咨询与建议

限定检索结果

文献类型

  • 11,158 篇 期刊文献
  • 8,732 篇 会议
  • 2 册 图书

馆藏范围

  • 19,892 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,262 篇 工学
    • 6,354 篇 计算机科学与技术...
    • 5,043 篇 软件工程
    • 2,375 篇 信息与通信工程
    • 2,298 篇 电子科学与技术(可...
    • 2,095 篇 电气工程
    • 1,655 篇 光学工程
    • 1,536 篇 生物工程
    • 1,481 篇 控制科学与工程
    • 1,365 篇 生物医学工程(可授...
    • 1,076 篇 化学工程与技术
    • 1,063 篇 材料科学与工程(可...
    • 809 篇 机械工程
    • 801 篇 仪器科学与技术
    • 659 篇 动力工程及工程热...
    • 454 篇 力学(可授工学、理...
    • 387 篇 冶金工程
  • 9,229 篇 理学
    • 4,952 篇 物理学
    • 2,994 篇 数学
    • 1,873 篇 生物学
    • 1,260 篇 化学
    • 1,105 篇 统计学(可授理学、...
    • 613 篇 系统科学
  • 2,511 篇 管理学
    • 1,601 篇 管理科学与工程(可...
    • 922 篇 图书情报与档案管...
    • 707 篇 工商管理
  • 1,433 篇 医学
    • 1,173 篇 临床医学
    • 960 篇 基础医学(可授医学...
    • 596 篇 药学(可授医学、理...
    • 440 篇 公共卫生与预防医...
  • 476 篇 法学
    • 384 篇 社会学
  • 292 篇 农学
  • 259 篇 经济学
  • 234 篇 教育学
  • 82 篇 文学
  • 36 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 404 篇 deep learning
  • 315 篇 computer science
  • 214 篇 machine learning
  • 170 篇 computational mo...
  • 167 篇 feature extracti...
  • 148 篇 internet of thin...
  • 147 篇 image segmentati...
  • 147 篇 accuracy
  • 145 篇 optimization
  • 127 篇 support vector m...
  • 123 篇 wireless communi...
  • 123 篇 data mining
  • 112 篇 hadron colliders
  • 110 篇 neural networks
  • 107 篇 bandwidth
  • 106 篇 magnetic resonan...
  • 101 篇 training
  • 99 篇 hadrons
  • 93 篇 throughput
  • 89 篇 reliability

机构

  • 1,076 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 964 篇 physikalisches i...
  • 948 篇 oliver lodge lab...
  • 628 篇 infn laboratori ...
  • 601 篇 infn sezione di ...
  • 589 篇 fakultät physik ...
  • 588 篇 university of ch...
  • 581 篇 infn sezione di ...
  • 575 篇 infn sezione di ...
  • 559 篇 school of physic...
  • 522 篇 iccub universita...
  • 521 篇 horia hulubei na...
  • 510 篇 school of physic...
  • 501 篇 department of ph...
  • 495 篇 imperial college...
  • 494 篇 center for high ...
  • 491 篇 h.h. wills physi...
  • 491 篇 nikhef national ...
  • 486 篇 stfc rutherford ...

作者

  • 264 篇 beiter a.
  • 261 篇 a. gomes
  • 259 篇 barter w.
  • 249 篇 bellee v.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 238 篇 c. amelung
  • 237 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 s. chen
  • 236 篇 d. calvet
  • 233 篇 g. spigo
  • 231 篇 f. siegert
  • 226 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 brundu d.
  • 219 篇 j. wang
  • 215 篇 r. ströhmer
  • 213 篇 y. tayalati
  • 210 篇 m. rijssenbeek

