咨询与建议

限定检索结果

文献类型

  • 108,061 篇 会议
  • 53,346 篇 期刊文献
  • 1,573 册 图书

馆藏范围

  • 162,979 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 94,764 篇 工学
    • 58,883 篇 计算机科学与技术...
    • 47,823 篇 软件工程
    • 21,921 篇 信息与通信工程
    • 16,075 篇 控制科学与工程
    • 13,905 篇 电气工程
    • 13,055 篇 电子科学与技术(可...
    • 10,928 篇 生物工程
    • 8,713 篇 生物医学工程(可授...
    • 8,213 篇 光学工程
    • 7,305 篇 机械工程
    • 7,046 篇 化学工程与技术
    • 6,012 篇 材料科学与工程(可...
    • 5,691 篇 动力工程及工程热...
    • 5,673 篇 仪器科学与技术
    • 3,963 篇 网络空间安全
    • 3,785 篇 安全科学与工程
  • 56,636 篇 理学
    • 25,427 篇 数学
    • 20,531 篇 物理学
    • 12,618 篇 生物学
    • 8,485 篇 统计学(可授理学、...
    • 7,348 篇 化学
    • 6,259 篇 系统科学
  • 23,268 篇 管理学
    • 14,895 篇 管理科学与工程(可...
    • 9,383 篇 图书情报与档案管...
    • 6,963 篇 工商管理
  • 8,691 篇 医学
    • 7,166 篇 临床医学
    • 6,440 篇 基础医学(可授医学...
    • 3,987 篇 药学(可授医学、理...
    • 3,665 篇 公共卫生与预防医...
  • 4,370 篇 法学
    • 3,598 篇 社会学
  • 2,870 篇 经济学
  • 2,610 篇 农学
  • 1,418 篇 教育学
  • 634 篇 文学
  • 395 篇 军事学
  • 181 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 5,121 篇 accuracy
  • 4,233 篇 deep learning
  • 3,944 篇 computer science
  • 3,868 篇 feature extracti...
  • 3,558 篇 computational mo...
  • 3,430 篇 machine learning
  • 3,224 篇 training
  • 2,594 篇 convolutional ne...
  • 2,509 篇 real-time system...
  • 2,428 篇 predictive model...
  • 2,317 篇 support vector m...
  • 2,128 篇 internet of thin...
  • 1,979 篇 artificial intel...
  • 1,974 篇 optimization
  • 1,792 篇 neural networks
  • 1,768 篇 data models
  • 1,507 篇 security
  • 1,490 篇 data mining
  • 1,428 篇 computer archite...
  • 1,380 篇 wireless sensor ...

机构

  • 2,183 篇 chitkara univers...
  • 1,094 篇 university of ch...
  • 1,088 篇 cavendish labora...
  • 1,011 篇 department of ph...
  • 955 篇 physikalisches i...
  • 943 篇 oliver lodge lab...
  • 610 篇 infn laboratori ...
  • 608 篇 infn sezione di ...
  • 581 篇 infn sezione di ...
  • 553 篇 infn sezione di ...
  • 541 篇 school of physic...
  • 539 篇 fakultät physik ...
  • 536 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 522 篇 department of ph...
  • 519 篇 school of comput...
  • 514 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 495 篇 stfc rutherford ...
  • 481 篇 nikhef national ...

作者

  • 260 篇 j. wang
  • 258 篇 barter w.
  • 250 篇 a. gomes
  • 240 篇 c. alexa
  • 237 篇 j. m. izen
  • 233 篇 blake t.
  • 229 篇 s. chen
  • 227 篇 c. amelung
  • 226 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 beiter a.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 211 篇 bencivenni g.

