咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是791-800 订阅
排序:
Malicious Clients and Contribution Co-Aware Federated Unlearning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Wang, Yang Li, Xue Chen, Siguang Nanjing University of Posts and Telecommunications Jiangsu Engineering Research Center of Communication and Network Technology Nanjing China Women’s Hospital of Nanjing Medical University Nanjing Women and Children’s Healthcare Hospital Department of Dermatology Nanjing China Hohai University College of Computer Science and Software Engineering Nanjing China
Existing federated unlearning methods to eliminate the negative impact of malicious clients on the global model are influenced by unreasonable assumptions (e.g., an auxiliary dataset) or fail to balance model performa... 详细信息
来源: 评论
TupleChain: Fast Lookup of OpenFlow Table with Multifaceted Scalability
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yanbiao Ren, Neng Wang, Xin Chen, Yuxuan Zhang, Xinyi Guo, Lingbo Xie, Gaogang Computer Network Information Center Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering Stony Brook University Stony BrookNY United States
OpenFlow switches are fundamental components of software defined networking, where the key operation is to look up flow tables to determine which flow an incoming packet belongs to. This needs to address the same mult... 详细信息
来源: 评论
An Analysis of Honeypots and their Impact as a Cyber Deception Tactic
arXiv
收藏 引用
arXiv 2022年
作者: Zielinski, Daniel Kholidy, Hisham A. Polytechnic Institute College of Engineering Network and Computer Security Department UticaNY United States
This paper explores deploying a cyber honeypot system to learn how cyber defenders can use a honeypot system as a deception mechanism to gather intelligence. Defenders can gather intelligence about an attacker such as... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论
A data-driven fault diagnosis method for photovoltaic modules  8
A data-driven fault diagnosis method for photovoltaic module...
收藏 引用
8th International Conference on Power and Renewable Energy, ICPRE 2023
作者: Jiurong, Yang Xingjian, Sun Zhuoran, Ma Xiaojuan, Han China Electric Power Research Institute Co. Ltd Safety and Quality Department Beijing China North China Electric Power University School of Control and Computer Engineering Beijing China State Grid Jibei Electric Power Co. Ltd Intelligent Distribution Network Center China
The existing fault diagnosis of photovoltaic modules mainly focuses on a single fault, while in actual operation, the impact of climate and environmental conditions often leads to multiple faults occurring simultaneou... 详细信息
来源: 评论
Smart Energy Management System Using Machine Learning
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 959-973页
作者: Ali Sheraz Akram Sagheer Abbas Muhammad Adnan Khan Atifa Athar Taher M.Ghazal Hussam Al Hamadi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Department of Computer Science COMSATS University IslamabadLahore CampusLahore54000Pakistan School of Information Technology Skyline University CollegeSharjah1797United Arab Emirates Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Energy management is an inspiring domain in developing of renewable energy ***,the growth of decentralized energy production is revealing an increased complexity for power grid managers,inferring more quality and reli... 详细信息
来源: 评论
African Union Convention on Cyber Security and Personal Data Protection: Challenges and Future Directions
arXiv
收藏 引用
arXiv 2023年
作者: Bouke, Mohamed Aly Abdullah, Azizol Alshatebi, Sameer Hamoud El Atigh, Hayate Cengiz, Korhan Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Department of Computer Engineering Istinye University Istanbul34010 Turkey Department of Information Technologies Faculty of Informatics and Management University of Hradec Kralove Kralove500 03 Czech Republic Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
This paper investigates the challenges and opportunities of implementing the African Union Convention on Cyber Security and Personal Data Protection (AUDPC) across Africa. Focusing on legal, regulatory, technical, inf... 详细信息
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Syed Waleed Riaz Fazlullah Khan Insaf Ullah Bandar Alshawi Ryan Alturki Mohammad Wedyan Computer Science Department Abdul Wali Khan University Mardan KPK Pakistan Faculty of Science and Engineering School of Computer Science University of Nottingham Ningbo China Ningbo Zhejiang China Institute for Analytics and Data Science University of Essex Colchester UK Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Computer Sciences Faculty of Information Technology and Computer Sciences Yarmouk University (YU) Irbid Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论
Computing Power in the Sky: Digital Twin-assisted Collaborative Computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Structured Tensor Decomposition Based Channel Estimation and Double Refinements for Active RIS Empowered Broadband Systems
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Yirun Wang, Yongqing Shen, Yuyao Wang, Gongpu Tellambura, Chintha Beijing Institute of Technology School of Information and Electronics Beijing100081 China Beijing Jiaotong University Engineering Research Center of Network Management Technology for High Speed Railway Ministry of Education School of Computer Science and Technology Beijing100044 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada
Channel parameter recovery is critical for the next-generation reconfigurable intelligent surface (RIS)-empowered communications and sensing. Tensor-based mechanisms are particularly effective, inherently capturing th... 详细信息
来源: 评论