咨询与建议

限定检索结果

文献类型

  • 5,380 篇 期刊文献
  • 4,472 篇 会议
  • 38 册 图书

馆藏范围

  • 9,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,498 篇 工学
    • 3,145 篇 计算机科学与技术...
    • 2,530 篇 软件工程
    • 1,260 篇 信息与通信工程
    • 835 篇 电气工程
    • 825 篇 控制科学与工程
    • 713 篇 电子科学与技术(可...
    • 599 篇 生物工程
    • 594 篇 光学工程
    • 522 篇 生物医学工程(可授...
    • 442 篇 仪器科学与技术
    • 383 篇 化学工程与技术
    • 332 篇 核科学与技术
    • 329 篇 机械工程
    • 309 篇 网络空间安全
    • 306 篇 动力工程及工程热...
    • 287 篇 材料科学与工程(可...
  • 4,535 篇 理学
    • 2,424 篇 物理学
    • 1,360 篇 数学
    • 764 篇 生物学
    • 521 篇 化学
    • 496 篇 统计学(可授理学、...
    • 424 篇 地球物理学
  • 1,300 篇 管理学
    • 811 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 334 篇 工商管理
  • 689 篇 医学
    • 511 篇 临床医学
    • 427 篇 基础医学(可授医学...
    • 296 篇 公共卫生与预防医...
    • 239 篇 药学(可授医学、理...
  • 282 篇 法学
    • 238 篇 社会学
  • 174 篇 农学
  • 129 篇 经济学
  • 74 篇 文学
  • 60 篇 教育学
  • 30 篇 军事学
  • 20 篇 艺术学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 297 篇 accuracy
  • 277 篇 deep learning
  • 233 篇 hadron colliders
  • 225 篇 machine learning
  • 197 篇 real-time system...
  • 193 篇 feature extracti...
  • 176 篇 internet of thin...
  • 157 篇 computational mo...
  • 137 篇 optimization
  • 136 篇 training
  • 131 篇 convolutional ne...
  • 128 篇 support vector m...
  • 128 篇 security
  • 119 篇 predictive model...
  • 103 篇 artificial intel...
  • 101 篇 reliability
  • 91 篇 semantics
  • 89 篇 hadrons
  • 87 篇 galaxies
  • 86 篇 cloud computing

机构

  • 887 篇 department of ph...
  • 860 篇 cavendish labora...
  • 825 篇 physikalisches i...
  • 824 篇 oliver lodge lab...
  • 578 篇 school of physic...
  • 472 篇 infn laboratori ...
  • 469 篇 infn sezione di ...
  • 456 篇 fakultät physik ...
  • 446 篇 infn sezione di ...
  • 432 篇 university of ch...
  • 428 篇 infn sezione di ...
  • 414 篇 iccub universita...
  • 414 篇 horia hulubei na...
  • 411 篇 department of ph...
  • 394 篇 school of physic...
  • 389 篇 school of physic...
  • 381 篇 nikhef national ...
  • 379 篇 imperial college...
  • 378 篇 center for high ...
  • 371 篇 h.h. wills physi...

作者

  • 270 篇 a. gomes
  • 256 篇 c. alexa
  • 256 篇 j. m. izen
  • 246 篇 g. bella
  • 245 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 242 篇 s. chen
  • 235 篇 g. spigo
  • 233 篇 f. siegert
  • 219 篇 r. ströhmer
  • 219 篇 j. wang
  • 216 篇 y. tayalati
  • 214 篇 m. rijssenbeek
  • 210 篇 s. jin
  • 205 篇 g. gaudio
  • 204 篇 m. gandelman
  • 203 篇 t. gershon
  • 200 篇 s. mohapatra
  • 197 篇 d. golubkov

