咨询与建议

限定检索结果

文献类型

  • 9,089 篇 会议
  • 7,161 篇 期刊文献
  • 334 册 图书

馆藏范围

  • 16,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,408 篇 工学
    • 7,270 篇 计算机科学与技术...
    • 5,856 篇 软件工程
    • 2,219 篇 信息与通信工程
    • 1,754 篇 控制科学与工程
    • 1,254 篇 电气工程
    • 1,169 篇 生物工程
    • 1,005 篇 电子科学与技术(可...
    • 858 篇 生物医学工程(可授...
    • 768 篇 机械工程
    • 716 篇 光学工程
    • 481 篇 动力工程及工程热...
    • 441 篇 仪器科学与技术
    • 417 篇 化学工程与技术
    • 379 篇 安全科学与工程
    • 354 篇 交通运输工程
    • 333 篇 材料科学与工程(可...
  • 5,484 篇 理学
    • 2,961 篇 数学
    • 1,383 篇 生物学
    • 1,246 篇 物理学
    • 952 篇 统计学(可授理学、...
    • 809 篇 系统科学
    • 499 篇 化学
  • 2,904 篇 管理学
    • 1,875 篇 管理科学与工程(可...
    • 1,088 篇 图书情报与档案管...
    • 913 篇 工商管理
  • 910 篇 医学
    • 753 篇 临床医学
    • 656 篇 基础医学(可授医学...
    • 383 篇 公共卫生与预防医...
    • 354 篇 药学(可授医学、理...
  • 457 篇 法学
    • 360 篇 社会学
  • 320 篇 经济学
  • 233 篇 教育学
  • 172 篇 农学
  • 44 篇 军事学
  • 43 篇 文学
  • 25 篇 艺术学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 594 篇 computer science
  • 355 篇 deep learning
  • 346 篇 software enginee...
  • 218 篇 computational mo...
  • 209 篇 internet of thin...
  • 202 篇 machine learning
  • 197 篇 optimization
  • 185 篇 educational inst...
  • 175 篇 data mining
  • 171 篇 artificial intel...
  • 170 篇 application soft...
  • 164 篇 feature extracti...
  • 149 篇 support vector m...
  • 147 篇 computer archite...
  • 147 篇 systems engineer...
  • 143 篇 neural networks
  • 137 篇 training
  • 136 篇 accuracy
  • 133 篇 wireless sensor ...
  • 124 篇 image segmentati...

机构

  • 164 篇 college of compu...
  • 110 篇 school of softwa...
  • 74 篇 school of inform...
  • 64 篇 department of co...
  • 63 篇 school of comput...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 51 篇 department of co...
  • 49 篇 school of comput...
  • 48 篇 department of co...
  • 48 篇 school of comput...
  • 46 篇 department of co...
  • 45 篇 department of el...
  • 41 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 department of la...
  • 36 篇 department of co...
  • 34 篇 school of comput...
  • 33 篇 department of co...
  • 33 篇 school of big da...

作者

  • 101 篇 niyato dusit
  • 61 篇 rajkumar buyya
  • 45 篇 hisao ishibuchi
  • 42 篇 johansson karl h...
  • 32 篇 pedrycz witold
  • 28 篇 shen furao
  • 28 篇 e. rogers
  • 27 篇 shen xuemin
  • 25 篇 li li
  • 21 篇 wang lei
  • 20 篇 liu yang
  • 19 篇 tsiftsis theodor...
  • 18 篇 tao yang
  • 17 篇 soni mukesh
  • 17 篇 xiong zehui
  • 16 篇 stuckey peter j.
  • 16 篇 liu xin
  • 16 篇 khan arif ali
  • 16 篇 parizi reza m.
  • 15 篇 zhi-hui wang

语言

  • 15,436 篇 英文
  • 983 篇 其他
  • 156 篇 中文
  • 17 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Department of Software Systems School of Computer Science and Engineering"
16584 条 记 录,以下是11-20 订阅
排序:
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
CLIP-Flow:Decoding images encoded in CLIP space
收藏 引用
Computational Visual Media 2024年 第6期10卷 1157-1168页
作者: Hao Ma Ming Li Jingyuan Yang Or Patashnik Dani Lischinski Daniel Cohen-Or Hui Huang Visual Computing Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060China Department of Computer Science Tel Aviv UniversityTel Aviv 6997801Israel School of Computer Science and Engineering the Hebrew University of JerusalemJerusalem 91904Israel
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-... 详细信息
来源: 评论
Early Detection of Colletotrichum Kahawae Disease in Coffee Cherry Based on computer Vision Techniques
收藏 引用
computer Modeling in engineering & sciences 2024年 第4期139卷 759-782页
作者: Raveena Selvanarayanan Surendran Rajendran Youseef Alotaibi Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical ScienceChennai602105India Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is har... 详细信息
来源: 评论
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1539-1556页
作者: Weihao Song Zidong Wang Zhongkui Li Jianan Wang Qing-Long Han IEEE the State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering ScienceCollege of Engineering Peking University the Department of Computer Science Brunel University London the School of Aerospace Engineering Beijing Institute of Technology the School of Science Computing and Engineering Technologies Swinburne University of Technology
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
TES-CVIDS: A Transmission Efficient Sub-Map Based Collaborative Dense VI-SLAM Framework
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-14页
作者: Zhang, Tianjun Zhang, Lin Zhang, Fengyi Zhao, Shengjie Zhou, Yicong School of Software Engineering Tongji University Shanghai China Department of Computer and Information Science University of Macau Macau China
In recent years, how to achieve stable localization and construct high-quality dense maps in large-scale scenes has become a research highlight. In large-scale scenes, for the consideration of the mapping accuracy and... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论