咨询与建议

限定检索结果

文献类型

  • 2,471 篇 会议
  • 1,663 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 4,157 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,516 篇 工学
    • 1,723 篇 计算机科学与技术...
    • 1,348 篇 软件工程
    • 645 篇 信息与通信工程
    • 270 篇 电子科学与技术(可...
    • 266 篇 控制科学与工程
    • 265 篇 电气工程
    • 207 篇 生物工程
    • 157 篇 机械工程
    • 131 篇 光学工程
    • 128 篇 生物医学工程(可授...
    • 118 篇 仪器科学与技术
    • 104 篇 网络空间安全
    • 96 篇 化学工程与技术
    • 88 篇 材料科学与工程(可...
    • 83 篇 核科学与技术
    • 78 篇 动力工程及工程热...
    • 72 篇 安全科学与工程
  • 1,264 篇 理学
    • 572 篇 数学
    • 455 篇 物理学
    • 244 篇 生物学
    • 183 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 98 篇 化学
  • 672 篇 管理学
    • 426 篇 管理科学与工程(可...
    • 261 篇 图书情报与档案管...
    • 161 篇 工商管理
  • 115 篇 法学
    • 75 篇 社会学
  • 115 篇 医学
    • 95 篇 临床医学
    • 81 篇 基础医学(可授医学...
  • 77 篇 教育学
    • 77 篇 教育学
  • 65 篇 经济学
  • 31 篇 农学
  • 17 篇 军事学
  • 16 篇 文学
  • 5 篇 艺术学

主题

  • 126 篇 computer network...
  • 106 篇 computer science
  • 106 篇 hadron colliders
  • 88 篇 computational mo...
  • 79 篇 internet
  • 77 篇 semantics
  • 68 篇 feature extracti...
  • 66 篇 routing
  • 65 篇 bandwidth
  • 65 篇 accuracy
  • 64 篇 protocols
  • 60 篇 training
  • 55 篇 security
  • 54 篇 computer archite...
  • 54 篇 ip networks
  • 53 篇 deep learning
  • 53 篇 machine learning
  • 52 篇 wireless sensor ...
  • 52 篇 telecommunicatio...
  • 50 篇 quality of servi...

机构

  • 149 篇 centro brasileir...
  • 148 篇 national and kap...
  • 148 篇 istanbul technic...
  • 147 篇 university of sp...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 136 篇 imperial college...
  • 136 篇 department of ph...
  • 134 篇 infn sezione di ...
  • 130 篇 department of ph...
  • 130 篇 zhejiang univers...
  • 129 篇 indian institute...
  • 127 篇 università di ca...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,685 篇 英文
  • 357 篇 其他
  • 121 篇 中文
  • 1 篇 日文
检索条件"机构=Institute of Computer Network Technology"
4157 条 记 录,以下是1-10 订阅
排序:
TGAIN:Geospatial Data Recovery Algorithm Based on GAIN-LSTM
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1471-1489页
作者: Lechan Yang Li Li Shouming Ma School of Soft Engineering Jinling Institute of TechnologyNanjing211169China School of Computer Jinling Institute of TechnologyNanjing211169China School of Network Security Jinling Institute of TechnologyNanjing211169China
Accurate geospatial data are essential for geographic information systems(GIS),environmental monitoring,and urban *** deep integration of the open Internet and geographic information technology has led to increasing c... 详细信息
来源: 评论
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
收藏 引用
Science China(Information Sciences) 2023年 第5期66卷 114-129页
作者: Haibin LI Yi ZHAO Wenbing YAO Ke XU Qi LI Department of Computer Science and Technology Tsinghua University Beijing National Research Center for Information Science and Technology (BNRist) Institute for Network Sciences and Cyberspace Tsinghua University
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
A Random Fusion of Mix 3D and Polar Mix to Improve Semantic Segmentation Performance in 3D Lidar Point Cloud
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第7期140卷 845-862页
作者: Bo Liu Li Feng Yufeng Chen School of Computer Science and Engineering Macao University of Science and TechnologyMacao999078China School of Computer Science and Artificial Intelligence Chaohu UniversityChaohu238000China Institute of Vehicle Information Control and Network Technology Hubei University of Automotive TechnologyShiyan442002China
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network *** point clouds,which represent spatial information through a coll... 详细信息
来源: 评论
A Malicious Domain Detection Method Based on DNS Logs  4
A Malicious Domain Detection Method Based on DNS Logs
收藏 引用
4th International Conference on Blockchain technology and Information Security, ICBCTIS 2024
作者: Ma, SiQi Pang, Tong Cui, Rui Yang, DeQuan School of Computer Science Beijing Institute of Technology Beijing China Beijing Institute of Technology Network Information Technology Center Beijing China
As the Internet continues to expand rapidly, the threat posed by malicious domain names to network security is on the rise. Cybercriminals exploit these domains to launch attacks such as malware infections, phishing s... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
Double-branch fusion network with a parallel attention selection mechanism for camouflaged object detection
收藏 引用
Science China(Information Sciences) 2023年 第6期66卷 258-266页
作者: Junjiang XIANG Qing PAN Zhengrong ZHANG Songnian FU Yuwen QIN Advanced Institute of Photonics Technology School of Information EngineeringGuangdong University of Technology Guangdong Provincial Key Laboratory of Photonics Information Technology Guangdong University of Technology Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and InformationGuangxi University
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel... 详细信息
来源: 评论
AERIAL CHARACTER STRINGS SEPARATION FOR RESTAURANT ORDERS USING DNN  51
AERIAL CHARACTER STRINGS SEPARATION FOR RESTAURANT ORDERS US...
收藏 引用
51st International Conference on computers and Industrial Engineering, CIE 2024
作者: Ichimura, Haruki Usuki, Jun Department of Information and Computer Sciences Kanagawa Institute of Technology Kanagawa Japan Department of Information Network and Communication Kanagawa Institute of Technology Kanagawa Japan
In recent years, self-ordering devices have been introduced in restaurants. Depending on these devices, the order processing efficiency in restaurants has improved, although device maintenance tasks were added. Under ... 详细信息
来源: 评论
Controllable False Data Injection Attack  5th
Controllable False Data Injection Attack
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Kokkonda, Jayasree Jahnavi, M. Department of Information Technology G. Narayanamma Institute of Technology and Science Hyderabad India Department of Computer Network and Information Security Narayanamma Institute of Technology and Science Hyderabad India
Yet the Internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak... 详细信息
来源: 评论