咨询与建议

限定检索结果

文献类型

  • 284,641 篇 会议
  • 122,590 篇 期刊文献
  • 2,893 册 图书

馆藏范围

  • 410,123 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 237,779 篇 工学
    • 158,389 篇 计算机科学与技术...
    • 128,595 篇 软件工程
    • 56,932 篇 信息与通信工程
    • 37,378 篇 控制科学与工程
    • 32,834 篇 电气工程
    • 31,433 篇 电子科学与技术(可...
    • 27,955 篇 生物工程
    • 21,893 篇 生物医学工程(可授...
    • 18,989 篇 光学工程
    • 16,048 篇 机械工程
    • 13,929 篇 化学工程与技术
    • 12,721 篇 仪器科学与技术
    • 12,717 篇 动力工程及工程热...
    • 11,272 篇 材料科学与工程(可...
    • 8,819 篇 安全科学与工程
    • 8,148 篇 网络空间安全
  • 135,425 篇 理学
    • 67,384 篇 数学
    • 43,992 篇 物理学
    • 31,647 篇 生物学
    • 22,156 篇 统计学(可授理学、...
    • 15,728 篇 系统科学
    • 14,851 篇 化学
  • 59,445 篇 管理学
    • 35,598 篇 管理科学与工程(可...
    • 26,174 篇 图书情报与档案管...
    • 17,736 篇 工商管理
  • 20,910 篇 医学
    • 17,543 篇 临床医学
    • 15,718 篇 基础医学(可授医学...
    • 9,778 篇 药学(可授医学、理...
    • 8,442 篇 公共卫生与预防医...
  • 11,218 篇 法学
    • 9,209 篇 社会学
  • 6,871 篇 经济学
  • 5,428 篇 农学
  • 4,434 篇 教育学
  • 1,914 篇 文学
  • 908 篇 军事学
  • 520 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,113 篇 computer science
  • 9,661 篇 accuracy
  • 9,088 篇 computational mo...
  • 8,390 篇 feature extracti...
  • 8,162 篇 deep learning
  • 7,743 篇 machine learning
  • 6,979 篇 training
  • 5,493 篇 data mining
  • 5,319 篇 predictive model...
  • 5,309 篇 support vector m...
  • 5,240 篇 computer archite...
  • 4,958 篇 wireless sensor ...
  • 4,797 篇 costs
  • 4,758 篇 optimization
  • 4,557 篇 bandwidth
  • 4,546 篇 real-time system...
  • 4,461 篇 application soft...
  • 4,438 篇 neural networks
  • 4,427 篇 testing
  • 4,415 篇 protocols

机构

  • 1,699 篇 department of co...
  • 1,354 篇 department of co...
  • 1,341 篇 department of el...
  • 1,165 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 975 篇 department of ph...
  • 951 篇 department of co...
  • 847 篇 university of ch...
  • 841 篇 physikalisches i...
  • 831 篇 oliver lodge lab...
  • 822 篇 department of el...
  • 641 篇 department of co...
  • 583 篇 department of co...
  • 536 篇 chitkara univers...
  • 532 篇 infn sezione di ...
  • 511 篇 infn laboratori ...
  • 508 篇 infn sezione di ...
  • 495 篇 horia hulubei na...
  • 489 篇 infn sezione di ...
  • 484 篇 department of co...

作者

  • 251 篇 j. wang
  • 250 篇 barter w.
  • 249 篇 s. chen
  • 246 篇 niyato dusit
  • 226 篇 a. gomes
  • 223 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 210 篇 boettcher t.
  • 207 篇 brundu d.
  • 205 篇 c. alexa
  • 205 篇 beiter a.
  • 199 篇 j. m. izen
  • 194 篇 bencivenni g.
  • 190 篇 c. amelung
  • 189 篇 g. bella
  • 189 篇 bay a.

