咨询与建议

限定检索结果

文献类型

  • 3,336 篇 会议
  • 2,031 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,342 篇 工学
    • 2,323 篇 计算机科学与技术...
    • 1,856 篇 软件工程
    • 725 篇 信息与通信工程
    • 545 篇 控制科学与工程
    • 350 篇 电子科学与技术(可...
    • 333 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 机械工程
    • 208 篇 仪器科学与技术
    • 208 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 101 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,776 篇 理学
    • 914 篇 数学
    • 499 篇 物理学
    • 357 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 170 篇 化学
  • 943 篇 管理学
    • 574 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 225 篇 医学
    • 188 篇 临床医学
    • 149 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 农学
  • 63 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 135 篇 feature extracti...
  • 133 篇 deep learning
  • 104 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 optimization
  • 78 篇 machine learning
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 56 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 visualization

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 108 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 school of inform...
  • 37 篇 department of co...
  • 31 篇 college of infor...
  • 30 篇 university of ch...
  • 30 篇 shandong provinc...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 25 篇 ren jiadong
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 255 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5386 条 记 录,以下是401-410 订阅
排序:
Bat Algorithm: A Review on Theory, Modifications and Applications  3
Bat Algorithm: A Review on Theory, Modifications and Applica...
收藏 引用
3rd International Conference on Intelligent Cybernetics technology and Applications, ICICyTA 2023
作者: Singh, Hakam Witarsyah, Deden Misra, Alok Tiwari, Raj Gaurang Chitkara University School of Engineering and Technology Department of Computer Science and Engineering Himachal Paradesh Baddi India Telkom University School of Industrial and System Engineering Information System Departement Bandung Indonesia Lovely Professional University School of Computer Application Punjab Phagwara India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Due to its many applications in a variety of domains, including clustering, cloud computing, and power systems, metaheuristic algorithms have attracted a lot of interest from the scholarly community. By using their se... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
On Big Data Forensic and Forensic Cloud Environment
On Big Data Forensic and Forensic Cloud Environment
收藏 引用
2022 International Conference on Smart Applications, Communications and Networking, SmartNets 2022
作者: Tabona, Oteng Ramokapane, Kopo M. Maupong, Thabiso M. Higher Colleges of Technology Faculty of Computer and Information Systems Abu Dhabi United Arab Emirates University of Bristol Department of Computer Science Bristol United Kingdom Botswana International University of Science and Technology Department of Computer Science and Information System Palapye Botswana
The number of electronic devices involved in cyber related crimes has increased significantly in the last few years. This is primarily due to advancements in technology and increased accessibility to devices. This pos... 详细信息
来源: 评论
The Influence of Digital Financial Literacy on Interest in Investing in the Capital Market of Millennial Generation Students  1
收藏 引用
4th International Conference on Inventive Computation and information Technologies, ICICIT 2022
作者: Gaol, Ford Lumban Christopher Dermawan, Gerry Rafif, Muhammad Resnandya Rubianto, Rully Matsuo, Tokuro Doctor of Computer Science Binus Graduate Program Jakarta Indonesia School of Information System Bina Nusantara University Alam Sutera Indonesia Advanced Institute of Industrial Technology Tokyo Japan
In today's environment, financial knowledge is vital and should be possessed by everyone. Numerous people are financially disadvantaged as a result of the COVID-19 pandemic. This serves as a reminder of the critic... 详细信息
来源: 评论
Nonlinear Deep Subspace Network for Micro-expression Recognition  3
Nonlinear Deep Subspace Network for Micro-expression Recogni...
收藏 引用
3rd Workshop on Facial Micro-Expression: Advanced Techniques for Multi-Modal Facial Expression Analysis, FME 2023
