咨询与建议

限定检索结果

文献类型

  • 5,427 篇 期刊文献
  • 4,481 篇 会议
  • 38 册 图书

馆藏范围

  • 9,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,549 篇 工学
    • 3,169 篇 计算机科学与技术...
    • 2,522 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 850 篇 控制科学与工程
    • 845 篇 电气工程
    • 718 篇 电子科学与技术(可...
    • 602 篇 生物工程
    • 599 篇 光学工程
    • 525 篇 生物医学工程(可授...
    • 441 篇 仪器科学与技术
    • 386 篇 化学工程与技术
    • 332 篇 核科学与技术
    • 329 篇 机械工程
    • 309 篇 动力工程及工程热...
    • 308 篇 网络空间安全
    • 297 篇 材料科学与工程(可...
  • 4,552 篇 理学
    • 2,428 篇 物理学
    • 1,364 篇 数学
    • 770 篇 生物学
    • 526 篇 化学
    • 498 篇 统计学(可授理学、...
    • 428 篇 地球物理学
  • 1,294 篇 管理学
    • 811 篇 管理科学与工程(可...
    • 494 篇 图书情报与档案管...
    • 334 篇 工商管理
  • 693 篇 医学
    • 514 篇 临床医学
    • 430 篇 基础医学(可授医学...
    • 293 篇 公共卫生与预防医...
    • 239 篇 药学(可授医学、理...
  • 278 篇 法学
    • 236 篇 社会学
  • 175 篇 农学
  • 129 篇 经济学
  • 74 篇 文学
  • 61 篇 教育学
  • 29 篇 军事学
  • 19 篇 艺术学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 297 篇 accuracy
  • 280 篇 deep learning
  • 233 篇 hadron colliders
  • 226 篇 machine learning
  • 197 篇 real-time system...
  • 193 篇 feature extracti...
  • 176 篇 internet of thin...
  • 157 篇 computational mo...
  • 137 篇 optimization
  • 134 篇 training
  • 131 篇 convolutional ne...
  • 128 篇 support vector m...
  • 127 篇 security
  • 119 篇 predictive model...
  • 101 篇 reliability
  • 101 篇 artificial intel...
  • 91 篇 semantics
  • 89 篇 hadrons
  • 87 篇 galaxies
  • 83 篇 higgs bosons

机构

  • 887 篇 department of ph...
  • 860 篇 cavendish labora...
  • 825 篇 physikalisches i...
  • 824 篇 oliver lodge lab...
  • 578 篇 school of physic...
  • 472 篇 infn laboratori ...
  • 469 篇 infn sezione di ...
  • 456 篇 fakultät physik ...
  • 446 篇 infn sezione di ...
  • 434 篇 university of ch...
  • 428 篇 infn sezione di ...
  • 414 篇 iccub universita...
  • 414 篇 horia hulubei na...
  • 411 篇 department of ph...
  • 394 篇 school of physic...
  • 389 篇 school of physic...
  • 381 篇 nikhef national ...
  • 379 篇 imperial college...
  • 378 篇 center for high ...
  • 371 篇 h.h. wills physi...

作者

  • 270 篇 a. gomes
  • 256 篇 c. alexa
  • 256 篇 j. m. izen
  • 245 篇 g. bella
  • 245 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 242 篇 s. chen
  • 235 篇 g. spigo
  • 233 篇 f. siegert
  • 219 篇 r. ströhmer
  • 219 篇 j. wang
  • 216 篇 y. tayalati
  • 214 篇 m. rijssenbeek
  • 210 篇 s. jin
  • 205 篇 g. gaudio
  • 204 篇 m. gandelman
  • 203 篇 t. gershon
  • 200 篇 s. mohapatra
  • 197 篇 d. golubkov

