咨询与建议

限定检索结果

文献类型

  • 16,823 篇 期刊文献
  • 14,798 篇 会议
  • 169 册 图书

馆藏范围

  • 31,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,995 篇 工学
    • 10,781 篇 计算机科学与技术...
    • 8,454 篇 软件工程
    • 3,653 篇 信息与通信工程
    • 3,086 篇 电子科学与技术(可...
    • 2,856 篇 电气工程
    • 2,175 篇 光学工程
    • 2,145 篇 控制科学与工程
    • 2,072 篇 生物工程
    • 1,794 篇 生物医学工程(可授...
    • 1,459 篇 化学工程与技术
    • 1,340 篇 材料科学与工程(可...
    • 1,174 篇 机械工程
    • 1,154 篇 仪器科学与技术
    • 889 篇 动力工程及工程热...
    • 597 篇 力学(可授工学、理...
  • 14,026 篇 理学
    • 7,056 篇 物理学
    • 4,975 篇 数学
    • 2,630 篇 生物学
    • 1,780 篇 统计学(可授理学、...
    • 1,701 篇 化学
    • 941 篇 系统科学
    • 897 篇 地球物理学
  • 4,226 篇 管理学
    • 2,601 篇 管理科学与工程(可...
    • 1,680 篇 图书情报与档案管...
    • 1,080 篇 工商管理
  • 2,032 篇 医学
    • 1,669 篇 临床医学
    • 1,296 篇 基础医学(可授医学...
    • 775 篇 药学(可授医学、理...
    • 605 篇 公共卫生与预防医...
  • 738 篇 法学
    • 591 篇 社会学
  • 439 篇 农学
  • 394 篇 经济学
  • 378 篇 教育学
  • 135 篇 文学
  • 66 篇 军事学
  • 54 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 873 篇 computer science
  • 499 篇 deep learning
  • 349 篇 feature extracti...
  • 338 篇 machine learning
  • 307 篇 computational mo...
  • 257 篇 accuracy
  • 210 篇 computer archite...
  • 209 篇 semantics
  • 208 篇 application soft...
  • 206 篇 support vector m...
  • 205 篇 routing
  • 198 篇 data mining
  • 196 篇 internet of thin...
  • 196 篇 image segmentati...
  • 191 篇 training
  • 173 篇 galaxies
  • 160 篇 artificial intel...
  • 158 篇 throughput
  • 152 篇 reinforcement le...
  • 151 篇 hadron colliders

机构

  • 1,044 篇 cavendish labora...
  • 977 篇 department of ph...
  • 923 篇 oliver lodge lab...
  • 905 篇 physikalisches i...
  • 901 篇 infn laboratori ...
  • 847 篇 infn sezione di ...
  • 820 篇 infn sezione di ...
  • 806 篇 infn sezione di ...
  • 649 篇 university of ch...
  • 647 篇 infn sezione di ...
  • 636 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 525 篇 fakultät physik ...
  • 515 篇 school of physic...
  • 508 篇 yerevan physics ...
  • 483 篇 horia hulubei na...
  • 474 篇 iccub universita...
  • 465 篇 school of physic...
  • 464 篇 h.h. wills physi...
  • 454 篇 department of ph...

作者

  • 374 篇 j. wang
  • 237 篇 barter w.
  • 234 篇 beiter a.
  • 227 篇 a. gomes
  • 224 篇 a. vorobyev
  • 222 篇 bellee v.
  • 211 篇 y. chen
  • 209 篇 c. alexa
  • 208 篇 s. chen
  • 206 篇 h. li
  • 203 篇 j. m. izen
  • 196 篇 brundu d.
  • 193 篇 blake t.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 192 篇 bowcock t.j.v.
  • 191 篇 j. strandberg
  • 190 篇 d. calvet
  • 190 篇 a. bocci
  • 188 篇 y. gao

