咨询与建议

限定检索结果

文献类型

  • 273,162 篇 会议
  • 112,863 篇 期刊文献
  • 2,781 册 图书

馆藏范围

  • 388,805 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,103 篇 工学
    • 149,617 篇 计算机科学与技术...
    • 121,008 篇 软件工程
    • 54,628 篇 信息与通信工程
    • 35,815 篇 控制科学与工程
    • 31,966 篇 电气工程
    • 30,609 篇 电子科学与技术(可...
    • 26,000 篇 生物工程
    • 20,441 篇 生物医学工程(可授...
    • 17,850 篇 光学工程
    • 15,546 篇 机械工程
    • 13,079 篇 化学工程与技术
    • 12,209 篇 仪器科学与技术
    • 12,154 篇 动力工程及工程热...
    • 10,920 篇 材料科学与工程(可...
    • 8,327 篇 安全科学与工程
    • 7,877 篇 网络空间安全
  • 127,332 篇 理学
    • 63,220 篇 数学
    • 41,829 篇 物理学
    • 29,490 篇 生物学
    • 20,402 篇 统计学(可授理学、...
    • 14,882 篇 系统科学
    • 14,048 篇 化学
  • 55,978 篇 管理学
    • 33,687 篇 管理科学与工程(可...
    • 24,484 篇 图书情报与档案管...
    • 16,673 篇 工商管理
  • 19,407 篇 医学
    • 16,215 篇 临床医学
    • 14,576 篇 基础医学(可授医学...
    • 9,158 篇 药学(可授医学、理...
    • 7,764 篇 公共卫生与预防医...
  • 10,518 篇 法学
    • 8,605 篇 社会学
  • 6,451 篇 经济学
  • 5,099 篇 农学
  • 4,167 篇 教育学
  • 1,866 篇 文学
  • 872 篇 军事学
  • 511 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,985 篇 computer science
  • 8,799 篇 accuracy
  • 8,606 篇 computational mo...
  • 7,863 篇 feature extracti...
  • 7,458 篇 deep learning
  • 7,238 篇 machine learning
  • 6,427 篇 training
  • 5,257 篇 data mining
  • 5,110 篇 computer archite...
  • 5,016 篇 support vector m...
  • 4,932 篇 wireless sensor ...
  • 4,799 篇 predictive model...
  • 4,649 篇 costs
  • 4,531 篇 bandwidth
  • 4,483 篇 optimization
  • 4,478 篇 application soft...
  • 4,369 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,321 篇 testing
  • 4,273 篇 neural networks

机构

  • 1,696 篇 department of co...
  • 1,364 篇 department of co...
  • 1,346 篇 department of el...
  • 1,158 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 973 篇 department of ph...
  • 879 篇 department of co...
  • 856 篇 physikalisches i...
  • 844 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 745 篇 university of ch...
  • 638 篇 department of co...
  • 550 篇 infn sezione di ...
  • 539 篇 department of co...
  • 521 篇 infn laboratori ...
  • 519 篇 infn sezione di ...
  • 516 篇 chitkara univers...
  • 502 篇 horia hulubei na...
  • 502 篇 infn sezione di ...
  • 486 篇 department of co...

作者

  • 258 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 237 篇 a. gomes
  • 225 篇 blake t.
  • 223 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 j. m. izen
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 193 篇 g. bella
  • 193 篇 c. amelung
  • 192 篇 j. strandberg

