiang, Wei-Bang Liu, Xuan-Hao Zheng, Wei-Long Lu, Bao-Liang Shanghai Jiao Tong University Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Brain Science and Technology Research Center Shanghai200240 China
Recognizing emotions from physiological signals is a topic that has garnered widespread interest, and research continues to develop novel techniques for perceiving emotions. However, the emergence of deep learning has... 详细信息
来源: 评论
BPCoach: Exploring Hero Drafting in Professional MOBA Tournaments via Visual Analytics
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW1期8卷 1-31页
作者: Liu, Shiyi Ma, Ruofei Zhao, Chuyi Li, Zhenbang Xiao, Jianpeng Li, Quan School of Information Science and Technology ShanghaiTech University Shanghai China Department of Computer Science Tufts University MedfordMA United States Guangzhou Qucheng Culture Media Co. Guangzhou China School of Information Science and Technology ShanghaiTech University Shanghai Engineering Research Center of Intelligent Vision and Imaging Shanghai China
Hero drafting for multiplayer online arena (MOBA) games is crucial because drafting directly affects the outcome of a match. Both sides take turns to "ban"/"pick" a hero from a roster of approximat... 详细信息
来源: 评论
Revisiting Adversarial Patches for Designing Camera-Agnostic Attacks against Person Detection  38
Revisiting Adversarial Patches for Designing Camera-Agnostic...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wei, Hui Wang, Zhixiang Zhang, Kewei Hou, Jiaqi Liu, Yuanwei Tang, Hao Wang, Zheng National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China The University of Tokyo Japan School of Computer Science Peking University China
Physical adversarial attacks can deceive deep neural networks (DNNs), leading to erroneous predictions in real-world scenarios. To uncover potential security risks, attacking the safety-critical task of person detecti...
来源: 评论
UAV Localization with Unreliable Observations in Hostile Underground Environments
收藏 引用
Journal of computer science & Technology 2024年 第6期39卷 1401-1418页
作者: Peng-Peng Chen Kui-Yuan Zhang Shou-Wan Gao Si-Yi Ren School of Computer Science and Technology China University of Mining and TechnologyXuzhou 221116China Mine Digitization Engineering Research Center Ministry of EducationXuzhou 221116China Shenzhen Research Institute China University of Mining and TechnologyShenzhen 518057China
The accurate and robust unmanned aerial vehicle(UAV)localization is significant due to the requirements of safety-critical monitoring and emergency wireless communication in hostile underground *** range-based localiz... 详细信息
来源: 评论
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1805-1819页
作者: Jin Wang Wei Ou Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Engineering Chonnam National UniversityGwangju61186Korea School of Computer Science Engineering Research Center of Digital Forensics of Ministry of EducationNanjing University of Information Science&TechnologyNanjing210044China
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block... 详细信息
来源: 评论
Intelligent Personality Assessment and Verification from Handwriting using Machine Learning
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第7期16卷 4541-4546页
作者: Mishra, Pradeep Kumar Mishra, Gouri Sankar Abidi, Ali Imam Kumar, Rajiv Sahoo, Ashok Kumar Maini, Tarun Department of Computer Science and Application SSET Sharda University Department of Computer Science and Engineering SSET Sharda University NVIDIA AI Learning & amp Research Center Department of Applied Computational Science and Engineering G L Bajaj Institute of Technology and Management Greater Noida Graphic Era Hill University School of Computer Science and Engineering Galgotias University
It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as a person. There has been a lot of study on the possibility of deduci... 详细信息
来源: 评论