咨询与建议

限定检索结果

文献类型

  • 167,869 篇 会议
  • 77,811 篇 期刊文献
  • 2,304 册 图书

馆藏范围

  • 247,983 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 145,425 篇 工学
    • 100,760 篇 计算机科学与技术...
    • 81,109 篇 软件工程
    • 34,913 篇 信息与通信工程
    • 22,142 篇 控制科学与工程
    • 18,293 篇 电气工程
    • 17,340 篇 电子科学与技术(可...
    • 16,389 篇 生物工程
    • 12,516 篇 生物医学工程(可授...
    • 10,723 篇 光学工程
    • 9,830 篇 机械工程
    • 8,062 篇 化学工程与技术
    • 7,463 篇 仪器科学与技术
    • 7,340 篇 动力工程及工程热...
    • 6,187 篇 材料科学与工程(可...
    • 5,588 篇 网络空间安全
    • 5,373 篇 安全科学与工程
  • 83,393 篇 理学
    • 42,951 篇 数学
    • 26,207 篇 物理学
    • 18,586 篇 生物学
    • 13,390 篇 统计学(可授理学、...
    • 9,269 篇 系统科学
    • 8,603 篇 化学
  • 39,192 篇 管理学
    • 23,629 篇 管理科学与工程(可...
    • 17,183 篇 图书情报与档案管...
    • 10,915 篇 工商管理
  • 12,084 篇 医学
    • 10,139 篇 临床医学
    • 9,092 篇 基础医学(可授医学...
    • 5,740 篇 药学(可授医学、理...
    • 4,940 篇 公共卫生与预防医...
  • 7,019 篇 法学
    • 5,758 篇 社会学
  • 4,256 篇 经济学
  • 3,301 篇 农学
  • 2,740 篇 教育学
  • 1,313 篇 文学
  • 522 篇 军事学
  • 408 篇 艺术学
  • 78 篇 哲学
  • 45 篇 历史学

主题

  • 11,850 篇 computer science
  • 5,650 篇 accuracy
  • 5,324 篇 feature extracti...
  • 5,125 篇 computational mo...
  • 4,775 篇 deep learning
  • 4,695 篇 machine learning
  • 4,111 篇 training
  • 3,551 篇 data mining
  • 3,293 篇 support vector m...
  • 2,950 篇 artificial intel...
  • 2,850 篇 predictive model...
  • 2,810 篇 optimization
  • 2,799 篇 internet of thin...
  • 2,710 篇 algorithm design...
  • 2,690 篇 wireless sensor ...
  • 2,686 篇 computer archite...
  • 2,546 篇 convolutional ne...
  • 2,518 篇 neural networks
  • 2,487 篇 protocols
  • 2,420 篇 application soft...

机构

  • 4,961 篇 department of co...
  • 1,082 篇 cavendish labora...
  • 975 篇 department of ph...
  • 914 篇 university of ch...
  • 908 篇 physikalisches i...
  • 907 篇 oliver lodge lab...
  • 822 篇 department of el...
  • 658 篇 department of co...
  • 652 篇 department of el...
  • 575 篇 infn sezione di ...
  • 553 篇 infn sezione di ...
  • 549 篇 infn laboratori ...
  • 536 篇 chitkara univers...
  • 525 篇 horia hulubei na...
  • 524 篇 department of co...
  • 516 篇 infn sezione di ...
  • 512 篇 department of ph...
  • 505 篇 school of physic...
  • 504 篇 school of physic...
  • 503 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 239 篇 j. wang
  • 239 篇 s. chen
  • 236 篇 a. gomes
  • 227 篇 c. alexa
  • 227 篇 blake t.
  • 223 篇 j. m. izen
  • 221 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 g. bella
  • 213 篇 beiter a.
  • 212 篇 j. strandberg
  • 212 篇 c. amelung
  • 211 篇 brundu d.
  • 210 篇 d. calvet
  • 206 篇 bencivenni g.

语言

  • 238,050 篇 英文
  • 6,957 篇 其他
  • 3,046 篇 中文
  • 181 篇 日文
  • 59 篇 德文
  • 52 篇 法文
  • 20 篇 朝鲜文
  • 19 篇 斯洛文尼亚文
  • 11 篇 荷兰文
  • 7 篇 俄文
  • 2 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Technology"
247984 条 记 录,以下是1-10 订阅
排序:
Cyberbullying detection - Technical report 2/2018 department of computer science AGH university of science and technology
arXiv
收藏 引用
arXiv 2018年
作者: Ptaszyński, Michal Leliwa, Gniewosz Piech, Mateusz Smywiński-Pohl, Aleksander Department of Computer Science Kitami Institute of Technology Samurai Labs/Fido Voice Department of Computer Science AGH University of Science and Technology
The research described in this paper concerns automatic cyberbullying detection in social media. There are two goals to achieve: building a gold standard cyberbullying detection dataset and measuring the performance o... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Labeling-based centrality approaches for identifying critical edges on temporal graphs
收藏 引用
Frontiers of computer science 2025年 第2期19卷 89-104页
作者: Tianming ZHANG Jie ZHAO Cibo YU Lu CHEN Yunjun GAO Bin CAO Jing FAN Ge YU School of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310023China School of Computer Science and Technology Zhejiang UniversityHangzhou 310013China Department of Computer Science Northeastern UniversityShenyang 110819China
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science China(Information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论
Fake news detection on social media using Adaptive Optimization based Deep Learning Approach
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 6091-6111页
作者: Steni Mol, T.S. Sreeja, P.S. Department of Computer Science Hindustan Institute of Technology and Science Chennai India Department of Computer Applications Vellore Institute of Technology Chennai India
Various content-sharing platforms and social media are developed in recent times so that it is highly possible to spread fake news and misinformation. This kind of news may cause chaos and panic among people. The auto... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
science China(Information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
AmplitudeArrow: On-the-Go AR Menu Selection Using Consecutive Simple Head Gestures and Amplitude Visualization
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第05期31卷 3408-3417页
作者: Tian, Yang Zhang, Youpeng Yan, Yukang Zhao, Shengdong Ma, Xiaojuan Shi, Yuanchun Guangxi University Department of Computer Science Guangxi Key Laboratory of Multimedia Communications and Network Technology China University of Rochester Department of Computer Science United States City University of Hong Kong School of Creative Media and the Department of Computer Science Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong Tsinghua University Department of Computer Science and Technology China
Heads-up computing aims to provide synergistic digital assistance that minimally interferes with users' on-the-go daily activities. Currently, the input modalities of heads-up computing are mainly voice and finger... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Modern Machine Learning Solution for Electricity Consumption Management in Smart Buildings
收藏 引用
IEEE Engineering Management Review 2025年 第1期53卷 54-62页
作者: Gautam, Sandeep Kumar Shrivastava, Vinayak Udmale, Sandeep S. Singh, Amit Kumar Singh, Sanjay Kumar Department of Computer Science and Engineering Varanasi221005 India Department of Computer Engineering and Information Technology Mumbai400019 India National Institute of Technology Department of Computer Science and Engineering Patna800005 India
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl... 详细信息
来源: 评论