咨询与建议

限定检索结果

文献类型

  • 12,471 篇 会议
  • 6,466 篇 期刊文献
  • 210 册 图书
  • 4 篇 专利

馆藏范围

  • 19,150 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,692 篇 工学
    • 6,254 篇 计算机科学与技术...
    • 5,159 篇 软件工程
    • 2,124 篇 信息与通信工程
    • 1,660 篇 电气工程
    • 1,649 篇 控制科学与工程
    • 1,353 篇 电子科学与技术(可...
    • 1,123 篇 生物工程
    • 956 篇 机械工程
    • 955 篇 生物医学工程(可授...
    • 808 篇 化学工程与技术
    • 803 篇 光学工程
    • 787 篇 仪器科学与技术
    • 784 篇 动力工程及工程热...
    • 661 篇 材料科学与工程(可...
    • 444 篇 建筑学
    • 405 篇 安全科学与工程
    • 399 篇 土木工程
    • 398 篇 力学(可授工学、理...
  • 6,434 篇 理学
    • 2,673 篇 数学
    • 2,635 篇 物理学
    • 1,307 篇 生物学
    • 839 篇 统计学(可授理学、...
    • 811 篇 化学
    • 632 篇 系统科学
  • 2,603 篇 管理学
    • 1,710 篇 管理科学与工程(可...
    • 970 篇 图书情报与档案管...
    • 876 篇 工商管理
  • 991 篇 医学
    • 853 篇 临床医学
    • 702 篇 基础医学(可授医学...
    • 434 篇 药学(可授医学、理...
  • 430 篇 法学
  • 396 篇 经济学
  • 337 篇 教育学
  • 257 篇 农学
  • 62 篇 文学
  • 46 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 326 篇 deep learning
  • 283 篇 computational mo...
  • 233 篇 machine learning
  • 221 篇 internet of thin...
  • 189 篇 optimization
  • 189 篇 accuracy
  • 181 篇 feature extracti...
  • 172 篇 neural networks
  • 169 篇 training
  • 167 篇 computer archite...
  • 151 篇 support vector m...
  • 150 篇 monitoring
  • 140 篇 image segmentati...
  • 129 篇 real-time system...
  • 126 篇 predictive model...
  • 125 篇 wireless communi...
  • 120 篇 cameras
  • 119 篇 reliability
  • 119 篇 bandwidth
  • 116 篇 artificial intel...

机构

  • 1,476 篇 faculty of elect...
  • 382 篇 university of za...
  • 238 篇 faculty of elect...
  • 188 篇 faculty of elect...
  • 136 篇 university of za...
  • 106 篇 university of sc...
  • 95 篇 faculty of elect...
  • 94 篇 north-west unive...
  • 92 篇 institut univers...
  • 90 篇 tianfu cosmic ra...
  • 89 篇 department of ph...
  • 89 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 87 篇 faculty of compu...
  • 83 篇 faculty of elect...
  • 81 篇 infn sezione di ...
  • 80 篇 hebei normal uni...
  • 79 篇 state key labora...
  • 77 篇 faculty of elect...
  • 76 篇 tno technical sc...

作者

  • 107 篇 bastieri d.
  • 98 篇 ferrara g.
  • 98 篇 ardid m.
  • 97 篇 chen a.
  • 96 篇 calvo d.
  • 85 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 77 篇 coleiro a.
  • 76 篇 gozzini s.r.
  • 73 篇 fang j.
  • 72 篇 feng c.f.
  • 72 篇 dallier r.
  • 67 篇 li xin
  • 67 篇 kalekin o.
  • 67 篇 axikegu
  • 66 篇 jiang k.
  • 64 篇 kuleshov d.
  • 63 篇 li cheng

