咨询与建议

限定检索结果

文献类型

  • 321,931 篇 会议
  • 138,390 篇 期刊文献
  • 3,368 册 图书
  • 2 篇 学位论文

馆藏范围

  • 463,690 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 269,876 篇 工学
    • 182,584 篇 计算机科学与技术...
    • 147,453 篇 软件工程
    • 64,004 篇 信息与通信工程
    • 41,542 篇 控制科学与工程
    • 36,007 篇 电气工程
    • 34,224 篇 电子科学与技术(可...
    • 31,042 篇 生物工程
    • 24,081 篇 生物医学工程(可授...
    • 20,742 篇 光学工程
    • 18,400 篇 机械工程
    • 15,131 篇 化学工程与技术
    • 14,191 篇 仪器科学与技术
    • 13,785 篇 动力工程及工程热...
    • 12,139 篇 材料科学与工程(可...
    • 9,618 篇 安全科学与工程
    • 8,915 篇 网络空间安全
  • 154,061 篇 理学
    • 78,887 篇 数学
    • 48,630 篇 物理学
    • 35,193 篇 生物学
    • 24,853 篇 统计学(可授理学、...
    • 17,625 篇 系统科学
    • 16,144 篇 化学
  • 68,721 篇 管理学
    • 40,901 篇 管理科学与工程(可...
    • 30,483 篇 图书情报与档案管...
    • 19,842 篇 工商管理
  • 22,758 篇 医学
    • 19,041 篇 临床医学
    • 17,129 篇 基础医学(可授医学...
    • 10,775 篇 药学(可授医学、理...
    • 8,881 篇 公共卫生与预防医...
  • 12,668 篇 法学
    • 10,355 篇 社会学
  • 7,742 篇 经济学
  • 6,206 篇 农学
  • 5,674 篇 教育学
  • 2,186 篇 文学
  • 1,060 篇 军事学
  • 664 篇 艺术学
  • 194 篇 哲学
  • 95 篇 历史学

主题

  • 23,559 篇 computer science
  • 9,963 篇 computational mo...
  • 9,676 篇 accuracy
  • 9,476 篇 feature extracti...
  • 8,439 篇 deep learning
  • 8,388 篇 machine learning
  • 7,749 篇 training
  • 6,554 篇 educational inst...
  • 6,493 篇 data mining
  • 5,818 篇 support vector m...
  • 5,700 篇 computer archite...
  • 5,616 篇 predictive model...
  • 5,555 篇 wireless sensor ...
  • 5,284 篇 costs
  • 5,213 篇 application soft...
  • 5,168 篇 algorithm design...
  • 5,158 篇 optimization
  • 5,012 篇 neural networks
  • 4,967 篇 testing
  • 4,964 篇 protocols

机构

  • 1,667 篇 department of co...
  • 1,334 篇 department of co...
  • 1,312 篇 department of el...
  • 1,142 篇 department of el...
  • 1,105 篇 college of compu...
  • 1,041 篇 department of co...
  • 1,022 篇 cavendish labora...
  • 978 篇 department of ph...
  • 965 篇 college of compu...
  • 882 篇 college of compu...
  • 866 篇 college of compu...
  • 837 篇 oliver lodge lab...
  • 833 篇 physikalisches i...
  • 795 篇 department of el...
  • 777 篇 university of ch...
  • 622 篇 department of co...
  • 600 篇 department of co...
  • 582 篇 college of compu...
  • 581 篇 department of co...
  • 556 篇 chitkara univers...

