咨询与建议

限定检索结果

文献类型

  • 20,590 篇 会议
  • 3,778 篇 期刊文献
  • 266 册 图书

馆藏范围

  • 24,634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,209 篇 工学
    • 10,869 篇 计算机科学与技术...
    • 9,063 篇 软件工程
    • 3,818 篇 信息与通信工程
    • 2,515 篇 控制科学与工程
    • 1,791 篇 电气工程
    • 1,785 篇 电子科学与技术(可...
    • 1,493 篇 生物工程
    • 1,289 篇 生物医学工程(可授...
    • 1,033 篇 机械工程
    • 1,028 篇 光学工程
    • 824 篇 仪器科学与技术
    • 773 篇 动力工程及工程热...
    • 735 篇 化学工程与技术
    • 636 篇 安全科学与工程
    • 541 篇 交通运输工程
    • 463 篇 建筑学
  • 7,904 篇 理学
    • 4,387 篇 数学
    • 2,098 篇 物理学
    • 1,662 篇 生物学
    • 1,395 篇 统计学(可授理学、...
    • 940 篇 系统科学
    • 762 篇 化学
  • 4,060 篇 管理学
    • 2,436 篇 管理科学与工程(可...
    • 1,882 篇 图书情报与档案管...
    • 1,301 篇 工商管理
  • 1,069 篇 医学
    • 896 篇 临床医学
    • 844 篇 基础医学(可授医学...
    • 536 篇 药学(可授医学、理...
    • 465 篇 公共卫生与预防医...
  • 713 篇 法学
    • 577 篇 社会学
  • 457 篇 经济学
  • 380 篇 教育学
  • 325 篇 农学
  • 103 篇 文学
  • 60 篇 军事学
  • 31 篇 艺术学
  • 6 篇 哲学
  • 4 篇 历史学

主题

  • 673 篇 accuracy
  • 493 篇 deep learning
  • 483 篇 feature extracti...
  • 475 篇 computational mo...
  • 420 篇 computer science
  • 350 篇 training
  • 342 篇 support vector m...
  • 298 篇 internet of thin...
  • 275 篇 machine learning
  • 262 篇 computer archite...
  • 261 篇 predictive model...
  • 261 篇 real-time system...
  • 234 篇 optimization
  • 210 篇 routing
  • 209 篇 data mining
  • 203 篇 neural networks
  • 203 篇 artificial intel...
  • 202 篇 convolutional ne...
  • 196 篇 reliability
  • 183 篇 throughput

机构

  • 86 篇 dept. of compute...
  • 83 篇 north-west unive...
  • 83 篇 institut univers...
  • 81 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 78 篇 tno technical sc...
  • 78 篇 université de st...
  • 76 篇 infn sezione di ...
  • 73 篇 nikhef national ...
  • 66 篇 università di ca...
  • 65 篇 university würzb...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 51 篇 dept. of compute...
  • 48 篇 university of jo...
  • 45 篇 university moham...
  • 44 篇 university moham...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 40 篇 dept. of compute...

作者

  • 94 篇 ardid m.
  • 93 篇 ferrara g.
  • 90 篇 kalekin o.
  • 89 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 88 篇 coleiro a.
  • 87 篇 calvo d.
  • 82 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 76 篇 huang f.
  • 75 篇 gozzini s.r.
  • 73 篇 dallier r.
  • 70 篇 anguita m.
  • 65 篇 enzenhöfer a.
  • 63 篇 celli s.
  • 60 篇 kulikovskiy v.
  • 59 篇 boettcher m.
  • 54 篇 dornic d.
  • 51 篇 aly z.

