咨询与建议

限定检索结果

文献类型

  • 11,383 篇 期刊文献
  • 8,742 篇 会议
  • 118 册 图书

馆藏范围

  • 20,243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,459 篇 工学
    • 6,439 篇 计算机科学与技术...
    • 5,076 篇 软件工程
    • 2,425 篇 信息与通信工程
    • 2,334 篇 电子科学与技术(可...
    • 2,169 篇 电气工程
    • 1,671 篇 光学工程
    • 1,545 篇 生物工程
    • 1,512 篇 控制科学与工程
    • 1,376 篇 生物医学工程(可授...
    • 1,109 篇 材料科学与工程(可...
    • 1,105 篇 化学工程与技术
    • 834 篇 机械工程
    • 813 篇 仪器科学与技术
    • 676 篇 动力工程及工程热...
    • 463 篇 力学(可授工学、理...
    • 396 篇 冶金工程
  • 9,345 篇 理学
    • 5,016 篇 物理学
    • 3,013 篇 数学
    • 1,899 篇 生物学
    • 1,295 篇 化学
    • 1,113 篇 统计学(可授理学、...
    • 616 篇 系统科学
  • 2,537 篇 管理学
    • 1,613 篇 管理科学与工程(可...
    • 935 篇 图书情报与档案管...
    • 718 篇 工商管理
  • 1,465 篇 医学
    • 1,187 篇 临床医学
    • 981 篇 基础医学(可授医学...
    • 600 篇 药学(可授医学、理...
    • 451 篇 公共卫生与预防医...
  • 478 篇 法学
    • 385 篇 社会学
  • 296 篇 农学
  • 264 篇 经济学
  • 236 篇 教育学
  • 83 篇 文学
  • 37 篇 艺术学
  • 36 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 418 篇 deep learning
  • 315 篇 computer science
  • 220 篇 machine learning
  • 170 篇 feature extracti...
  • 165 篇 computational mo...
  • 153 篇 internet of thin...
  • 149 篇 image segmentati...
  • 147 篇 accuracy
  • 144 篇 optimization
  • 127 篇 support vector m...
  • 121 篇 wireless communi...
  • 121 篇 data mining
  • 110 篇 neural networks
  • 109 篇 hadron colliders
  • 108 篇 magnetic resonan...
  • 107 篇 training
  • 105 篇 bandwidth
  • 98 篇 hadrons
  • 93 篇 throughput
  • 90 篇 deep neural netw...

机构

  • 1,081 篇 cavendish labora...
  • 1,010 篇 department of ph...
  • 969 篇 physikalisches i...
  • 953 篇 oliver lodge lab...
  • 629 篇 infn laboratori ...
  • 607 篇 infn sezione di ...
  • 591 篇 fakultät physik ...
  • 589 篇 university of ch...
  • 584 篇 infn sezione di ...
  • 582 篇 infn sezione di ...
  • 561 篇 school of physic...
  • 523 篇 horia hulubei na...
  • 522 篇 iccub universita...
  • 510 篇 school of physic...
  • 501 篇 department of ph...
  • 495 篇 h.h. wills physi...
  • 495 篇 imperial college...
  • 494 篇 center for high ...
  • 490 篇 nikhef national ...
  • 486 篇 stfc rutherford ...

作者

  • 264 篇 beiter a.
  • 261 篇 a. gomes
  • 259 篇 barter w.
  • 249 篇 bellee v.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 238 篇 c. amelung
  • 237 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 s. chen
  • 236 篇 d. calvet
  • 233 篇 g. spigo
  • 231 篇 f. siegert
  • 226 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 brundu d.
  • 219 篇 j. wang
  • 214 篇 r. ströhmer
  • 213 篇 y. tayalati
  • 210 篇 m. rijssenbeek

语言

  • 19,211 篇 英文
  • 771 篇 其他
  • 239 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Digital Technology Center and Department of Computer Science and Engineering"
20243 条 记 录,以下是1-10 订阅
排序:
A survey on cross-user federated recommendation
收藏 引用
science China(Information sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1149-1171页
作者: Xiang Zhang Shenyan Han Wenbin Huang Daoyong Fu School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Nanjing University of Information Science and TechnologyMinistry of EducationNanjing210044China
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ... 详细信息
来源: 评论
Enhanced thyroid disease prediction using ensemble machine learning: a high-accuracy approach with feature selection and class balancing
收藏 引用
Discover Artificial Intelligence 2025年 第1期5卷 1-29页
作者: Islam, Md. Rezaul Chowdhury, Aniruddha Islam Shama, Sharmin Lamyea, Md. Masudul Hasan Department of Computer Science and Engineering Shahjalal University of Science and Technology Sylhet3114 Bangladesh Department of Educational Technology and Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Gazipur1750 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1212 Bangladesh
Thyroid disorders are increasingly prevalent, making early detection crucial for reducing mortality and complications. Accurate prediction of disease progression and understanding the interplay of clinical features ar... 详细信息
来源: 评论
Power synchronization: taming massive diversified serverless functions under power constraints
收藏 引用
science China(Information sciences) 2025年 第3期68卷 47-65页
作者: Du LIU Lu ZHANG Yechen XU Xinkai WANG Lingyu SUN Yifei PU Xiaofeng HOU Chao LI Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong University AI Chip Center for Emerging Smart Systems The Hong Kong University of Science and Technology
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted ser... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Scalable Motion Estimation and Temporal Context Reinforcement for Video Compression Using RGB Sensors
收藏 引用
IEEE Sensors Journal 2025年 第10期25卷 18323-18333页
作者: Huang, Qian Lu, Hao Liu, Wenting Wang, Yiming Hohai University College of Computer Science and Software Engineering Nanjing211100 China Jiangsu Engineering Research Center of Digital Twinning Technology for Key Equipment in Petrochemical Process Changzhou213164 China
We propose a novel deep learned video compression technique, named scalable motion estimation (SME), which is designed for video data generated by sensor systems in smart devices. These devices face unique challenges ... 详细信息
来源: 评论
A QoS-based technique for load balancing in green cloud computing using an artificial bee colony algorithm
收藏 引用
Journal of Experimental and Theoretical Artificial Intelligence 2025年 第2期37卷 307-342页
作者: Tabagchi Milan, Sara Jafari Navimipour, Nima Lohi Bavil, Hamed Yalcin, Senay Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Computer Engineering Faculty of Engineering and Natural Sciences Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Douliou Taiwan Department of Computer Engineering University of Applied Sciences & Technology Tabriz Iran Department of Computer Engineering Nisantasi University Istanbul Turkey
Nowadays, high energy amount is being wasted by computing servers and personal electronic devices, which produce a high amount of carbon dioxide. Thus, it is required to decrease energy usage and pollution. Many appli... 详细信息
来源: 评论
SEDN: A Spatiotemporal Encoder-Decoder Network for End-to-End Object Removal Forgery Detection in High-Resolution Videos
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2503-2515页
作者: Xiong, Lizhi Ding, Linsen Cao, Mengqi Xia, Zhihua Shi, Yun-Qing Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Ministry of Education Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Nanjing210044 China Jinan University College of Cyber Security Guangzhou510632 China New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
With the growing popularity of high-resolution (HR) video and the continuous growth of network bandwidth, the challenge of object removal detection in HR videos has attracted significant attention. Expert forgers leve... 详细信息
来源: 评论