咨询与建议

限定检索结果

文献类型

  • 5,962 篇 会议
  • 3,414 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 9,416 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,593 篇 工学
    • 3,458 篇 计算机科学与技术...
    • 2,766 篇 软件工程
    • 1,096 篇 信息与通信工程
    • 969 篇 控制科学与工程
    • 742 篇 电气工程
    • 740 篇 电子科学与技术(可...
    • 572 篇 生物工程
    • 491 篇 机械工程
    • 443 篇 光学工程
    • 412 篇 生物医学工程(可授...
    • 394 篇 仪器科学与技术
    • 297 篇 动力工程及工程热...
    • 294 篇 化学工程与技术
    • 223 篇 交通运输工程
    • 209 篇 材料科学与工程(可...
    • 199 篇 土木工程
    • 167 篇 安全科学与工程
  • 2,965 篇 理学
    • 1,422 篇 数学
    • 877 篇 物理学
    • 639 篇 生物学
    • 457 篇 统计学(可授理学、...
    • 355 篇 系统科学
    • 300 篇 化学
  • 1,470 篇 管理学
    • 960 篇 管理科学与工程(可...
    • 559 篇 图书情报与档案管...
    • 401 篇 工商管理
  • 387 篇 医学
    • 329 篇 临床医学
    • 259 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 205 篇 法学
    • 171 篇 社会学
  • 157 篇 经济学
  • 93 篇 农学
  • 83 篇 教育学
  • 32 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 185 篇 feature extracti...
  • 175 篇 deep learning
  • 170 篇 computational mo...
  • 147 篇 data mining
  • 145 篇 systems engineer...
  • 127 篇 optimization
  • 123 篇 machine learning
  • 117 篇 neural networks
  • 106 篇 control systems
  • 106 篇 accuracy
  • 101 篇 semantics
  • 94 篇 computer archite...
  • 87 篇 laboratories
  • 85 篇 educational inst...
  • 85 篇 predictive model...
  • 85 篇 training
  • 83 篇 costs
  • 78 篇 bandwidth
  • 78 篇 real-time system...

机构

  • 102 篇 national enginee...
  • 99 篇 college of compu...
  • 80 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 national enginee...
  • 56 篇 college of infor...
  • 46 篇 school of comput...
  • 41 篇 the key laborato...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 31 篇 university of ch...
  • 30 篇 faculty of compu...
  • 28 篇 huazhong univers...
  • 27 篇 school of comput...
  • 27 篇 hubei province k...
  • 26 篇 school of comput...
  • 25 篇 hubei key labora...

作者

  • 72 篇 hai jin
  • 37 篇 jin hai
  • 31 篇 yang yang
  • 29 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 hu shengshan
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 19 篇 jianchao zeng
  • 19 篇 dutta paramartha
  • 18 篇 wang xingjun
  • 17 篇 zhen ji
  • 15 篇 wang lei
  • 15 篇 long zheng
  • 15 篇 zhuang songlin
  • 15 篇 tomio watanabe
  • 15 篇 wang wei

