咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是211-220 订阅
排序:
TextCtrl: Diffusion-based Scene Text Editing with Prior Guidance Control  38
TextCtrl: Diffusion-based Scene Text Editing with Prior Guid...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zeng, Weichao Shu, Yan Li, Zhenhang Yang, Dongbao Zhou, Yu Institute of Information Engineering Chinese Academy of Sciences China VCIP TMCC DISSec College of Computer Science Nankai University China School of Cyber Security University of Chinese Academy of Sciences China
Centred on content modification and style preservation, Scene Text Editing (STE) remains a challenging task despite considerable progress in text-to-image synthesis and text-driven image manipulation recently. GAN-bas...
来源: 评论
A Pricing-Based Cooperative Relay Selection Scheme for Reliable Communications
收藏 引用
China Communications 2024年 第8期21卷 30-44页
作者: Xiao Yulong Wu Yu Amr Tolba Chen Ziqiang Li Tengfei School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science Community CollegeKing Saud UniversityRiyadh 11437Saudi Arabia
With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety... 详细信息
来源: 评论
Arbitrary Reading Order Scene Text Spotter with Local Semantics Guidance  39
Arbitrary Reading Order Scene Text Spotter with Local Semant...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Lyu, Jiahao Wang, Wei Yang, Dongbao Zhong, Jinwen Zhou, Yu Institute of Information Engineering Chinese Academy of Science China VCIP & TMCC & DISSec College of Computer Science Nankai University China Shanghai Artificial Intelligence Laboratory China School of Cyber Security University of Chinese Academy of Sciences China
Scene text spotting has attracted the enthusiasm of relative researchers in recent years. Most existing scene text spotters follow the detection-then-recognition paradigm, where the vanilla detection module hardly det...
来源: 评论
Application of Support Vector Machine to Lassa Fever Diagnosis
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 165-177页
作者: Nwankwo, Wilson Adigwe, Wilfred Umezuruike, Chinecherem Acheme, Ijegwa D. Nwankwo, Chukwuemeka Pascal Ojei, Emmanuel Oghorodi, Duke Department of Computer Science Edo State University Uzairue Nigeria Department of Computer Science Delta State University of Science and Technology Ozoro Nigeria College of Computing and Communication Studies Bowen University Iwo Nigeria Department of Software Engineering Delta State University of Science and Technology Ozoro Nigeria Department of Cyber Security Delta State University of Science and Technology Ozoro Nigeria
Lassa fever is a type of viral hemorrhagic fever with high fatality rate. Precise and prompt diagnosis and successful treatment of this disease is very important in the control and prevention of the spread as unrestri... 详细信息
来源: 评论
A Novel Machine Learning-Based Early Warning Detection System for Business Customer Churn  5
A Novel Machine Learning-Based Early Warning Detection Syste...
收藏 引用
5th IEEE International Conference on Recent Trends in computer science and Technology, ICRTCST 2024
作者: Chandan, Radha Raman Ramaraj, S. Sarishma Praba Devi, P. Sj, Sultanuddin Indhuma, E. Department of Computer Science UP Varanasi221011 India Karpagam College of Engineering Department of Computer Science and Engineering TamilNadu Coimbatore India Graphic Era Deemed to be University Department of Computer Science & Engineering Uttarakhand Dehradun248002 India Sona College of Technology Department of Management Studies Salem India Dhanalakshmi College of Engineering Dept of Cyber Security Tambaram Manimangalam Chennai India St. Martins Engineering College Department of Computer Science and Engineering Telangana Secunderabad India
This study presents an Early Warning Detection System (ML-EWDS) based on machine learning for reducing commercial customer turnover. Companies in all sectors need to be especially concerned about client churn in today... 详细信息
来源: 评论
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs  24
Save the Bruised Striver: A Reliable Live Patching Framework...
收藏 引用
19th European Conference on computer Systems, EuroSys 2024
作者: Zhou, Ming Wang, Haining Li, Ke Zhu, Hongsong Sun, Limin School of Cyber Science and Engineering Nanjing University of Science and Technology China Department of Electrical and Computer Engineering Virginia Tech China Nari Group Corporation State Grid Electric Power Research Institute School of Cyber Security University of Chinese Academy of Sciences China Institute of Information Engineering Cas China Virginia Tech. United States
Industrial Control Systems (ICS), particularly programmable logic controllers (PLCs) responsible for managing underlying physical infrastructures, often operate for extended periods without interruption. Thus, it is c... 详细信息
来源: 评论
Predicting Mental States: Machine Learning Techniques for Personalized Mental Health Support  15
Predicting Mental States: Machine Learning Techniques for Pe...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Hepzibah, Grace Babu, Nirmal Varghese Division of Computer Science Engineering Karunya Institute of Technology and Science Karunya Nagar Tamil Nadu Coimbatore641114 India Division of Data Science and Cyber Security Karunya Institute of Technology and Science Karunya Nagar Tamil Nadu Coimbatore641114 India
As we know that individuals around the globe work difficult to keep up with this hustling world. In any case, due to this each person is managing with diverse wellbeing issues, one of the foremost known issue is sadne... 详细信息
来源: 评论
Detection and Recovery of RFID Harmonic Signal for Wi-Fi Interference
收藏 引用
Journal of Communications and Information Networks 2024年 第4期9卷 330-339页
作者: Chao Gong Ping Li Panlong Yang Zhao Lv School of Computer Science and Technology Anhui UniversityHefei 230000China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of TechnologyMa’anshan 243032China School of Computer science School of Cyber Science and EngineeringNanjing University of Information Science and TechnologyNanjing 210000China
In the realm of the Internet of things(IoT),radio frequency identification(RFID)technology is essential for linking physical objects to digital *** introduction of harmonic technology has expanded RFID’s applications... 详细信息
来源: 评论
Guardian of the Ensembles: Introducing Pairwise Adversarially Robust Loss for Resisting Adversarial Attacks in DNN Ensembles
Guardian of the Ensembles: Introducing Pairwise Adversariall...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Shukla, Shubhi Dalui, Subhadeep Alam, Manaar Datta, Shubhajit Mondal, Arijit Mukhopadhyay, Debdeep Chakrabarti, Partha Pratim Centre for Computational and Data Sciences Iit Kharagpur India Iit Kharagpur Computer Science and Engineering Department India Center for Cyber Security New York University Abu Dhabi United Arab Emirates Iit Kharagpur Department of Artificial Intelligence India Iit Patna Computer Science and Engineering Department India
Adversarial attacks rely on transferability, where an adversarial example (AE) crafted on a surrogate classifier tends to mislead a target classifier. Recent ensemble methods demonstrate that AEs are less likely to mi... 详细信息
来源: 评论
ICP Registration Based on Overlapping Region
ICP Registration Based on Overlapping Region
收藏 引用
Image Processing, computer Vision and Machine Learning (ICICML), International Conference on
作者: Zhuoer Xiao School of Computer Science and Engineering School of Cyber Security) UESTC Chengdu China
To solve the problem that ICP(Iterative Closest Point), a widely used fine registration algorithm, can degrade good initial registration results, this paper introduces a step of overlapping region extraction between t... 详细信息
来源: 评论