咨询与建议

限定检索结果

文献类型

  • 6,273 篇 会议
  • 6,129 篇 期刊文献

馆藏范围

  • 12,402 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,617 篇 工学
    • 5,499 篇 计算机科学与技术...
    • 4,595 篇 软件工程
    • 1,892 篇 信息与通信工程
    • 1,288 篇 生物工程
    • 1,048 篇 控制科学与工程
    • 1,000 篇 电气工程
    • 930 篇 生物医学工程(可授...
    • 814 篇 光学工程
    • 720 篇 电子科学与技术(可...
    • 416 篇 机械工程
    • 408 篇 化学工程与技术
    • 355 篇 仪器科学与技术
    • 335 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 321 篇 网络空间安全
    • 313 篇 安全科学与工程
  • 5,033 篇 理学
    • 2,430 篇 数学
    • 1,521 篇 物理学
    • 1,506 篇 生物学
    • 960 篇 统计学(可授理学、...
    • 531 篇 化学
    • 450 篇 系统科学
  • 2,121 篇 管理学
    • 1,250 篇 管理科学与工程(可...
    • 945 篇 图书情报与档案管...
    • 690 篇 工商管理
  • 938 篇 医学
    • 780 篇 临床医学
    • 700 篇 基础医学(可授医学...
    • 407 篇 公共卫生与预防医...
    • 406 篇 药学(可授医学、理...
  • 412 篇 法学
    • 358 篇 社会学
  • 253 篇 经济学
  • 212 篇 农学
  • 110 篇 教育学
  • 51 篇 文学
  • 18 篇 军事学
  • 17 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 480 篇 deep learning
  • 473 篇 accuracy
  • 361 篇 machine learning
  • 303 篇 feature extracti...
  • 271 篇 computational mo...
  • 247 篇 real-time system...
  • 231 篇 predictive model...
  • 231 篇 training
  • 219 篇 internet of thin...
  • 170 篇 convolutional ne...
  • 168 篇 support vector m...
  • 158 篇 optimization
  • 154 篇 neural networks
  • 140 篇 reinforcement le...
  • 139 篇 semantics
  • 137 篇 data models
  • 127 篇 data mining
  • 115 篇 artificial intel...
  • 111 篇 security
  • 109 篇 image segmentati...