语言

  • 372,465 篇 英文
  • 12,661 篇 其他
  • 3,698 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 33 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Engineering and Computer Science"
388806 条 记 录,以下是261-270 订阅
排序:
Usability and Security Analysis of the Compare-and-Confirm Method in Mobile Push-Based Two-Factor Authentication
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4623-4638页
作者: Jubur, Mohammed Saxena, Nitesh Reegu, Faheem A. Jazan University Department of Computer Network Engineering Jazan45142 Saudi Arabia Texas A&M University Department of Computer Science Engineering College StationTX77840 United States
Push-based two-factor authentication (2FA) methods, such as the "Just-Confirm" approach, are popular due to their user-friendly design, requiring users to simply approve or deny a push notification on their ... 详细信息
来源: 评论
FLARE: Defending Federated Learning Against Model Poisoning Attacks via Latent Space Representations
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2607-2623页
作者: Wang, Ning Zhang, Chaoyu Xiao, Yang Chen, Yimin Lou, Wenjing Hou, Y. Thomas University of South Florida Department of Computer Science and Engineering TampaFL33620 United States Virginia Tech Department of Computer Science ArlingtonVA22203 United States University of Kentucky Department of Computer Science LexingtonKY40506 United States University of Massachusetts Lowell Miner School of Computer and Information Sciences LowellMA01854 United States Virginia Tech Bradley Department of Electrical and Computer Engineering BlacksburgVA24061 United States
Federated learning (FL) has been shown vulnerable to a new class of adversarial attacks, known as model poisoning attacks (MPA), where one or more malicious clients try to poison the global model by sending carefully ... 详细信息
来源: 评论
Osmotic Computing Based Secure Resource Orchestration Scheme for Vehicular Communication  17
Osmotic Computing Based Secure Resource Orchestration Scheme...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Garg, Deepanshu Angurala, Mohit Bali, Rasmeet S. Kumar, Neeraj Chandigarh University Computer Science & Engineering Department India Guru Nanak Dev University Computer Science Department India Thapar University Patiala Computer Science & Engineering Department India
The advancement in technology leads to provide an efficient communication among vehicles to offload resource-intensive tasks for transportation-based services. However, it may cause issue related to efficient secure r... 详细信息
来源: 评论
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论
Integrated fuzzy-based gamma adaptive for image enhancement with color attenuation prior
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 11249-11267页
作者: Harne, Sachin Choubey, Siddhartha Choubey, Abha Department of Computer Application Shri Shankaracharya Group of Institution Chhattisgarh Bhilai India Department of Computer Science and Engineering Shri Shankaracharya Group of Institution Chhattisgarh Bhilai India
Images Quality in the Transportation industry is considered the most significant term and gains more attention among the higher authorities and researchers. Therefore, the accuracy level of the image has been evaluate... 详细信息
来源: 评论
A lightweight identity based mutual authenticated key agreement scheme for telecare medical information system
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Banerjee, Ananya Sahana, Subhas Chandra Department of Computer Science & Engineering National Institute of Technology West Bengal Durgapur713209 India
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ... 详细信息
来源: 评论
Polarization-encodable photonic memory cells using nextgeneration 2D phase-change materials
收藏 引用
Nano Research 2025年 第3期18卷 510-518页
作者: Amin Shafiee Linhong Chen Mahdi Nikdast Jie Yao Department of Electrical and Computer Engineering Colorado State UniversityFort CollinsCO 80523USA Department of Materials Science and Engineering University of CaliforniaBerkeleyCA 94720USA
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb... 详细信息
来源: 评论
TWISH: an enhanced activation function for optimizing mental health and comorbidity risk assessment during COVID-19 using deep learning
收藏 引用
Multimedia Tools and Applications 2025年 1-21页
作者: Bhimavarapu, Usharani Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India
Significant health hazards have been associated with the COVID-19 pandemic, especially for women, whose mental and physical health have suffered greatly. In order to predict the risk of COVID-19 in women, this study i... 详细信息
来源: 评论
Multi-agent Path Planning Based on Conflict-Based Search (CBS) Variations for Heterogeneous Robots
收藏 引用
Journal of Intelligent and Robotic Systems: Theory and Applications 2025年 第1期111卷 1-12页
作者: Bai, Yifan Kotpalliwar, Shruti Kanellakis, Christoforos Nikolakopoulos, George Department of Computer Science Electrical and Space Engineering Luleå University of Technology Luleå797187 Sweden
This article introduces a novel Multi-agent path planning scheme based on Conflict Based Search (CBS) for heterogeneous holonomic and non-holonomic agents, designated as Heterogeneous CBS (HCBS). The proposed methodol... 详细信息
来源: 评论
HCBiL-DMN: an effective food infestation detection from stored food grains using deep learning model
收藏 引用
Multimedia Tools and Applications 2025年 第14期84卷 14047-14070页
作者: Vedavathi, N. Suhas Bharadwaj, R. Department of Computer Science and Engineering Vidyavardhaka College of Engineering Karnataka Mysuru570002 India Department of Information Science and Engineering The National Institute of Engineering Karnataka Mysuru570008 India
Food Infestation Detection is more important for food safety and health concerns. It is a challenging task to separate the grains into infested or non-infested. It is found that in the existing system, there is no eff... 详细信息
来源: 评论