语言

  • 8,390 篇 英文
  • 778 篇 其他
  • 221 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering"
9416 条 记 录,以下是701-710 订阅
排序:
An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3529-3548页
作者: Ghalib H.Alshammri Amani K.Samha Ezz El-Din Hemdan Mohammed Amoon Walid El-Shafai Department of Computer Science Community CollegeKing Saud UniversityRiyadh28095Saudi Arabia Deanship of Scientific Research Saudi Electronic UniversityRiyadhSaudi Arabia Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh28095Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Electronics and Electrical Communications Eng.Depart. Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic *** recent times,the most complex task in Software Defined Network(SDN)is security,which is... 详细信息
来源: 评论
Approximate state estimation with large-scale sensor networks under event-based sensor scheduling strategy  63
Approximate state estimation with large-scale sensor network...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Liu, Xinhui Cheng, Meiqi Shi, Dawei Shi, Ling Beijing Institute of Technology Miit Key Laboratory of Servo Motion System Drive and Control School of Automation Beijing100081 China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong
In this paper, we investigate the issues of real-time sensor scheduling and state estimator design within large-scale sensor network systems. Specifically, data redundancy sometimes occurs in large-scale sensor arrays... 详细信息
来源: 评论
Predicting Useful Information From Typing Patterns Using a Bootstrapped-Based Homogeneous Ensemble Approach  9th
Predicting Useful Information From Typing Patterns Using a B...
收藏 引用
9th International Symposium on Applied Computing for Software and Smart systems, ACSS 2022
作者: Roy, Soumen Roy, Utpal Sinha, Devadatta Pal, Rajat Kumar Department of Computer Science and Engineering University of Calcutta Acharya Prafulla Chandra Roy Siksha Prangan JD-2 Sector - III Saltlake City Kolkata700106 India Department of Computer System Sciences VisvaBharati Santiniketan731235 India
Nowadays, the way a user connects with computing devices is being analysed with the goal of extracting useful information for some interesting applications beyond user authentication. It enables the development of nex... 详细信息
来源: 评论
Trends, Opportunities, and Challenges in Detecting Depressive Disorders Through Mobile Devices: A Review  2
Trends, Opportunities, and Challenges in Detecting Depressiv...
收藏 引用
2nd International Conference on computer system, Information Technology, and Electrical engineering, COSITE 2023
作者: Elwirehardja, Gregorius Natanael Isnan, Mahmud Perbangsa, Anzaludin Samsinga Muchtar, Kahlil Pardamean, Bens Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Mahmud Isnan Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Information System Department School of Information Systems Bina Nusantara University Jakarta11480 Indonesia Department of Electrical and Computer Engineering Universitas Syiah Kuala Banda Aceh23111 Indonesia Computer Science Department BINUS Graduate Program-Master of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Depressive Disorders (DD) is one of the most prevalent mental disorders in the world that may lead to suicide cases. To prevent the latter, ubiquitous early detection systems may be effective. Recent studies have sinc... 详细信息
来源: 评论
Cooperative Relationship Prediction between Scholars in Heterogeneous Academic Network  23
Cooperative Relationship Prediction between Scholars in Hete...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Shi, Jia Jin, Hai Xie, Xia National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Technology Hainan University Haikou China
The real academic network belongs to a heterogeneous network, therefore, for the link prediction tasks, some information on the network may be lost if only using homogeneous network methods. In order to make good use ... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论
Implementation of Soft Computing-Based Optimization Strategies to Enhance Power system Stability  1
Implementation of Soft Computing-Based Optimization Strategi...
收藏 引用
1st International Conference on Futuristic Technologies, INCOFT 2022
作者: Kumar, Gautam Kataria, Mukesh Galgotias University Department of Computer Science and Engineering Uttar Pradesh Greater Noida India Jaipur National University School of Computer & System Sciences Department of Computer Sciences Jaipur India
The improvement of large, interconnected power systems relies basically upon the stability of the power system. Because of the critical robotized needs of both home and modern requirements, the present power system ke... 详细信息
来源: 评论
A Novel Ensemble Deep Learning Framework for Breast Cancer Prediction
A Novel Ensemble Deep Learning Framework for Breast Cancer P...
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical systems, ICSES 2023
作者: Shaker Reddy, Pundru Chandra Nithyapriya, S. Sharma, Nipun Maheswari, S. Jayaram, B. Katale, Tejaswini SR University School of Computer Science and Artificial Intelligence Telangana Warangal506371 India Anna University Artificial Intelligence and Data Science Bannari Amman Institute of Technology Tamil Nadu Chennai India Presidency University Bangalore Electronics and Communication Engineering Karnataka India Sathyabama Institute of Science and Technology Department of Mathematics Tamil Nadu Chennai India Computer Science and Business System RMK Engineering College Tamil Nadu Kavaraipettai India Vishwakarma Institute of Technology Department of Computer Engineering Maharashtra Pune India
Because of its high incidence and high mortality rate, breast cancer requires reliable means of early detection and diagnosis to improve survival rates for its patients. With advantages including increased accuracy an... 详细信息
来源: 评论
Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2639-2653页
作者: V.Praveena A.Vijayaraj P.Chinnasamy Ihsan Ali Roobaea Alroobaea Saleh Yahya Alyahyan Muhammad Ahsan Raza Department of Computer Science and Engineering Dr.N.G.P Institute of TechnologyCoimbatore641048India Department of Information Technology Vignan’s Foundation for ScienceTechnology&ResearchGuntur522213India Department of Information Technology Sri Shakthi Institute of Engineering and TechnologyCoimbatore641062India Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala Lumpur50603Malaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science Community College in DwadmiShaqra University11961Saudi Arabia Department of Information Technology Bahauddin Zakariya UniversityMultan60000Pakistan
In recent years,progressive developments have been observed in recent technologies and the production cost has been continuously *** such scenario,Internet of Things(IoT)network which is comprised of a set of Unmanned... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论