咨询与建议

限定检索结果

文献类型

  • 83,889 篇 会议
  • 45,876 篇 期刊文献
  • 1,402 册 图书

馆藏范围

  • 131,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78,012 篇 工学
    • 49,776 篇 计算机科学与技术...
    • 39,912 篇 软件工程
    • 19,698 篇 信息与通信工程
    • 13,022 篇 控制科学与工程
    • 11,959 篇 电气工程
    • 11,671 篇 电子科学与技术(可...
    • 8,858 篇 生物工程
    • 6,921 篇 生物医学工程(可授...
    • 6,690 篇 光学工程
    • 5,773 篇 机械工程
    • 5,056 篇 化学工程与技术
    • 4,749 篇 动力工程及工程热...
    • 4,525 篇 仪器科学与技术
    • 4,313 篇 材料科学与工程(可...
    • 3,380 篇 网络空间安全
    • 3,071 篇 安全科学与工程
  • 45,421 篇 理学
    • 21,675 篇 数学
    • 15,861 篇 物理学
    • 10,182 篇 生物学
    • 7,073 篇 统计学(可授理学、...
    • 5,512 篇 化学
    • 4,913 篇 系统科学
  • 20,054 篇 管理学
    • 12,848 篇 管理科学与工程(可...
    • 7,906 篇 图书情报与档案管...
    • 5,847 篇 工商管理
  • 7,064 篇 医学
    • 5,766 篇 临床医学
    • 5,145 篇 基础医学(可授医学...
    • 3,131 篇 药学(可授医学、理...
    • 3,021 篇 公共卫生与预防医...
  • 3,670 篇 法学
    • 3,034 篇 社会学
  • 2,331 篇 经济学
  • 1,649 篇 农学
  • 1,268 篇 教育学
  • 739 篇 文学
  • 273 篇 军事学
  • 193 篇 艺术学
  • 15 篇 哲学
  • 9 篇 历史学

主题

  • 3,864 篇 computer science
  • 3,499 篇 accuracy
  • 2,982 篇 deep learning
  • 2,760 篇 feature extracti...
  • 2,736 篇 machine learning
  • 2,560 篇 computational mo...
  • 2,274 篇 training
  • 1,704 篇 internet of thin...
  • 1,691 篇 artificial intel...
  • 1,671 篇 optimization
  • 1,661 篇 support vector m...
  • 1,563 篇 predictive model...
  • 1,491 篇 convolutional ne...
  • 1,426 篇 real-time system...
  • 1,416 篇 wireless sensor ...
  • 1,335 篇 data mining
  • 1,147 篇 neural networks
  • 1,135 篇 security
  • 1,120 篇 data models
  • 1,105 篇 computer archite...

机构

  • 1,086 篇 cavendish labora...
  • 1,013 篇 department of ph...
  • 958 篇 physikalisches i...
  • 944 篇 oliver lodge lab...
  • 910 篇 department of co...
  • 836 篇 department of el...
  • 745 篇 university of ch...
  • 685 篇 department of el...
  • 669 篇 department of co...
  • 602 篇 infn sezione di ...
  • 592 篇 infn laboratori ...
  • 579 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 553 篇 chitkara univers...
  • 543 篇 fakultät physik ...
  • 539 篇 horia hulubei na...
  • 534 篇 school of physic...
  • 518 篇 school of physic...
  • 518 篇 department of ph...
  • 516 篇 h.h. wills physi...

作者

  • 253 篇 a. gomes
  • 250 篇 barter w.
  • 243 篇 s. chen
  • 242 篇 c. alexa
  • 237 篇 j. m. izen
  • 235 篇 d. calvet
  • 233 篇 c. amelung
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 227 篇 beiter a.
  • 227 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 j. wang
  • 219 篇 bowcock t.j.v.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 amato s.
  • 213 篇 brundu d.
  • 212 篇 g. spigo
  • 212 篇 boettcher t.

