咨询与建议

限定检索结果

文献类型

  • 13,794 篇 会议
  • 7,643 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,432 篇 工学
    • 10,387 篇 计算机科学与技术...
    • 8,664 篇 软件工程
    • 3,407 篇 信息与通信工程
    • 2,159 篇 控制科学与工程
    • 1,904 篇 生物工程
    • 1,591 篇 电气工程
    • 1,407 篇 生物医学工程(可授...
    • 1,170 篇 光学工程
    • 1,168 篇 电子科学与技术(可...
    • 830 篇 网络空间安全
    • 791 篇 机械工程
    • 677 篇 安全科学与工程
    • 633 篇 动力工程及工程热...
    • 592 篇 交通运输工程
    • 584 篇 仪器科学与技术
    • 556 篇 化学工程与技术
  • 6,835 篇 理学
    • 3,488 篇 数学
    • 2,089 篇 生物学
    • 1,771 篇 物理学
    • 1,218 篇 统计学(可授理学、...
    • 742 篇 系统科学
    • 654 篇 化学
  • 4,012 篇 管理学
    • 2,426 篇 管理科学与工程(可...
    • 1,767 篇 图书情报与档案管...
    • 1,067 篇 工商管理
  • 1,562 篇 医学
    • 1,221 篇 临床医学
    • 1,119 篇 基础医学(可授医学...
    • 820 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 848 篇 法学
    • 701 篇 社会学
  • 373 篇 经济学
  • 334 篇 农学
  • 236 篇 教育学
  • 183 篇 文学
  • 32 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 921 篇 deep learning
  • 849 篇 accuracy
  • 534 篇 computational mo...
  • 484 篇 machine learning
  • 464 篇 feature extracti...
  • 447 篇 training
  • 393 篇 real-time system...
  • 387 篇 predictive model...
  • 370 篇 internet of thin...
  • 317 篇 support vector m...
  • 316 篇 convolutional ne...
  • 285 篇 computer science
  • 280 篇 semantics
  • 271 篇 data models
  • 256 篇 optimization
  • 230 篇 neural networks
  • 221 篇 computer archite...
  • 214 篇 reliability
  • 214 篇 scalability
  • 204 篇 image segmentati...

机构

  • 253 篇 department of co...
  • 153 篇 school of comput...
  • 140 篇 school of comput...
  • 136 篇 school of comput...
  • 127 篇 school of comput...
  • 121 篇 department of co...
  • 112 篇 school of comput...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 101 篇 college of compu...
  • 101 篇 national enginee...
  • 101 篇 department of co...
  • 97 篇 school of comput...
  • 95 篇 department of co...
  • 95 篇 department of co...
  • 93 篇 north-west unive...
  • 93 篇 institut univers...
  • 88 篇 national centre ...
  • 87 篇 infn sezione di ...
  • 83 篇 tno technical sc...

作者

  • 123 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 89 篇 gal t.
  • 89 篇 bozza c.
  • 88 篇 anjali t.
  • 88 篇 díaz a.f.
  • 87 篇 boumaaza j.
  • 85 篇 zheng wei-shi
  • 85 篇 coleiro a.
  • 84 篇 gozzini s.r.
  • 82 篇 dallier r.
  • 73 篇 kalekin o.
  • 66 篇 anguita m.
  • 64 篇 boettcher m.
  • 63 篇 huang f.
  • 61 篇 kulikovskiy v.
  • 55 篇 enzenhöfer a.

