咨询与建议

限定检索结果

文献类型

  • 6,322 篇 会议
  • 6,253 篇 期刊文献
  • 86 册 图书

馆藏范围

  • 12,661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,768 篇 工学
    • 5,591 篇 计算机科学与技术...
    • 4,635 篇 软件工程
    • 1,940 篇 信息与通信工程
    • 1,291 篇 生物工程
    • 1,089 篇 电气工程
    • 1,085 篇 控制科学与工程
    • 933 篇 生物医学工程(可授...
    • 822 篇 光学工程
    • 770 篇 电子科学与技术(可...
    • 433 篇 机械工程
    • 419 篇 化学工程与技术
    • 361 篇 仪器科学与技术
    • 343 篇 动力工程及工程热...
    • 340 篇 网络空间安全
    • 320 篇 交通运输工程
    • 318 篇 安全科学与工程
  • 5,115 篇 理学
    • 2,454 篇 数学
    • 1,570 篇 物理学
    • 1,519 篇 生物学
    • 976 篇 统计学(可授理学、...
    • 548 篇 化学
    • 450 篇 系统科学
  • 2,149 篇 管理学
    • 1,259 篇 管理科学与工程(可...
    • 967 篇 图书情报与档案管...
    • 695 篇 工商管理
  • 952 篇 医学
    • 781 篇 临床医学
    • 707 篇 基础医学(可授医学...
    • 409 篇 公共卫生与预防医...
    • 406 篇 药学(可授医学、理...
  • 412 篇 法学
    • 357 篇 社会学
  • 253 篇 经济学
  • 214 篇 农学
  • 115 篇 教育学
  • 52 篇 文学
  • 18 篇 军事学
  • 17 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 494 篇 deep learning
  • 472 篇 accuracy
  • 372 篇 machine learning
  • 298 篇 feature extracti...
  • 274 篇 computational mo...
  • 248 篇 real-time system...
  • 231 篇 predictive model...
  • 229 篇 training
  • 219 篇 internet of thin...
  • 169 篇 support vector m...
  • 166 篇 convolutional ne...
  • 162 篇 optimization
  • 161 篇 artificial intel...
  • 156 篇 neural networks
  • 141 篇 reinforcement le...
  • 139 篇 semantics
  • 132 篇 data models
  • 127 篇 data mining
  • 112 篇 image segmentati...
  • 110 篇 security

