咨询与建议

限定检索结果

文献类型

  • 13,535 篇 会议
  • 7,602 篇 期刊文献
  • 256 册 图书

馆藏范围

  • 21,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,219 篇 工学
    • 10,258 篇 计算机科学与技术...
    • 8,571 篇 软件工程
    • 3,382 篇 信息与通信工程
    • 2,112 篇 控制科学与工程
    • 1,903 篇 生物工程
    • 1,575 篇 电气工程
    • 1,389 篇 生物医学工程(可授...
    • 1,151 篇 电子科学与技术(可...
    • 1,149 篇 光学工程
    • 825 篇 网络空间安全
    • 790 篇 机械工程
    • 665 篇 安全科学与工程
    • 628 篇 动力工程及工程热...
    • 587 篇 交通运输工程
    • 577 篇 仪器科学与技术
    • 554 篇 化学工程与技术
  • 6,781 篇 理学
    • 3,450 篇 数学
    • 2,083 篇 生物学
    • 1,749 篇 物理学
    • 1,196 篇 统计学(可授理学、...
    • 743 篇 系统科学
    • 652 篇 化学
  • 3,993 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,754 篇 图书情报与档案管...
    • 1,055 篇 工商管理
  • 1,545 篇 医学
    • 1,204 篇 临床医学
    • 1,105 篇 基础医学(可授医学...
    • 804 篇 公共卫生与预防医...
    • 654 篇 药学(可授医学、理...
  • 839 篇 法学
    • 697 篇 社会学
  • 372 篇 经济学
  • 329 篇 农学
  • 225 篇 教育学
  • 185 篇 文学
  • 32 篇 军事学
  • 27 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 895 篇 deep learning
  • 811 篇 accuracy
  • 532 篇 computational mo...
  • 495 篇 machine learning
  • 444 篇 feature extracti...
  • 437 篇 training
  • 379 篇 real-time system...
  • 376 篇 predictive model...
  • 359 篇 internet of thin...
  • 309 篇 support vector m...
  • 305 篇 convolutional ne...
  • 287 篇 computer science
  • 273 篇 data models
  • 268 篇 semantics
  • 258 篇 optimization
  • 234 篇 neural networks
  • 215 篇 computer archite...
  • 208 篇 scalability
  • 207 篇 reliability
  • 197 篇 image segmentati...

机构

  • 265 篇 department of co...
  • 167 篇 school of comput...
  • 136 篇 school of comput...
  • 135 篇 school of comput...
  • 111 篇 school of comput...
  • 110 篇 department of co...
  • 110 篇 school of comput...
  • 100 篇 national enginee...
  • 100 篇 department of co...
  • 100 篇 school of comput...
  • 99 篇 department of co...
  • 98 篇 college of compu...
  • 98 篇 department of co...
  • 94 篇 north-west unive...
  • 94 篇 school of comput...
  • 94 篇 institut univers...
  • 93 篇 department of co...
  • 89 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 83 篇 tno technical sc...

作者

  • 117 篇 niyato dusit
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 86 篇 gozzini s.r.
  • 83 篇 zheng wei-shi
  • 82 篇 dallier r.
  • 81 篇 anjali t.
  • 73 篇 kalekin o.
  • 66 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 benoit d.m.

