咨询与建议

限定检索结果

文献类型

  • 13,952 篇 会议
  • 7,738 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,947 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,596 篇 工学
    • 10,518 篇 计算机科学与技术...
    • 8,728 篇 软件工程
    • 3,445 篇 信息与通信工程
    • 2,199 篇 控制科学与工程
    • 1,905 篇 生物工程
    • 1,610 篇 电气工程
    • 1,422 篇 生物医学工程(可授...
    • 1,194 篇 光学工程
    • 1,177 篇 电子科学与技术(可...
    • 841 篇 网络空间安全
    • 801 篇 机械工程
    • 693 篇 安全科学与工程
    • 645 篇 动力工程及工程热...
    • 602 篇 交通运输工程
    • 589 篇 仪器科学与技术
    • 561 篇 化学工程与技术
  • 6,899 篇 理学
    • 3,505 篇 数学
    • 2,095 篇 生物学
    • 1,796 篇 物理学
    • 1,217 篇 统计学(可授理学、...
    • 744 篇 系统科学
    • 657 篇 化学
  • 4,062 篇 管理学
    • 2,455 篇 管理科学与工程(可...
    • 1,794 篇 图书情报与档案管...
    • 1,084 篇 工商管理
  • 1,592 篇 医学
    • 1,241 篇 临床医学
    • 1,140 篇 基础医学(可授医学...
    • 840 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 859 篇 法学
    • 710 篇 社会学
  • 379 篇 经济学
  • 337 篇 农学
  • 241 篇 教育学
  • 183 篇 文学
  • 34 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 944 篇 deep learning
  • 870 篇 accuracy
  • 540 篇 computational mo...
  • 498 篇 machine learning
  • 466 篇 feature extracti...
  • 448 篇 training
  • 402 篇 real-time system...
  • 386 篇 predictive model...
  • 371 篇 internet of thin...
  • 325 篇 convolutional ne...
  • 323 篇 support vector m...
  • 288 篇 computer science
  • 278 篇 data models
  • 269 篇 semantics
  • 256 篇 optimization
  • 233 篇 neural networks
  • 221 篇 computer archite...
  • 219 篇 reliability
  • 218 篇 scalability
  • 209 篇 image segmentati...

机构

  • 266 篇 department of co...
  • 169 篇 school of comput...
  • 137 篇 school of comput...
  • 137 篇 school of comput...
  • 125 篇 department of co...
  • 118 篇 school of comput...
  • 114 篇 school of comput...
  • 112 篇 department of co...
  • 108 篇 department of co...
  • 103 篇 college of compu...
  • 103 篇 school of comput...
  • 100 篇 school of comput...
  • 100 篇 national enginee...
  • 100 篇 department of co...
  • 96 篇 north-west unive...
  • 95 篇 institut univers...
  • 92 篇 department of co...
  • 90 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 85 篇 tno technical sc...

作者

  • 122 篇 niyato dusit
  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 95 篇 chen a.
  • 91 篇 gal t.
  • 91 篇 bozza c.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 88 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 84 篇 zheng wei-shi
  • 84 篇 dallier r.
  • 83 篇 anjali t.
  • 71 篇 kalekin o.
  • 64 篇 boettcher m.
  • 63 篇 anguita m.
  • 59 篇 kulikovskiy v.
  • 59 篇 huang f.
  • 55 篇 benoit d.m.

