咨询与建议

限定检索结果

文献类型

  • 91,625 篇 会议
  • 55,337 篇 期刊文献
  • 1,450 册 图书

馆藏范围

  • 148,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 89,352 篇 工学
    • 54,418 篇 计算机科学与技术...
    • 43,676 篇 软件工程
    • 21,525 篇 信息与通信工程
    • 14,338 篇 控制科学与工程
    • 13,507 篇 电子科学与技术(可...
    • 13,458 篇 电气工程
    • 9,658 篇 生物工程
    • 7,489 篇 生物医学工程(可授...
    • 7,434 篇 光学工程
    • 6,677 篇 化学工程与技术
    • 6,614 篇 机械工程
    • 5,778 篇 材料科学与工程(可...
    • 5,478 篇 动力工程及工程热...
    • 5,145 篇 仪器科学与技术
    • 3,547 篇 网络空间安全
    • 3,270 篇 安全科学与工程
    • 3,246 篇 交通运输工程
  • 52,579 篇 理学
    • 24,374 篇 数学
    • 19,125 篇 物理学
    • 11,084 篇 生物学
    • 7,926 篇 统计学(可授理学、...
    • 6,939 篇 化学
    • 5,383 篇 系统科学
  • 21,882 篇 管理学
    • 14,045 篇 管理科学与工程(可...
    • 8,546 篇 图书情报与档案管...
    • 6,211 篇 工商管理
  • 7,706 篇 医学
    • 6,261 篇 临床医学
    • 5,473 篇 基础医学(可授医学...
    • 3,341 篇 药学(可授医学、理...
  • 3,877 篇 法学
    • 3,191 篇 社会学
  • 2,499 篇 经济学
  • 1,911 篇 农学
  • 1,339 篇 教育学
  • 788 篇 文学
  • 332 篇 军事学
  • 233 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 4,154 篇 computer science
  • 3,789 篇 accuracy
  • 3,219 篇 deep learning
  • 3,123 篇 feature extracti...
  • 2,853 篇 machine learning
  • 2,817 篇 computational mo...
  • 2,572 篇 training
  • 1,880 篇 optimization
  • 1,766 篇 internet of thin...
  • 1,764 篇 support vector m...
  • 1,753 篇 artificial intel...
  • 1,745 篇 predictive model...
  • 1,600 篇 convolutional ne...
  • 1,535 篇 real-time system...
  • 1,512 篇 wireless sensor ...
  • 1,478 篇 data mining
  • 1,281 篇 neural networks
  • 1,263 篇 data models
  • 1,251 篇 security
  • 1,125 篇 computer archite...

机构

  • 1,640 篇 cavendish labora...
  • 1,338 篇 school of comput...
  • 1,006 篇 university of ch...
  • 945 篇 department of ph...
  • 898 篇 department for p...
  • 893 篇 department of co...
  • 885 篇 department of ph...
  • 883 篇 institute of phy...
  • 840 篇 oliver lodge lab...
  • 834 篇 physikalisches i...
  • 806 篇 institute of phy...
  • 789 篇 department of el...
  • 787 篇 fakultät physik ...
  • 783 篇 department of ph...
  • 783 篇 institute of hig...
  • 741 篇 school of physic...
  • 727 篇 physics departme...
  • 682 篇 cern geneva
  • 676 篇 dipartimento di ...
  • 664 篇 department of ph...

作者

  • 457 篇 bachacou h.
  • 450 篇 annovi a.
  • 417 篇 akimov a.v.
  • 411 篇 aad g.
  • 410 篇 alonso f.
  • 403 篇 alimonti g.
  • 403 篇 abulaiti y.
  • 402 篇 amidei d.
  • 402 篇 alexa c.
  • 401 篇 alexopoulos t.
  • 399 篇 arnaez o.
  • 398 篇 argyropoulos s.
  • 398 篇 adelman j.
  • 396 篇 anastopoulos c.
  • 394 篇 amelung c.
  • 393 篇 azuelos g.
  • 393 篇 aloisio a.
  • 388 篇 adye t.
  • 386 篇 arce a.t.h.
  • 385 篇 ahmadov f.