语言

  • 19,888 篇 英文
  • 1,393 篇 其他
  • 150 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 荷兰文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21393 条 记 录,以下是101-110 订阅
排序:
The Impact of Domain Name Server(DNS)over Hypertext Transfer Protocol Secure(HTTPS)on Cyber Security:Limitations,Challenges,and Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4513-4542页
作者: Muhammad Dawood Shanshan Tu Chuangbai Xiao Muhammad Haris Hisham Alasmary Muhammad Waqas Sadaqat Ur Rehman Faculty of Information Technology Beijing University of TechnologyBeijing100124China National Center of Robotics and Automation University of Engineering and TechnologyPeshawar25000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia School of Computing and Engineering Sciences Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUnited Kingdom School of Engineering Edith Cowan UniversityPerthWA 6027Australia School of Computer Science and Engineering University of SalfordManchesterM54BRUnited Kingdom
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a... 详细信息
来源: 评论
Enhancing Secure Data Transmission Through Deep Learning-Based Image Steganography and Super-Resolution Generative Adversarial Networks
收藏 引用
SN computer science 2024年 第8期5卷 1138页
作者: Ramesh, Sreyas Sukanth, B.N. Jaswanth, Sathyavarapu Sri Singh, Rimjhim Padam Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
In the era of multimedia technology digital images are essential and keeping them safe from unauthorised access is crucial. To address this issue, the proposed research explores the intersection of image steganography... 详细信息
来源: 评论
Convergence of Deep Learning and Forensic Methodologies Using Self-attention Integrated EfficientNet Model for Deep Fake Detection
收藏 引用
SN computer science 2024年 第8期5卷 1-12页
作者: Singh, Rimjhim Padam Sree, Nichenametla Hima Reddy, Koti Leela Sai Praneeth Jashwanth, Kandukuri Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The immensely increasing number of Deepfake technologies poses significant challenges to digital media integrity, leading to the immediate need for effective Deepfake detection methods. In light of the growing threat ... 详细信息
来源: 评论
A Game Theoretic Link Scheduler for Wireless Networks with Heterogeneous Energy Sources
收藏 引用
China Communications 2024年 第12期21卷 108-125页
作者: He Tengjiao Kwanwu Chin Wang Yishun Sieteng Soh College of Information Science and Technology Jinan UniversityGuangzhouChina School of Electrical Computer and Telecommunications EngineeringUniversity of WollongongNSWAustralia School of Electrical Engineering Computing and Mathematical SciencesCurtin UniversityWAAustralia
This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs *... 详细信息
来源: 评论
Code Reviewer Intelligent Prediction in Open Source Industrial Software Project
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 687-704页
作者: Zhifang Liao Bolin Zhang Xuechun Huang Song Yu Yan Zhang School of Computer Science and Engineering Central South UniversityChangsha410083China Department of Computing School of ComputingEngineering and Built EnvironmentGlasgow Caledonian UniversityGlasgowG40BAUK
Currently, open-source software is gradually being integrated into industrial software, while industry protocolsin industrial software are also gradually transferred to open-source community development. Industrial pr... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
IoT-Based Fire Alarm System and Motion Detector: A Comprehensive Protocol Analysis for Enhanced Performance  9
IoT-Based Fire Alarm System and Motion Detector: A Comprehen...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Samudrala, Sai Santhoshi Haneesha Thambi, Jaishitha Vadluri, Sai Rishisri Rajagopal, Shinu M. Bhaskaran, Sreebha Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bangalore India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bengaluru India
Fire alarm systems play a vital role in providing early warnings, facilitating prompt evacuation in emergency situations. These systems ensure the security of individuals by alerting them to possible risks and allowin... 详细信息
来源: 评论
Impulsive Control of Nonlinear Multi-Agent Systems: A Hybrid Fuzzy Adaptive and Event-Triggered Strategy
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年 第6期33卷 1889-1898页
作者: Han, Fang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China
This paper presents a hybrid control approach that integrates an adaptive fuzzy mechanism with an event-triggered impulse strategy to address consensus control challenges in nonlinear Multi-Agent Systems (MASs) with u... 详细信息
来源: 评论
Blockchain-Based Communicator with Multicast Transmission  8
Blockchain-Based Communicator with Multicast Transmission
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Nair, Praanesh Balakrishnan Varun Adhitya, G.B. Vineetha, K.V. Ullas, S. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Department of Computer Science and Engineering Bengaluru India
This paper examines the conceptualization and implementation of an instant messaging application, which is decentralized. The proposed work utilizes a blockchain with end-to-end encryption and digital signatures. The ... 详细信息
来源: 评论
Bias analysis of AI models for undergraduate student admissions
收藏 引用
Neural computing and Applications 2025年 第12期37卷 7785-7795页
作者: Van Busum, Kelly Fang, Shiaofen Department of Computer Science and Software Engineering Butler University IndianapolisIN United States Computing and Engineering Indiana University Luddy School of Informatics Indiana University Indianapolis IndianapolisIN United States
Bias detection and mitigation is an active area of research in machine learning. This work extends previous research done by the authors Van Busum and Fang (Proceedings of the 38th ACM/SIGAPP Symposium on Applied Comp... 详细信息
来源: 评论