作者: Feng, Weijia Xu, Manlu Chen, Yuanxu Wang, Xiaofeng Guo, Jia Dai, Lei Wang, Nan Zuo, Xinyu Li, Xiaoxue College of Computer and Information Engineering Tianjin Normal University Tianjin China Ping An Technology Shenzhen China Tianjin Key Laboratory for Advanced Mechatronic System Design and Intelligent Control Tianjin University of Technology Tianjin China
Deep learning (DL) models have been widely studied in the field of micro-expression recognition (MER). However, micro-expressions (MEs) suffer from small number of samples and difficulty in extracting subtle and trans... 详细信息
来源: 评论
Analyzing Code Injection Attacks on Applications of Android Devices and Emulator  9
Analyzing Code Injection Attacks on Applications of Android ...
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Erfina, Adhitia Hidayat, Rahmat Rizaldi, Rafli Radya Puput Maulana, Riko Sembiring, Falentino Nusa Putra University Faculty of Engineering Computing and Design Departement of Infomation System Sukabumi Indonesia Budi Luhur University Master of Computer Science Faculty of Information Technology Jakarta Indonesia
The Android operating system released by Google in 2007 has experienced very significant development. In 2019, the number of Android application users reached 2.5 billion. One of the contributing factors is the nature... 详细信息
来源: 评论
The Effect of E-Commerce on Increasing Consumption Behavior During a Pandemic  4th
The Effect of E-Commerce on Increasing Consumption Behavior ...
收藏 引用
4th International Conference on Inventive Computation and information Technologies, ICICIT 2022
作者: Gaol, Ford Lumban Tompunu, Sherina Gloria Larissa, Jessica Adine Wijaksana, Arista Prajnawira, Ferdianto Matsuo, Tokuro Binus Graduate Program—Doctor of Computer Science Jakarta Indonesia School of Information System Bina Nusantara University Alam Sutera Indonesia Advanced Institute of Industrial Technology Tokyo Japan
The rapid development of technology and ease of information today greatly affects all aspects of life. During the COVID-19 pandemic, technology played an important role in maintaining community activities continued sm... 详细信息
来源: 评论
Exploring Global and Local information for Anomaly Detection with Normal Samples
Exploring Global and Local Information for Anomaly Detection...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Xu, Fan Wang, Nan Zhao, Xibin School of Computer Science and Technology University of Science and Technology of China Hefei230026 China School of Software Beijing Jiaotong University Beijing100044 China Key Laboratory for Information System Security Beijing100084 China
Anomaly detection aims to detect data that do not conform to regular patterns, and such data is also called outliers. The anomalies to be detected are often tiny in proportion, containing crucial information, and are ...
来源: 评论
Automated Grading of Breast Cancer Histopathology Images Using Multilayered Autoencoder
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3407-3423页
作者: Shakra Mehak M.Usman Ashraf Rabia Zafar Ahmed M.Alghamdi Ahmed S.Alfakeeh Fawaz Alassery Habib Hamam Muhammad Shafiq Knowledge Unit of System and Technology University of Management&TechnologySialkot Campus51310Pakistan Department of Computer Science University of Management and TechnologySialkot Campus51310Pakistan Faculty of Computing and Technology University of Engineering&TechnologyNarowal51610Pakistan College of Computer Science and Engineering University of Jeddah21493Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia Faculty of Engineering Moncton UniversityNBE1A3E9Canada Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Breast cancer(BC)is the most widely recognized cancer in women *** 2018,627,000 women had died of breast cancer(World Health Organization Report 2018).To diagnose BC,the evaluation of tumours is achieved by analysis o... 详细信息
来源: 评论
Utilization of Waste Banks system in the COVID-19 Pandemic  4th
Utilization of Waste Banks System in the COVID-19 Pandemic
收藏 引用
4th International Conference on Inventive Computation and information Technologies, ICICIT 2022
作者: Pradanang, Riyan Aditya, Bima Rayhan, Adhitya Winarlie, Michael Adrian Gaol, Ford Lumban Matsuo, Tokuro School of Information System Bina Nusantara University Alam Sutera Tangerang Indonesia Computer Science Binus Graduate Program Jakarta Indonesia Advanced Institute of Industrial Technology Tokyo Japan
People’s perspectives and behaviors altered in a variety of ways during the pandemic period, most notably in areas related to health, environment, and most notably waste management. Many people still prefer to work f... 详细信息
来源: 评论