咨询与建议

限定检索结果

文献类型

  • 94,371 篇 会议
  • 53,990 篇 期刊文献
  • 904 册 图书

馆藏范围

  • 149,264 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 85,926 篇 工学
    • 42,906 篇 计算机科学与技术...
    • 33,693 篇 软件工程
    • 19,139 篇 信息与通信工程
    • 18,642 篇 电子科学与技术(可...
    • 18,493 篇 电气工程
    • 14,073 篇 控制科学与工程
    • 8,681 篇 光学工程
    • 7,975 篇 生物工程
    • 7,024 篇 材料科学与工程(可...
    • 6,544 篇 生物医学工程(可授...
    • 6,341 篇 化学工程与技术
    • 6,164 篇 机械工程
    • 5,638 篇 仪器科学与技术
    • 5,554 篇 动力工程及工程热...
    • 2,722 篇 力学(可授工学、理...
    • 2,286 篇 交通运输工程
    • 2,055 篇 建筑学
  • 53,983 篇 理学
    • 23,704 篇 物理学
    • 23,308 篇 数学
    • 9,144 篇 生物学
    • 8,023 篇 统计学(可授理学、...
    • 6,872 篇 化学
    • 6,304 篇 系统科学
  • 15,282 篇 管理学
    • 10,178 篇 管理科学与工程(可...
    • 5,531 篇 图书情报与档案管...
    • 4,928 篇 工商管理
  • 5,607 篇 医学
    • 4,665 篇 临床医学
    • 3,971 篇 基础医学(可授医学...
    • 2,571 篇 药学(可授医学、理...
  • 2,681 篇 法学
    • 2,300 篇 社会学
  • 1,933 篇 经济学
  • 1,144 篇 农学
  • 1,119 篇 教育学
  • 550 篇 文学
  • 337 篇 军事学
  • 180 篇 艺术学
  • 25 篇 哲学
  • 17 篇 历史学

主题

  • 5,986 篇 computer science
  • 2,743 篇 computational mo...
  • 2,091 篇 bandwidth
  • 1,925 篇 control systems
  • 1,842 篇 feature extracti...
  • 1,742 篇 laboratories
  • 1,697 篇 costs
  • 1,661 篇 computer archite...
  • 1,640 篇 accuracy
  • 1,614 篇 application soft...
  • 1,588 篇 testing
  • 1,576 篇 optimization
  • 1,549 篇 delay
  • 1,536 篇 machine learning
  • 1,487 篇 wireless sensor ...
  • 1,475 篇 hardware
  • 1,430 篇 algorithm design...
  • 1,422 篇 training
  • 1,372 篇 robustness
  • 1,354 篇 neural networks

机构

  • 1,413 篇 department of el...
  • 1,205 篇 department of el...
  • 1,099 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 961 篇 physikalisches i...
  • 947 篇 oliver lodge lab...
  • 738 篇 university of ch...
  • 603 篇 infn laboratori ...
  • 602 篇 infn sezione di ...
  • 591 篇 infn sezione di ...
  • 557 篇 infn sezione di ...
  • 554 篇 fakultät physik ...
  • 542 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 516 篇 department of ph...
  • 516 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 499 篇 stfc rutherford ...
  • 493 篇 nikhef national ...

作者

  • 262 篇 barter w.
  • 250 篇 a. gomes
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 blake t.
  • 232 篇 c. amelung
  • 231 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 d. calvet
  • 229 篇 beiter a.
  • 226 篇 bellee v.
  • 225 篇 amato s.
  • 224 篇 betancourt c.
  • 222 篇 borsato m.
  • 221 篇 bowcock t.j.v.
  • 221 篇 boettcher t.
  • 221 篇 bencivenni g.
  • 220 篇 brundu d.

