咨询与建议

限定检索结果

文献类型

  • 367,230 篇 会议
  • 162,359 篇 期刊文献
  • 3,670 册 图书
  • 1 篇 学位论文

馆藏范围

  • 533,259 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 312,629 篇 工学
    • 204,808 篇 计算机科学与技术...
    • 164,874 篇 软件工程
    • 73,715 篇 信息与通信工程
    • 48,006 篇 控制科学与工程
    • 41,977 篇 电子科学与技术(可...
    • 41,808 篇 电气工程
    • 33,751 篇 生物工程
    • 26,248 篇 生物医学工程(可授...
    • 24,551 篇 光学工程
    • 21,703 篇 机械工程
    • 18,770 篇 化学工程与技术
    • 17,291 篇 仪器科学与技术
    • 15,905 篇 动力工程及工程热...
    • 15,461 篇 材料科学与工程(可...
    • 10,607 篇 安全科学与工程
    • 9,827 篇 交通运输工程
    • 9,745 篇 网络空间安全
  • 177,300 篇 理学
    • 87,661 篇 数学
    • 59,846 篇 物理学
    • 38,277 篇 生物学
    • 27,916 篇 统计学(可授理学、...
    • 19,874 篇 系统科学
    • 19,721 篇 化学
  • 78,055 篇 管理学
    • 46,564 篇 管理科学与工程(可...
    • 34,540 篇 图书情报与档案管...
    • 22,492 篇 工商管理
  • 24,920 篇 医学
    • 20,845 篇 临床医学
    • 18,453 篇 基础医学(可授医学...
    • 11,535 篇 药学(可授医学、理...
  • 13,935 篇 法学
    • 11,418 篇 社会学
  • 8,729 篇 经济学
  • 7,003 篇 农学
  • 6,078 篇 教育学
  • 2,505 篇 文学
  • 1,252 篇 军事学
  • 766 篇 艺术学
  • 148 篇 哲学
  • 87 篇 历史学

主题

  • 23,944 篇 computer science
  • 11,166 篇 computational mo...
  • 11,090 篇 accuracy
  • 10,757 篇 feature extracti...
  • 9,346 篇 deep learning
  • 9,000 篇 machine learning
  • 8,594 篇 training
  • 7,395 篇 data mining
  • 6,379 篇 computer archite...
  • 6,352 篇 support vector m...
  • 6,188 篇 predictive model...
  • 6,130 篇 wireless sensor ...
  • 5,997 篇 optimization
  • 5,930 篇 costs
  • 5,885 篇 algorithm design...
  • 5,770 篇 bandwidth
  • 5,688 篇 protocols
  • 5,619 篇 application soft...
  • 5,613 篇 neural networks
  • 5,542 篇 testing

机构

  • 1,679 篇 department of co...
  • 1,673 篇 department of co...
  • 1,321 篇 department of co...
  • 1,295 篇 department of el...
  • 1,222 篇 university of ch...
  • 1,117 篇 department of el...
  • 1,015 篇 physikalisches i...
  • 994 篇 cavendish labora...
  • 968 篇 department of ph...
  • 899 篇 institute of inf...
  • 864 篇 department of el...
  • 834 篇 infn laboratori ...
  • 831 篇 oliver lodge lab...
  • 796 篇 department of el...
  • 761 篇 infn sezione di ...
  • 699 篇 school of comput...
  • 658 篇 department of co...
  • 576 篇 department of co...
  • 575 篇 infn sezione di ...
  • 524 篇 school of comput...

作者

  • 314 篇 niyato dusit
  • 259 篇 j. wang
  • 238 篇 barter w.
  • 219 篇 s. chen
  • 215 篇 yang yang
  • 214 篇 liu yang
  • 211 篇 bellee v.
  • 209 篇 bowcock t.j.v.
  • 209 篇 a. gomes
  • 208 篇 blake t.
  • 208 篇 y. zhang
  • 201 篇 borsato m.
  • 199 篇 beiter a.
  • 199 篇 brundu d.
  • 199 篇 betancourt c.
  • 196 篇 y. li
  • 186 篇 c. alexa
  • 186 篇 c. amelung
  • 185 篇 j. m. izen
  • 184 篇 g. bella

