咨询与建议

限定检索结果

文献类型

  • 11,814 篇 会议
  • 11,529 篇 期刊文献
  • 216 册 图书

馆藏范围

  • 23,556 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,520 篇 工学
    • 6,075 篇 计算机科学与技术...
    • 4,710 篇 软件工程
    • 3,001 篇 电子科学与技术(可...
    • 2,581 篇 信息与通信工程
    • 2,568 篇 电气工程
    • 2,360 篇 控制科学与工程
    • 1,646 篇 光学工程
    • 1,280 篇 材料科学与工程(可...
    • 1,238 篇 化学工程与技术
    • 1,182 篇 生物工程
    • 939 篇 生物医学工程(可授...
    • 935 篇 仪器科学与技术
    • 920 篇 机械工程
    • 886 篇 动力工程及工程热...
    • 727 篇 力学(可授工学、理...
    • 442 篇 冶金工程
  • 11,758 篇 理学
    • 5,601 篇 物理学
    • 5,364 篇 数学
    • 1,740 篇 统计学(可授理学、...
    • 1,502 篇 系统科学
    • 1,484 篇 化学
    • 1,441 篇 生物学
    • 349 篇 地球物理学
  • 2,096 篇 管理学
    • 1,388 篇 管理科学与工程(可...
    • 752 篇 图书情报与档案管...
    • 677 篇 工商管理
  • 797 篇 医学
    • 677 篇 临床医学
    • 557 篇 基础医学(可授医学...
    • 344 篇 药学(可授医学、理...
  • 378 篇 法学
  • 290 篇 经济学
  • 181 篇 教育学
  • 168 篇 农学
  • 66 篇 文学
  • 48 篇 军事学
  • 20 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 450 篇 mathematics
  • 401 篇 computer science
  • 214 篇 deep learning
  • 179 篇 computational mo...
  • 177 篇 mathematical mod...
  • 173 篇 optimization
  • 161 篇 machine learning
  • 155 篇 neural networks
  • 153 篇 control systems
  • 146 篇 computer archite...
  • 136 篇 eigenvalues and ...
  • 133 篇 application soft...
  • 133 篇 bandwidth
  • 131 篇 educational inst...
  • 130 篇 signal processin...
  • 124 篇 image segmentati...
  • 118 篇 accuracy
  • 116 篇 statistics
  • 113 篇 signal to noise ...
  • 99 篇 internet of thin...

机构

  • 611 篇 department of ph...
  • 490 篇 horia hulubei na...
  • 416 篇 dipartimento di ...
  • 376 篇 infn laboratori ...
  • 360 篇 faculty of scien...
  • 350 篇 department for p...
  • 345 篇 department of ph...
  • 343 篇 department of ph...
  • 330 篇 department of ph...
  • 321 篇 infn sezione di ...
  • 318 篇 china institute ...
  • 313 篇 indian institute...
  • 310 篇 department of ph...
  • 301 篇 kirchhoff-instit...
  • 292 篇 faculty of elect...
  • 275 篇 department of ph...
  • 275 篇 fakultät für phy...
  • 271 篇 institute of phy...
  • 260 篇 institute of phy...
  • 258 篇 ithemba labs nat...

作者

  • 298 篇 c. alexa
  • 296 篇 j. m. izen
  • 294 篇 g. bella
  • 294 篇 d. calvet
  • 294 篇 c. amelung
  • 292 篇 j. strandberg
  • 292 篇 g. spigo
  • 289 篇 f. siegert
  • 278 篇 r. ströhmer
  • 272 篇 m. rijssenbeek
  • 271 篇 s. jin
  • 270 篇 g. gaudio
  • 267 篇 y. tayalati
  • 263 篇 s. mohapatra
  • 248 篇 m. klein
  • 246 篇 biswas s.
  • 246 篇 ahammed z.
  • 238 篇 alkin a.
  • 235 篇 s. guindon
  • 232 篇 f. pastore

