咨询与建议

限定检索结果

文献类型

  • 9,498 篇 会议
  • 8,349 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,950 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,037 篇 工学
    • 8,329 篇 计算机科学与技术...
    • 6,931 篇 软件工程
    • 2,729 篇 信息与通信工程
    • 1,797 篇 生物工程
    • 1,553 篇 控制科学与工程
    • 1,353 篇 电气工程
    • 1,202 篇 生物医学工程(可授...
    • 1,024 篇 光学工程
    • 921 篇 电子科学与技术(可...
    • 609 篇 机械工程
    • 543 篇 化学工程与技术
    • 495 篇 网络空间安全
    • 456 篇 交通运输工程
    • 444 篇 动力工程及工程热...
    • 436 篇 仪器科学与技术
    • 431 篇 安全科学与工程
  • 6,573 篇 理学
    • 3,297 篇 数学
    • 2,050 篇 生物学
    • 1,747 篇 物理学
    • 1,267 篇 统计学(可授理学、...
    • 692 篇 化学
    • 590 篇 系统科学
  • 3,196 篇 管理学
    • 1,823 篇 管理科学与工程(可...
    • 1,516 篇 图书情报与档案管...
    • 903 篇 工商管理
  • 1,166 篇 医学
    • 972 篇 临床医学
    • 862 篇 基础医学(可授医学...
    • 523 篇 药学(可授医学、理...
    • 513 篇 公共卫生与预防医...
  • 570 篇 法学
    • 488 篇 社会学
  • 348 篇 经济学
  • 278 篇 农学
  • 182 篇 教育学
  • 60 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 712 篇 deep learning
  • 665 篇 accuracy
  • 452 篇 machine learning
  • 446 篇 feature extracti...
  • 411 篇 computational mo...
  • 401 篇 training
  • 355 篇 real-time system...
  • 334 篇 predictive model...
  • 292 篇 semantics
  • 274 篇 internet of thin...
  • 256 篇 optimization
  • 234 篇 support vector m...
  • 224 篇 convolutional ne...
  • 206 篇 reinforcement le...
  • 204 篇 data models
  • 195 篇 neural networks
  • 194 篇 data mining
  • 172 篇 image segmentati...
  • 157 篇 reliability
  • 149 篇 transformers

机构

  • 425 篇 department of ph...
  • 396 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 361 篇 h.h. wills physi...
  • 308 篇 university of ch...
  • 289 篇 van swinderen in...
  • 289 篇 nikhef national ...
  • 288 篇 imperial college...
  • 287 篇 school of physic...
  • 287 篇 center for high ...
  • 283 篇 department of ph...
  • 283 篇 physik-institut ...
  • 283 篇 oliver lodge lab...
  • 283 篇 physikalisches i...
  • 281 篇 cavendish labora...
  • 281 篇 stfc rutherford ...
  • 281 篇 school of physic...
  • 281 篇 school of physic...
  • 280 篇 institute of par...
  • 277 篇 departamento de ...

作者

  • 249 篇 barter w.
  • 240 篇 beiter a.
  • 233 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 203 篇 brundu d.
  • 200 篇 borsato m.
  • 198 篇 betancourt c.
  • 162 篇 niyato dusit
  • 160 篇 bediaga i.
  • 159 篇 baker s.
  • 150 篇 amato s.
  • 146 篇 baryshnikov f.
  • 145 篇 boettcher t.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain
  • 143 篇 f. maciuc

