咨询与建议

限定检索结果

文献类型

  • 16,823 篇 期刊文献
  • 14,798 篇 会议
  • 169 册 图书

馆藏范围

  • 31,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,995 篇 工学
    • 10,781 篇 计算机科学与技术...
    • 8,454 篇 软件工程
    • 3,653 篇 信息与通信工程
    • 3,086 篇 电子科学与技术(可...
    • 2,856 篇 电气工程
    • 2,175 篇 光学工程
    • 2,145 篇 控制科学与工程
    • 2,072 篇 生物工程
    • 1,794 篇 生物医学工程(可授...
    • 1,459 篇 化学工程与技术
    • 1,340 篇 材料科学与工程(可...
    • 1,174 篇 机械工程
    • 1,154 篇 仪器科学与技术
    • 889 篇 动力工程及工程热...
    • 597 篇 力学(可授工学、理...
  • 14,026 篇 理学
    • 7,056 篇 物理学
    • 4,975 篇 数学
    • 2,630 篇 生物学
    • 1,780 篇 统计学(可授理学、...
    • 1,701 篇 化学
    • 941 篇 系统科学
    • 897 篇 地球物理学
  • 4,226 篇 管理学
    • 2,601 篇 管理科学与工程(可...
    • 1,680 篇 图书情报与档案管...
    • 1,080 篇 工商管理
  • 2,032 篇 医学
    • 1,669 篇 临床医学
    • 1,296 篇 基础医学(可授医学...
    • 775 篇 药学(可授医学、理...
    • 605 篇 公共卫生与预防医...
  • 738 篇 法学
    • 591 篇 社会学
  • 439 篇 农学
  • 394 篇 经济学
  • 378 篇 教育学
  • 135 篇 文学
  • 66 篇 军事学
  • 54 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 873 篇 computer science
  • 499 篇 deep learning
  • 349 篇 feature extracti...
  • 338 篇 machine learning
  • 307 篇 computational mo...
  • 257 篇 accuracy
  • 210 篇 computer archite...
  • 209 篇 semantics
  • 208 篇 application soft...
  • 206 篇 support vector m...
  • 205 篇 routing
  • 198 篇 data mining
  • 196 篇 internet of thin...
  • 196 篇 image segmentati...
  • 191 篇 training
  • 173 篇 galaxies
  • 160 篇 artificial intel...
  • 158 篇 throughput
  • 152 篇 reinforcement le...
  • 151 篇 hadron colliders

机构

  • 1,044 篇 cavendish labora...
  • 977 篇 department of ph...
  • 923 篇 oliver lodge lab...
  • 905 篇 physikalisches i...
  • 901 篇 infn laboratori ...
  • 847 篇 infn sezione di ...
  • 820 篇 infn sezione di ...
  • 806 篇 infn sezione di ...
  • 649 篇 university of ch...
  • 647 篇 infn sezione di ...
  • 636 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 525 篇 fakultät physik ...
  • 515 篇 school of physic...
  • 508 篇 yerevan physics ...
  • 483 篇 horia hulubei na...
  • 474 篇 iccub universita...
  • 465 篇 school of physic...
  • 464 篇 h.h. wills physi...
  • 454 篇 department of ph...

作者

  • 374 篇 j. wang
  • 237 篇 barter w.
  • 234 篇 beiter a.
  • 227 篇 a. gomes
  • 224 篇 a. vorobyev
  • 222 篇 bellee v.
  • 211 篇 y. chen
  • 209 篇 c. alexa
  • 208 篇 s. chen
  • 206 篇 h. li
  • 203 篇 j. m. izen
  • 196 篇 brundu d.
  • 193 篇 blake t.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 192 篇 bowcock t.j.v.
  • 191 篇 j. strandberg
  • 190 篇 d. calvet
  • 190 篇 a. bocci
  • 188 篇 y. gao

语言

  • 29,759 篇 英文
  • 1,563 篇 其他
  • 431 篇 中文
  • 28 篇 日文
  • 5 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Center for Network Science and Technology"
31790 条 记 录,以下是61-70 订阅
排序:
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Bouke, Mohamed Aly El Atigh, Hayate Abdullah, Azizol Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io... 详细信息
来源: 评论
Spatio-Temporal Heterogeneous Graph Neural network With Multi-view Learning For Traffic Prediction  27th
Spatio-Temporal Heterogeneous Graph Neural Network With Mult...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Song, Liting Ren, Qianqian Zhou, Ying Department of Computer Science and Technology Heilongjiang University Harbin150080 China Heilongjiang Network Space Research Center Harbin150090 China
Among various traffic data modeling and predicting methods, graph learning-based models attract more attention, because of their powerful representation ability for modeling spatial and temporal dependencies with grap... 详细信息
来源: 评论
Improved Manta Ray Foraging Optimizer-based SVM for Feature Selection Problems:A Medical Case Study
收藏 引用
Journal of Bionic Engineering 2024年 第1期21卷 409-425页
作者: Adel Got Djaafar Zouache Abdelouahab Moussaoui Laith Abualigah Ahmed Alsayat Faculty of informatics University of Science and Technology Houari BoumedieneAlgiersAlgeria LRIA Laboratory University of Science and Technology Houari BoumedieneAlgiersAlgeria Computer Science Department University of Mohamed El Bachir El IbrahimiBordj Bou ArreridjAlgeria Computer Science Department University of Ferhat AbbasSetifAlgeria Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl al-Bayt UniversityMafraq 25113Jordan Department of Computer Science College of Computer and Information SciencesJouf UniversityJoufSaudi Arabia Department of Electrical and Computer Engineering Lebanese American University13-5053ByblosLebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman 19328Jordan MEU Research Unit Middle East UniversityAmman 11831Jordan Applied science research center Applied science private universityAmman 11931Jordan School of Computer Sciences Universiti Sains Malaysia11800 PenangMalaysia School of Engineering and Technology Sunway University Malaysia27500 Petaling JayaMalaysia
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these paramete... 详细信息
来源: 评论
Zero Trust networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Controllable False Data Injection Attack  5th
Controllable False Data Injection Attack
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Kokkonda, Jayasree Jahnavi, M. Department of Information Technology G. Narayanamma Institute of Technology and Science Hyderabad India Department of Computer Network and Information Security Narayanamma Institute of Technology and Science Hyderabad India
Yet the Internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement
收藏 引用
Journal of computer science & technology 2024年 第2期39卷 336-345页
作者: 李梓诺 陈绪行 郭淑娜 王书强 潘治文 Department of Computer and Information Science University of MacaoMacao 999078China Research Center for Biomedical Information Technology Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China
Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-level modif... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
The Design of Portrait Photography Guiding System Using VGG16 Model  14th
The Design of Portrait Photography Guiding System Using VGG1...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Chiu, Chuan-Feng Huang, Chun-Hong Tseng, Hsiang-Chieh Wu, Pei-Jung Lin, Wei-Sheng Peng, Hsiang-Min Department of Information Management Minghsin University of Science and Technology Hsinchu Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan City Taiwan
Because of the population of photography camera, human being could have photography equipment to take a picture became an easy task. However, to have a good photography is not an easy task. The basic of a good photo i... 详细信息
来源: 评论
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular networks
收藏 引用
China Communications 2025年 第3期22卷 270-287页
作者: Wang Zhihua Wang Shuaibo Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China School of Cyber Science and Engineering Zhengzhou UniversityZhengzhou 449001China Lab of National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029China
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 详细信息
来源: 评论