语言

  • 140,011 篇 英文
  • 20,768 篇 其他
  • 2,134 篇 中文
  • 317 篇 日文
  • 36 篇 德文
  • 30 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute for Systems and Computer Engineering of Science and Technology"
162980 条 记 录,以下是121-130 订阅
排序:
Enhancing sustainable 5G powered agriculture 4.0 : Summary of low power connectivity, internet of UAV things, AI solutions and research trends
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17389-17433页
作者: Majumdar, Parijata Mitra, Sanjoy Bhattacharya, Diptendu Bhushan, Bharat Department of Computer Science and Engineering Techno College of Engineering Agartala Maheshkhola Madhuban799004 India Department of Computer Science and Engineering Tripura Institute of Technology Agartala Narsingarh Agartala799009 India Department of Computer Science and Engineering National Institute of Technology Agartala Jirania Agartala799046 India Department of Computer Science and Engineering School of Engineering and Technology Sharda University Greater Noida201310 India
Emerging technologies of Agriculture 4.0 such as the Internet of Things (IoT), Cloud Computing, Artificial Intelligence (AI), and 5G network services are being rapidly deployed to address smart farming implementation-... 详细信息
来源: 评论
Introduction to the Special Issue on the Bottleneck of Blockchain Techniques Scalability,Security and Privacy Protection
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 1933-1937页
作者: Shen Su Daojing He Neeraj Kumar Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Computer Science and Technology Harbin Institute of Technology(Shenzhen)Shenzhen518055China Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatiala147004India
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi... 详细信息
来源: 评论
Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
收藏 引用
无人系统(英文) 2024年 第2期12卷 341-358页
作者: Ziqin Chen Guanpu Chen Yiguang Hong Department of Control Science and Engineering and Shanghai Research Institute for Intelligent Autonomous Systems Tongji UniversityShanghaiP.R.China School of Electrical Engineering and Computer Science KTH Royal Institute of TechnologyStockholmSweden
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga... 详细信息
来源: 评论
Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks
收藏 引用
Soft Computing 2024年 第17-18期28卷 10345-10367页
作者: Subramani, Shalini Selvi, M. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such a scenario, the security of communication is a major challenge in t... 详细信息
来源: 评论
Adaptive pelican optimization with optimized mask RCNN for automatic lung cancer detection
收藏 引用
Multimedia Tools and Applications 2025年 1-21页
作者: Sudha, R. Maheswari, K.M. Uma Department of Computer Science and Engineering SRM Institute of Science and Technology Chengalpattu India Department of Computing Technologies SRM Institute of Science and Technology Chengalpattu India
Lung cancer is a prevalent and deadly disease worldwide, necessitating accurate and timely detection methods for effective treatment. Deep learning-based approaches have emerged as promising solutions for automated me... 详细信息
来源: 评论
Mixed-decomposed convolutional network:A lightweight yet efficient convolutional neural network for ocular disease recognition
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 319-332页
作者: Xiaoqing Zhang Xiao Wu Zunjie Xiao Lingxi Hu Zhongxi Qiu Qingyang Sun Risa Higashita Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhenChina Tomey Corporation NagoyaJapan Guangdong Provincial Key Laboratory of Brain‐inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhenChina Singapore Eye Research Institute SingaporeSingapore
Eye health has become a global health concern and attracted broad *** the years,researchers have proposed many state-of-the-art convolutional neural networks(CNNs)to assist ophthalmologists in diagnosing ocular diseas... 详细信息
来源: 评论
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
GTE: learning code AST representation efficiently and effectively
收藏 引用
science China(Information sciences) 2025年 第3期68卷 393-394页
作者: Yihao QIN Shangwen WANG Bo LIN Kang YANG Xiaoguang MAO College of Computer Science and Technology National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Ear...
来源: 评论
Predicting circRNA-Disease Associations by Using Multi-Biomolecular Networks Based on Variational Graph Auto-Encoder with Attention Mechanism
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1526-1537页
作者: Jing YANG Xiujuan LEI Yi PAN School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology
CircRNA-disease association(CDA) can provide a new direction for the treatment of diseases. However,traditional biological experiment is time-consuming and expensive, this urges us to propose the reliable computationa... 详细信息
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论