咨询与建议

限定检索结果

文献类型

  • 42,726 篇 会议
  • 26,412 篇 期刊文献
  • 693 册 图书

馆藏范围

  • 69,831 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 43,015 篇 工学
    • 31,878 篇 计算机科学与技术...
    • 26,741 篇 软件工程
    • 10,400 篇 信息与通信工程
    • 6,311 篇 控制科学与工程
    • 5,982 篇 生物工程
    • 5,118 篇 生物医学工程(可授...
    • 4,806 篇 电气工程
    • 3,879 篇 电子科学与技术(可...
    • 3,497 篇 光学工程
    • 2,607 篇 机械工程
    • 2,224 篇 仪器科学与技术
    • 2,079 篇 化学工程与技术
    • 1,989 篇 动力工程及工程热...
    • 1,893 篇 网络空间安全
    • 1,751 篇 安全科学与工程
    • 1,580 篇 交通运输工程
  • 24,979 篇 理学
    • 12,509 篇 数学
    • 7,128 篇 生物学
    • 6,654 篇 物理学
    • 4,849 篇 统计学(可授理学、...
    • 2,448 篇 系统科学
    • 2,438 篇 化学
  • 13,240 篇 管理学
    • 7,517 篇 管理科学与工程(可...
    • 6,222 篇 图书情报与档案管...
    • 3,805 篇 工商管理
  • 5,591 篇 医学
    • 4,591 篇 临床医学
    • 4,102 篇 基础医学(可授医学...
    • 2,510 篇 公共卫生与预防医...
    • 2,316 篇 药学(可授医学、理...
  • 2,493 篇 法学
    • 2,109 篇 社会学
  • 1,496 篇 经济学
  • 1,178 篇 农学
  • 1,013 篇 教育学
  • 326 篇 文学
  • 136 篇 军事学
  • 107 篇 艺术学
  • 12 篇 哲学
  • 12 篇 历史学

主题

  • 2,259 篇 accuracy
  • 1,975 篇 deep learning
  • 1,846 篇 machine learning
  • 1,661 篇 computer science
  • 1,607 篇 data mining
  • 1,596 篇 data models
  • 1,532 篇 training
  • 1,487 篇 feature extracti...
  • 1,312 篇 computational mo...
  • 1,256 篇 predictive model...
  • 1,128 篇 internet of thin...
  • 1,006 篇 real-time system...
  • 988 篇 support vector m...
  • 926 篇 artificial intel...
  • 924 篇 convolutional ne...
  • 669 篇 optimization
  • 645 篇 cloud computing
  • 605 篇 semantics
  • 605 篇 security
  • 573 篇 wireless sensor ...

机构

  • 976 篇 cavendish labora...
  • 945 篇 department of ph...
  • 884 篇 oliver lodge lab...
  • 864 篇 physikalisches i...
  • 597 篇 university of ch...
  • 559 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 511 篇 horia hulubei na...
  • 501 篇 school of physic...
  • 500 篇 imperial college...
  • 497 篇 school of physic...
  • 490 篇 nikhef national ...
  • 489 篇 stfc rutherford ...
  • 484 篇 iccub universita...
  • 482 篇 h.h. wills physi...
  • 476 篇 school of physic...
  • 476 篇 physik-institut ...
  • 470 篇 henryk niewodnic...
  • 468 篇 department of co...
  • 468 篇 school of physic...

作者

  • 250 篇 barter w.
  • 236 篇 a. gomes
  • 235 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 s. chen
  • 211 篇 c. alexa
  • 211 篇 brundu d.
  • 211 篇 bowcock t.j.v.
  • 210 篇 j. m. izen
  • 209 篇 g. bella
  • 209 篇 j. strandberg
  • 209 篇 d. calvet
  • 209 篇 c. amelung
  • 203 篇 blake t.
  • 202 篇 boettcher t.
  • 201 篇 amato s.
  • 199 篇 betancourt c.
  • 198 篇 borsato m.
  • 195 篇 g. spigo
  • 194 篇 m. gandelman

