咨询与建议

限定检索结果

文献类型

  • 9,091 篇 会议
  • 8,136 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,645 篇 工学
    • 8,037 篇 计算机科学与技术...
    • 6,779 篇 软件工程
    • 2,606 篇 信息与通信工程
    • 1,791 篇 生物工程
    • 1,385 篇 控制科学与工程
    • 1,262 篇 电气工程
    • 1,182 篇 生物医学工程(可授...
    • 1,003 篇 光学工程
    • 888 篇 电子科学与技术(可...
    • 581 篇 机械工程
    • 531 篇 化学工程与技术
    • 442 篇 网络空间安全
    • 432 篇 动力工程及工程热...
    • 428 篇 交通运输工程
    • 410 篇 仪器科学与技术
    • 407 篇 安全科学与工程
  • 6,432 篇 理学
    • 3,220 篇 数学
    • 2,038 篇 生物学
    • 1,713 篇 物理学
    • 1,231 篇 统计学(可授理学、...
    • 656 篇 化学
    • 588 篇 系统科学
  • 3,104 篇 管理学
    • 1,757 篇 管理科学与工程(可...
    • 1,482 篇 图书情报与档案管...
    • 890 篇 工商管理
  • 1,119 篇 医学
    • 932 篇 临床医学
    • 846 篇 基础医学(可授医学...
    • 517 篇 药学(可授医学、理...
    • 474 篇 公共卫生与预防医...
  • 555 篇 法学
    • 477 篇 社会学
  • 336 篇 经济学
  • 274 篇 农学
  • 163 篇 教育学
  • 60 篇 文学
  • 31 篇 军事学
  • 22 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 664 篇 deep learning
  • 595 篇 accuracy
  • 441 篇 machine learning
  • 434 篇 feature extracti...
  • 398 篇 computational mo...
  • 383 篇 training
  • 324 篇 predictive model...
  • 320 篇 real-time system...
  • 301 篇 semantics
  • 258 篇 internet of thin...
  • 238 篇 optimization
  • 223 篇 support vector m...
  • 219 篇 convolutional ne...
  • 195 篇 neural networks
  • 193 篇 reinforcement le...
  • 185 篇 data mining
  • 183 篇 data models
  • 159 篇 image segmentati...
  • 145 篇 visualization
  • 145 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 307 篇 university of ch...
  • 293 篇 nikhef national ...
  • 292 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 168 篇 bediaga i.
  • 157 篇 baker s.
  • 151 篇 amato s.
  • 147 篇 niyato dusit
  • 147 篇 baryshnikov f.
  • 147 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 16,055 篇 英文
  • 1,183 篇 其他
  • 109 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Engineering with Data Science"
17330 条 记 录,以下是161-170 订阅
排序:
A comparative analysis for deep-learning-based approaches for image forgery detection
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2024年 第1期8卷 1-10页
作者: Ch, Ravikumar Radha, Marepalli Mahendar, Maragoni Manasa, Pinnapureddy Department of Artificial Intelligence &Data Science Chaitanya Bharathi Institute of Technology Hyderabad 500075 India Department of Computer Science and Engineering CVR College of Engineering Hyderabad 501510 India Department of Computer Science and Engineering Neil Gogte Institute of Technology Hyderabad 500039 India
The detection of counterfeit photographs is critical in the digital age because of the widespread development of digital media and its significant impact on social networks. The legitimacy of digital content is being ... 详细信息
来源: 评论
AI-Driven Indoor Farming: An Algorithmic Approach to Sustainable Agriculture  1st
AI-Driven Indoor Farming: An Algorithmic Approach to Sustain...
收藏 引用
1st International Conference on Intelligent Computing, Smart Communication, and Network Technologies, ICICSCNT 2023
作者: Veeramalai, S. Saranya, K. Computer Science and Engineering Chennai İnstitute of Technology Chennai India Artificial Intelligence and Data Science Panimalar Engineering College Poonamallee Chennai India
Indoor farming has emerged as a promising alternative to traditional farming methods, offering a controlled and optimized environment for crop growth that can improve yield and reduce the environmental impact of agric... 详细信息
来源: 评论
Efficient Image Captioning Based on Vision Transformer Models
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1483-1500页
作者: Samar Elbedwehy T.Medhat Taher Hamza Mohammed F.Alrahmawy Department of Data Science Faculty of Artificial IntelligenceKafrelsheikh UniversityEgypt Department of Electrical Engineering Faculty of EngineeringKafrelsheikh UniversityEgypt Department of Computer Science Faculty of Computer and Information ScienceMansouraEgypt
Image captioning is an emerging field in machine *** refers to the ability to automatically generate a syntactically and semantically meaningful sentence that describes the content of an *** captioning requires a comp... 详细信息
来源: 评论