语言

  • 124,637 篇 英文
  • 5,022 篇 其他
  • 1,489 篇 中文
  • 67 篇 日文
  • 20 篇 法文
  • 19 篇 德文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering Chalmers University of Technology"
131167 条 记 录,以下是41-50 订阅
排序:
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
AmplitudeArrow: On-the-Go AR Menu Selection Using Consecutive Simple Head Gestures and Amplitude Visualization
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第05期31卷 3408-3417页
作者: Tian, Yang Zhang, Youpeng Yan, Yukang Zhao, Shengdong Ma, Xiaojuan Shi, Yuanchun Guangxi University Department of Computer Science Guangxi Key Laboratory of Multimedia Communications and Network Technology China University of Rochester Department of Computer Science United States City University of Hong Kong School of Creative Media and the Department of Computer Science Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong Tsinghua University Department of Computer Science and Technology China
Heads-up computing aims to provide synergistic digital assistance that minimally interferes with users' on-the-go daily activities. Currently, the input modalities of heads-up computing are mainly voice and finger... 详细信息
来源: 评论
Cognitive Transformation in Personal IoT: Pioneering Intelligent Automation
收藏 引用
Cyber-Physical Systems 2025年 第2期11卷 183-240页
作者: Gulzar, Bisma Ahmad Sofi, Shabir Sholla, Sahil Department of Information Technology National Institute of Technology Srinagar India Department of Computer Science Engineering Islamic University of Science & Technology Srinagar India
In recent years, IoT has transformed personal environments by integrating diverse smart devices. This paper presents an advanced IoT architecture that optimizes network infrastructure, focusing on the adoption of MQTT... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
From Centralization to Decentralization: Blockchain’s Role in Transforming Social Media Platforms
收藏 引用
IEEE Access 2025年 13卷 80478-80507页
作者: Sarkar Diba, Bidita Dutta Plabon, Jayonto Tasnim, Nishat Hossain, Mehjabin Mistry, Durjoy Sarker, Sourav Mridha, M.F. Okuyama, Yuichi Shin, Jungpil University of Asia Pacific Department of Computer Science and Engineering Dhaka1215 Bangladesh Chittagong University of Engineering and Technology Department of Civil Engineering Chittagong4349 Bangladesh American International University Department of Computer Science and Engineering Dhaka1215 Bangladesh University of Aizu Department of Computer Science and Engineering Fukushima Aizuwakamatsu956-8580 Japan
Blockchain is influencing the social media platforms by promising to solve the biggest issues of today, such as privacy concerns and content moderation, and the ability to provide a decentralized system for the manage... 详细信息
来源: 评论
Why Smart Contracts Reported as Vulnerable Were Not Exploited?
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2579-2596页
作者: Hu, Tianyuan Li, Jingyue Li, Bixin Storhaug, André Southeast University School of Computer Science and Engineering Nanjing211189 China Norwegian University of Science and Technology Department of Computer Science Trondheim7034 Norway
Smart contract security is crucial for blockchain applications. While studies suggest that only a small fraction of reported vulnerabilities are exploited, no follow-up research has investigated the reasons behind thi... 详细信息
来源: 评论
Enhanced thyroid disease prediction using ensemble machine learning: a high-accuracy approach with feature selection and class balancing
收藏 引用
Discover Artificial Intelligence 2025年 第1期5卷 1-29页
作者: Islam, Md. Rezaul Chowdhury, Aniruddha Islam Shama, Sharmin Lamyea, Md. Masudul Hasan Department of Computer Science and Engineering Shahjalal University of Science and Technology Sylhet3114 Bangladesh Department of Educational Technology and Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Gazipur1750 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1212 Bangladesh
Thyroid disorders are increasingly prevalent, making early detection crucial for reducing mortality and complications. Accurate prediction of disease progression and understanding the interplay of clinical features ar... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论