语言

  • 501,042 篇 英文
  • 25,435 篇 其他
  • 6,545 篇 中文
  • 511 篇 日文
  • 84 篇 德文
  • 71 篇 朝鲜文
  • 52 篇 法文
  • 35 篇 斯洛文尼亚文
  • 14 篇 西班牙文
  • 11 篇 俄文
  • 6 篇 土耳其文
  • 5 篇 阿拉伯文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Information Science"
533260 条 记 录,以下是511-520 订阅
排序:
Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 2244-2256页
作者: Li, Yi Shen, Jian Vijayakumar, Pandi Lai, Chin-Feng Sivaraman, Audithan Sharma, Pradip Kumar Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China University College of Engineering Tindivanam Anna University Chennai Department of Computer Science and Engineering Tindivanam604001 India National Cheng Kung University Department of Engineering Science Tainan701 Taiwan Netaji Subhas University of Technology Department of Information Technology New Delhi110078 India University of Aberdeen Department of Computing Science AberdeenAB24 3UE United Kingdom
Distributed and resilient machine learning (DRML) endues next-generation consumer electronics with AI function. Intuitively, AI provides innovative, humanized, convenient applications based on the data extended by nex... 详细信息
来源: 评论
Combating Misinformation on Social Media Using Social Noise and Social Entropy as a Measure of Uncertainty
收藏 引用
Proceedings of the Association for information science and Technology 2024年 第1期61卷 25-35页
作者: Alsaid, Manar Parvathi Panguluri, Siva Hawamdeh, Suliman Department of Information Science Texas A&M University United States Department of Computer Science University of North Texas United States Department of Information Science University of North Texas United States
Recent events around the world, including the war in Ukraine and the conflict in Gaza have highlighted the effective use of social media as a tool to voice concerns about social issues to create awareness. At the same... 详细信息
来源: 评论
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
收藏 引用
Cybersecurity 2024年 第3期7卷 32-48页
作者: Vikas Maurya Rachit Agarwal Saurabh Kumar Sandeep Shukla Department of Computer Science and Engineering Indian Institute of Technology KanpurkanpurIndia Merkle Science BangaloreIndia
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se... 详细信息
来源: 评论
Automated decryption of siri bhoovalaya using cryptography and natural language processing techniques
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10447-10464页
作者: Jagadeesh Sai, D. Department of Information Science & Engineering Ramaiah Institute of Technology Bangalore India
"The Siri Bhoovalaya is a seminal work of literature, believed to have been composed approximately a millennium ago, which encompasses diverse information encrypted using numerals of the Kannada language—a predo... 详细信息
来源: 评论
Ensemble Deep Learning Approaches in Health Care:A Review
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 3741-3771页
作者: Aziz Alotaibi Department of Computer Science College of Computing and Information TechnologyTaif UniversityTaif21974Saudi Arabia
Deep learning algorithms have been rapidly incorporated into many different applications due to the increase in computational power and the availability of massive amounts of ***,both deep learning and ensemble learni... 详细信息
来源: 评论
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 379-397页
作者: Hameed, Mohamed Abdel Hassaballah, M. Abdelazim, Riem Sahu, Aditya Kumar Department of Computer Science Faculty of Computers and Information Luxor University Luxor85951 Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University AlKharj16278 Saudi Arabia Department of Computer Science Faculty of Computers and Information South Valley University Qena Egypt Department of Information Systems College of Information Technology Misr University for Science and Technology Giza Egypt Amrita School of Computing Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv... 详细信息
来源: 评论
MAIDS: malicious agent identification-based data security model for cloud environments
收藏 引用
Cluster Computing 2024年 第5期27卷 6167-6184页
作者: Gupta, Kishu Saxena, Deepika Gupta, Rishabh Singh, Ashutosh Kumar Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan School of Computer Science and Engineering The University of Aizu Aizuwakamatsu965-0006 Japan Department of Computer Science The University of Economics and Human Sciences Warsaw01-043 Poland Department of Computer Applications SRM Institute of Science & ampTechnology Delhi-NCR Campus Modinagar Uttar Pradesh Ghaziabad201204 India Department of Computer Science and Engineering Indian Institute of Information Technology Bhopal Bhopal462003 India
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac... 详细信息
来源: 评论
Quadratic and Lagrange interpolation-based butterfly optimization algorithm for numerical optimization and engineering design problem
收藏 引用
Soft Computing 2025年 第1期29卷 157-194页
作者: Sharma, Sushmita Saha, Apu Kumar Chakraborty, Sanjoy Deb, Suman Sahoo, Saroj Kumar Department of Computer Science and Engineering Indian Institute of Information Technology Tripura Agartala India Department of Computer Science and Engineering National Institute of Technology Tripura Agartala India Department of Mathematics National Institute of Technology Agartala Tripura Agartala India Department of Information Technology Bir Bikram Memorial College Tripura Agartala India
This work proposes a novel and improved Butterfly Optimization Algorithm (BOA), known as LQBOA, to solve BOA’s inherent limitations. The LQBOA uses Lagrange interpolation and simple quadratic interpolation techniques... 详细信息
来源: 评论
Enhanced Multi-Scale Object Detection Algorithm for Foggy Traffic Scenarios
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2451-2474页
作者: Honglin Wang Zitong Shi Cheng Zhu School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Electrical&Computer Engineering University of Illinois at Urbana ChampaignUrbanaIL 61801USA
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal... 详细信息
来源: 评论