语言

  • 63,669 篇 英文
  • 5,608 篇 其他
  • 577 篇 中文
  • 31 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 7 篇 斯洛文尼亚文
  • 6 篇 朝鲜文
  • 3 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Data Science Program Computer Science Department School of Computer Science"
69831 条 记 录,以下是831-840 订阅
排序:
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on data Engineering and Communication Systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论
Medical data publishing based on average distribution and clustering
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第3期7卷 381-394页
作者: Tong Yi Minyong Shi Haibin Zhu School of Computer Science and Engineering Guangxi Normal UniversityGuilinChina School of Computer Science Communication University of ChinaBeijingChina Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada
Most of the data publishing methods have not considered sensitivity protection,and hence the adversary can disclose privacy by sensitivity *** with this problem,this paper presents a medical data publishing method bas... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc Networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论
Segment Proximity Graphs and Nearest Neighbor Queries Amid Disjoint Segments  32
Segment Proximity Graphs and Nearest Neighbor Queries Amid D...
收藏 引用
32nd Annual European Symposium on Algorithms, ESA 2024
作者: Agarwal, Pankaj K. Kaplan, Haim Katz, Matthew J. Sharir, Micha Department of Computer Science Duke University DurhamNC United States School of Computer Science Tel Aviv University Israel Department of Computer Science Ben-Gurion University of the Negev Beer Sheva Israel
In this paper we study a few proximity problems related to a set of pairwise-disjoint segments in R2. Let S be a set of n pairwise-disjoint segments in R2, and let r > 0 be a parameter. We define the segment proxim... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
M3Hop-CoT: Misogynous Meme Identification with Multimodal Multi-hop Chain-of-Thought
M3Hop-CoT: Misogynous Meme Identification with Multimodal Mu...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Kumari, Gitanjali Jain, Kirtan Ekbal, Asif Department of Computer Science and Engineering India Indian Institute of Technology Patna India School of AI and Data Science Indian Institute of Technology Jodhpur India
In recent years, there has been a significant rise in the phenomenon of hate against women on social media platforms, particularly through the use of misogynous memes. These memes often target women with subtle and ob... 详细信息
来源: 评论
Efficient Identification of DeepFake Images using CNN  2
Efficient Identification of DeepFake Images using CNN
收藏 引用
2nd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Gowda, Naveen Chandra Veena, H.N. Ramani, D Roja School of Computer Science and Engineering REVA University Bengaluru India SJB Institute of Technology Department of Computer Science and Engineering Bengaluru India Newhorizon College of Engineering Department of Computer Science and Engineering Bengaluru India
The development of Deepfakes has become more prevalent with the rise of Generative Adversarial Networks (GANs). Deepfakes are synthetically created, modified images that have been made to look real;they pose severe so... 详细信息
来源: 评论
Counterfactual discriminative micro-expression recognition
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-10页
作者: Li, Yong Liu, Menglin Lao, Lingjie Wang, Yuanzhi Cui, Zhen Department of Computer Science City University of Hong Kong 999077 Hong Kong School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China
Micro-expressions are spontaneous, rapid and subtle facial movements that can hardly be suppressed or fabricated. Micro-expression recognition (MER) is one of the most challenging topics in affective computing. It aim... 详细信息
来源: 评论
Optimizing Service Stipulation Uncertainty with Deep Reinforcement Learning for Internet Vehicle Systems
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5705-5721页
作者: Zulqar Nain B.Shahana Shehzad Ashraf Chaudhry P.Viswanathan M.S.Mekala Sung Won Kim Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-siKorea Department of Computer Science and Engineering KLEFIndia Department of Computer Engineering Faculty of Engineering and ArchitectureIstanbul Gelisim UniversityIstanbul34310Turkey School of Computer Science and Engineering VIT UniversityVelloreIndia
Fog computing brings computational services near the network edge to meet the latency constraints of cyber-physical System(CPS)*** devices enable limited computational capacity and energy availability that hamper end ... 详细信息
来源: 评论
Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3909-3927页
作者: Yilei Wang Xin Sun Guiping Zheng Ahmar Rashid Sami Ullah Hisham Alasmary Muhammad Waqas Zhejiang Electric-Power Corporation Research Institute Zhejiang310014China Faculty of Information Technology Beijing University of TechnologyBeijing100124China Beijing Trusty Cloud Technology Co. Ltd.Beijing100022China Department of Computer Science and Engineering Ghulam Ishaq Khan Institute of Engineering Sciences and EngineeringTopi23640Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper Dir18050Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia School of Computing and Mathematical Science Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerth6027Australia
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent *** sensing layer of IIoT comprises the edge converge... 详细信息
来源: 评论