咨询与建议

限定检索结果

文献类型

  • 282,604 篇 会议
  • 121,862 篇 期刊文献
  • 2,872 册 图书

馆藏范围

  • 407,337 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 236,182 篇 工学
    • 157,389 篇 计算机科学与技术...
    • 127,888 篇 软件工程
    • 56,656 篇 信息与通信工程
    • 37,019 篇 控制科学与工程
    • 32,687 篇 电气工程
    • 31,325 篇 电子科学与技术(可...
    • 27,896 篇 生物工程
    • 21,781 篇 生物医学工程(可授...
    • 18,818 篇 光学工程
    • 15,971 篇 机械工程
    • 13,868 篇 化学工程与技术
    • 12,669 篇 动力工程及工程热...
    • 12,661 篇 仪器科学与技术
    • 11,221 篇 材料科学与工程(可...
    • 8,763 篇 安全科学与工程
    • 8,065 篇 网络空间安全
  • 134,794 篇 理学
    • 67,115 篇 数学
    • 43,792 篇 物理学
    • 31,575 篇 生物学
    • 22,012 篇 统计学(可授理学、...
    • 15,718 篇 系统科学
    • 14,797 篇 化学
  • 59,162 篇 管理学
    • 35,410 篇 管理科学与工程(可...
    • 26,077 篇 图书情报与档案管...
    • 17,622 篇 工商管理
  • 20,735 篇 医学
    • 17,377 篇 临床医学
    • 15,579 篇 基础医学(可授医学...
    • 9,777 篇 药学(可授医学、理...
    • 8,290 篇 公共卫生与预防医...
  • 11,147 篇 法学
    • 9,153 篇 社会学
  • 6,846 篇 经济学
  • 5,374 篇 农学
  • 4,363 篇 教育学
  • 1,919 篇 文学
  • 903 篇 军事学
  • 519 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,105 篇 computer science
  • 9,386 篇 accuracy
  • 8,945 篇 computational mo...
  • 8,282 篇 feature extracti...
  • 7,939 篇 deep learning
  • 7,683 篇 machine learning
  • 6,881 篇 training
  • 5,478 篇 data mining
  • 5,251 篇 support vector m...
  • 5,219 篇 predictive model...
  • 5,198 篇 computer archite...
  • 4,952 篇 wireless sensor ...
  • 4,781 篇 costs
  • 4,699 篇 optimization
  • 4,556 篇 bandwidth
  • 4,467 篇 application soft...
  • 4,418 篇 neural networks
  • 4,411 篇 protocols
  • 4,393 篇 testing
  • 4,388 篇 real-time system...

机构

  • 1,684 篇 department of co...
  • 1,351 篇 department of co...
  • 1,344 篇 department of el...
  • 1,150 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 973 篇 department of ph...
  • 930 篇 department of co...
  • 845 篇 physikalisches i...
  • 841 篇 university of ch...
  • 829 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 634 篇 department of co...
  • 561 篇 department of co...
  • 541 篇 infn sezione di ...
  • 530 篇 chitkara univers...
  • 517 篇 infn laboratori ...
  • 511 篇 infn sezione di ...
  • 497 篇 infn sezione di ...
  • 495 篇 horia hulubei na...
  • 485 篇 department of co...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 250 篇 barter w.
  • 238 篇 niyato dusit
  • 227 篇 a. gomes
  • 223 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 210 篇 boettcher t.
  • 207 篇 c. alexa
  • 207 篇 brundu d.
  • 205 篇 beiter a.
  • 201 篇 j. m. izen
  • 196 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 389,867 篇 英文
  • 13,674 篇 其他
  • 3,821 篇 中文
  • 220 篇 日文
  • 50 篇 德文
  • 36 篇 法文
  • 35 篇 朝鲜文
  • 19 篇 斯洛文尼亚文
  • 9 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 意大利文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering with Data Science"
407338 条 记 录,以下是61-70 订阅
排序:
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
Relay Type Link Fabrication Attack in SDN: A Review
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2025年 第1期7卷 51-55页
作者: Metaferia, Getahun Lemma, Frezewd Adama Science and Technology University Department of Computer Science and Engineering Adama1881 Ethiopia
Software-defined Networking (SDN) is an innovative network architecture tailored to address the modern demands of network virtualization and cloud computing, which require features such as programmability, flexibility... 详细信息
来源: 评论
Enhancing link prediction in graph data augmentation through graphon mixup
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6267-6282页
作者: Sultana, Tangina Hossain, Md. Delowar Morshed, Md. Golam Lee, Young-Koo Department of Electronics and Communication Engineering Hajee Mohammad Danesh Science and Technology University Dinajpur Bangladesh Department of Computer Science and Engineering Kyung Hee University Yongin Korea Republic of Department of Computer Science and Engineering Hajee Mohammad Danesh Science and Technology University Dinajpur Bangladesh
Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i... 详细信息
来源: 评论
Stylometry-driven framework for Urdu intrinsic plagiarism detection: a comprehensive analysis using machine learning, deep learning, and large language models
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6479-6513页
作者: Manzoor, Muhammad Faraz Farooq, Muhammad Shoaib Abid, Adnan Department of Computer Science University of Management and Technology Lahore Pakistan Department of Data Science Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Detecting plagiarism in documents is a well-established task in natural language processing (NLP). Broadly, plagiarism detection is categorized into two types (1) intrinsic: to check the whole document or all the pass... 详细信息
来源: 评论
Application of human activity/action recognition: a review
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: sedaghati, Nazanin ardebili, Sondos Ghaffari, Ali Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Computer Engineering Faculty of Engineering and Natural Science Istinye University Istanbul Turkey Department of Computer Science Khazar University Baku Azerbaijan
Human activity recognition is a crucial domain in computer science and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ... 详细信息
来源: 评论
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and Telecommunications College of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Department of Computer Science and Engineering University College of Engineering Department of Computer Engineering National Institute of Technology Kurukshetra
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t... 详细信息
来源: 评论
ResdenseNet: a lightweight dense ResNet enhanced with depthwise separable convolutions and its applications for early plant disease classification
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6305-6326页
作者: Nagpal, Jyoti Goel, Lavika Department of Computer Science & Engineering The NorthCap University Gurugram122017 India Department of Computer Science and Engineering Malaviya National Institute of Technology Rajasthan Jaipur302017 India
In recent years, artificial intelligence has undergone robust development, leading to the emergence of numerous autonomous AI applications. However, a crucial challenge lies in optimizing computational efficiency and ... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
Proposing a digital twin-based sustainable water governance system for rural Indian villages
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1777-1783页
作者: Singh, Dineshkumar Sharma, Vishnu Department of Computer Science and Engineering Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India Department of Computer Science and Application Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ... 详细信息
来源: 评论
Silver Lining in the Fake News Cloud: Can Large Language Models Help Detect Misinformation?
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 14-24页
作者: Kumar, Raghvendra Goddu, Bhargav Saha, Sriparna Jatowt, Adam Indian Institute of Technology Department of Computer Science and Engineering Patna801106 India University of Innsbruck Department of Computer Science Innsbruck6020 Austria
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua... 详细信息
来源: 评论