语言

  • 15,860 篇 英文
  • 5,983 篇 其他
  • 179 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21947 条 记 录,以下是521-530 订阅
Elevating Login Security with Hybrid Encryption Enhanced QR Authentication  9
Elevating Login Security with Hybrid Encryption Enhanced QR ...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Lahari, Busam Venkata Dhathri, Busireddy Nithin, G. Kavitha, C.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science & Engineering Bengaluru India
As the digital world continues to grow, the need for robust and secure authentication systems to protect sensitive information has never been more important. This paper introduces a developing approach to login securi... 详细信息
来源: 评论
A Predictive Framework for Failure Detection and Reallocation in Crowdsourcing Platforms  2024
A Predictive Framework for Failure Detection and Reallocatio...
收藏 引用
16th International Conference on Contemporary computing, IC3 2024
作者: Voleti, Sai Anushree Tathipamula, Harini Sai Poolla, Lakshmi Saranya Nair, Lekshmi S. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
Crowdsourcing platforms have become essential tools for managing various tasks, relying on distributed labour practices to enhance productivity and goal achievement. However, they often encounter challenges such as un... 详细信息
来源: 评论
Multimodal Lung Cancer Image Analysis  15
Multimodal Lung Cancer Image Analysis
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Pallithodiyil, Akshita Prasanth Srikrishna, Atyam Preetham Sai, Gutha Venkat Paripoorna, D. Sathiya, R.R. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
This paper addresses the significant global impact of lung cancer, the primary cause of cancer-related deaths worldwide and the second leading cause of mortality following cardiovascular disease. The challenge lies in... 详细信息
来源: 评论
Design of an Automatic Washing Machine Control System using Deterministic Finite Automata  5
Design of an Automatic Washing Machine Control System using ...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Madhuja, C. Bhanot, Shreya Srinidhi, M. Radha, D. Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amrita School of Computing Bengaluru India
A Deterministic Finite Automaton (DFA) is a theoretical model of computation used to design and analyze the behavior of systems with a finite number of states, where each state transitions deterministically based on i... 详细信息
来源: 评论
YOLOv8 for Pedestrian Detection: A Comparative Study for Pedestrian Detection  3
YOLOv8 for Pedestrian Detection: A Comparative Study for Ped...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Sivaraman, G. Sophiya, E. Diviya, M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India
This research analyzes the usefulness of YOLOv8 for robust pedestrian recognition in demanding real world situations. A custom-trained YOLOv8 model is evaluated against SSD models, displaying better accuracy in detect... 详细信息
来源: 评论
SecureComment: Safeguarding Online Discussions with Intelligent Toxic Comment Filtering  2
SecureComment: Safeguarding Online Discussions with Intellig...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Rayani, Reddy Kowshik Tekula, Samhitha Vattigunta, Subhash Kovid Kovi, Naveen Kumar Namitha, Kalakunnath Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Toxic comments, such as hate speech and abuse, are a widespread issue online, disrupting healthy conversation and user safety. Identifying and filtering these comments is crucial for ensuring respectful online communi... 详细信息
来源: 评论
Post-Exploitation Insights: Dynamic Analysis of C2 Frameworks  4
Post-Exploitation Insights: Dynamic Analysis of C2 Framework...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Rao, Subhiksha Suresh Mishra, Sahil Seshadri, Samarth Kavitha, C.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science & Engineering Bengaluru India
Recognizing and reducing the risks presented by malevolent actors in the realm of cyber security requires an awareness of post exploitation techniques. However, deThe study investigates post operational challenges thr... 详细信息
来源: 评论
Comparative Analysis of Classifiers for Cyber Attack Prediction on LUflow Dataset with Explainability  9
Comparative Analysis of Classifiers for Cyber Attack Predict...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Gunti, Geethika Sree, Kuruva Divya Gupta, Deepa Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bangalore India
As the cyber threats areevolving, intrusions exploit vulnerabilities in software or systems and can occur 24/7, targeting individuals and *** Intrusion detection system (IDS) is designed to help in the detection of cy... 详细信息
来源: 评论
Securing Layers: The Synergy of Mix Networks and Shamir's Secret Sharing in Onion Routing  2
Securing Layers: The Synergy of Mix Networks and Shamir's Se...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Jambha, Aniketh Vasudev Swetchana, Dutta Sushrutha, Karru Rajagopal, Shinu M. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bengaluru India
In the contemporary digital landscape, where online privacy and security face escalating challenges due to evolving cyber threats, this investigation uncovers vulnerabilities within traditional security measures. The ... 详细信息
来源: 评论
Dissecting Digital Dangers: A MITRE-Aligned Analysis of Two Prominent Malware Instances  15
Dissecting Digital Dangers: A MITRE-Aligned Analysis of Two ...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Rao, Subhiksha Suresh Mishra, Sahil Rajesh, M. Savant, Richa Vivek Sreevidya, B. Department of Computer Science & Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
The increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e... 详细信息
来源: 评论