语言

  • 21,083 篇 英文
  • 3,218 篇 其他
  • 221 篇 中文
  • 107 篇 日文
  • 9 篇 朝鲜文
  • 8 篇 斯洛文尼亚文
  • 3 篇 德文
  • 1 篇 法文
检索条件"机构=Dept. of Computer Science and Systems Technology"
24634 条 记 录,以下是251-260 订阅
排序:
CAM-Based High Efficient Weakly Supervised Multi-Object Multi-Class Detection Method
CAM-Based High Efficient Weakly Supervised Multi-Object Mult...
收藏 引用
2025 IEEE International Conference on Consumer Electronics, ICCE 2025
作者: Chen, Xiu-Zhi Huang, Hsiao-Wei Chen, Yen-Lin Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei Taiwan
Two approaches are available for WSOD: MIL and CAM. MIL-based methods are capable of addressing multiple targets and multiple class problems. However, these methods require the input of region proposals. In contrast, ... 详细信息
来源: 评论
Deep Learning-Driven Cloud Intrusion Detection: Internet of Things and Cloud Networks  1
Deep Learning-Driven Cloud Intrusion Detection: Internet of ...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Moon, Iffath Tanjim Islam Mondal, Md. Nazrul Rajshahi University of Engineering & Technology Dept. of Computer Science & Engineering Rajshahi6204 Bangladesh
In this paper, we have utilized deep learning approaches to detect cloud intrusion for the Internet of Things (IoT). The emerging growth of IoT and cloud environments has revolutionized many industries by allowing rea... 详细信息
来源: 评论
Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats  2
Quantum Cryptography and Post-Quantum Security: Safeguarding...
收藏 引用
2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025
作者: Ishaq, Muhammad Al-Anesi, Bushra Jeddah International College Computer Science & Information Technology Dept. Jeddah Saudi Arabia
As quantum computing progresses towards practical realization, the security of existing cryptographic protocols, such as RSA and Elliptic Curve Cryptography (ECC), faces unprecedented risks. Quantum algorithms like Sh... 详细信息
来源: 评论
Reconsider Time Series Analysis for Insider Threat Detection
Reconsider Time Series Analysis for Insider Threat Detection
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Chen, Chia-Cheng Pao, Hsing-Kuo National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti... 详细信息
来源: 评论
Monocular UAV Motion Planning Method Based on Deep Reinforcement Learning
Monocular UAV Motion Planning Method Based on Deep Reinforce...
收藏 引用
2025 IEEE International Conference on Consumer Electronics, ICCE 2025
作者: Hsueh, Man-Chen Ku, Chun Chen, Xiu-Zhi Chen, Yen-Lin Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei Taiwan
This paper presents a monocular UAV motion planning method based on the DRL method SDDPG. By processing image data with the self-proposed lightweight dept. estimation model and a pretrained encoder, the information is... 详细信息
来源: 评论
Automated Skin Cancer Classification and Detection Using Convolutional Neural Networks and Dermoscopy Images  4
Automated Skin Cancer Classification and Detection Using Con...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Sara, Umme Das, Utpol Kanti Sikder, Juel Chowdhury, Sudipta Roy Dept. of Computer Science and Engineering National Institute of Textile Engineering and Research Savar Dhaka Bangladesh Dept. of Computer Science and Engineering Rangamati Science and Technology University Rangamati Sadar Rangamati4500 Bangladesh
The uncontrolled growth of skin cells in the epidermis producing the creation of a mass termed a tumor is a dangerous condition known as skin cancer. Current developments in deep learning artificial intelligence have ... 详细信息
来源: 评论
Fractional Delay and Doppler Estimation for OTFS systems with Doppler Squint Effect
Fractional Delay and Doppler Estimation for OTFS Systems wit...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Zhang, Meiying Cao, Ruoxiao Qian, Jun He, Hengtao Song, Shenghui Zhang, Jun Letaief, Khaled B. The Hong Kong University of Science and Technology Dept. of Electronic and Computer Engineering Hong Kong
Orthogonal time frequency space (OTFS) modulation is a promising technology for mitigating severe Doppler effects in high-mobility scenarios. However, existing OTFS channel estimation methods neglect the Doppler Squin... 详细信息
来源: 评论
Extract, Define, Canonicalize: An LLM-based Framework for Knowledge Graph Construction
Extract, Define, Canonicalize: An LLM-based Framework for Kn...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Bowen Soh, Harold Dept. of Computer Science National University of Singapore Singapore NUS Smart Systems Institute Singapore
In this work, we are interested in automated methods for knowledge graph creation (KGC) from input text. Progress on large language models (LLMs) has prompted a series of recent works applying them to KGC, e.g., via z... 详细信息
来源: 评论
Advancements in Animal Tracking: Assessing Deep Learning Algorithms  15
Advancements in Animal Tracking: Assessing Deep Learning Alg...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Akter, Tahmina Majumder, Avishek Mahmud, Tanjim Habib, Israt Binteh Hossain, Mohammad Shahadat Andersson, Karl Port City International University Dept. of Computer Science and Engineering Chittagong Bangladesh Rangamati Science and Technology University Dept. of Computer Science and Engineering Rangamati4500 Bangladesh International Islamic University Chittagong Dept. of Computer Science and Engineering Chittagong Bangladesh University of Chittagong Dept. of Computer Science and Engineering Chittagong4331 Bangladesh Luleå University of Technology Cybersecurity Laboratory Luleå97187 Sweden
In the rapidly advancing field of computer vision, object detection has become crucial for various applications, including animal tracking, face detection, and surveillance systems. This study investigates the efficac... 详细信息
来源: 评论
Securing of Cloud Storage Data Using Hybrid AES-ECC Cryptographic Approach
收藏 引用
Journal of Mobile Multimedia 2023年 第2期19卷 363-388页
作者: Kumar, Sunil Kumar, Dilip Dept. of Computer Science and Engineering National Institute of Technology Jamshedpur India
Internet has revolutionized the world in a way no one could have ever imagined. It paved the way for various different technologies, that have transformed the world exceptionally. Internet enabled cloud technology whi... 详细信息
来源: 评论