作者

  • 248 篇 barter w.
  • 247 篇 niyato dusit
  • 235 篇 s. chen
  • 233 篇 j. wang
  • 223 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 216 篇 a. gomes
  • 215 篇 borsato m.
  • 215 篇 betancourt c.
  • 214 篇 amato s.
  • 212 篇 boettcher t.
  • 207 篇 beiter a.
  • 207 篇 brundu d.
  • 198 篇 c. alexa
  • 196 篇 bencivenni g.
  • 195 篇 j. m. izen
  • 193 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 445,315 篇 英文
  • 13,672 篇 其他
  • 4,869 篇 中文
  • 245 篇 日文
  • 108 篇 德文
  • 105 篇 法文
  • 38 篇 朝鲜文
  • 24 篇 斯洛文尼亚文
  • 18 篇 荷兰文
  • 12 篇 俄文
  • 11 篇 西班牙文
  • 5 篇 土耳其文
  • 4 篇 葡萄牙文
  • 3 篇 阿拉伯文
  • 3 篇 捷克文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 斯洛伐克文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science-College of Engineering and Computer Science"
463691 条 记 录,以下是4951-4960 订阅
排序:
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Gong, Xueluan Tian, Bowei Xue, Meng Wu, Yuan Chen, Yanjiao Wang, Qian Nanyang Technological University Singapore Wuhan University School of Cyber Science and Engineering China Hong Kong University of Science and Technology Department of Computer Science and Engineering China Wuhan Textile University School of Computer Science and Artificial Intelligence Engineering Research Center of Hubei Province for Clothing Information China Zhejiang University College of Electrical Engineering China
Recent studies have revealed the vulnerability of Deep Neural Network (DNN) models to backdoor attacks. However, existing backdoor attacks arbitrarily set the trigger mask or use a randomly selected trigger, which res... 详细信息
来源: 评论
Syntriever: How to Train Your Retriever with Synthetic Data from LLMs
arXiv
收藏 引用
arXiv 2025年
作者: Kim, Minsang Baek, Seungjun Department of Computer Science and Engineering Korea University Korea Republic of
LLMs have boosted progress in many AI applications. Recently, there were attempts to distill the vast knowledge of LLMs into information retrieval systems. Those distillation methods mostly use output probabilities of... 详细信息
来源: 评论
An Enhanced Keylogger Detection Systems Using Recurrent Neural Networks Enabled with Feature Selection Model  7th
An Enhanced Keylogger Detection Systems Using Recurrent Neur...
收藏 引用
7th International Conference on Communication, Device and Networking, ICCDN 2024
作者: Awotunde, Joseph Bamidele Sur, Samarendra Nath Imoize, Agbotiname Lucky Rodríguez, Demóstenes Zegarra Akanji, Boluwatife Department of Computer Science Faculty of Information and Communication Sciences University of Ilorin Kwara State Ilorin240003 Nigeria Department of Electronics and Communication Engineering Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India Department of Electrical and Electronics Engineering Faculty of Engineering University of Lagos Akoka Lagos 100213 Nigeria Department of Electrical Engineering and Information Technology Institute of Digital Communication Ruhr University Bochum44801 Germany Department of Computer Science Federal University of Lavras Minas Gerais Lavras Brazil
Keyloggers are malicious software programs that record keystrokes of users without their consent or knowledge. They can steal sensitive information like credit card numbers and passwords. They pose a significant threa... 详细信息
来源: 评论
Enhancing DNA Sequence Analysis for Disease Diagnosis and Prediction Using Parallelised Hash-Based Approach
Enhancing DNA Sequence Analysis for Disease Diagnosis and Pr...
收藏 引用
Computational Intelligence, Communication Technology and Networking (CICTN), International Conference on
作者: Anusha Sreeram Raju Bhukya Department of Computer Science and Engineering National Institute of Technology Warangal
DNA sequencing is a critical tool in genetics, helping to identify disease-causing mutations, predict disease risks, screen for genetic diseases, and monitor disease progression. By determining the order of nucleotide... 详细信息
来源: 评论
FTayCO-DCN: Fractional Taylored Crocuta Optimization Enabled Deep Convolutional Neural Network for Pothole Detection
FTayCO-DCN: Fractional Taylored Crocuta Optimization Enabled...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: Vijay Jagannath Bodake Sudhir Kumar Meeeshala Department of Computer Science and Engineering Sandip University Nashik Nashik
Pothole detection is the dominant research domain that aids in achieving less traffic as well as safe journeys. Multiple researches were conducted in this domain to attain improved research efficacy, but the research ... 详细信息
来源: 评论
Interpretable Ensemble Learning Model for Enabling an IDS to Detect DNS Attacks  4th
Interpretable Ensemble Learning Model for Enabling an IDS to...
收藏 引用
4th International Conference on Intelligent Systems and Pattern Recognition, ISPR 2024
作者: Mahmoud, Loreen Pillai, Sreedev Gangopadhyay, Sugata Department of Computer Science and Engineering IIT Roorkee Roorkee India
Malicious domains pose a significant threat to internet security, with cyber-criminals exploiting the Domain Name System (DNS) to deceive users and host malicious content. The DNS services are very significant, and he... 详细信息
来源: 评论
Comprehensive Comparative Analysis of Food Classification Using YOLOv8n, VGG19, and InceptionV3
Comprehensive Comparative Analysis of Food Classification Us...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mohit Sapat Sarthak Wadegaonkar Sarthak Patankar Pratibha Mahajan Department of Computer Science Engineering Vishwakarma University Pune India
Food classification plays a vital role in areas such as food recognition, nutritional tracking, and culinary exploration. This study evaluates the effectiveness of three deep learning models—YOLOv8n, VGG19, and Incep... 详细信息
来源: 评论
Optimized interpretable generalized additive neural networks based malicious activity detection with video surveillance
收藏 引用
Signal, Image and Video Processing 2025年 第7期19卷 1-13页
作者: Lokesh, K. Baskar, M. Department of Computer Science and Engineering School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamilnadu Chennai606203 India Department of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamilnadu Chennai606203 India
Video surveillance continues to have difficulties with identifying the anomalies such as illegal activities and crimes despite the development of interactive multimedia anomaly detection systems. To address this issue... 详细信息
来源: 评论
A Deep Convolution Multifractal Analysis Using Principle Line Extraction Approach for Palmprint Recognition System  3rd
A Deep Convolution Multifractal Analysis Using Principle Lin...
收藏 引用
3rd International Conference on Computational Electronics for Wireless Communications, ICCWC 2023
作者: Abirami, B. Krishnaveni, K. Research Department of Computer Science Sri S. Ramasamy Naidu Memorial College Affiliated with Madurai Kamaraj University Tamil Nadu Virudhunagar District Sattur626203 India
This research study proposes a unique deep learning classifier using palm hand’s principle lines extraction approach for the palmprint recognition system. A Deep Convolution Multifractal Analysis Model for Palmprint ... 详细信息
来源: 评论
Mathematical analysis of the Shear-thinning slime layer flowing beneath an active bacterial surface
收藏 引用
Multiscale and Multidisciplinary Modeling, Experiments and Design 2025年 第2期8卷 1-14页
作者: Shah, Rehman Ali Asghar, Zeeshan Waqas, Muhammad Gondal, Muhammad Asif Department of Mathematics and Statistics International Islamic University Islamabad44000 Pakistan Department of Mathematics and Sciences College of Humanities and Sciences Prince Sultan University Riyadh11586 Saudi Arabia Department of Computer Science NUTECH National University of Technology Islamabad44000 Pakistan Department of Mathematics and Sciences Dhofar University Salalah211 Oman
Certain rod-shaped bacteria may move over surfaces without the assistance of external appendages like flagella, cilia, or pili thanks to a process known as gliding motility. In this work, the dynamics of an undulating... 详细信息
来源: 评论