语言

  • 22,565 篇 英文
  • 804 篇 其他
  • 180 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer and Electrical Engineering and Applied Mathematics"
23559 条 记 录,以下是61-70 订阅
排序:
Application of computer Vision Technology in User Interface Design  3rd
Application of Computer Vision Technology in User Interface ...
收藏 引用
3rd World Conference on Intelligent and 3D Technologies, WCI3DT 2024
作者: Su, Jianna Department of Mathematics and Computer Engineering Ordos Institute of Applied Technology Inner Mongolia Erdos017010 China
This article explores the application of computer vision technology in user interface design, particularly through gesture recognition to enhance human–computer interaction. Gestures offer natural and versatile advan... 详细信息
来源: 评论
Robustness of generative AI detection: adversarial attacks on black-box neural text detectors
收藏 引用
International Journal of Speech Technology 2024年 第4期27卷 861-874页
作者: Fishchuk, Vitalii Braun, Daniel Faculty of Electrical Engineering Mathematics and Computer Science University of Twente Enschede Netherlands Department of High-tech Business and Entrepreneurship University of Twente Enschede Netherlands
The increased quality and human-likeness of AI generated texts has resulted in a rising demand for neural text detectors, i.e. software that is able to detect whether a text was written by a human or generated by an A... 详细信息
来源: 评论
Early Detection of Cyber-Physical Attacks on Electric Vehicles Fast Charging Stations Using Wavelets and Deep Learning
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 220-231页
作者: Abu-Nassar, Ahmad M. Morsi, Walid G. Electrical Computer and Software Engineering Department Faculty of Engineering and Applied Science OshawaONL1G 0C5 Canada
Transportation electrification plays an important role in the operation of the smart grid through the integration of the electric vehicle fast charging stations (EVFCSs), which allows the electric vehicles to provide ... 详细信息
来源: 评论
Trustworthy Actionable Perturbations  41
Trustworthy Actionable Perturbations
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Friedbaum, Jesse Adiga, Sudarshan Tandon, Ravi Program in Applied Mathematics University of Arizona TucsonAZ United States Department of Electrical and Computer Engineering University of Arizona TucsonAZ United States
Counterfactuals, or modified inputs that lead to a different outcome, are an important tool for understanding the logic used by machine learning classifiers and how to change an undesirable classification. Even if a c... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
Science China(Information Sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Decentralized Multi-Armed Bandit Can Outperform Classic Upper Confidence Bound: A Homogeneous Case over Strongly Connected Graphs  63
Decentralized Multi-Armed Bandit Can Outperform Classic Uppe...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Zhu, Jingxuan Liu, Ji Zhejiang Lab China Stony Brook University Department of Applied Mathematics and Statistics United States Stony Brook University Department of Electrical and Computer Engineering United States
This paper studies a homogeneous decentralized multi-armed bandit problem, in which a network of multiple agents faces the same set of arms, and each agent aims to minimize its own regret. A fully decentralized upper ... 详细信息
来源: 评论
Blockchain-based secure and transparent election and vote counting mechanism using secret sharing scheme
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14009-14027页
作者: Chouhan, Vikas Arora, Anshul Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee India Department of Applied Mathematics Delhi Technological University Delhi India
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy... 详细信息
来源: 评论
Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6601-6616页
作者: Takiddin, Abdulrahman Ismail, Muhammad Atat, Rachad Serpedin, Erchin Florida State University Department of Electrical and Computer Engineering FAMU-FSU College of Engineering TallahasseeFL32310 United States Tennessee Tech University Department of Computer Science CookevilleTN38505 United States Lebanese American University Department of Computer Science and Mathematics Beirut1102-2801 Lebanon Texas A&M University Department of Electrical and Computer Engineering College StationTX77843 United States
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals... 详细信息
来源: 评论
Detecting Abnormal Communication Patterns in IoT Networks Using Graph Neural Networks  13th
Detecting Abnormal Communication Patterns in IoT Networks U...
收藏 引用
13th IAPR-TC-15 International Workshop on Graph-Based Representations in Pattern Recognition, GbRPR 2023
作者: Carletti, Vincenzo Foggia, Pasquale Vento, Mario Department of Information Engineering Electrical Engineering and Applied Mathematics University of Salerno Fisciano Italy
Nowadays, millions of Internet of Things (IoT) devices communicate over the Internet, thus becoming potential targets for cyberattacks. Due to the limited hardware capabilities of these devices, host-based countermeas... 详细信息
来源: 评论
Coordinated Motion Planning: Multi-Agent Path Finding in a Densely Packed, Bounded Domain  35
Coordinated Motion Planning: Multi-Agent Path Finding in a D...
收藏 引用
35th International Symposium on Algorithms and Computation, ISAAC 2024
作者: Fekete, Sándor P. Kosfeld, Ramin Kramer, Peter Neutzner, Jonas Rieck, Christian Scheffer, Christian Department of Computer Science TU Braunschweig Germany Department of Electrical Engineering and Computer Science Bochum University of Applied Sciences Germany
We study Multi-Agent Path Finding for arrangements of labeled agents in the interior of a simply connected domain: Given a unique start and target position for each agent, the goal is to find a sequence of parallel, c... 详细信息
来源: 评论