咨询与建议

限定检索结果

文献类型

  • 56,820 篇 会议
  • 26,648 篇 期刊文献
  • 930 册 图书

馆藏范围

  • 84,398 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50,964 篇 工学
    • 36,817 篇 计算机科学与技术...
    • 29,423 篇 软件工程
    • 13,995 篇 信息与通信工程
    • 8,104 篇 控制科学与工程
    • 6,149 篇 电气工程
    • 5,888 篇 电子科学与技术(可...
    • 5,644 篇 生物工程
    • 4,242 篇 生物医学工程(可授...
    • 3,456 篇 机械工程
    • 3,433 篇 光学工程
    • 2,668 篇 仪器科学与技术
    • 2,433 篇 动力工程及工程热...
    • 2,094 篇 化学工程与技术
    • 2,073 篇 网络空间安全
    • 2,036 篇 安全科学与工程
    • 1,759 篇 交通运输工程
  • 26,591 篇 理学
    • 14,511 篇 数学
    • 7,344 篇 物理学
    • 6,356 篇 生物学
    • 4,492 篇 统计学(可授理学、...
    • 3,182 篇 系统科学
    • 2,332 篇 化学
  • 14,217 篇 管理学
    • 8,740 篇 管理科学与工程(可...
    • 6,028 篇 图书情报与档案管...
    • 4,030 篇 工商管理
  • 4,398 篇 医学
    • 3,702 篇 临床医学
    • 3,188 篇 基础医学(可授医学...
    • 1,917 篇 药学(可授医学、理...
    • 1,859 篇 公共卫生与预防医...
  • 2,407 篇 法学
    • 1,917 篇 社会学
  • 1,459 篇 经济学
  • 1,122 篇 农学
  • 1,078 篇 教育学
  • 443 篇 文学
  • 245 篇 军事学
  • 152 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 4,337 篇 computer science
  • 1,838 篇 feature extracti...
  • 1,739 篇 accuracy
  • 1,712 篇 deep learning
  • 1,610 篇 computational mo...
  • 1,592 篇 machine learning
  • 1,542 篇 data mining
  • 1,232 篇 training
  • 1,140 篇 wireless sensor ...
  • 1,050 篇 support vector m...
  • 1,024 篇 internet of thin...
  • 963 篇 bandwidth
  • 929 篇 artificial intel...
  • 928 篇 optimization
  • 920 篇 protocols
  • 875 篇 computer archite...
  • 867 篇 educational inst...
  • 860 篇 routing
  • 842 篇 application soft...
  • 819 篇 predictive model...

机构

  • 1,461 篇 department of co...
  • 627 篇 department of co...
  • 496 篇 institute of inf...
  • 474 篇 maharishi school...
  • 352 篇 department of co...
  • 349 篇 department of co...
  • 277 篇 department of ph...
  • 260 篇 faculty of scien...
  • 259 篇 faculté des scie...
  • 258 篇 department of ph...
  • 227 篇 departamento de ...
  • 220 篇 department of ph...
  • 216 篇 department of co...
  • 214 篇 physics division...
  • 213 篇 department of ph...
  • 206 篇 department of co...
  • 195 篇 department of ph...
  • 194 篇 department of co...
  • 185 篇 department of ph...
  • 164 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 265 篇 a. c. könig
  • 263 篇 m. klein
  • 262 篇 r. ströhmer
  • 261 篇 h. a. gordon
  • 258 篇 h. sakamoto
  • 251 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 237 篇 s. jin
  • 231 篇 d. guest
  • 222 篇 g. gaudio
  • 203 篇 chang chin-chen
  • 202 篇 f. pastore

语言

  • 80,762 篇 英文
  • 2,665 篇 其他
  • 970 篇 中文
  • 55 篇 日文
  • 13 篇 德文
  • 11 篇 法文
  • 10 篇 斯洛文尼亚文
  • 4 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 西班牙文
检索条件"机构=Department and Information Engineering and Computer Science"
84398 条 记 录,以下是151-160 订阅
排序:
Detecting Adversarial Examples of Fake News via the Neurons Activation State
收藏 引用
IEEE Transactions on Computational Social Systems 2024年 第4期11卷 5199-5209页
作者: Tseng, Fan-Hsun Zeng, Jiang-Yi Cho, Hsin-Hung Yeh, Kuo-Hui Chen, Chi-Yuan National Cheng Kung University Department of Computer Science and Information Engineering Tainan70101 Taiwan National Ilan University Department of Computer Science and Information Engineering Yilan26047 Taiwan National Dong Hwa University Department of Information Management Hualien974301 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
Due to the development of technologies, such as the Internet and mobile communication, news production is increasing day by day. Proper news delivery can lead to a thriving economy and disseminate knowledge. However, ... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论
Energy Efficient Unequal Fault Tolerance Clustering Approach
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1971-1983页
作者: Sowjanya Ramisetty Divya Anand Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz Department of Computer Science and Engineering KG Reddy College of Engineering and TechnologyHyderabadIndia School of Computer Science and Engineering Lovely Professional UniversityPhagwaraIndia Department of Computer Science and Engineering Chandigarh UniversityMohaliIndia Department of Computer Science and Engineering Tailor’s UniversityMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV Networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
Multi-Objective Offloading Optimization in MEC and Vehicular-Fog Systems: A Distributed-TD3 Approach
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第11期25卷 16897-16909页
作者: Wakgra, Frezer Guteta Kar, Binayak Tadele, Seifu Birhanu Shen, Shan-Hsiang Khan, Asif Uddin The Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei106 Taiwan The School of Computer Engineering KIIT Deemed to be University Odisha Bhubaneswar751024 India
The emergence of 5G networks has enabled the deployment of a two-tier edge and vehicular-fog network. It comprises Multi-access Edge Computing (MEC) and Vehicular-Fogs (VFs), strategically positioned closer to Interne... 详细信息
来源: 评论
Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
收藏 引用
science China(information sciences) 2022年 第7期65卷 67-85页
作者: Huanruo LI Yunfei GUO Shumin HUO Hongchao HU Penghao SUN Department of Computer Science Information Engineering University Department of Communication Technologies Academy of Military Science
Implementing defensive deception in the cloud is promising to proactively counter reconnaissance attack. This technique presents decoys to camouflage cloud assets and distracts attack resource. However,the major chall... 详细信息
来源: 评论
Video forgery localization using inter-frame denoising and intra-frame segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Banerjee, Debanik Chittaragi, Nagaratna B. Koolagudi, Shashidhar G. Department of Computer Science and Engineering National Institute of Technology Karnataka Karnataka Surathkal575025 India Department of Information Science and Engineering Siddaganaga Institute of Technology Karnataka Tumkur572103 India
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video... 详细信息
来源: 评论
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4127-4148页
作者: Abdulelah Alwabel Chinmaya Kumar Swain Department of Computer Sciences College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Engineering Institute of Management and Information TechnologyCuttackBPUTOdishaIndia
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data ***,the maj... 详细信息
来源: 评论
Automatic Transportation Mode Classification Using a Deep Reinforcement Learning Approach With Smartphone Sensors
收藏 引用
IEEE Access 2024年 12卷 514-533页
作者: Taherinavid, Siavash Moravvej, Seyed Vahid Chen, Yen-Lin Yang, Jing Ku, Chin Soon Yee, Por Lip Iran University of Science and Technology School of Civil Engineering Tehran13114-16846 Iran Isfahan University of Technology Department of Electrical and Computer Engineering Isfahan84156-83111 Iran National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论