咨询与建议

限定检索结果

文献类型

  • 367,230 篇 会议
  • 162,359 篇 期刊文献
  • 3,670 册 图书
  • 1 篇 学位论文

馆藏范围

  • 533,259 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 312,629 篇 工学
    • 204,808 篇 计算机科学与技术...
    • 164,874 篇 软件工程
    • 73,715 篇 信息与通信工程
    • 48,006 篇 控制科学与工程
    • 41,977 篇 电子科学与技术(可...
    • 41,808 篇 电气工程
    • 33,751 篇 生物工程
    • 26,248 篇 生物医学工程(可授...
    • 24,551 篇 光学工程
    • 21,703 篇 机械工程
    • 18,770 篇 化学工程与技术
    • 17,291 篇 仪器科学与技术
    • 15,905 篇 动力工程及工程热...
    • 15,461 篇 材料科学与工程(可...
    • 10,607 篇 安全科学与工程
    • 9,827 篇 交通运输工程
    • 9,745 篇 网络空间安全
  • 177,300 篇 理学
    • 87,661 篇 数学
    • 59,846 篇 物理学
    • 38,277 篇 生物学
    • 27,916 篇 统计学(可授理学、...
    • 19,874 篇 系统科学
    • 19,721 篇 化学
  • 78,055 篇 管理学
    • 46,564 篇 管理科学与工程(可...
    • 34,540 篇 图书情报与档案管...
    • 22,492 篇 工商管理
  • 24,920 篇 医学
    • 20,845 篇 临床医学
    • 18,453 篇 基础医学(可授医学...
    • 11,535 篇 药学(可授医学、理...
  • 13,935 篇 法学
    • 11,418 篇 社会学
  • 8,729 篇 经济学
  • 7,003 篇 农学
  • 6,078 篇 教育学
  • 2,505 篇 文学
  • 1,252 篇 军事学
  • 766 篇 艺术学
  • 148 篇 哲学
  • 87 篇 历史学

主题

  • 23,944 篇 computer science
  • 11,166 篇 computational mo...
  • 11,090 篇 accuracy
  • 10,757 篇 feature extracti...
  • 9,346 篇 deep learning
  • 9,000 篇 machine learning
  • 8,594 篇 training
  • 7,395 篇 data mining
  • 6,379 篇 computer archite...
  • 6,352 篇 support vector m...
  • 6,188 篇 predictive model...
  • 6,130 篇 wireless sensor ...
  • 5,997 篇 optimization
  • 5,930 篇 costs
  • 5,885 篇 algorithm design...
  • 5,770 篇 bandwidth
  • 5,688 篇 protocols
  • 5,619 篇 application soft...
  • 5,613 篇 neural networks
  • 5,542 篇 testing

机构

  • 1,679 篇 department of co...
  • 1,673 篇 department of co...
  • 1,321 篇 department of co...
  • 1,295 篇 department of el...
  • 1,222 篇 university of ch...
  • 1,117 篇 department of el...
  • 1,015 篇 physikalisches i...
  • 994 篇 cavendish labora...
  • 968 篇 department of ph...
  • 899 篇 institute of inf...
  • 864 篇 department of el...
  • 834 篇 infn laboratori ...
  • 831 篇 oliver lodge lab...
  • 796 篇 department of el...
  • 761 篇 infn sezione di ...
  • 699 篇 school of comput...
  • 658 篇 department of co...
  • 576 篇 department of co...
  • 575 篇 infn sezione di ...
  • 524 篇 school of comput...

