咨询与建议

限定检索结果

文献类型

  • 85,981 篇 会议
  • 45,846 篇 期刊文献
  • 1,257 册 图书

馆藏范围

  • 133,084 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 80,597 篇 工学
    • 58,180 篇 计算机科学与技术...
    • 46,807 篇 软件工程
    • 20,344 篇 信息与通信工程
    • 12,597 篇 控制科学与工程
    • 9,542 篇 电气工程
    • 9,325 篇 生物工程
    • 8,581 篇 电子科学与技术(可...
    • 7,184 篇 生物医学工程(可授...
    • 5,685 篇 光学工程
    • 5,560 篇 机械工程
    • 4,097 篇 仪器科学与技术
    • 4,004 篇 动力工程及工程热...
    • 3,875 篇 化学工程与技术
    • 3,758 篇 网络空间安全
    • 3,367 篇 安全科学与工程
    • 2,874 篇 交通运输工程
  • 45,136 篇 理学
    • 23,050 篇 数学
    • 13,664 篇 物理学
    • 10,735 篇 生物学
    • 7,282 篇 统计学(可授理学、...
    • 4,905 篇 系统科学
    • 4,293 篇 化学
  • 23,584 篇 管理学
    • 14,280 篇 管理科学与工程(可...
    • 10,297 篇 图书情报与档案管...
    • 6,491 篇 工商管理
  • 7,630 篇 医学
    • 6,333 篇 临床医学
    • 5,585 篇 基础医学(可授医学...
    • 3,348 篇 药学(可授医学、理...
    • 3,303 篇 公共卫生与预防医...
  • 4,078 篇 法学
    • 3,292 篇 社会学
  • 2,442 篇 经济学
  • 2,074 篇 农学
  • 1,839 篇 教育学
  • 667 篇 文学
  • 361 篇 军事学
  • 264 篇 艺术学
  • 53 篇 哲学
  • 31 篇 历史学

主题

  • 3,968 篇 computer science
  • 3,648 篇 accuracy
  • 3,355 篇 deep learning
  • 3,284 篇 feature extracti...
  • 2,920 篇 machine learning
  • 2,664 篇 computational mo...
  • 2,464 篇 training
  • 2,301 篇 educational inst...
  • 2,035 篇 internet of thin...
  • 1,952 篇 support vector m...
  • 1,923 篇 data mining
  • 1,750 篇 predictive model...
  • 1,739 篇 artificial intel...
  • 1,680 篇 convolutional ne...
  • 1,606 篇 real-time system...
  • 1,595 篇 optimization
  • 1,428 篇 security
  • 1,425 篇 wireless sensor ...
  • 1,342 篇 data models
  • 1,269 篇 cloud computing

机构

  • 1,093 篇 department of co...
  • 1,019 篇 department of ph...
  • 1,014 篇 cavendish labora...
  • 964 篇 oliver lodge lab...
  • 959 篇 physikalisches i...
  • 783 篇 university of ch...
  • 643 篇 college of compu...
  • 617 篇 infn sezione di ...
  • 589 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 561 篇 department of ph...
  • 547 篇 infn sezione di ...
  • 543 篇 fakultät physik ...
  • 541 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 538 篇 imperial college...
  • 532 篇 school of physic...
  • 517 篇 h.h. wills physi...
  • 510 篇 stfc rutherford ...
  • 499 篇 school of physic...

作者

  • 252 篇 barter w.
  • 245 篇 a. gomes
  • 236 篇 s. chen
  • 234 篇 c. alexa
  • 233 篇 j. m. izen
  • 231 篇 beiter a.
  • 229 篇 blake t.
  • 225 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 225 篇 c. amelung
  • 225 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 216 篇 bay a.