语言

  • 29,759 篇 英文
  • 1,563 篇 其他
  • 431 篇 中文
  • 28 篇 日文
  • 5 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Center for Network Science and Technology"
31790 条 记 录,以下是211-220 订阅
排序:
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
ML-based Intrusion Detection as a Service: Traffic Split Offloading and Cost Allocation in a Multi-tier Architecture
收藏 引用
IEEE Transactions on Services Computing 2025年 第03期18卷 1557-1572页
作者: Sudyana, Didik Lai, Yuan-Cheng Lin, Ying-Dar Cholda, Piotr National Cheng Kung University Computer and Network Center Tainan701 Taiwan National Taiwan University of Science and Technology Department of Information Management Taipei106 Taiwan National Yang Ming Chiao Tung University Department of Computer Science Hsinchu300 Taiwan AGH University of Krakow Institute of Telecommunications Kraków Poland
An Intrusion Detection System (IDS) employing machine learning (ML) solutions is crucial for identifying network intrusions. To minimize operational expenses and enhance performance, enterprises have begun outsourcing... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论
Deciphering urban traffic impacts on air quality by deep learning and emission inventory
收藏 引用
Journal of Environmental sciences 2023年 第2期124卷 745-757页
作者: Wenjie Du Lianliang Chen Haoran Wang Ziyang Shan Zhengyang Zhou Wenwei Li Yang Wang School of Software Engineering University of Science and Technology of ChinaHefei 230026China Suzhou Institute for Advanced Research University of Science and Technology of ChinaSuzhou 215123China Alibaba Inc. Hangzhou 310052China School of Computer Science and Technology University of Science and Technology of ChinaHefei 230026China CAS Key Laboratory of Urban Pollutant Conversion Department of environmental science and EngineeringUniversity of Science and Technology of ChinaHefei 230026China USTC-CityU Joint Advanced Research Center Suzhou 215123China
Air pollution is a major obstacle to future sustainability,and traffic pollution has become a large drag on the sustainable developments of future ***,combined with the large volume of real-time monitoring data,we pro... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Data Replication Methods in Cloud, Fog, and Edge Computing: A Systematic Literature Review
收藏 引用
Wireless Personal Communications 2024年 第1期135卷 531-561页
作者: Karamimirazizi, Fatemeh Jameii, Seyed Mahdi Rahmani, Amir Masoud Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran Department of Computer Engineering Shahr-e-Qods Branch Islamic Azad University Tehran Iran Future Technology Research Center National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou64002 Taiwan
Nowadays, a large amount of data is being generated and these data are usually stored in distributed environments such as cloud, fog, and edge environments. Data replication, which is commonly used to manage large amo... 详细信息
来源: 评论
An Energy-Aware Resource Management Strategy Based on Spark and YARN in Heterogeneous Environments
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2024年 第2期8卷 635-644页
作者: Shabestari, Fatemeh Jafari Navimipour, Nima Islamic Azad University Sofian Branch Department of Computer Engineering Sofian Iran Kadir Has University Department of Computer Engineering Istanbul34083 Turkey National Yunlin University of Science and Technology Future Technology Research Center Douliou64002 Taiwan
Apache Spark is a popular framework for processing big data. Running Spark on Hadoop YARN allows it to schedule Spark workloads alongside other data-processing frameworks on Hadoop. When an application is deployed in ... 详细信息
来源: 评论
IRS-enabled NOMA communication systems:A network architecture primer with future trends and challenges
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1503-1528页
作者: Haleema Sadia Ahmad Kamal Hassan Ziaul Haq Abbas Ghulam Abbas Muhammad Waqas Zhu Han Faculty of Electrical Engineering and Telecommunications and Networking(TeleCoN)Research Center Ghulam Ishaq Khan Institute of Engineering and Technology(GIKI)Topi 23640Pakistan Faculty of Computer Science and Engineering GIKITopi 23640Pakistan Department of Computer Engineering College of Information TechnologyUniversity of Bahrain32028Bahrain School of Engineering Edith Cowan UniversityPerth WA6027Australia Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoul 446-701South Korea
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne... 详细信息
来源: 评论
GrCol-PPFL:User-Based Group Collaborative Federated Learning Privacy Protection Framework
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1923-1939页
作者: Jieren Cheng Zhenhao Liu Yiming Shi Ping Luo Victor S.Sheng School of Compute Science and Technology Hainan UniversityHaikou570228China Hainan Blockchain Technology Engineering Research Center Hainan UniversityHaikou570228China Department of Computer Science Texas Tech University TX79409USA
With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more *** on the premise of protecting users’personal privacy data,... 详细信息
来源: 评论
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism
收藏 引用
IEEE Transactions on Cloud Computing 2023年 第3期11卷 3085-3098页
作者: Xiong, Lizhi Han, Xiao Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Jiangsu Nanjing210044 China Nanjing University of Information Science and Technology Engineering Research Center of Digital Forensics Ministry of Education CICAEET Jiangsu Nanjing210044 China National Dong Hwa University Department of Computer Science & Information Engineering Hualien974 Taiwan Fudan University School of Computer Science Shanghai200433 China
Reversible Data Hiding in Encrypted Images (RDHEI) has drawn increasing concern in multimedia cloud computing scenarios. It embeds secret message into the encrypted carrier while preserving the confidentiality of the ... 详细信息
来源: 评论