咨询与建议

限定检索结果

文献类型

  • 11,252 篇 期刊文献
  • 8,757 篇 会议
  • 118 册 图书

馆藏范围

  • 20,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,316 篇 工学
    • 6,376 篇 计算机科学与技术...
    • 5,044 篇 软件工程
    • 2,375 篇 信息与通信工程
    • 2,305 篇 电子科学与技术(可...
    • 2,103 篇 电气工程
    • 1,655 篇 光学工程
    • 1,537 篇 生物工程
    • 1,482 篇 控制科学与工程
    • 1,366 篇 生物医学工程(可授...
    • 1,081 篇 化学工程与技术
    • 1,072 篇 材料科学与工程(可...
    • 810 篇 机械工程
    • 802 篇 仪器科学与技术
    • 662 篇 动力工程及工程热...
    • 455 篇 力学(可授工学、理...
    • 389 篇 冶金工程
  • 9,250 篇 理学
    • 4,961 篇 物理学
    • 2,998 篇 数学
    • 1,878 篇 生物学
    • 1,266 篇 化学
    • 1,105 篇 统计学(可授理学、...
    • 613 篇 系统科学
  • 2,515 篇 管理学
    • 1,603 篇 管理科学与工程(可...
    • 922 篇 图书情报与档案管...
    • 707 篇 工商管理
  • 1,443 篇 医学
    • 1,177 篇 临床医学
    • 963 篇 基础医学(可授医学...
    • 596 篇 药学(可授医学、理...
    • 441 篇 公共卫生与预防医...
  • 476 篇 法学
    • 384 篇 社会学
  • 293 篇 农学
  • 259 篇 经济学
  • 235 篇 教育学
  • 82 篇 文学
  • 36 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 407 篇 deep learning
  • 315 篇 computer science
  • 214 篇 machine learning
  • 169 篇 computational mo...
  • 166 篇 feature extracti...
  • 151 篇 accuracy
  • 149 篇 internet of thin...
  • 147 篇 image segmentati...
  • 140 篇 optimization
  • 127 篇 support vector m...
  • 123 篇 wireless communi...
  • 121 篇 data mining
  • 111 篇 neural networks
  • 110 篇 hadron colliders
  • 106 篇 magnetic resonan...
  • 104 篇 bandwidth
  • 102 篇 training
  • 98 篇 hadrons
  • 94 篇 throughput
  • 90 篇 computer archite...

机构

  • 1,076 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 962 篇 physikalisches i...
  • 948 篇 oliver lodge lab...
  • 621 篇 infn laboratori ...
  • 600 篇 infn sezione di ...
  • 590 篇 university of ch...
  • 589 篇 fakultät physik ...
  • 577 篇 infn sezione di ...
  • 576 篇 infn sezione di ...
  • 562 篇 school of physic...
  • 522 篇 iccub universita...
  • 521 篇 horia hulubei na...
  • 510 篇 school of physic...
  • 501 篇 department of ph...
  • 495 篇 imperial college...
  • 494 篇 center for high ...
  • 491 篇 h.h. wills physi...
  • 491 篇 nikhef national ...
  • 486 篇 stfc rutherford ...

作者

  • 264 篇 beiter a.
  • 260 篇 a. gomes
  • 259 篇 barter w.
  • 249 篇 bellee v.
  • 245 篇 c. alexa
  • 243 篇 j. m. izen
  • 236 篇 c. amelung
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 234 篇 d. calvet
  • 234 篇 s. chen
  • 231 篇 g. spigo
  • 229 篇 f. siegert
  • 226 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 brundu d.
  • 218 篇 j. wang
  • 213 篇 r. ströhmer
  • 211 篇 y. tayalati
  • 209 篇 betancourt c.