机构

  • 426 篇 department of ph...
  • 399 篇 iccub universita...
  • 399 篇 horia hulubei na...
  • 381 篇 h.h. wills physi...
  • 328 篇 van swinderen in...
  • 301 篇 yandex school of...
  • 300 篇 university of ch...
  • 295 篇 school of physic...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 289 篇 cavendish labora...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 242 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 209 篇 borsato m.
  • 209 篇 betancourt c.
  • 205 篇 brundu d.
  • 193 篇 bediaga i.
  • 182 篇 amato s.
  • 171 篇 boettcher t.
  • 170 篇 baryshnikov f.
  • 159 篇 baker s.
  • 152 篇 braun s.
  • 147 篇 borisyak m.
  • 144 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 11,655 篇 英文
  • 952 篇 其他
  • 64 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer and Data Engineering"
12661 条 记 录,以下是61-70 订阅
排序:
Machine learning for Internet of Things (IoT) device identification: a comparative study
收藏 引用
PeerJ computer Science 2025年 11卷 1-34页
作者: Tahaei, Hamid Liu, Anqi Forooghikian, Hamid Gheisari, Mehdi Zaki, Faiz Anuar, Nor Badrul Fang, Zhaoxi Huang, Longjun Institute of Artificial Intelligence Shaoxing University Shaoxing China School of Computing and Data Science Xiamen University Malaysia Selangor Malaysia Department of Management Islamic Azad University of Kish Kish Iran Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Selangor Kuala Lumpur Malaysia Department of Computer Science and Engineering Shaoxing University Shaoxing China
The rapid deployment of millions of connected devices brings significant security challenges to the Internet of Things (IoT). IoT devices are typically resource-constrained and designed for specific tasks, from which ... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论
Securing MIMO Wiretap Channel With Learning-Based Friendly Jamming Under Imperfect CSI
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16009-16022页
作者: Minh Tuan, Bui Nguyen, Diep N. Linh Trung, Nguyen Nguyen, Van-Dinh Van Huynh, Nguyen Thai Hoang, Dinh Krunz, Marwan Dutkiewicz, Eryk University of Technology Sydney School of Electrical and Data Engineering SydneyNSW2007 Australia University of Engineering and Technology Vietnam National University Faculty of Electronics and Telecommunications Hanoi100000 Viet Nam College of Engineering and Computer Science VinUniversity Hanoi100000 Viet Nam University of Liverpool Department of Electrical Engineering and Electronics LiverpoolL69 3GJ United Kingdom The University of Arizona Department of Electrical and Computer Engineering TucsonAZ85721 United States
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state i... 详细信息
来源: 评论
A General Framework for Clustering and Distribution Matching with Bandit Feedback
收藏 引用
IEEE Transactions on Information Theory 2025年 第3期71卷 2116-2139页
作者: Yavas, Recep Can Huang, Yuqi Tan, Vincent Y. F. Scarlett, Jonathan CNRS@CREATE DesCartes Program CREATE Tower 138602 Singapore National University of Singapore Department of Computer Science Queenstown119077 Singapore National University of Singapore School of Computing Department of Information Systems and Analytics Queenstown119077 Singapore National University of Singapore Department of Mathematics Department of Electrical and Computer Engineering Queenstown119077 Singapore Institute of Data Science National University of Singapore Department of Computer Science The Department of Mathematics Queenstown119077 Singapore
We develop a general framework for clustering and distribution matching problems with bandit feedback. We consider a K-armed bandit model where some subset of K arms is partitioned into M groups. Within each group, th... 详细信息
来源: 评论
Optimizing mechanical strength and thermal stability of sisal fiber-plastic composites by high-temperature treatment
收藏 引用
Interactions 2025年 第1期246卷 1-15页
作者: Mungle, Nischal P. Jadhav, Varsha D. Kulkarni, Sumant Khanderao D.S.Vijayan Saminathan, Rajasekaran Satishkumar, P. Department of Mechanical Engineering Yeshawantrao Chavan College of Engineering Maharashtra Wanadongari Nagpur India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Technology Maharashtra Pune India School of Civil Engineering REVA University Rukmini Knowledge Park Karnataka Kattigenahalli Bengaluru India Tamilnadu Chennai India Department of Mechanical Engineering College of Engineering and Computer Science Jazan University Jazan Saudi Arabia Department of Mechanical Engineering Rathinam Technical Campus Tamilnadu Coimbatore India
In this experiment, high-temperature polyethylene terephthalate (PT) was mixed with epoxy resin (ER) that had been thinned with acetone. Sisal fibers were coated with the resulting product. Composites of Coated treate... 详细信息
来源: 评论
Efficient Plant Disease Detection using K-Means clustering and DenseNet-based Classification  3
Efficient Plant Disease Detection using K-Means clustering a...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Yashodha, G. Rajakumar, B. Krishnamoorthy, M. Surendran, R. Kg College of Arts and Science Department of Computer Technology Coimbatore641035 India J.N.N. Institute of Engineering Department of Artificial Intelligence and Data Science Chennai601102 India Panimalar Engineering College Department of Computer Science and Engineering Chennai600 123 India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India
Early detection is vital in crop health, yet improvement in productivity faces time-consuming and inefficient challenges due to traditional manual techniques of plant disease detection. Thus, we present a deep learnin... 详细信息
来源: 评论
Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16478-16492页
作者: Manh, Bui Duc Nguyen, Chi-Hieu Hoang, Dinh Thai Nguyen, Diep N. Zeng, Ming Pham, Quoc-Viet University of Technology Sydney School of Electrical and Data Engineering SydneyNSW2007 Australia Université Laval Department of Electrical Engineering and Computer Engineering QuebecQCG1V 0A6 Canada University of Dublin School of Computer Science and Statistics Trinity College Dublin D02 PN40 Ireland
This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet-of-Things (IoT) systems. In our approach, artificial intelligence (AI)-driven detection modules are strategic... 详细信息
来源: 评论
Using Blue Whale Technology: An ML Edge Self-Adaptable Vehicle Slowdown Earliest Warning Information System  8th
Using Blue Whale Technology: An ML Edge Self-Adaptable Vehic...
收藏 引用
8th International Conference on Microelectronics Electromagnetics and Telecommunications, ICMEET 2023
作者: Murali, N. David, D. Beulah Research Scholar Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Tamilnadu Chennai India Department of Data Analytics Institute of Information Technology Saveetha School of Engineering SIMATS Tamilnadu Chennai India
Human life is challenged by this main work’s ultimate goal of reducing accidents and ensuring life safety due to the enormous growth of vehicles and those based on safety. Here, cases of suspected drunk driving, reck... 详细信息
来源: 评论
3D E-commerce Using AI Depth Algorithm Augmented Reality  8th
3D E-commerce Using AI Depth Algorithm Augmented Reality
收藏 引用
8th International Conference on Microelectronics Electromagnetics and Telecommunications, ICMEET 2023
作者: Silviya, S. H. Annie Devi, S. Renuka Sriman, B. Aswinrani, M. Raja, S. Sunitha, T. Rajalakshmi Institute of Technology Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Rajalakshmi Engineering College Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Artificial Intelligence and Data Science Saveetha Engineering College Chennai India
In today's dynamic world of online shopping, augmented reality (AR) integration has emerged as a game-changing innovation. It transcends the limitations of traditional online shopping by harnessing AR technologies... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论