语言

  • 9,093 篇 英文
  • 756 篇 其他
  • 97 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Cyberspace Research and College of Computer Science and Technology"
9946 条 记 录,以下是1-10 订阅
排序:
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
收藏 引用
science China(Information sciences) 2023年 第5期66卷 114-129页
作者: Haibin LI Yi ZHAO Wenbing YAO Ke XU Qi LI Department of Computer Science and Technology Tsinghua University Beijing National Research Center for Information Science and Technology (BNRist) Institute for Network Sciences and Cyberspace Tsinghua University
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil... 详细信息
来源: 评论
VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
收藏 引用
science China(Information sciences) 2022年 第7期65卷 32-50页
作者: Guangrui LIU Weizhe ZHANG Xinjie LI Kaisheng FAN Shui YU School of Cyberspace Science Harbin Institute of Technology Cyberspace Security Research Center Peng Cheng Laboratory School of Computer Science University of Technology Sydney
Machine learning-based network intrusion detection systems(ML-NIDS) are extensively used for network security against unknown attacks. Existing intrusion detection systems can effectively defend traditional network at... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3251-3279页
作者: Qi Fei Haojun Hu Guisheng Yin Zhian Sun College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Information Technology Research Department Jiangsu Automation Research InstituteLianyungang222062China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti... 详细信息
来源: 评论
Algorithms for online fault tolerance server consolidation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 514-523页
作者: Boyu Li Bin Wu Meng Shen Hao Peng Weisheng Li Hong Zhang Jie Gan Zhihong Tian Guangquan Xu College of Intelligence and Computing Tianjin UniversityTianjin 300350China School of Cyberspace Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Computer Science and Technology Zhejiang Normal UniversityJinhua 321004China School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400054China School of Astronautics Beihang UniversityBeijing100191China School of Computer Science University of SydneySydneyNSW 20528Australia Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou 511370China
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server *** this mechanism,each item represents a computing task and is replicated intoξ+1 servers for some integerξ≥... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
COMPrompter: reconceptualized segment anything model with multiprompt network for camouflaged object detection
收藏 引用
science China(Information sciences) 2025年 第1期68卷 189-203页
作者: Xiaoqin ZHANG Zhenni YU Li ZHAO Deng-Ping FAN Guobao XIAO Zhejiang Province Key Laboratory of Intelligent Informatics for Safety and Emergency Wenzhou University Nankai International Advanced Research Institute (SHENZHEN FUTIAN) College of Computer Science Nankai University School of Computer Science and Technology Tongji University
We rethink the segment anything model(SAM) and propose a novel multiprompt network called COMPrompter for camouflaged object detection(COD). SAM has zero-shot generalization ability beyond other models and can provide... 详细信息
来源: 评论
Localization in modified polar representation: hybrid measurements and closed-form solution
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第3期35卷 575-588页
作者: CONG Xunchao SUN Yimao YANG Yanbing ZHANG Lei CHEN Liangyin The 10th Research Institute of China Electronics Technology Group Corporation Chengdu 610036China College of Computer Science and Institute for Industrial Internet Research Sichuan UniversityChengdu 610065China
Classical localization methods use Cartesian or Polar coordinates, which require a priori range information to determine whether to estimate position or to only find bearings. The modified polar representation (MPR) u... 详细信息
来源: 评论
A Framework of Knowledge Graph-Enhanced Large Language Model Based on Question Decomposition and Atomic Retrieval
A Framework of Knowledge Graph-Enhanced Large Language Model...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Li, Yading Song, Dandan Zhou, Changzhi Tian, Yuhang Wang, Hao Yang, Ziyi Zhang, Shuhao School of Computer Science and Technology Beijing Institute of Technology China School of Cyberspace Science and Technology Beijing Institute of Technology China College of Computing and Data Science Nanyang Technological University Singapore
Knowledge graphs (KGs) can provide explainable reasoning for large language models (LLMs), alleviating their hallucination problem. Knowledge graph question answering (KGQA) is a typical benchmark to evaluate the meth... 详细信息
来源: 评论
Pyramid-VAE-GAN:Transferring hierarchical latent variables for image inpainting
收藏 引用
Computational Visual Media 2023年 第4期9卷 827-841页
作者: Huiyuan Tian Li Zhang Shijian Li Min Yao Gang Pan College of Computer Science and Technology Zhejiang UniversityHangzhou 310027China Advanced Technology Research Institute Zhejiang UniversityHangzhou 310027China
Significant progress has been made in image inpainting methods in recent ***,they are incapable of producing inpainting results with reasonable structures,rich detail,and sharpness at the same *** this paper,we propos... 详细信息
来源: 评论