机构

  • 426 篇 department of ph...
  • 399 篇 iccub universita...
  • 399 篇 horia hulubei na...
  • 382 篇 h.h. wills physi...
  • 339 篇 van swinderen in...
  • 309 篇 yandex school of...
  • 300 篇 university of ch...
  • 297 篇 school of physic...
  • 293 篇 nikhef national ...
  • 291 篇 cavendish labora...
  • 291 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 243 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 209 篇 betancourt c.
  • 206 篇 brundu d.
  • 195 篇 bediaga i.
  • 185 篇 amato s.
  • 176 篇 baryshnikov f.
  • 172 篇 boettcher t.
  • 159 篇 baker s.
  • 154 篇 braun s.
  • 151 篇 borisyak m.
  • 145 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 11,411 篇 英文
  • 937 篇 其他
  • 63 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer and Data Engineering"
12402 条 记 录,以下是241-250 订阅
排序:
Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16478-16492页
作者: Manh, Bui Duc Nguyen, Chi-Hieu Hoang, Dinh Thai Nguyen, Diep N. Zeng, Ming Pham, Quoc-Viet University of Technology Sydney School of Electrical and Data Engineering SydneyNSW2007 Australia Université Laval Department of Electrical Engineering and Computer Engineering QuebecQCG1V 0A6 Canada University of Dublin School of Computer Science and Statistics Trinity College Dublin D02 PN40 Ireland
This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet-of-Things (IoT) systems. In our approach, artificial intelligence (AI)-driven detection modules are strategic... 详细信息
来源: 评论
Unveiling Early Autism Spectrum Disorder Detection: A Comprehensive Study of Machine Learning and Deep Learning Approaches  6
Unveiling Early Autism Spectrum Disorder Detection: A Compre...
收藏 引用
6th IEEE Pune Section International Conference, PuneCon 2023
作者: Tarai, Trilochan Parhi, Manoranjan Mishra, Debahuti Shaw, Kailash University Department of Computer Science and Engineering Odisha Bhubaneswar India University Centre of Data Science Department of Computer Science and Engineering Odisha Bhubaneswar India Department of Aiml Pune India
According to research by the world health organization (WHO), approximately 0.63% of children are diagnosed with autism spectrum disorder (ASD). ASD commonly emerges during childhood and persists through adolescence a... 详细信息
来源: 评论
Using Blue Whale Technology: An ML Edge Self-Adaptable Vehicle Slowdown Earliest Warning Information System  8th
Using Blue Whale Technology: An ML Edge Self-Adaptable Vehic...
收藏 引用
8th International Conference on Microelectronics Electromagnetics and Telecommunications, ICMEET 2023
作者: Murali, N. David, D. Beulah Research Scholar Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Tamilnadu Chennai India Department of Data Analytics Institute of Information Technology Saveetha School of Engineering SIMATS Tamilnadu Chennai India
Human life is challenged by this main work’s ultimate goal of reducing accidents and ensuring life safety due to the enormous growth of vehicles and those based on safety. Here, cases of suspected drunk driving, reck... 详细信息
来源: 评论
Principled Penalty-based Methods for Bilevel Reinforcement Learning and RLHF  41
Principled Penalty-based Methods for Bilevel Reinforcement L...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Shen, Han Yang, Zhuoran Chen, Tianyi Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute United States Department of Statistics and Data Science Yale University United States
Bilevel optimization has been recently applied to many machine learning tasks. However, their applications have been restricted to the supervised learning setting, where static objective functions with benign structur... 详细信息
来源: 评论
SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1398-1411页
作者: Mimonah Al Qathrady Safi Ullah Mohammed S.Alshehri Jawad Ahmad Sultan Almakdi Samar M.Alqhtani Muazzam A.Khan Baraq Ghaleb Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Computer Science Quaid-i-Azam UniversityIslamabadPakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK ICESCO Chair Big Data Analytics and Edge Computing Quaid-i-Azam UniversityIslamabadPakistan
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr... 详细信息
来源: 评论
3D E-commerce Using AI Depth Algorithm Augmented Reality  8th
3D E-commerce Using AI Depth Algorithm Augmented Reality
收藏 引用
8th International Conference on Microelectronics Electromagnetics and Telecommunications, ICMEET 2023
作者: Silviya, S. H. Annie Devi, S. Renuka Sriman, B. Aswinrani, M. Raja, S. Sunitha, T. Rajalakshmi Institute of Technology Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Rajalakshmi Engineering College Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Artificial Intelligence and Data Science Saveetha Engineering College Chennai India
In today's dynamic world of online shopping, augmented reality (AR) integration has emerged as a game-changing innovation. It transcends the limitations of traditional online shopping by harnessing AR technologies... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论
Theoretical Insights for Diffusion Guidance: A Case Study for Gaussian Mixture Models  41
Theoretical Insights for Diffusion Guidance: A Case Study fo...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wu, Yuchen Chen, Minshuo Li, Zihao Wang, Mengdi Wei, Yuting Department of Statistics and Data Science The Wharton School University of Pennsylvania United States Department of Electrical and Computer Engineering Princeton University United States
Diffusion models benefit from instillation of task-specific information into the score function to steer the sample generation towards desired properties. Such information is coined as guidance. For example, in text-t... 详细信息
来源: 评论
The Impact of 5G Technology on the Functionality and Performance of Internet of Things (IoT) Devices  8
The Impact of 5G Technology on the Functionality and Perform...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Yesankar, Prajyot Gourshettiwar, Palash Gote, Pradnyawant Jiet, Moses Makuei Gadkari, Ayush Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Artificial Intelligence & Data Science Maharashtra Wardha442001 India
The design of wireless mobile devices of the next generation 5G promises to address the demands of complex IOT designs in terms of connectivity technologies. This The study illuminates the architecture, benefits, and ... 详细信息
来源: 评论
Detailed Analysis on the Micro-Architecture and Integration of Bit Manipulation Extensions in the SweRV EH1 Core of a RISC-V Processor and its Functional Verification  21
Detailed Analysis on the Micro-Architecture and Integration ...
收藏 引用
21st International Bhurban Conference on Applied Sciences and Technology, IBCAST 2024
作者: Yasmin, Samina Naveed, Muhammad Asim Hussain, Tassadaq Ayguade, Eduard Centre for AI and Big Data Department of Electrical Engineering Mianwali Pakistan Pakistan Supercomputing PakASIC Centre for AI and Big Data Mianwali Pakistan Barcelona Supercomputing Centre Computer Sciences Department Spain
Embedded system applications and small electronic devices demand cost-effective, high-performance, energy-efficient, and secure processor architectures. In this context, RISC-V has emerged as a significant competitor ... 详细信息
来源: 评论