语言

  • 17,418 篇 英文
  • 4,166 篇 其他
  • 167 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21694 条 记 录,以下是4401-4410 订阅
排序:
Post-Exploitation Insights: Dynamic Analysis of C2 Frameworks
Post-Exploitation Insights: Dynamic Analysis of C2 Framework...
收藏 引用
Sustainable Expert Systems (ICSES), International Conference on
作者: Subhiksha Suresh Rao Sahil Mishra Samarth Seshadri Kavitha C. R Department of Computer Science & Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Recognizing and reducing the risks presented by malevolent actors in the realm of cyber security requires an awareness of post exploitation techniques. However, deThe study investigates post operational challenges thr... 详细信息
来源: 评论
Bottom-Up Parsers: A Survey
Bottom-Up Parsers: A Survey
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Appala Hari Narayana Karthik B Venkat Vinod Kumar Bejji Bharadwaj Sree Sai Karthikeya Meena Belwal Department of Computer Science and Engineering Amrita School Of Computing Amrita Vishwa Vidyapeetham Bengaluru India
This study offers a thorough analysis of bottom-up parsing techniques, necessary for the creation and execution of compilers. Parsers such as SLR (Simple LR), LR (Canonical LR), LR(k) and LALR (Look-Ahead LR) are bott... 详细信息
来源: 评论
Reflectance Recovery Guided Learning of Illumination-Invariant Features for Person Re-Identification  18th
Reflectance Recovery Guided Learning of Illumination-Invari...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Chen, Xianbiao Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
In real-world scenarios, the changes of illumination are noticeable and can significantly impact the performance of re-identification (ReID) algorithms. However, the existing person ReID methods predominantly concentr... 详细信息
来源: 评论
Automated Classification and Segmentation of Brain Tumor Images Using Backboned ResUNet Framework
Automated Classification and Segmentation of Brain Tumor Ima...
收藏 引用
Mobile computing and Sustainable Informatics (ICMCSI), International Conference on
作者: Prasanalakshmi B Cuddapah Anitha Balamanigandan R Mahaveerakannan R N.V. Ratnakishor Gade Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamil Nadu India Department of Computer Science and Engineering School of Computing Mohan Babu University Tirupati Andhra Pradesh India
One of the most challenging issues in computer imaging is the automated segmentation of brain tumors using Magnetic Resonance Images (MRI). Several approaches are explored using Deep Neural Networks in image segmentat... 详细信息
来源: 评论
GSM-Powered Gas Leak Detection: A Modern Approach
GSM-Powered Gas Leak Detection: A Modern Approach
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Manju Khanna Sibyala Hemanth Sai Chakka Subrahmanya Sresti Vellala Bhavaharnath Sharma Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bangalore India
Global systems for mobile communications (GSM) Powered Gas Leakage Detection system aims to prevent gas leakages, especially from inflammable sources like LPG, which poses great risk. This presents a gas leakage detec... 详细信息
来源: 评论
Tweeting the Blues: Leveraging NLP and Classification Models for Depression Detection
Tweeting the Blues: Leveraging NLP and Classification Models...
收藏 引用
Advancement in Computation & computer Technologies (InCACCT), International Conference on
作者: Spandana Chereddy K Geetha A G Sreedevi Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Depression is a global mental health problem while Twitter is a valuable medium on which content indicating emotional affect is generated. Our research draws upon NLP to analyze tweets by the application of Naive Baye... 详细信息
来源: 评论
SecureNet: A PySpark-Based Approach to Enhanced Network Intrusion Detection Using Machine Learning and Feature engineering
SecureNet: A PySpark-Based Approach to Enhanced Network Intr...
收藏 引用
Intelligent Technologies (CONIT), International Conference on
作者: B. Akhileswar Reddy G. Someswara Reddy K. Lokesh Manju Venugopalan Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Cyber-attacks are increasing day to day in this world of AI and Internet. A ML model to detect the network attack based on the network parameters is of great use. The proposed model uses a new and complete method to m... 详细信息
来源: 评论
Convolutional Neural Network Based Age Estimation using Diverse Facial Datasets
Convolutional Neural Network Based Age Estimation using Dive...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Sidda Siri Chandana N Vithyatharshana Y Ghnana Prasoona Yedhoti Thrinayani C Jyotsna Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Determining an individual’s age accurately is important in many contexts, including forensic investigations, medical diagnostics, and security applications. Traditional age estimation techniques rely on manual evalua... 详细信息
来源: 评论
Dissecting Digital Dangers: A MITRE-Aligned Analysis of Two Prominent Malware Instances
Dissecting Digital Dangers: A MITRE-Aligned Analysis of Two ...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Subhiksha Suresh Rao Richa Vivek Savant Sahil Mishra B Sreevidya M Rajesh Department of Computer Science & Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
The increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e... 详细信息
来源: 评论
Shallow-Sec: Malware Detection in Real-Time Devices using Feature Weightage and Shallow Learning Models
Shallow-Sec: Malware Detection in Real-Time Devices using Fe...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: Panaganti Priyanka Udhayakumar K. Deepak Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
In the domain of mobile security, particularly in APK (Android Application Package) malware detection, ensuring robust threat identification is critical for safeguarding user devices and sensitive data. This study add... 详细信息
来源: 评论