咨询与建议

限定检索结果

文献类型

  • 82,689 篇 会议
  • 43,497 篇 期刊文献
  • 766 册 图书

馆藏范围

  • 126,951 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 71,687 篇 工学
    • 34,901 篇 计算机科学与技术...
    • 27,380 篇 软件工程
    • 16,602 篇 电子科学与技术(可...
    • 16,403 篇 信息与通信工程
    • 16,270 篇 电气工程
    • 12,190 篇 控制科学与工程
    • 7,547 篇 光学工程
    • 6,570 篇 生物工程
    • 5,758 篇 材料科学与工程(可...
    • 5,394 篇 生物医学工程(可授...
    • 5,365 篇 化学工程与技术
    • 5,184 篇 机械工程
    • 4,935 篇 动力工程及工程热...
    • 4,882 篇 仪器科学与技术
    • 2,275 篇 力学(可授工学、理...
    • 1,882 篇 交通运输工程
    • 1,781 篇 冶金工程
  • 45,175 篇 理学
    • 20,084 篇 物理学
    • 19,442 篇 数学
    • 7,433 篇 生物学
    • 6,722 篇 统计学(可授理学、...
    • 5,793 篇 化学
    • 5,501 篇 系统科学
  • 12,355 篇 管理学
    • 8,331 篇 管理科学与工程(可...
    • 4,348 篇 图书情报与档案管...
    • 4,164 篇 工商管理
  • 4,600 篇 医学
    • 3,826 篇 临床医学
    • 3,270 篇 基础医学(可授医学...
    • 2,091 篇 药学(可授医学、理...
  • 2,258 篇 法学
    • 1,960 篇 社会学
  • 1,651 篇 经济学
  • 969 篇 教育学
  • 920 篇 农学
  • 472 篇 文学
  • 282 篇 军事学
  • 124 篇 艺术学
  • 22 篇 哲学
  • 14 篇 历史学

主题

  • 5,010 篇 computer science
  • 2,343 篇 computational mo...
  • 1,820 篇 bandwidth
  • 1,778 篇 control systems
  • 1,495 篇 feature extracti...
  • 1,480 篇 costs
  • 1,400 篇 delay
  • 1,395 篇 testing
  • 1,371 篇 computer archite...
  • 1,370 篇 accuracy
  • 1,353 篇 optimization
  • 1,334 篇 hardware
  • 1,308 篇 wireless sensor ...
  • 1,303 篇 application soft...
  • 1,252 篇 algorithm design...
  • 1,247 篇 robustness
  • 1,238 篇 switches
  • 1,230 篇 machine learning
  • 1,215 篇 training
  • 1,213 篇 mathematical mod...

机构

  • 1,461 篇 department of el...
  • 1,228 篇 department of el...
  • 467 篇 department of el...
  • 467 篇 department of el...
  • 328 篇 department of el...
  • 300 篇 department of el...
  • 280 篇 department of el...
  • 212 篇 department of el...
  • 166 篇 radiation labora...
  • 166 篇 department of el...
  • 159 篇 department of el...
  • 159 篇 department of el...
  • 158 篇 department of el...
  • 156 篇 ieee
  • 146 篇 universidad iber...
  • 145 篇 department of el...
  • 145 篇 school of electr...
  • 141 篇 department of el...
  • 118 篇 department of el...
  • 117 篇 school of automa...

作者

  • 295 篇 niyato dusit
  • 183 篇 han zhu
  • 108 篇 g. tonelli
  • 107 篇 d. barney
  • 100 篇 l. valencia palo...
  • 98 篇 c. hensel
  • 96 篇 t. liu
  • 90 篇 a. garcia-bellid...
  • 89 篇 a. babaev
  • 89 篇 a. steen
  • 89 篇 n. cartiglia
  • 89 篇 k.g. shin
  • 89 篇 n. colino
  • 89 篇 f. moortgat
  • 88 篇 v. karjavine
  • 88 篇 b. clerbaux
  • 88 篇 g. sultanov
  • 85 篇 w. busza
  • 79 篇 m. a. ciocci
  • 78 篇 f. buehrer