语言

  • 18,887 篇 英文
  • 748 篇 其他
  • 240 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Digital Technology Center and Department of Computer Science and Engineering"
19892 条 记 录,以下是91-100 订阅
排序:
An Enhanced Feature-Based Hybrid Approach for Adversarial PDF Malware Detection  6
An Enhanced Feature-Based Hybrid Approach for Adversarial PD...
收藏 引用
6th International Conference on Electrical engineering and Information and Communication technology, ICEEICT 2024
作者: Hossain, G.M. Sakhawat Deb, Kaushik Sarker, Iqbal H. Chittagong University of Engineering and Technology Department of Computer Science and Engineering Chattogram4349 Bangladesh Rangamati Science and Technology University Department of Computer Science and Engineering Rangamati4500 Bangladesh Centre for Securing Digital Futures Edith Cowan University PerthWA6027 Australia
Cyber scammers frequently use PDF (Portable Document Format) files to install malicious code and infect consumers' systems. Standard remedies and techniques for identifying adversarial PDF malware are often insuff... 详细信息
来源: 评论
A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models
收藏 引用
Cognitive Computation 2024年 第3期16卷 1073-1091页
作者: Heidari, Arash Navimipour, Nima Jafari Dag, Hasan Talebi, Samira Unal, Mehmet Department of Software Engineering Haliç University Istanbul34060 Turkey Department of Computer Engineering Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Yunlin Douliou64002 Taiwan Department of Information Technology Kadir Has University Istanbul Turkey Department of Computer Science University of Texas at San Antonio San AntonioTX United States Department of Computer Engineering Nisantasi University Istanbul Turkey
In recent years, the proliferation of deep learning (DL) techniques has given rise to a significant challenge in the form of deepfake videos, posing a grave threat to the authenticity of media content. With the rapid ... 详细信息
来源: 评论
"There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the digital Age  18th
"There is a Damn Hello on the Social Media!" Insights into P...
收藏 引用
18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024
作者: Große, Christine Division of Computer Science Electrical and Space Engineering Department of Digital Services and Systems Luleå University of Technology Luleå971 87 Sweden
The ability to handle threats, such as disinformation, manipulation of public opinion, and disruption of critical supplies, is becoming increasingly important, thus, necessitating, among other strategies, efforts to e... 详细信息
来源: 评论
LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection  6th
LMCF-FS: A Novel Lightweight Malware Classification Framewor...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yun, Cui Zhou, Lei Xing, Shuangshuang Yang, Ning Zhao, Pan Chen, Zhiguo School of Computer Jiangsu University of Science and Technology Zhenjiang212100 China Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and School of Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China
The rapid increase in the number of malware and its variants poses a significant threat to internet security. While existing machine learning-based malware classification methods can improve accuracy, they often requi... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
Hierarchical cubic lattice structures with bending- and stretching-dominated cellular designs for enhanced buckling resistance
收藏 引用
International Journal of Lightweight Materials and Manufacture 2025年 第3期8卷 310-320页
作者: Viswanath, A. Khalil, M. Khan, M.K.A. Cantwell, W.J. Khan, K.A. Department of Aerospace Engineering Khalifa University of Science and Technology Abu DhabiPO Box 127788 United Arab Emirates Department of Mechanical Engineering Khalifa University of Science and Technology Abu DhabiPO Box 127788 United Arab Emirates Advanced Digital & Additive Manufacturing Center Khalifa University of Science and Technology Abu DhabiPO Box 127788 United Arab Emirates
Buckling is a common failure mode in low-density strut lattices, limiting their mechanical strength and stability. This work presents a novel methodology to design and manufacture lightweight, buckling-resistant strut... 详细信息
来源: 评论
Mutual Retinex: Combining Transformer and CNN for Image Enhancement
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2024年 第3期8卷 2240-2252页
作者: Jiang, Kui Wang, Qiong An, Zhaoyi Wang, Zheng Zhang, Cong Lin, Chia-Wen Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan430072 China Wuhan Polytechnic University School of Mathematics and Computer Science Wuhan430024 China National Tsing Hua University Department of Electrical Engineering Institute of Communications Engineering Hsinchu30013 Taiwan
Images captured in low-light or underwater environments are often accompanied by significant degradation, which can negatively impact the quality and performance of downstream tasks. While convolutional neural network... 详细信息
来源: 评论
Challenges and future directions of secure federated learning:a survey
收藏 引用
Frontiers of computer science 2022年 第5期16卷 173-180页
作者: Kaiyue ZHANG Xuan SONG Chenhan ZHANG Shui YU Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia SUSTech-UTokyo Joint Research Center on Super Smart City Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but... 详细信息
来源: 评论
Curriculum Guided Domain Adaptation in the Dark
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2604-2614页
作者: Jahan, Chowdhury Sadman Savakis, Andreas Rochester Institute of Technology Center for Imaging Science RochesterNY14623 United States Kate Gleason College of Engineering Rochester Institute of Technology Department of Computer Engineering RochesterNY14623 United States
Addressing the rising concerns of privacy and security, domain adaptation in the dark aims to adapt a black-box source trained model to an unlabeled target domain without access to any source data or source model para... 详细信息
来源: 评论
Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques
收藏 引用
Annals of Data science 2024年 第1期11卷 217-242页
作者: Das Guptta, Sumitra Shahriar, Khandaker Tayef Alqahtani, Hamed Alsalman, Dheyaaldin Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & ampTechnology Chittagong4349 Bangladesh Unit of Cybersecurity Department of Computer Science Center of Artificial Intelligence King Khalid University Abha Saudi Arabia School of Engineering Computing and Informatics Dar Al-Hekma University Jeddah Saudi Arabia
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t... 详细信息
来源: 评论