咨询与建议

限定检索结果

文献类型

  • 91,599 篇 会议
  • 54,990 篇 期刊文献
  • 1,454 册 图书

馆藏范围

  • 148,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 89,023 篇 工学
    • 54,230 篇 计算机科学与技术...
    • 43,684 篇 软件工程
    • 21,444 篇 信息与通信工程
    • 14,166 篇 控制科学与工程
    • 13,451 篇 电子科学与技术(可...
    • 13,379 篇 电气工程
    • 9,632 篇 生物工程
    • 7,463 篇 生物医学工程(可授...
    • 7,451 篇 光学工程
    • 6,645 篇 化学工程与技术
    • 6,611 篇 机械工程
    • 5,701 篇 材料科学与工程(可...
    • 5,454 篇 动力工程及工程热...
    • 5,140 篇 仪器科学与技术
    • 3,523 篇 网络空间安全
    • 3,264 篇 安全科学与工程
    • 3,234 篇 交通运输工程
  • 52,470 篇 理学
    • 24,363 篇 数学
    • 19,078 篇 物理学
    • 11,066 篇 生物学
    • 7,933 篇 统计学(可授理学、...
    • 6,864 篇 化学
    • 5,378 篇 系统科学
  • 21,874 篇 管理学
    • 14,050 篇 管理科学与工程(可...
    • 8,540 篇 图书情报与档案管...
    • 6,224 篇 工商管理
  • 7,666 篇 医学
    • 6,237 篇 临床医学
    • 5,468 篇 基础医学(可授医学...
    • 3,340 篇 药学(可授医学、理...
  • 3,884 篇 法学
    • 3,198 篇 社会学
  • 2,497 篇 经济学
  • 1,910 篇 农学
  • 1,347 篇 教育学
  • 786 篇 文学
  • 334 篇 军事学
  • 233 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 4,154 篇 computer science
  • 3,782 篇 accuracy
  • 3,197 篇 deep learning
  • 3,112 篇 feature extracti...
  • 2,838 篇 machine learning
  • 2,813 篇 computational mo...
  • 2,563 篇 training
  • 1,873 篇 optimization
  • 1,763 篇 support vector m...
  • 1,760 篇 internet of thin...
  • 1,744 篇 artificial intel...
  • 1,742 篇 predictive model...
  • 1,590 篇 convolutional ne...
  • 1,527 篇 real-time system...
  • 1,511 篇 wireless sensor ...
  • 1,478 篇 data mining
  • 1,279 篇 neural networks
  • 1,260 篇 data models
  • 1,243 篇 security
  • 1,125 篇 computer archite...

机构

  • 1,640 篇 cavendish labora...
  • 1,337 篇 school of comput...
  • 999 篇 university of ch...
  • 945 篇 department of ph...
  • 898 篇 department for p...
  • 893 篇 department of co...
  • 885 篇 department of ph...
  • 883 篇 institute of phy...
  • 840 篇 oliver lodge lab...
  • 834 篇 physikalisches i...
  • 806 篇 institute of phy...
  • 787 篇 department of el...
  • 787 篇 fakultät physik ...
  • 783 篇 department of ph...
  • 783 篇 institute of hig...
  • 743 篇 school of physic...
  • 727 篇 physics departme...
  • 682 篇 cern geneva
  • 676 篇 dipartimento di ...
  • 661 篇 department of ph...

作者

  • 457 篇 bachacou h.
  • 450 篇 annovi a.
  • 417 篇 akimov a.v.
  • 411 篇 aad g.
  • 410 篇 alonso f.
  • 403 篇 alimonti g.
  • 403 篇 abulaiti y.
  • 402 篇 amidei d.
  • 402 篇 alexa c.
  • 401 篇 alexopoulos t.
  • 399 篇 arnaez o.
  • 398 篇 argyropoulos s.
  • 398 篇 adelman j.
  • 396 篇 anastopoulos c.
  • 394 篇 amelung c.
  • 393 篇 azuelos g.
  • 393 篇 aloisio a.
  • 388 篇 adye t.
  • 386 篇 arce a.t.h.
  • 385 篇 ahmadov f.

