咨询与建议

限定检索结果

文献类型

  • 1,192 篇 会议
  • 776 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,227 篇 工学
    • 872 篇 计算机科学与技术...
    • 722 篇 软件工程
    • 338 篇 信息与通信工程
    • 191 篇 控制科学与工程
    • 188 篇 生物工程
    • 147 篇 电气工程
    • 138 篇 生物医学工程(可授...
    • 122 篇 光学工程
    • 117 篇 电子科学与技术(可...
    • 90 篇 网络空间安全
    • 85 篇 机械工程
    • 79 篇 化学工程与技术
    • 60 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 47 篇 动力工程及工程热...
  • 709 篇 理学
    • 326 篇 数学
    • 234 篇 物理学
    • 205 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 85 篇 化学
    • 51 篇 系统科学
  • 363 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 119 篇 医学
    • 83 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 59 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 72 篇 法学
    • 60 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 83 篇 accuracy
  • 75 篇 deep learning
  • 55 篇 feature extracti...
  • 53 篇 training
  • 50 篇 convolutional ne...
  • 43 篇 machine learning
  • 41 篇 real-time system...
  • 38 篇 computational mo...
  • 38 篇 predictive model...
  • 30 篇 optimization
  • 29 篇 artificial intel...
  • 28 篇 semantics
  • 27 篇 security
  • 26 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 20 篇 scalability
  • 20 篇 medical services
  • 20 篇 cloud computing

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 42 篇 zhang yanning
  • 41 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,780 篇 英文
  • 174 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1976 条 记 录,以下是891-900 订阅
排序:
S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision
S-chain: A Shard-based Blockchain Scheme for Cross-chain Sup...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yuwei Xu Yuxing Song Junyu Zeng Ran He Jingdong Xu School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China College of Computer Science Nankai University Tianjin China
With the popularization of consortium blockchain, how to supervise numerous business chains has become a problem. Recently, some researchers have proposed the concept of ‘governing chain by chain’, which means that ...
来源: 评论
MedUniSeg: 2D and 3D Medical Image Segmentation via a Prompt-driven Universal Model
arXiv
收藏 引用
arXiv 2024年
作者: Ye, Yiwen Chen, Ziyang Zhang, Jianpeng Xie, Yutong Xia, Yong The National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an710072 China The College of Computer Science and Technology Zhejiang University Zhejiang China The University of Adelaide Australia Research & Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen518057 China The Ningbo Institute of Northwestern Polytechnical University Ningbo315048 China
Universal segmentation models offer significant potential in addressing a wide range of tasks by effectively leveraging discrete annotations. As the scope of tasks and modalities expands, it becomes increasingly impor... 详细信息
来源: 评论
The Performance Analysis of Distributed Denial of Service Attacks in Wireless Networks
The Performance Analysis of Distributed Denial of Service At...
收藏 引用
International Conference on Futuristic Technologies (INCOFT)
作者: Trapty Agrawal R Raghavendra K. Ranjith Singh Rajiv Gandhi N Dharmesh Dhabliya Jitendra Kumar Katariya Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Indi Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore Karnataka India Department of Computer Science Karpagam Academy of Higher Education Coimbatore Department of Civil Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science & Application Vivekananda Global University Jaipur India
Complete studies paper that examines the outcomes that malicious 0.33-celebration actors will have on Wi-Fi networks via dispensed denial of carrier (DDoS) attacks. This paper explores the available numerous assault m...
来源: 评论
Contrastive Patch Comparison Transformer for Weakly Supervised Semantic Segmentation
Contrastive Patch Comparison Transformer for Weakly Supervis...
收藏 引用
IEEE International Conference on Smart Internet of Things (SmartIoT)
作者: Wentian Cai Weixian Yang Jing Lin Ying Gao School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangdong Provincial People's Hospital Guangdong Academy of Medical Sciences Guangzhou China
Weakly supervised semantic segmentation (WSSS) focuses on utilizing image-level labels to classify all pixels into object classes or background class. Class Activation Mapping (CAM) highlights the most discriminative ... 详细信息
来源: 评论
Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning
Cerberus: Efficient OSPS Traffic Identification through Mult...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yuwei Xu Xiaotian Fang Jie Cao Rou Yu Kehui Song Guang Cheng School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China College of Computer Science Nankai University Tianjin China
The privacy protection capabilities of open source proxy software (OSPS) while browsing the Internet have sparked great interest from both industry and academia, bringing forth pressing security concerns. Currently, u... 详细信息
来源: 评论
Sequence-to-Sequence Multi-Hop Knowledge Reasoning Based on Retentive Network
Sequence-to-Sequence Multi-Hop Knowledge Reasoning Based on ...
收藏 引用
computer Information science and application Technology (CISAT), International Conference on
作者: Ruilin Su Wanshan Zhang Dunhui Yu Hubei University Wuhan China Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Hubei Key Laboratory of Big Data Intelligent Analysis and Application Hubei University Wuhan China Engineering and Technical Research Center of Hubei Province in Software Engineering Wuhan China
Multi-hop Knowledge Reasoning is a task that involves generating an answer given a query and a knowledge graph. Existing sequence-to-sequence reasoning models use the Transformer to encode and decode sequences, but th... 详细信息
来源: 评论
SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization
SharpEye: Identify mKCP Camouflage Traffic through Feature O...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yuwei Xu Zizhi Zhu Yunpeng Bai Lilanyi Wu Kehui Song Guang Cheng School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China College of Computer Science Nankai University Tianjin China
As a new self-developed protocol of V2Ray, mKCP disguises users’ network access as communication of four network applications by forging application layer headers to evade traffic-based detection. The emergence of mK... 详细信息
来源: 评论
A Novel based Hybrid smart System for detecting the cyber-attacks on IOT’s
A Novel based Hybrid smart System for detecting the cyber-at...
收藏 引用
Artificial Intelligence and Smart Communication (AISC), International Conference on
作者: K. Juliana Gnanaselvi Surendra Kumar Shukla Keerthipati Kumar Anita Gehlot Tarun Jaiswal B. T. Geetha Department of Computer Science Rathinam College of Arts and Science Coimbatore Tamil Nadu India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Information Technology University of Technology and Applied Science- Al Mussnna Oman Uttaranchal Institute of Technology Uttaranchal University India Department of Computer Application National Institute of Technology Raipur (C.G.) Department of ECE Saveetha School of Engineering SIMATS Tamil Nadu India
The Iot technology (IoT) is rapidly advancing sufficiently that it might have a larger effect on huge industrial infrastructure and everyday routines. However, this became the focus of fraudsters, whom made IoT into s... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
Tensor Graph Convolutional Network for Dynamic Graph Representation Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Ling Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Engineering Research Center of Big Data Application for Smart Cities Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China The College of Computer and Information Science Southwest University Chongqing400715 China
Dynamic graphs (DG) describe dynamic interactions between entities in many practical scenarios. Most existing DG representation learning models combine graph convolutional network and sequence neural network, which mo... 详细信息
来源: 评论