语言

  • 126,534 篇 英文
  • 4,857 篇 其他
  • 1,707 篇 中文
  • 101 篇 日文
  • 18 篇 法文
  • 18 篇 斯洛文尼亚文
  • 17 篇 德文
  • 4 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science/ College of Computer Science and Information Technology"
133084 条 记 录,以下是281-290 订阅
排序:
StegMamba: Distortion-Free Immune-Cover for Multi-Image Steganography With State Space Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第5期35卷 4576-4591页
作者: Luo, Ting Zhou, Yuhang He, Zhouyan Jiang, Gangyi Xu, Haiyong Qi, Shuren Zhang, Yushu Ningbo University College of Science and Technology Ningbo315212 China Ningbo University Faculty of Information Science and Engineering Ningbo315211 China The Chinese University of Hong Kong Department of Mathematics Hong Kong Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China
Multi-image steganography ensures privacy protection while avoiding suspicion from third parties by embedding multiple secret images within a cover image. However, existing multi-image steganographic methods fail to m... 详细信息
来源: 评论
Prioritization and meta-heuristic approach for efficient congestion control in vehicular ad hoc networks (VANETs)
收藏 引用
International Journal of information technology (Singapore) 2025年 1-9页
作者: Sharma, Swati Khanum, Saba Madhumala, R.B. Maroju, Abhilash Aggarwal, Saurabh Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Punjab India Department of Computer Science and Engineering MSIT Janakpuri Delhi India Department of Computer Science and Engineering Dayanand Sagar Academy of Technology and Management (DSATM) Bengaluru India Department of Computer Science and Engineering University of Cumberlands Williamsburg United States Department of Information Technology University of the Cumberlands Williamsburg United States
Vehicular ad hoc networks (VANETs) have emerged as a key area of interest in the research community due to their wide range of applications. As the number of vehicles increases, VANETs encounter challenges with access... 详细信息
来源: 评论
Evaluation of jet energy determination in heavy-ion collisions using Machine Learning  2
Evaluation of jet energy determination in heavy-ion collisio...
收藏 引用
2nd International Conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Zhao, Yangguang Wang, Yuhui Zhou, Yujie Bao, Qihan College of Computer Science and Technology Qingdao University Qingdao266071 China College of Food Science Sichuan Agriculture University Chengdu610000 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Computer and Information Science Southwest University Chongqing400715 China
In high-energy physics experiments, the precise reconstruction of the transverse momentum of jets is challenging. The primary obstacle is the interference caused by background noise particles overlapping with the jet ... 详细信息
来源: 评论
Privacy-Preserving Keyword Search with Access Control for Secret Sharing-Based Data Outsourcing
收藏 引用
IEEE Access 2025年 13卷 73625-73651页
作者: Kamal, Ahmad Akmal Aminuddin Mohd Okada, Masamune Fujisawa, Masaya Tokyo University of Science Department of Information and Computer Technology 125 Tokyo85858 Japan Tokyo University of Science Graduate School of Engineering Tokyo125-8585 Japan
Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining its confidentiality. Extensive research has been conducted on searchable encryptio... 详细信息
来源: 评论
A Lightweight Convolutional Neural Network with Squeeze and Excitation Module for Security Authentication Using Wireless Channel
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2025-2040页
作者: Xiaoying Qiu Xiaoyu Ma Guangxu Zhao Jinwei Yu Wenbao Jiang Zhaozhong Guo Maozhi Xu College of Computer Science Beijing Information Science and Technology UniversityBeijing100192China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China School of Mathematical Sciences Peking UniversityBeijing100871China
Physical layer authentication(PLA)in the context of the Internet of Things(IoT)has gained significant *** with traditional encryption and blockchain technologies,PLA provides a more computationally efficient alternati... 详细信息
来源: 评论
Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1973-1986页
作者: Khulud Salem Alshudukhi Mamoona Humayun Ghadah Naif Alwakid Department of Computer Science College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computing School of Arts Humanities and Social SciencesUniversity of RoehamptonLondonSW155PHUK
The Internet ofThings(IoT)and edge computing have substantially contributed to the development and growth of smart *** handled time-constrained services and mobile devices to capture the observing environment for surv... 详细信息
来源: 评论
Escape Routing Using Deep Reinforcement Learning
Escape Routing Using Deep Reinforcement Learning
收藏 引用
2025 International Workshop on Advanced Imaging technology, IWAIT 2025
作者: Cheng, Hsu Fu Cheng, Dun Wei Department of Computer Science and Information Engineering National Yunlin University of Science & Technology Yunlin Taiwan
Escape routing is a critical task in the design of printed circuit boards (PCB) and integrated circuits (IC), aiming to establish effective connections among multiple pin points while avoiding path overlaps and interf... 详细信息
来源: 评论
Comparative Analysis of Brain Tumor Classification Using Transfer Learning  3rd
Comparative Analysis of Brain Tumor Classification Using Tra...
收藏 引用
3rd International Conference on Advances in Computing Research, ACR 2025
作者: Al-Sultan, Noorah Aljuaid, Hanan Department of Computer Science College of Computer and Information Sciences Princess Noura University Riyadh Saudi Arabia
Accurate brain tumor classification is crucial for precise diagnosis and effective treatment planning. Despite the extensive use of comparative analyses of deep learning models in the literature, no prior studies have... 详细信息
来源: 评论
Next-k Items Recommendation with Item Novelty  14th
Next-k Items Recommendation with Item Novelty
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Ma, Hao-Shang Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung Taiwan
Recommendation engines leverage past user preferences to forecast their future interests. Many deep learning-based recommendation systems aim to explore the intricate dynamics between users and particular items. Typic... 详细信息
来源: 评论
HRAM-VITON: High-Resolution Virtual Try-On with Attention Mechanism
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2753-2768页
作者: Yue Chen Xiaoman Liang Mugang Lin Fachao Zhang Huihuang Zhao College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on met... 详细信息
来源: 评论