语言

  • 137,461 篇 英文
  • 8,775 篇 其他
  • 2,150 篇 中文
  • 68 篇 日文
  • 27 篇 德文
  • 26 篇 法文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 意大利文
检索条件"机构=Department of Computer Science and Engineering Nanjing University of Science and Technology"
148412 条 记 录,以下是211-220 订阅
排序:
Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 899-914页
作者: Chengsheng Yuan Baojie Cui Zhili Zhou Xinting Li Qingming Jonathan Wu Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China School of International Relations National University of Defense TechnologyNanjing210039China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable ***,recent studies have shown that these deep fake fingerprint detection(DFFD)mod... 详细信息
来源: 评论
Silver Lining in the Fake News Cloud: Can Large Language Models Help Detect Misinformation?
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 14-24页
作者: Kumar, Raghvendra Goddu, Bhargav Saha, Sriparna Jatowt, Adam Indian Institute of Technology Department of Computer Science and Engineering Patna801106 India University of Innsbruck Department of Computer Science Innsbruck6020 Austria
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua... 详细信息
来源: 评论
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
The Elevated Temperature Tribological Performance of Tough and Superhard TaMoN-Ag Films With Solute and Nanocomposite Structures
收藏 引用
Journal of Tribology 2025年 第6期147卷 062101页
作者: Wang, Huiying Li, Hang Li, Jianliang Wei, Ningxin Sun, Longlong Huang, Jiewen Kong, Jian Wu, Qiujie Shi, Yan Department of Materials Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Department of Materials Science and Engineering Hubei Polytechnic University Huangshi435003 China College of Materials and Metallurgy Guizhou University Guiyang550025 China
Films have been prepared with not only high hardness to guarantee excellent wear resistance but also high toughness to prevent brittle fracture at low to middle-high temperatures. On the basis of ternary transition me... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to Data Clustering
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论
Synthesis of monolayer tungsten nitride:Rapid optical visualization and electrical impact of grain boundaries
收藏 引用
Nano Research 2025年 第3期18卷 645-653页
作者: Qiuyun Yang Dehu Li Fanfan Shi Zhibin Shao Na Wang Yao Peng Edwin Hang Tong Teo Zheng Liu Hong Wang Department of Physics University of Science and Technology of ChinaHefei 230026China Institute of Electrical and Electronic Engineering Anhui Science and Technology UniversityFengyang 233100China College of Mechanics and Engineering Science Hohai UniversityNanjing 211100China School of Materials Science and Engineering Nanyang Technological University50 Nanyang AvenueSingapore 639798Singapore
Two-dimensional(2D)transition metal nitrides(TMNs)have garnered significant attention in fields such as energy storage and nanoelectronics due to their unique electrical properties,high chemical stability,and excellen... 详细信息
来源: 评论
Modeling Task Engagement to Regulate Reinforcement Learning-based Decoding for Online Brain Control
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2024年 第3期17卷 606-614页
作者: Zhang, Xiang Shen, Xiang Wang, Yiwen Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Chemical and Biological Engineering Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong
Brain-Machine Interfaces (BMIs) offer significant promise for enabling paralyzed individuals to control external devices using their brain signals. One challenge is that during the online Brain Control (BC) process, s... 详细信息
来源: 评论
SeBROP:blind ROP attacks without returns
收藏 引用
Frontiers of computer science 2022年 第4期16卷 185-202页
作者: Tianning Zhang Miao Cai Diming Zhang Hao Huang Department of Computer Science and Technology Nanjing UniversityNanjing210023China School of Computer and Information Hohai UniversityNanjing211106China College of Computer Engineering Jiangsu University of Science and TechnologyZhenjiang212008China
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and Data Execution Prevention(DEP),against modern ... 详细信息
来源: 评论
Enhanced thyroid disease prediction using ensemble machine learning: a high-accuracy approach with feature selection and class balancing
收藏 引用
Discover Artificial Intelligence 2025年 第1期5卷 1-29页
作者: Islam, Md. Rezaul Chowdhury, Aniruddha Islam Shama, Sharmin Lamyea, Md. Masudul Hasan Department of Computer Science and Engineering Shahjalal University of Science and Technology Sylhet3114 Bangladesh Department of Educational Technology and Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Gazipur1750 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1212 Bangladesh
Thyroid disorders are increasingly prevalent, making early detection crucial for reducing mortality and complications. Accurate prediction of disease progression and understanding the interplay of clinical features ar... 详细信息
来源: 评论