语言

  • 137,210 篇 英文
  • 8,639 篇 其他
  • 2,156 篇 中文
  • 68 篇 日文
  • 27 篇 德文
  • 26 篇 法文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 意大利文
检索条件"机构=Department of Computer Science and Engineering Nanjing University of Science and Technology"
148043 条 记 录,以下是691-700 订阅
排序:
Towards Interpretable Machine-Learning-Based DDoS Detection
收藏 引用
SN computer science 2024年 第1期5卷 115页
作者: Zhou, Qianru Li, Rongzhen Xu, Lei Nallanathan, Arumugam Yang, Jian Fu, Anmin School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Electronic Engineering and Computer Science Queen Mary University of London London E1 4NS United Kingdom
The Internet is the most complex machine humankind has ever built, and thus, it is difficult to defend it from attacks. The most common attack to the Internet is DDoS attacks. With the growing popularity for QUIC prot... 详细信息
来源: 评论
Autonomous embodied navigation task generation from natural language dialogues
收藏 引用
science China(Information sciences) 2025年 第5期68卷 119-132页
作者: Haifeng XU Yongchang LI Lumeng MA Chunwen LI Yanzhi DONG Xiaohu YUAN Huaping LIU Department of Automation Tsinghua University School of Physics and Electronic Information Yantai University School of Electrical and Electronic Engineering Shanghai Institute of Technology Department of Computer Science and Technology Tsinghua University
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
AI-Based Security Protocols for IoT Applications: A Critical Review
收藏 引用
Recent Advances in computer science and Communications 2023年 第5期16卷 2-18页
作者: Chadha, Harshita Gupta, Shruti Khanna, Ashish Kumar, Neeraj Department of Computer Science and Engineering Maharaja Agrasen Institute of Technology New Delhi India Department of Computer Science and Engineering Chitkara University Institute of Engineering & Technology Punjab Chandigarh India
The Internet Of Things (IoT) is a network of heterogeneous nodes that exchange data and critical information amongst themselves with minimum human intervention. The utility of this technology is large, thus it is used... 详细信息
来源: 评论
Adaptive Neighborhood Adjustment Strategy Based On MOHHO and NSGA-III Algorithms for Feature Selection
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第5期54卷 917-935页
作者: Papasani, Anusha Durgam, Revathi Devarakonda, Nagaraju Computer Science and Engineering Department Koneru Lakshmaiah Education Foundation AndhraPradesh Vaddeswaram522502 India Computer Science and Engineering Department AVN Institute of Engineering and Technology Telangana Hyderabad501510 India Science and Engineering Department VIT-AP University AP Amaravati522237 India
The efficiency of multi-objective evolutionary algorithms (MOEAs) in tackling issues with multiple objectives is examined. However, it is noted that current MOEA-based feature selection techniques often converge towar... 详细信息
来源: 评论
Recognition of American sign language using modified deep residual CNN with modified canny edge segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Hariharan, U. Devarajan, Devikanniga Kumar, P. Santhosh Rajkumar, K. Meena, M. Akilan, T. Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab Mohali140413 India Department of Computer Science and Engineering GITAM University Karnataka Bengaluru561203 India Department of Information Technology Faculty of Engineering and technology SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu Tambaram602109 India Research Coordinator Dept. of IQAC Amity University Kolkata West Bengal 700135 India
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori... 详细信息
来源: 评论
A Method for Suppressing ISRJ based on Noise Frequency Modulated Signal and Multi-channel Matched Filtering  16
A Method for Suppressing ISRJ based on Noise Frequency Modul...
收藏 引用
16th International Conference on Signal Processing Systems, ICSPS 2024
作者: Li, Wangyang Yang, Jianchao Lu, Xinyu Dai, Zheng Yu, Wenchao Tan, Ke Gu, Hong Department of Electronic Engineering Nanjing University of Science and Technology China
This paper introduces a method for suppressing interrupted sampling repeater jamming (ISRJ) based on noise frequency modulation (NFM) signals and multi-channel matched filtering. By taking advantage of the relevant ch... 详细信息
来源: 评论
An integrated land change modeler and distributed hydrological model approach for quantifying future urban runoff dynamics
收藏 引用
science China Earth sciences 2024年 第10期67卷 3288-3301页
作者: Asad Hussain MUHAMMAD Waseem MUHAMMAD Ajmal MUHAMMAD Atiq Ur Rehman Tariq MUHAMMAD Jiaqing XIAO Tao YANG Pengfei SHI Institute for Disaster Risk Management School of Geographical ScienceNanjing University of Information Science and TechnologyNanjing 210044China The National Key Laboratory of Water Disaster Prevention Hohai UniversityNanjing 210098China Yangtze Institute for Conservation and Development Hohai UniversityNanjing 210098China College of Hydrology and Water Resources Hohai UniversityNanjing 210098China Centre of Excellence in Water Resources Engineering University of Engineering and TechnologyLahore 54890Pakistan Department of Agricultural Engineering Faculty of CivilAgricultural and Mining EngineeringUniversity of Engineering and TechnologyPeshawar 25120Pakistan
Climate and land use changes have a significant impact on the runoff generation process in urban environments, and these effects could get worse in the future. The combined contributions of these changes have increase... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of Information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论