语言

  • 121,752 篇 英文
  • 3,796 篇 其他
  • 1,331 篇 中文
  • 50 篇 日文
  • 17 篇 德文
  • 13 篇 法文
  • 10 篇 朝鲜文
  • 4 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Electrical&Computer Engineering and Computer Science"
126952 条 记 录,以下是141-150 订阅
排序:
Supervised deep learning for content-aware image retargeting with Fourier Convolutions
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 83611-83627页
作者: Givkashi, MohammadHossein Naderi, MohammadReza Karimi, Nader Shirani, Shahram Samavi, Shadrokh Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan84156-83111 Iran Department of Electrical and Computer Engineering McMaster University HamiltonONL8S 4L8 Canada Computer Science Department Seattle University SeattleWA98122 United States
Image retargeting aims to alter the size of the image with attention to the contents. One of the main obstacles to training deep learning models for image retargeting is the need for a vast labeled dataset. Labeled da... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Comparison of deep learning algorithms for site detection of false data injection attacks in smart grids
收藏 引用
Energy Informatics 2024年 第1期7卷 71页
作者: Nasir, Qassim Abu Talib, Manar Arshad, Muhammad Arbab Ishak, Tracy Berrim, Romaissa Alsaid, Basma Badway, Youssef Abu Waraga, Omnia Department of Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Department of Computer Science Iowa State University AmesIA United States Department of Electrical Engineering University of Sharjah Sharjah United Arab Emirates
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these atta... 详细信息
来源: 评论
Efficient Algorithms for Attributed Graph Alignment with Vanishing Edge Correlation
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4556-4580页
作者: Wang, Ziao Wang, Weina Wang, Lele University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada University of Michigan Department of Electrical and Computer Engineering Ann ArborMI48109 United States Carnegie Mellon University Computer Science Department PittsburghPA15213 United States
Graph alignment refers to the task of finding the vertex correspondence between two correlated graphs of n vertices. Extensive study has been done on polynomial-time algorithms for the graph alignment problem under th... 详细信息
来源: 评论
Learning Group Actions on Latent Representations  38
Learning Group Actions on Latent Representations
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jin, Yinzhu Shrivastava, Aman Fletcher, P. Thomas Department of Computer Science University of Virginia United States Department of Electrical and Computer Engineering Department of Computer Science University of Virginia United States
In this work, we introduce a new approach to model group actions in autoencoders. Diverging from prior research in this domain, we propose to learn the group actions on the latent space rather than strictly on the dat...
来源: 评论
Spatio-temporal Graph-Based Generation and Detection of Adversarial False Data Injection Evasion Attacks in Smart Grids
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6601-6616页
作者: Takiddin, Abdulrahman Ismail, Muhammad Atat, Rachad Serpedin, Erchin Florida State University Department of Electrical and Computer Engineering FAMU-FSU College of Engineering TallahasseeFL32310 United States Tennessee Tech University Department of Computer Science CookevilleTN38505 United States Lebanese American University Department of Computer Science and Mathematics Beirut1102-2801 Lebanon Texas A&M University Department of Electrical and Computer Engineering College StationTX77843 United States
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals... 详细信息
来源: 评论
Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 49-63页
作者: Wang, Feng Gursoy, M. Cenk Velipasalar, Senem Syracuse University Department of Electrical Engineering and Computer Science SyracuseNY13244 United States
In this paper, we present a multi-agent deep reinforcement learning (deep RL) framework for network slicing in a dynamic environment with multiple base stations and multiple users. In particular, we propose a novel de... 详细信息
来源: 评论
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
Feature-Based Federated Transfer Learning: Communication Efficiency, Robustness and Privacy
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 823-840页
作者: Wang, Feng Gursoy, M. Cenk Velipasalar, Senem Syracuse University Department of Electrical Engineering and Computer Science SyracuseNY13244 United States
In this paper, we propose feature-based federated transfer learning as a novel approach to improve communication efficiency by reducing the uplink payload by multiple orders of magnitude compared to that of existing a... 详细信息
来源: 评论
Enhancing Renewable Energy Integration:A Gaussian-Bare-Bones Levy Cheetah Optimization Approach to Optimal Power Flow in electrical Networks
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1339-1370页
作者: Ali S.Alghamdi Mohamed A.Zohdy Saad Aldoihi Department of Electrical Engineering College of EngineeringMajmaah UniversityAl-Majmaah11952Saudi Arabia Electrical and Computer Engineering Department Oakland UniversityRochesterMI48309USA Institute of Earth and Space Science King Abdulaziz City for Science and Technology(KACST)Riyadh11442Saudi Arabia Computer Science and Systems Engineering Institute Polytechnique de ParisPalaiseau CedexFrance
In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for n... 详细信息
来源: 评论