语言

  • 134,459 篇 英文
  • 13,036 篇 其他
  • 1,717 篇 中文
  • 53 篇 日文
  • 26 篇 德文
  • 22 篇 法文
  • 11 篇 朝鲜文
  • 4 篇 阿拉伯文
  • 4 篇 俄文
  • 4 篇 斯洛文尼亚文
  • 2 篇 捷克文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Electrical Engineering and Computer Science and Laboratory for Computer Science"
149265 条 记 录,以下是161-170 订阅
Deep Learning-Based Trojan Detection in Network Traffic: A CNN-BiLSTM Approach  100
Deep Learning-Based Trojan Detection in Network Traffic: A C...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Hoque, Md Mozammal Alam, Khorshed Monir, Md Fahad Tarek Habib, Md University of Houston Department of Electrical and Computer Engineering United States Department of Computer Science & Engineering Bangladesh
Trojan detection from network traffic data is crucial for safeguarding networks against covert infiltration and potential data breaches. Deep learning (DL) techniques can play a pivotal role in detecting trojans from ... 详细信息
来源: 评论
SFI-Swin: symmetric face inpainting with swin transformer by distinctly learning face components distributions
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17581-17595页
作者: Givkashi, MohammadHossein Naderi, MohammadReza Karimi, Nader Shirani, Shahram Samavi, Shadrokh Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan84156-83111 Iran Department of Electrical and Computer Engineering McMaster University HamiltonL8S 4L8 Canada Computer Science Department Seattle University Seattle98122 United States
Image inpainting consists of filling holes or missing parts of an image. Inpainting face images with symmetric characteristics is more challenging than inpainting a natural scene. None of the powerful existing models ... 详细信息
来源: 评论
Designing an IT2 Fuzzy Rule-based System for Emotion Recognition Using Biological Data  14
Designing an IT2 Fuzzy Rule-based System for Emotion Recogni...
收藏 引用
14th International Conference on computer and Knowledge engineering, ICCKE 2024
作者: Keshtkar, Mahsa Tahayori, Hooman Department of Computer Science and Engineering IT School of Electrical and Computer Engineering Shiraz University Shiraz Iran
— In recent years, significant efforts have been dedicated to detect human emotions. This interest primarily stems from the fact that emotions influence individuals' reactions and behaviors. Understanding these i... 详细信息
来源: 评论
Domain Adaptation based Object Detection for Autonomous Driving in Foggy and Rainy Weather
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-12页
作者: Li, Jinlong Xu, Runsheng Liu, Xinyu Ma, Jin Li, Baolu Zou, Qin Ma, Jiaqi Yu, Hongkai Department of Computer Science Cleveland State University Cleveland OH USA Department of Civil and Environmental Engineering University of California Los Angeles CA USA Department of Electrical and Computer Engineering Cleveland State University Cleveland OH USA School of Computer Science Wuhan University Wuhan China
Typically, object detection methods for autonomous driving that rely on supervised learning make the assumption of a consistent feature distribution between the training and testing data, this such assumption may fail... 详细信息
来源: 评论
A review on applications of holomorphic embedding methods
收藏 引用
iEnergy 2023年 第4期2卷 264-274页
作者: Kaiyang Huang Kai Sun Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert th... 详细信息
来源: 评论
Comparison of deep learning algorithms for site detection of false data injection attacks in smart grids
收藏 引用
Energy Informatics 2024年 第1期7卷 1-26页
作者: Nasir, Qassim Abu Talib, Manar Arshad, Muhammad Arbab Ishak, Tracy Berrim, Romaissa Alsaid, Basma Badway, Youssef Abu Waraga, Omnia Department of Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Department of Computer Science Iowa State University AmesIA United States Department of Electrical Engineering University of Sharjah Sharjah United Arab Emirates
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these atta... 详细信息
来源: 评论
Analyzing the Impact of Demographic and Operational Variables on 1-to-Many Face ID Search
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on Technology and Society 2024年 第2期5卷 217-230页
作者: Pangelinan, Gabriella Bhatta, Aman Wu, Haiyu King, Michael C. Bowyer, Kevin W. Florida Institute of Technology Department of Electrical Engineering and Computer Science MelbourneFL32901 United States University of Notre Dame Department of Computer Science and Engineering Notre DameIN46556 United States
Concerns related to the proliferation of automated face recognition technology with the intent of solving or preventing crimes continue to mount. The technology being implicated in wrongful arrest following 1-to-many ... 详细信息
来源: 评论
Fast sampling from constrained spaces using the Metropolis-adjusted Mirror Langevin algorithm  37
Fast sampling from constrained spaces using the Metropolis-a...
收藏 引用
37th Annual Conference on Learning Theory, COLT 2024
作者: Srinivasan, Vishwak Wibisono, Andre Wilson, Ashia Department of Electrical Engineering and Computer Science MIT United States Department of Computer Science Yale University United States
We propose a new method called the Metropolis-adjusted Mirror Langevin algorithm for approximate sampling from distributions whose support is a compact and convex set. This algorithm adds an accept-reject filter to th... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
Classification with ensembles and case study on functional magnetic resonance imaging
收藏 引用
Digital Communications and Networks 2022年 第1期8卷 80-86页
作者: Adnan OM.Abuassba Zhang Dezheng Hazrat Ali Fan Zhang Khan Ali Department of Computer Science Arab Open University-PalestineRamallahPalestine Department of Computer Science and Communication Engineering University of Science and Technology BeijingChina and Beijing Key Laboratory of Knowledge Engineering for Materials ScienceBeijing100083China Department of Electrical and Computer Engineering COMSATS University IslamabadAbbottabad CampusAbbottabadPakistan
The ensemble is a technique that strategically combines basic models to achieve better accuracy ***,combination methods,and selection topology are the main factors determining ensemble ***,it is a challenging task to ... 详细信息
来源: 评论