语言

  • 9,062 篇 英文
  • 726 篇 其他
  • 97 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Cyberspace Research and College of Computer Science and Technology"
9890 条 记 录,以下是51-60 订阅
排序:
Boosting Robustness in Automatic Modulation Recognition for Wireless Communications
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2024年 第3期11卷 1635-1648页
作者: Zhao, Yuhang Wang, Yajie Zhang, Chuan Li, Chunhai Xiong, Zehui Zhu, Liehuang Niyato, Dusit Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Guilin University of Electronic Technology Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin541004 China Singapore University of Technology and Design Pillar of Information Systems Technology and Design 487372 Singapore Nanyang Technological University College of Computing and Data Science 639798 Singapore
In the radio frequency field, deep neural networks have been widely used for automatic modulation recognition tasks due to their superior accuracy. However, it has been shown that these models are susceptible to adver... 详细信息
来源: 评论
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1129-1150页
作者: Shijie Tang Yong Ding Huiyong Wang School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China School of Electronic Engineering and Automation Guilin University of Electronic TechnologyGuilin541004China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic TechnologyGuilin541004China Institute of Cyberspace Technology HKCT Institute for Higher EducationHong Kong999077China School of Mathematics&Computing Science Guilin University of Electronic TechnologyGuilin541004China
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... 详细信息
来源: 评论
Unpaired remote sensing image super-resolution with content-preserving weak supervision neural network
收藏 引用
science China(Information sciences) 2023年 第1期66卷 324-325页
作者: Jie WU Runmin CONG Leyuan FANG Chunle GUO Bob ZHANG Pedram GHAMISI College of Electrical and Information Engineering Hunan University Institute of Information Science Beijing Jiaotong University College of Computer Science Nankai University Department of Computer and Information Science University of Macau Helmholtz-Zentrum Dresden-Rossendorf Helmholtz Institute Freiberg for Resource Technology Institute of Advanced Research in Artificial Intelligence (IARAI)
Dear editor,Image super-resolution(SR) uses image processing methods to increase the resolution of the image without increasing any hardware cost. Remote sensing images with high spatial resolution contain rich imager...
来源: 评论
Collaborative Search With Knowledge Sharing And Summarization  4
Collaborative Search With Knowledge Sharing And Summarizatio...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Mohan, Venkateshwaran Sivaganesan, D. Balasubramaniam, S. Vikhas, S.G. Dhinesh, S.P. Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Coimbatore India Dr Mahalingam College of Engineering and Technology Department of Computer Science and Engineering Pollachi India Psg College of Technology Department of Computer Science and Engineering Coimbatore India Sri Krishna Arts and Science College Department of Computer Science Coimbatore India
A collaborative search engine is used for a group of users who want to search information together for various group activities. This will be time saving as the users can split the work between them. Summarization is ... 详细信息
来源: 评论
Features enhancement of micro-service based cab booking system using block-chain  4th
Features enhancement of micro-service based cab booking syst...
收藏 引用
4th International Conference on Computational Methods in science and technology, ICCMST 2024
作者: Rohit Singh, Neelaksh Shukla, Riya Singh, Ashutosh Kumar Department of Computer Science and Engineering Institute of Engineering and Rural Technology Prayagraj India Department of Computer Science and Engineering United College of Engineering and Research Prayagraj India
Cab booking services help people order taxis. Existing cab booking services use client server-based architecture. The paper gives a study of the architecture and workings of the Uber cab booking website (Dissanayake, ... 详细信息
来源: 评论
Proactive Caching at the Wireless Edge:A Novel Predictive User Popularity-Aware Approach
收藏 引用
computer Modeling in Engineering & sciences 2024年 第8期140卷 1997-2017页
作者: Yunye Wan Peng Chen Yunni Xia Yong Ma Dongge Zhu Xu Wang Hui Liu Weiling Li Xianhua Niu Lei Xu Yumin Dong College of Computer Science Chongqing UniversityChongqing400044China School of Computer and Software Engineering Xihua UniversityChengdu610039China School of Computer and Information Engineering Jiangxi Normal UniversityNanchang330022China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd.Yinchuan750002China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100083China School of Computer Science and Technology Dongguan University of TechnologyDongguan523808China School of Emergency Management Xihua UniversityChengdu610039China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e... 详细信息
来源: 评论
A Novel Collective User Web Behavior Simulation Method
收藏 引用
computers, Materials & Continua 2021年 第3期66卷 2539-2553页
作者: Hongri Liu Xu Zhang Jingjing Li Bailing Wang College of Computer Science&Technology Harbin Institute of Technology at WeihaiWeihai264209China Cyberspace Security Research Center Peng Cheng LaboratoryShenzhen518000China Research Institute of Cyberspace Security Harbin Institute of TechnologyHarbin150001China
A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber *** studies almost focus on individual web behavior analysis and prediction... 详细信息
来源: 评论
Prediction of Insurance Claims for Health Sector using Machine Learning Techniques  3
Prediction of Insurance Claims for Health Sector using Machi...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Pragatheeswari, E. Kavitha, M.N. Saranya, S.S. Dhanushree, D. Jasmitha, S. Abiradhie, P.V. Department of Computer Technology Kongu Engineering College Perundurai Erode India Department of Computer Science and Design Kongu Engineering College Perundurai Erode India Department of Computer Science and Engineering PSG Institute of Technology and Applied Research Coimbatore India
Nowadays, health issues play a tremendous role in day-to-day life and the medical expenditure to get treatment becomes more difficult for the ordinary people. Health insurance has become a vital aspect of people's... 详细信息
来源: 评论
Computational Web Drug Discovery Application forSARS- Cov-2 Disease Using Predictive and Analytical Approach  10
Computational Web Drug Discovery Application forSARS- Cov-2 ...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Hemkiran, S. Kartik, R. Aswath, S. Rathan Kabilan, K. Sudha Sadasivam, G. Psg Institute of Technology and Applied Research Dept. of Computer Science and Engineering Coimbatore India Psg College of Technology Dept. of Computer Science and Engineering Coimbatore India
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent... 详细信息
来源: 评论
Defending against data reconstruction attacks in federated learning: an information theory approach  24
Defending against data reconstruction attacks in federated l...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Qi Tan Qi Li Yi Zhao Zhuotao Liu Xiaobing Guo Ke Xu Department of Computer Science and Technology Tsinghua University Institute for Network Science and Cyberspace Tsinghua University School of Cyberspace Science and Technology Beijing Institute of Technology Lenovo Research
Federated Learning (FL) trains a black-box and high-dimensional model among different clients by exchanging parameters instead of direct data sharing, which mitigates the privacy leak incurred by machine learning. How...
来源: 评论