语言

  • 384,493 篇 英文
  • 21,760 篇 其他
  • 3,920 篇 中文
  • 220 篇 日文
  • 59 篇 德文
  • 38 篇 法文
  • 35 篇 朝鲜文
  • 26 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 8 篇 俄文
  • 6 篇 土耳其文
  • 5 篇 荷兰文
  • 4 篇 阿拉伯文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering with Data Science"
410124 条 记 录,以下是1121-1130 订阅
排序:
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Cycle Consistency Loss with Long Short Connection in Convolutional Neural Network-Generative Adversarial Network for Image Steganography  1
Cycle Consistency Loss with Long Short Connection in Convolu...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Fatima, Syeda Imrana Garapati, Yugandhar Department of Computer Science and Engineering Hyderabad India
Image steganography is the practice of concealing secret information within a digital image in such a way that the alteration is undetectable to the human eye. It ensures secure communication by embedding data into th... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
Machine Learning-Based Autonomous Optimization of Unattended Wireless Sensor Networks Through Multi-Cause Reinforcement Learning
收藏 引用
SN computer science 2025年 第2期6卷 1-11页
作者: Chaudhary, Jitendra Kumar Dudeja, Deepak Verma, Neeraj Kumar Saini, Arun Kumar Kapila, Dhiraj Mohapatra, Smaranika School of Computing Graphic Era Hill University Bhimtal Campus Uttrakhand Bhimtal India Department of Computer Science and Engineering M.M. Engineering College Maharishi Markandeshwar (Deemed to Be University) Mullana Haryana Ambala India Department of Data Science and Engineering Manipal University Jaipur Jaipur India Department of IcfaiTech The ICFAI University Jaipur India Department of Computer Science & Engineering Lovely Professional University Punjab Phagwara India Department of Computer Science and Engineering Manipal University Jaipur Rajasthan Jaipur India
Self-configuration refers to a node's ability to dynamically adjust resource allocation based on changing network conditions, either autonomously or with minimal human input. Alongside this, self-optimization is a... 详细信息
来源: 评论
Improving Emotion Recognition in Audio Signals: Leveraging Novel Features and Deep Learning for Improved Classification  3rd
Improving Emotion Recognition in Audio Signals: Leveraging N...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Chaudhary, Poonam Choudhary, Neeraj Department of Computer Science and Engineering The NorthCap University Gurugram India Department of Computer Science and Engineering University College of Engineering and Technology Bikaner India
Recently, there has been interest in classifying emotions using audio inputs and machine learning methods. Because a single statement might be delivered in a variety of emotional circumstances, textual data alone is i... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
Network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
A Surface Crack Detection System Based on Image Input: The CNN Approach  2
A Surface Crack Detection System Based on Image Input: The C...
收藏 引用
2nd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Tiwari, Shweta Srivastava, Animesh Parihar, Parul Yadav, Puneet Kumar Chandigarh University Department of Computer Science and Engineering India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Alliance University Department of Computer Science and Engineering India
Any concrete construction that has surface fractures can seriously harm both its surroundings and the people nearby. Cracks that are discovered early on can help stop additional harm. Cracks are found using traditiona... 详细信息
来源: 评论
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
Graph Contrastive Learning for Truth Inference  40
Graph Contrastive Learning for Truth Inference
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Liu, Hao Liu, Jiacheng Tang, Feilong Li, Peng Chen, Long Yu, Jiadi Zhu, Yanmin Gao, Min Yang, Yanqin Hou, Xiaofeng Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong East China Normal University School of Data Science and Engineering Shanghai China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China University of Aizu School of Computer Science and Engineering Japan Simon Fraser University School of Computing Science Canada
Crowdsourcing has become a popular paradigm for collecting large-scale labeled datasets by leveraging numerous annotators. However, these annotators often provide noisy labels due to varying expertise. Truth inference... 详细信息
来源: 评论
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for Virtual Network Embedding  16
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Keerthan Kumar, T.G. Kb, Aneesh Siddheshwar, Anagha Marali, Amulya Kamath, Anupama Koolagudi, S.G. Addya, Sourav Kanti National Institute of Technology Department of Computer Science and Engineering Karnataka India Siddaganga Institute of Technology Department of Computer Science and Engineering India Pes University Department of Computer Science and Engineering India
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs... 详细信息
来源: 评论