语言

  • 18,432 篇 英文
  • 561 篇 其他
  • 149 篇 中文
  • 5 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 塞尔维亚文
检索条件"机构=Faculty of Computing and Engineering"
19151 条 记 录,以下是101-110 订阅
排序:
Research on Garbled Circuits-Based Identity Authentication and Ciphertext Hidden Access Control in Vehicular Networks  24
Research on Garbled Circuits-Based Identity Authentication a...
收藏 引用
9th International Conference on Cloud computing and Internet of Things, CCIOT 2024
作者: Jiao, Zhilong Bai, Fenhua Zhang, Chi Zhang, Xiaohui Gong, Bei Faculty of Information Engineering and Automation Kunming University of Science and Technology China Kunming China Department of Computing Beijing University of Technology China Beijing China
Since most communications in vehicular networks rely on wireless transmissions, information broadcast by vehicles is highly susceptible to interception and eavesdropping by third parties, making it vulnerable to vario... 详细信息
来源: 评论
Enhancing Classification Algorithm Recommendation in Automated Machine Learning: A Meta-Learning Approach Using Multivariate Sparse Group Lasso
收藏 引用
Computer Modeling in engineering & Sciences 2025年 第2期142卷 1611-1636页
作者: Irfan Khan Xianchao Zhang Ramesh Kumar Ayyasamy Saadat M.Alhashmi Azizur Rahim School of Software Dalian University of TechnologyDalian116620China Faculty of Information and Communication Technology Universiti Tunku Abdul RahmanKampar31900Malaysia College of Computing and Informatics University of SharjahSharjah27272United Arab Emirates Department of Computer Systems Engineering University of Engineering and Applied SciencesSwat19200Pakistan
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods... 详细信息
来源: 评论
Sizing and Implementation of Phase-Shifting Transformer for Congestion Management in Renewable-Rich Regions: A Case Study of the Croatian Power Grid
收藏 引用
IEEE Transactions on Power Systems 2025年
作者: Hrgović, Ivana Pavić, Ivica University of Zagreb Faculty of Electrical Engineering and Computing Zagreb10000 Croatia
Phase shifting transformers (PSTs) are a cost-efficient solution for controlling power flow without additional operating expenses. They can enhance power distribution in transmission systems and increase system capaci... 详细信息
来源: 评论
Exploring information hiding in images – problems and measures: a survey
收藏 引用
Multimedia Tools and Applications 2025年 1-63页
作者: Khan, Ahmed Sarfaraz, Aaliya School of Computer Science Taylor’s University Subang Jaya Malaysia School of Computing and Artificial Intelligence Faculty of Engineering and Technology Sunway University No. 5 Jalan Universiti Selangor Darul Ehsan Bandar Sunway47500 Malaysia
The widespread adoption of digital communication technologies across various domains has led to a significant shift towards digitalization. However, this evolution has also introduced vulnerabilities, including unauth... 详细信息
来源: 评论
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-32页
作者: Bostani, Hamid Zhao, Zhengyu Liu, Zhuoran Moonsamy, Veelasha Digital Security Group Institute for Computing and Information Sciences Radboud University Nijmegen Netherlands Faculty of Electronic and Information Engineering Xi'an Jiaotong University Xi'an China Horst Görtz Institute for It Security Ruhr University Bochum Bochum Germany
Machine Learning (ML) promises to enhance the efficacy of Android Malware Detection (AMD);however, ML models are vulnerable to realistic evasion attacks - crafting realizable Adversarial Examples (AEs) that satisfy An... 详细信息
来源: 评论
A New Benchmark and Algorithm for Clothes-Changing Video Person Re-Identification
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 1993-2005页
作者: Wang, Likai Zhang, Xiangqun Han, Ruize Wei, Yanjie Wang, Song Feng, Wei Tianjin University College of Intelligence and Computing Tianjin300350 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518107 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
Person re-identification (Re-ID) is a classical computer vision task and has significant applications for public security and information forensics. Recently, long-term Re-ID with clothes-changing has attracted increa... 详细信息
来源: 评论
Dialect recognition based on improved GFCC with VMD and Teager energy operator cepstral coefficients  16
Dialect recognition based on improved GFCC with VMD and Teag...
收藏 引用
16th International Conference on Signal Processing Systems, ICSPS 2024
作者: Zhang, Liyan Qi, Chao Liu, Zengli Zhao, Xuanzhi Rong, Shaowei Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Kunming University of Science and Technology Computing Center Kunming650500 China
Aiming at the problems of low recognition rate of Chinese dialects and poor robustness in noisy environment, this paper proposes an improved feature extraction algorithm, which combines the Sparrow Search Algorithm (S... 详细信息
来源: 评论
Participation of electric vehicle charging station aggregators in the day-ahead energy market using demand forecasting and uncertainty-based pricing
收藏 引用
Energy 2025年 328卷
作者: Matkovic, Daria Pilski, Terezija Matijasevic Capuder, Tomislav University of Zagreb Faculty of Electrical Engineering and Computing Croatia
This paper introduces a novel approach to the smart management of public EV charging infrastructure, combining day-ahead energy bidding with a dynamic end-user pricing model. It addresses critical challenges such as d... 详细信息
来源: 评论
How Much Do Activity Patterns Change With Age?  6th
How Much Do Activity Patterns Change With Age?
收藏 引用
6th International Conference on Biomedical and Health Informatics, ICBHI 2024
作者: Jurčić, Krunoslav Gómez, Andrea Juliana Ruiz Zequera-Diaz, Martha Magjarević, Ratko Faculty of Electrical Engineering and Computing University of Zagreb Unska 3 Zagreb10000 Croatia School of Engineering BASPI/FootLab Pontificia Universidad Javeriana Cra. 7 #40–62 Bogotá Colombia
This paper presents a comparison of features derived from various biomedical signals from both younger as well as elderly subjects. The dataset consists of accelerometer, gyroscope and altimeter signals acquired from ... 详细信息
来源: 评论
SV-data2vec: Guiding Video Representation Learning with Latent Skeleton Targets
SV-data2vec: Guiding Video Representation Learning with Late...
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Zorana Doždor Tomislav Hrkać Zoran Kalafatić Faculty of Electrical Engineering and Computing University of Zagreb Croatia
Recent advancements in action recognition leverage both skeleton and video modalities to achieve state-of-the-art performance. However, due to the challenges of early fusion, which tends to underutilize the strengths ... 详细信息
来源: 评论