Blockchain-Enabled Private and Secure Task Allocation Framework  16
Blockchain-Enabled Private and Secure Task Allocation Framew...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Orang, Ayda Valinezhad Dorri, Ali Gaspers, Serge Ruj, Sushmita School of Computer Science and Engineering Unsw Sydney Australia Data61 Csiro Australia School of Computer Science Queensland University of Technology Australia
In the realm of wireless communications and task allocations, where agents need to travel to perform tasks, a new challenge has emerged. This challenge involves efficiently distributing tasks among agents while consid... 详细信息
来源: 评论
Real-time distance field acceleration based free-viewpoint video synthesis for large sports fields
收藏 引用
Computational Visual Media 2024年 第2期10卷 331-353页
作者: Yanran Dai Jing Li Yuqi Jiang Haidong Qin Bang Liang Shikuan Hong Haozhe Pan Tao Yang School of Telecommunications Engineering Xidian UniversityXi’an 710071China National Engineering Laboratory for Integrated AeroSpace-Ground-Ocean Big Data Application Technology SAIIPthe School of Computer ScienceNorthwestern Polytechnical UniversityXi’an 710129China
Free-viewpoint video allows the user to view objects from any virtual perspective,creating an immersive visual *** technology enhances the interactivity and freedom of multimedia ***,many free-viewpoint video synthesi... 详细信息
来源: 评论
Model-based framework for exploiting sensors of IoT devices using a botnet: a case study with android
收藏 引用
Cyber-Physical Systems 2025年 第1期11卷 1-46页
作者: Khaliq, Zubair Khan, Dawood Ashraf Baba, Asif Iqbal Ali, Shahbaz Farooq, Sheikh Umar Department of Computer Science University of Kashmir Jammu and Kashmir Srinagar India AI Thndr Dubai United Arab Emirates Department of Computer Science Tuskegee University TuskegeeAL United States Data Engineering hyke.ai Dubai United Arab Emirates
Botnets have become a severe security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic, and the ever-larger number of cybercrim... 详细信息
来源: 评论
Optimizing Coverage in Wireless Sensor Networks Using the Tumbleweed Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 250-261页
作者: Zhang, Mengfei Chu, Shu-Chuan Liu, Nengxian Huang, Kuan-Chun Pan, Jeng-Shyang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Department of Industrial and Systems Engineering Chung Yuan Christian University Taoyuan320314 Taiwan School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte... 详细信息
来源: 评论
dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone  23
dTEE: A Declarative Approach to Secure IoT Applications Usin...
收藏 引用
23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024
作者: Sun, Tong Li, Borui Teng, Yixiao Gao, Yi Dong, Wei Zhejiang University The State Key Laboratory of Blockchain and Data Security College of Computer Science China Southeast University School of Computer Science and Engineering China
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu... 详细信息
来源: 评论
Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4322-4343页
作者: Al-Maliki, Shawqi Qayyum, Adnan Ali, Hassan Abdallah, Mohamed Qadir, Junaid Hoang, Dinh Thai Niyato, Dusit Al-Fuqaha, Ala Division College of Science and Engineering Doha34110 Qatar Information Technology University Lahore54000 Pakistan University of New South Wales Sydney Sydney2052 Australia Qatar University Department of Computer Science and Engineering College of Engineering Doha34110 Qatar University of Technology Sydney School of Electrical and Data Engineering Sydney2052 Australia Nanyang Technological University College of Computing and Data Science 639798 Singapore
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have be... 详细信息
来源: 评论
Internet of Brain, Thought, Thinking, and Creation
收藏 引用
Chinese Journal of Electronics 2022年 第6期31卷 1025-1042页
作者: ZHANG Zhimin YIN Rui NING Huansheng School of Computer and Communication Engineering University of Science and Technology Beijing Beijing Engineering Research Center for Cyberspace Data Analysis and Applications
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and... 详细信息
来源: 评论