咨询与建议

限定检索结果

文献类型

  • 3,312 篇 会议
  • 2,013 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,362 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,174 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 960 篇 信息与通信工程
    • 487 篇 电气工程
    • 475 篇 电子科学与技术(可...
    • 405 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 172 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 99 篇 材料科学与工程(可...
    • 88 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,659 篇 理学
    • 831 篇 数学
    • 558 篇 物理学
    • 315 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 129 篇 化学
  • 725 篇 管理学
    • 483 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 158 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 wireless communi...
  • 77 篇 computer archite...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 69 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 64 篇 costs
  • 64 篇 machine learning

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,062 篇 英文
  • 208 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5362 条 记 录,以下是1071-1080 订阅
排序:
Ethereum Smart Contract Representation Learning for Robust Bytecode-Level Similarity Detection  34
Ethereum Smart Contract Representation Learning for Robust B...
收藏 引用
34th International Conference on Software engineering and Knowledge engineering, SEKE 2022
作者: Tian, Zhenzhou Huang, Yaqian Tian, Jie Wang, Zhongmin Chen, Yanping Chen, Lingwei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an710121 China Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an710121 China Department of Computer Science and Engineering Wright State University DaytonOH United States
Smart contracts are programs that run on a blockchain, where Ethereum is one of the most popular ones supporting them. Due to the fact that they are immutable, it is essential to design smart contracts bug-free before... 详细信息
来源: 评论
Workshop: Advancements in Metaverse and IoT
Workshop: Advancements in Metaverse and IoT
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Wei Zhao Yuanlong Cao Liang Zhao Zhi Liu School of Computer Science and Technology Anhui University of Technology Anhui China School of Software Jiangxi Normal University Jiangxi China School of Computer Science Shenyang Aerospace University Shenyang China Department of Computer and Network Engineering The University of Electro-Communications Tokyo Japan
The metaverse is a virtual reality world where users can create and tailor their avatars and interact with each other in a digital environment. On the other hand, the Internet of Things (IoT) is a network of Internet-...
来源: 评论
Significance of Internet-of-Things Edge and Fog Computing in Education Sector
Significance of Internet-of-Things Edge and Fog Computing in...
收藏 引用
Smart Computing and Application (ICSCA), International Conference on
作者: Shams Tabrez Siddiqui Mohammad Rafeek Khan Zeba Khan Nadim Rana Haneef Khan Md Imran Alam Department of Computer Science College of CS & IT Jazan University Jazan Saudi Arabia Department of Computer and Network Engineering College of CS & IT Jazan University Jazan Saudi Arabia Computer and Information System Applied College Jazan University Jazan Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
IoT gadgets include smart lights, ovens, and industrial data-collecting equipment. IDC expects 41.6 billion connected IoT devices to generate 79.4 ZB of data by 2025. Early IoT devices sent data to the cloud for analy... 详细信息
来源: 评论
Optimal Feature Manipulation Attacks against Linear Regression
Optimal Feature Manipulation Attacks against Linear Regressi...
收藏 引用
作者: Li, Fuwei Lai, Lifeng Cui, Shuguang Department of Electrical and Computer Engineering University of California DavisCA95616 United States School of Science and Engineering Shenzhen Research Institute of Big Data and Future Network of Intelligence Institute The Chinese University of Hong Kong Shenzhen518172 China
In this paper, we investigate how to manipulate the coefficients obtained via linear regression by adding carefully designed poisoning data points to the dataset or modifying the original data points. Given the energy... 详细信息
来源: 评论
ReSup: Reliable Label Noise Suppression for Facial Expression Recognition
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Zhang, Xiang Lu, Yan Yan, Huan Huang, Jinyang Gu, Yu Ji, Yusheng Liu, Zhi Liu, Bin University of Science and Technology of China School of Cyber Science and Technology Hefei230026 China Hefei University of Technology School of Computer and Information Hefei230601 China AI Lab Shanghai200030 China Guizhou Normal University School of Computer and Information Guiyang230601 China National Institute of Informatics Tokyo101-8430 Japan The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan
Because of the ambiguous and subjective property of the facial expression, the label noise is widely existing in the FER dataset. For this problem, in the training phase, current methods often directly predict whether... 详细信息
来源: 评论
Evaluating Large Language Models Via Multi-Modal User Knowledge Graphs: A Comprehensive Assessment Framework
Evaluating Large Language Models Via Multi-Modal User Knowle...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Pan Liu Zizhao Chen Yihao Li W. Eric Wong Faculty of Business Information Shanghai Business School Shanghai Institute of Network Technology (Yantai) Yantai China Department of Computer Science The University of Texas at Dallas Richardson TX USA China School of Information and Electrical Engineering Ludong University Yantai China
Large language models (LLMs) have been widely adopted across various industries, but issues such as hallucinations, biases, and erroneous outputs frequently arise, compromising their reliability and safety. Objectivel... 详细信息
来源: 评论
DDoS Attack Detection Based on CNN and Federated Learning  9
DDoS Attack Detection Based on CNN and Federated Learning
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Lv, Dingyang Cheng, Xinyu Zhang, Jinghui Zhang, Wei Zhao, Wei Xu, He School of Computer Science and Engineering Southeast University Nanjing China Digital Department China United Network Communications Group Co. Ltd. China Institute for Artificial Intelligence Hefei Comprehensive National Science Center Hefei China School of Computer Science and Technology Anhui University of Technology Hefei China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Distributed Denial of Service (DDoS) attack, which seriously affects the availability of the Internet, is one of the most dangerous network attacks. Machine learning is widely used in DDoS attack detection. However, d... 详细信息
来源: 评论
Deep and Reinforcement Learning Technologies on Internet of Vehicle (IoV) Applications: Current Issues and Future Trends
收藏 引用
Journal of Advanced Transportation 2022年 2022卷
作者: Elmoiz Alatabani, Lina Sayed Ali, Elmustafa Mokhtar, Rania A. Saeed, Rashid A. Alhumyani, Hesham Kamrul Hasan, Mohammad Department of Data Communications and Network Engineering Faculty of Telecommunications The Future University Khartoum Sudan Department of Electrical and Electronics Engineering Faculty of Engineering Red Sea University Bosaso Somalia Department of Computer Engineering College of Computers and Information Technology Taif University P.O. Box 11099 Taif21944 Saudi Arabia Selangor Bangi43600 Malaysia
Recently, artificial intelligence (AI) technology has great attention in transportation systems, which led to the emergence of a new concept known as Internet of Vehicles (IoV). The IoV has been associated with the Io... 详细信息
来源: 评论
Google Map-based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Zhili Yang, Ching-Nung Wang, Shaowei Nan, Guoshun Cimato, Stelvio Zheng, Yifeng Wang, Qian Guangzhou University Institute of Artificial Intel-ligence China Guangdong Key Labor-atory of Blockchain Security Guangdong510006 China National Dong Hwa University Department of Computer Science and Information Engineering Hualian97401 Taiwan national engineering research center for mobile network technologies Beijing100876 China Universitá degli studi di Milano Italy The Hong Kong Polytechnic University Department of Electrical and Electronic Engi-neering Hong Kong Wuhan University School of Cyber Science and Engineering Wuhan430072 China
Passwords are widely used for authentication in Internet applications. Recently, users tend to adopt graphical passwords instead of traditional alphanumeric passwords, since it is much easier for humans to remember im... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论