作者

  • 314 篇 niyato dusit
  • 259 篇 j. wang
  • 238 篇 barter w.
  • 219 篇 s. chen
  • 215 篇 yang yang
  • 214 篇 liu yang
  • 211 篇 bellee v.
  • 209 篇 bowcock t.j.v.
  • 209 篇 a. gomes
  • 208 篇 blake t.
  • 208 篇 y. zhang
  • 201 篇 borsato m.
  • 199 篇 beiter a.
  • 199 篇 brundu d.
  • 199 篇 betancourt c.
  • 196 篇 y. li
  • 186 篇 c. alexa
  • 186 篇 c. amelung
  • 185 篇 j. m. izen
  • 184 篇 g. bella

语言

  • 501,042 篇 英文
  • 25,435 篇 其他
  • 6,545 篇 中文
  • 511 篇 日文
  • 84 篇 德文
  • 71 篇 朝鲜文
  • 52 篇 法文
  • 35 篇 斯洛文尼亚文
  • 14 篇 西班牙文
  • 11 篇 俄文
  • 6 篇 土耳其文
  • 5 篇 阿拉伯文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Information Science"
533260 条 记 录,以下是531-540 订阅
排序:
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3003-3031页
作者: Hira Akhtar Butt Khoula Said Al Harthy Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman Department of Computer Science University of Management and TechnologySialkot51040Pakistan Department of Computer Science and Creative Technologies Global College of Engineering and TechnologyMuscat2546Sultanate of Oman Department of Computer Science University of WahWah Cantt47040Pakistan Department of Computer Science and IT University of ChakwalChakwal48800Pakistan
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention... 详细信息
来源: 评论
Analysis of community question-answering issues via machine learning and deep learning:State-of-the-art review
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第1期8卷 95-117页
作者: Pradeep Kumar Roy Sunil Saumya Jyoti Prakash Singh Snehasish Banerjee Adnan Gutub Department of Computer Science and Engineering Indian Institute of Information TechnologySuratIndia Indian Institute of Information Technology DharwadIndia Department of Computer Science and Engineering National Institute of TechnologyPatnaIndia The York Management School University of YorkYorkUK Computer Engineering Department College of Computer&Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volu... 详细信息
来源: 评论
High Dynamic Range Imaging for Dynamic Scenes Based on Multi-Level Spike Camera
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 5394-5406页
作者: Zhu, Zhenkun Xiong, Ruiqin Zhao, Jing Zhao, Rui Fan, Xiaopeng Zhu, Shuyuan Huang, Tiejun Peking University School of Computer Science Beijing100871 China Harbin Institute of Technology Department of Computer Science and Technology Harbin150001 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China
Spike camera is a retina-inspired neuromorphic camera which can capture dynamic scenes of high-speed motion by firing a continuous stream of spikes at an extremely high temporal resolution. The limitation in the curre... 详细信息
来源: 评论
GRA: Graph Representation Alignment for Semi-Supervised Action Recognition
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2024年 第9期35卷 11896-11905页
作者: Huang, Kuan-Hung Huang, Yao-Bang Lin, Yong-Xiang Hua, Kai-Lung Tanveer, M. Lu, Xuequan Razzak, Imran National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei10607 Taiwan Indian Institute of Technology Indore Department of Mathematics Indore Simrol453552 India La Trobe University Department of Computer Science and IT MelbourneVIC3086 Australia University of New South Wales School of Computer Science and Engineering SydneyNSW2052 Australia
Graph convolutional networks (GCNs) have emerged as a powerful tool for action recognition, leveraging skeletal graphs to encapsulate human motion. Despite their efficacy, a significant challenge remains the dependenc... 详细信息
来源: 评论
Human Gait Recognition for Biometrics Application Based on Deep Learning Fusion Assisted Framework
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 357-374页
作者: Ch Avais Hanif Muhammad Ali Mughal Muhammad Attique Khan Nouf Abdullah Almujally Taerang Kim Jae-Hyuk Cha Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Department of Computer Science HITEC UniversityTaxila47080Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Hanyang UniversitySeoul04763Korea
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer ... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4691-4708页
作者: Sachin Sharma Brajesh Kumar Singh Hitendra Garg Department of Computer Science Abdul Kalam Technical UniversityLucknow226031India Department of Computer Engineering & Applications GLA UniversityMathura281406India Department of Computer Science Raja Balwant Singh Engineering Technical CampusAgra283105India
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing... 详细信息
来源: 评论
A Novel Certificateless Signature-based Access Control Scheme for Named In-network Computing Service
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 38-45页
作者: Li, Wanji Liu, Qiangbin Zhu, Yi School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering the Dean of Department of Communication Engineering Jiangsu University Zhenjiang China
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论