咨询与建议

限定检索结果

文献类型

  • 53,774 篇 会议
  • 27,402 篇 期刊文献
  • 754 册 图书

馆藏范围

  • 81,930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,039 篇 工学
    • 36,796 篇 计算机科学与技术...
    • 29,921 篇 软件工程
    • 13,916 篇 信息与通信工程
    • 8,206 篇 控制科学与工程
    • 6,060 篇 电气工程
    • 6,001 篇 生物工程
    • 5,701 篇 电子科学与技术(可...
    • 4,141 篇 生物医学工程(可授...
    • 3,806 篇 机械工程
    • 3,686 篇 光学工程
    • 2,710 篇 仪器科学与技术
    • 2,506 篇 动力工程及工程热...
    • 2,369 篇 化学工程与技术
    • 2,279 篇 网络空间安全
    • 2,131 篇 安全科学与工程
    • 1,962 篇 交通运输工程
  • 26,785 篇 理学
    • 14,387 篇 数学
    • 7,349 篇 物理学
    • 6,661 篇 生物学
    • 4,635 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,488 篇 化学
  • 14,691 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,260 篇 图书情报与档案管...
    • 3,812 篇 工商管理
  • 4,128 篇 医学
    • 3,458 篇 临床医学
    • 3,107 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,806 篇 公共卫生与预防医...
  • 2,382 篇 法学
    • 1,865 篇 社会学
  • 1,418 篇 经济学
  • 1,169 篇 农学
  • 977 篇 教育学
  • 372 篇 文学
  • 241 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,197 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,967 篇 deep learning
  • 1,966 篇 accuracy
  • 1,618 篇 machine learning
  • 1,605 篇 computational mo...
  • 1,560 篇 training
  • 1,224 篇 data mining
  • 1,075 篇 internet of thin...
  • 1,074 篇 support vector m...
  • 1,049 篇 optimization
  • 1,002 篇 predictive model...
  • 891 篇 educational inst...
  • 870 篇 wireless sensor ...
  • 867 篇 semantics
  • 836 篇 artificial intel...
  • 823 篇 real-time system...
  • 789 篇 security
  • 773 篇 neural networks
  • 730 篇 image segmentati...

机构

  • 689 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 259 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 206 篇 department of ph...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 186 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 167 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 253 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 234 篇 niyato dusit
  • 226 篇 d. guest
  • 226 篇 s. jin
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,091 篇 英文
  • 4,603 篇 其他
  • 1,248 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Engineering and Information Technology"
81930 条 记 录,以下是141-150 订阅
排序:
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
OCRBench: on the hidden mystery of OCR in large multimodal models
收藏 引用
science China(information sciences) 2024年 第12期67卷 23-35页
作者: Yuliang LIU Zhang LI Mingxin HUANG Biao YANG Wenwen YU Chunyuan LI Xu-Cheng YIN Cheng-Lin LIU Lianwen JIN Xiang BAI School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Electronic and Information Engineering South China University of Technology Microsoft Research School of Computer & Communication Engineering University of Science and Technology Beijing Institute of Automation Chinese Academy of Sciences School of Software Engineering Huazhong University of Science and Technology
Large models have recently played a dominant role in natural language processing and multimodal vision-language learning. However, their effectiveness in text-related visual tasks remains relatively unexplored. In thi... 详细信息
来源: 评论
A Lightweight Object Detection Algorithm for Remote Sensing Images
收藏 引用
engineering Letters 2025年 第3期33卷 704-711页
作者: Hou, Donghao Zhang, Yujun Ren, Jia School of Computer and Software Engineering University of Science and Technology Liaoning Anshan114051 China School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan114051 China
With the continuous advancement of satellite technology, remote sensing images has been increasingly applied in fields such as urban planning, environmental monitoring, and disaster response. However, remote sensing i... 详细信息
来源: 评论
Automatic Transportation Mode Classification Using a Deep Reinforcement Learning Approach With Smartphone Sensors
收藏 引用
IEEE Access 2024年 12卷 514-533页
作者: Taherinavid, Siavash Moravvej, Seyed Vahid Chen, Yen-Lin Yang, Jing Ku, Chin Soon Yee, Por Lip Iran University of Science and Technology School of Civil Engineering Tehran13114-16846 Iran Isfahan University of Technology Department of Electrical and Computer Engineering Isfahan84156-83111 Iran National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research... 详细信息
来源: 评论
Per-user network access control kernel module with secure multifactor authentication
收藏 引用
Journal of Supercomputing 2024年 第1期80卷 970-1008页
作者: Cheng, Sheng-Tzong Horng, Gwo-Jiun Hsu, Chih-Wei Su, Z.-Yu Department of Computer Science and Information Engineering National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering Southern Taiwan University of Science and Technology Tainan Taiwan
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis... 详细信息
来源: 评论
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12837-12856页
作者: Porwal, Shardha Mittal, Sangeeta Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
A Novel Trustworthiness Measurement Model Based on Weight and User Feedback
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 612-625页
作者: ZHOU Wei MA Yanfang PAN Haiyu School of Computer Science and Technology Huaibei Normal University School of Computer Science and Information Engineering Changzhou Institute of Technology School of Computer Science and Information Security Guilin University of Electronic Technology
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af... 详细信息
来源: 评论
Application of the Deep Convolutional Neural Network for the Classification of Auto Immune Diseases
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 647-664页
作者: Fayaz Muhammad Jahangir Khan Asad Ullah Fasee Ullah Razaullah Khan Inayat Khan Mohammed ElAffendi Gauhar Ali Department of Computer Science and Information Technology Sarhad University of Science and Information TechnologyPeshawar25000Pakistan Department of Computer Science University of Engineering and TechnologyMardan23200Pakistan EIAS Data Science and Blockchain Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical *** primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune *** use of IIF f... 详细信息
来源: 评论
Improved Symbiotic organisms search for path planning of unmanned combat aerial vehicles
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第4期14卷 4289-4311页
作者: Rajmohan, Shathanaa Ramasubramanian, N. Computer Science and Engineering Indian Institute of Information Technology Chittoor Sri City India Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Unmanned Combat Aerial Vehicles (UCAVs) are becoming a critical part of the military to automate complex missions with minimum risk and increased efficiency. Path planning is a necessary routine for UCAVs to guide the... 详细信息
来源: 评论