语言

  • 12,995 篇 英文
  • 4,876 篇 其他
  • 136 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering with Data Science"
17950 条 记 录,以下是4821-4830 订阅
Listen to the Speaker in Your Gaze
Listen to the Speaker in Your Gaze
收藏 引用
IEEE Conference on Cybernetics and Intelligent Systems
作者: Hongli Yang Xinyi Chen Junjie Li Hao Huang Siqi Cai Haizhou Li Shenzhen Research Institute of Big Data Shenzhen China School of Computer Science and Technology Xinjiang University Urumqi China Department of Electrical and Computer Engineering National University of Singapore Singapore School of Data Science Shenzhen Research Institute of Big Data Shenzhen China The Chinese University of Hong Kong Shenzhen China
Attending to one’s voice in a cocktail party is notably challenging, particularly for individuals with hearing impairments. This paper proposes a novel eye-controlled target speaker extraction system, which consists ... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges
Exploring Decentralized Identity Verification Systems Using ...
收藏 引用
Global Conference for Advancement in Technology (GCAT)
作者: V. Saravanan Sumalatha A Desidi Narsimha Reddy B. Shamreen Ahamed Udayakumar K Arthi Priyadharshini M Department of Nano Electronics Materials and Sensors Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamilnadu India Department of Computer Science Kristu Jayanti College Autonomous Bengaluru Data Consultant (Data Governance Data Analytics: Enterprise Performance Management AI&ML) Soniks Consulting LLC Texas USA Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Jeppiaar Nagar Chennai Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology India Department of CSE Dhanalakshmi College of Engineering Chennai
The rapid advancement of digital technologies has underscored the critical necessity for robust and reliable identity verification systems in today's interconnected world. Traditional centralized identity manageme... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature  23
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Zou, Huiying Duan, Jia Liu, Xi Ren, Wei Li, Tao Zheng, Xianghan Choo, Kim-Kwang Raymond Hunan Engineering Research Center of Geographic Information Security and Application The Third Surveying and Mapping Institute of Hunan Province Hunan China China University of Geosciences School of Computer Science Wuhan China Sichuan University Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Casm State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of Mnr Beijing China Fuzhou University College of Computer and Big Data China Sanya College School of Information and Intelligent Engineering China University of Texas at San Antonio Department of Information Systems and Cyber Security San Antonio United States
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Equilibrium Optimizer with Deep Learning Model for Autism Spectral Disorder Classification  1
Equilibrium Optimizer with Deep Learning Model for Autism Sp...
收藏 引用
1st IEEE International Conference on Automation, Computing and Renewable Systems, ICACRS 2022
作者: Praveena, A. Senthamilarasi, N. Karthik, T.S. Abirami, S.K. Vijayakrishna Rapaka, E. Das, Shyamali Department of Computer Science and Engineering Jansons Institute of Technology Karumathampatti Tamilnadu Coimbatore India Department of Information Technology Panimalar Engineering College Tamilnadu Chennai India Department of Electronics and Communication Engineering Aditya College of Engineering and Technology Andhrapradesh Surampalem India Department of Computer Science and Business Systems Sri Eshwar College of Engineering Tamilnadu Coimbatore India Data Science Indian Institute of Technology Madras Tamilnadu Chennai India Karnataka Bangalore India
Autism Spectrum Disorder (ASD) is a developing disorder if the symptoms develop obvious in the initial years of age but it could be present in some age groups. ASD is mental health problem that affects communicational... 详细信息
来源: 评论
A Conceptual Evaluation of the data as Partner (DAP) Framework
A Conceptual Evaluation of the Data as Partner (DAP) Framewo...
收藏 引用
IEEE International Smart Cities Conference (ISC2)
作者: Sonia Hassan Drishty Sobnath Esther Snell Olufemi Isiaq Department of Science and Engineering Solent University Southampton England Department of Computer and Data Science and AI Creative Computing Institute Universiy of Arts London
This paper explores the innovative data As Partner (DAP) philosophy as a transformative approach to organisational data strategy, drawing upon established concepts of information value, technology acceptance, and incl...
来源: 评论
Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification
Hidden in Time, Revealed in Frequency: Spectral Features and...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Nathan Dillbary Roi Yozevitch Amit Dvir Ran Dubin Chen Hajaj Department of Computer Science Ariel Cyber Innovation Center Ariel University Israel Department of Industrial Engineering and Management Data Science and Artificial Intelligence Research Center Ariel University Israel
In recent years, privacy and security concerns have led to the wide adoption of encrypted protocols, making encrypted traffic a major portion of overall communications online. The transition into more secure protocols...
来源: 评论
Reinforcement learning-based IoT sensor scheduling strategy for bridge structure health monitoring  15
Reinforcement learning-based IoT sensor scheduling strategy ...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart data, Smartdata 2022
作者: Zhang, Yuan Wu, Hengshan Yi, Lingzhi Luo, Bin Qiu, Yun Tang, Feilong School of Civil Engineering University of South China China Department of Computer Science St. Francis Xavier University Canada Foshan Highway and Bridge Engineering Monitoring Station Co China The School of Data Science and Engineering East China Normal University Shanghai200062 China
Internet of Things (IoT) based Bridge Structural Health Monitoring (BSHM) is a hot topic in the field of civil engineering and computer science, and has been widely concerned by academia and industry. The lifetime of ... 详细信息
来源: 评论
Rumor Detection with a novel graph neural network approach
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Tianrui Cai, Qi Xu, Changxin Hong, Bo Ni, Fanghao Qiao, Yuxin Yang, Tsungwei Electrical and Computer Engineering University of California La Jolla San Diego United States Computer Science and Engineering University of North Texas Denton United States Computer Information Technology Northern Arizona University Flagstaff United States Data Science and Artificial Intelligence Indian Institute of Technology Assam Guwahati India Computer Science Tunghai University Taichung Taiwan
The wide spread of rumors[3] on social media has caused a negative impact on people's daily life, leading to potential panic, fear and mental health problems for the public.[47] How to debunk rumors as early as po... 详细信息
来源: 评论
YOLOv8 vs. YOLOv9: Evaluating Object Detection Algorithms for Marine Waste Recognition
YOLOv8 vs. YOLOv9: Evaluating Object Detection Algorithms fo...
收藏 引用
IEEE International Symposium on Consumer Electronics (ISCE)
作者: Achmad Zahir Wajdi Prasetyo Wibowo Shiori Sasaki Department of Informatics and Computer Engineering Politeknik Elektronika Negeri Surabaya Surabaya Indonesia Faculty of Data Science Musashino University Tokyo Japan
Marine debris, the majority of which is composed of plastic (61 % to 87 %), is a significant environmental issue facing the world. Between 4.8 million and 12.7 million metric tons of plastic are thought to have entere... 详细信息
来源: 评论