语言

  • 19,122 篇 英文
  • 748 篇 其他
  • 240 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Digital Technology Center and Department of Computer Science and Engineering"
20127 条 记 录,以下是91-100 订阅
排序:
LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection  6th
LMCF-FS: A Novel Lightweight Malware Classification Framewor...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yun, Cui Zhou, Lei Xing, Shuangshuang Yang, Ning Zhao, Pan Chen, Zhiguo School of Computer Jiangsu University of Science and Technology Zhenjiang212100 China Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and School of Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China
The rapid increase in the number of malware and its variants poses a significant threat to internet security. While existing machine learning-based malware classification methods can improve accuracy, they often requi... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
Hierarchical cubic lattice structures with bending- and stretching-dominated cellular designs for enhanced buckling resistance
收藏 引用
International Journal of Lightweight Materials and Manufacture 2025年 第3期8卷 310-320页
作者: Viswanath, A. Khalil, M. Khan, M.K.A. Cantwell, W.J. Khan, K.A. Department of Aerospace Engineering Khalifa University of Science and Technology Abu DhabiPO Box 127788 United Arab Emirates Department of Mechanical Engineering Khalifa University of Science and Technology Abu DhabiPO Box 127788 United Arab Emirates Advanced Digital & Additive Manufacturing Center Khalifa University of Science and Technology Abu DhabiPO Box 127788 United Arab Emirates
Buckling is a common failure mode in low-density strut lattices, limiting their mechanical strength and stability. This work presents a novel methodology to design and manufacture lightweight, buckling-resistant strut... 详细信息
来源: 评论
Mutual Retinex: Combining Transformer and CNN for Image Enhancement
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2024年 第3期8卷 2240-2252页
作者: Jiang, Kui Wang, Qiong An, Zhaoyi Wang, Zheng Zhang, Cong Lin, Chia-Wen Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan430072 China Wuhan Polytechnic University School of Mathematics and Computer Science Wuhan430024 China National Tsing Hua University Department of Electrical Engineering Institute of Communications Engineering Hsinchu30013 Taiwan
Images captured in low-light or underwater environments are often accompanied by significant degradation, which can negatively impact the quality and performance of downstream tasks. While convolutional neural network... 详细信息
来源: 评论
Challenges and future directions of secure federated learning:a survey
收藏 引用
Frontiers of computer science 2022年 第5期16卷 173-180页
作者: Kaiyue ZHANG Xuan SONG Chenhan ZHANG Shui YU Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia SUSTech-UTokyo Joint Research Center on Super Smart City Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but... 详细信息
来源: 评论
Curriculum Guided Domain Adaptation in the Dark
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2604-2614页
作者: Jahan, Chowdhury Sadman Savakis, Andreas Rochester Institute of Technology Center for Imaging Science RochesterNY14623 United States Kate Gleason College of Engineering Rochester Institute of Technology Department of Computer Engineering RochesterNY14623 United States
Addressing the rising concerns of privacy and security, domain adaptation in the dark aims to adapt a black-box source trained model to an unlabeled target domain without access to any source data or source model para... 详细信息
来源: 评论
Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques
收藏 引用
Annals of Data science 2024年 第1期11卷 217-242页
作者: Das Guptta, Sumitra Shahriar, Khandaker Tayef Alqahtani, Hamed Alsalman, Dheyaaldin Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & ampTechnology Chittagong4349 Bangladesh Unit of Cybersecurity Department of Computer Science Center of Artificial Intelligence King Khalid University Abha Saudi Arabia School of Engineering Computing and Informatics Dar Al-Hekma University Jeddah Saudi Arabia
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t... 详细信息
来源: 评论
Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW2期8卷 1-51页
作者: Hohendanner, Michel Ullstein, Chiara Miyamoto, Dohjin Huffman, Emma Fukuwatari Socher, Gudrun Grossklags, Jens Osawa, Hirotaka Munich Center for Digital Sciences and AI Munich University of Applied Sciences Munich Germany Department of Computer Science Technical University of Munich Germany Department of Computer Science Technical University of Munich Munich Germany Tokyo University Tokyo Japan Kyoto Design Lab Kyoto Institute of Technology Kyoto Japan Faculty of Science and Technology Keio University Yokohama Japan
Currently, the development of the metaverse lies in the hands of industry. Citizens have little influence on this process. Instead, to do justice to the pluralism of (digital) societies, we should strive for an open d... 详细信息
来源: 评论
Intelligent Predetermination of Generator Tripping Scheme: Knowledge Fusion-based Deep Reinforcement Learning Framework
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第1期10卷 66-75页
作者: Lingkang Zeng Wei Yao Ze Hu Hang Shuai Zhouping Li Jinyu Wen Shijie Cheng State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronics EngineeringHuazhong University of Science and TechnologyWuhan 430074China Dispatching and Control Center Central China Branch of State Grid Corporation of ChinaWuhan 430077China. Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ... 详细信息
来源: 评论
Lane and Platoon Assignment in Intelligent Transportation System: A Novel Heuristic Approach
收藏 引用
International Journal of Intelligent Transportation Systems Research 2024年 第2期22卷 298-315页
作者: Mahini, Hamidreza Asadi, Mehrdad Mahini, Alireza Rahmani, Amir Masoud Fathy, Mahmood Department of Computer Engineering Gorgan Branch Islamic Azad University Gorgan Iran Vrije Universiteit Brussel Brussels Belgium Future Technology Research Center National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou64002 Taiwan Department of Computer Engineering Iran University of Science and Technology Tehran Iran
The right lane and platoon assignment to a vehicle significantly impacts achieving the desired driving goals to improve occupants’ safety or reduce pollution. Preparing an intelligent assistant to address this issue ... 详细信息
来源: 评论