咨询与建议

限定检索结果

文献类型

  • 171,237 篇 会议
  • 78,422 篇 期刊文献
  • 2,282 册 图书

馆藏范围

  • 251,940 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 147,682 篇 工学
    • 101,865 篇 计算机科学与技术...
    • 81,779 篇 软件工程
    • 35,284 篇 信息与通信工程
    • 22,616 篇 控制科学与工程
    • 18,626 篇 电气工程
    • 17,785 篇 电子科学与技术(可...
    • 16,417 篇 生物工程
    • 12,660 篇 生物医学工程(可授...
    • 10,749 篇 光学工程
    • 9,937 篇 机械工程
    • 8,104 篇 化学工程与技术
    • 7,514 篇 仪器科学与技术
    • 7,385 篇 动力工程及工程热...
    • 6,619 篇 材料科学与工程(可...
    • 5,728 篇 网络空间安全
    • 5,446 篇 安全科学与工程
  • 84,023 篇 理学
    • 43,320 篇 数学
    • 26,471 篇 物理学
    • 18,653 篇 生物学
    • 13,654 篇 统计学(可授理学、...
    • 9,265 篇 系统科学
    • 8,685 篇 化学
  • 39,614 篇 管理学
    • 23,899 篇 管理科学与工程(可...
    • 17,339 篇 图书情报与档案管...
    • 11,093 篇 工商管理
  • 12,299 篇 医学
    • 10,339 篇 临床医学
    • 9,246 篇 基础医学(可授医学...
    • 5,732 篇 药学(可授医学、理...
    • 5,139 篇 公共卫生与预防医...
  • 7,131 篇 法学
    • 5,850 篇 社会学
  • 4,282 篇 经济学
  • 3,352 篇 农学
  • 2,827 篇 教育学
  • 1,316 篇 文学
  • 529 篇 军事学
  • 411 篇 艺术学
  • 78 篇 哲学
  • 45 篇 历史学

主题

  • 11,857 篇 computer science
  • 6,354 篇 accuracy
  • 5,588 篇 feature extracti...
  • 5,421 篇 computational mo...
  • 5,253 篇 deep learning
  • 4,855 篇 machine learning
  • 4,349 篇 training
  • 3,594 篇 data mining
  • 3,428 篇 support vector m...
  • 3,128 篇 predictive model...
  • 3,081 篇 artificial intel...
  • 2,974 篇 optimization
  • 2,896 篇 internet of thin...
  • 2,849 篇 convolutional ne...
  • 2,825 篇 real-time system...
  • 2,779 篇 computer archite...
  • 2,708 篇 wireless sensor ...
  • 2,683 篇 algorithm design...
  • 2,576 篇 neural networks
  • 2,554 篇 protocols

机构

  • 4,993 篇 department of co...
  • 1,081 篇 cavendish labora...
  • 981 篇 department of ph...
  • 909 篇 university of ch...
  • 909 篇 physikalisches i...
  • 906 篇 oliver lodge lab...
  • 833 篇 department of el...
  • 670 篇 department of el...
  • 663 篇 department of co...
  • 564 篇 infn sezione di ...
  • 554 篇 infn laboratori ...
  • 542 篇 chitkara univers...
  • 540 篇 department of co...
  • 538 篇 infn sezione di ...
  • 523 篇 horia hulubei na...
  • 511 篇 infn sezione di ...
  • 508 篇 school of physic...
  • 505 篇 fakultät physik ...
  • 502 篇 department of ph...
  • 501 篇 h.h. wills physi...

作者

  • 255 篇 barter w.
  • 237 篇 j. wang
  • 237 篇 a. gomes
  • 235 篇 s. chen
  • 230 篇 blake t.
  • 226 篇 c. alexa
  • 225 篇 bellee v.
  • 224 篇 bowcock t.j.v.
  • 222 篇 j. m. izen
  • 221 篇 amato s.
  • 219 篇 betancourt c.
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 217 篇 boettcher t.
  • 215 篇 beiter a.
  • 208 篇 c. amelung
  • 208 篇 bencivenni g.
  • 207 篇 g. bella
  • 207 篇 j. strandberg
  • 206 篇 d. calvet

语言

  • 221,354 篇 英文
  • 27,718 篇 其他
  • 3,045 篇 中文
  • 182 篇 日文
  • 50 篇 德文
  • 50 篇 斯洛文尼亚文
  • 34 篇 法文
  • 20 篇 朝鲜文
  • 15 篇 俄文
  • 5 篇 阿拉伯文
  • 5 篇 西班牙文
  • 3 篇 意大利文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Pucho Technology and Department of Computer Science and Technology"
251941 条 记 录,以下是21-30 订阅
排序:
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 400-414页
作者: Nasir Ahmad Jalali Hongsong Chen Department of Computer Science University of Science and Technology Beijing(USTB)Beijing 100083China
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants r... 详细信息
来源: 评论
A program logic for obstruction-freedom
收藏 引用
Frontiers of computer science 2024年 第6期18卷 85-100页
作者: Zhao-Hui LI Xin-Yu FENG School of Computer Science and Technology University of Science and Technology of ChinaHefei 230026China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
Though obstruction-free progress property is weaker than other non-blocking properties including lock-freedom and wait-freedom,it has advantages that have led to the use of obstruction-free implementations for softwar... 详细信息
来源: 评论
NeurDB: an AI-powered autonomous data system
收藏 引用
science China(Information sciences) 2024年 第10期67卷 129-150页
作者: Beng Chin OOI Shaofeng CAI Gang CHEN Yanyan SHEN Kian-Lee TAN Yuncheng WU Xiaokui XIAO Naili XING Cong YUE Lingze ZENG Meihui ZHANG Zhanhao ZHAO School of Computing National University of Singapore College of Computer Science and Technology Zhejiang University Department of Computer Science and Engineering Shanghai Jiao Tong University School of Information Renmin University of China School of Computer Science and Technology Beijing Institute of Technology
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
science China(Information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Attentional multi-feature fusion for spoofing-aware speaker verification
收藏 引用
International Journal of Speech technology 2024年 第2期27卷 377-387页
作者: Shen, Qian Guo, Mengxi Huang, YiDa Ma, Jianfen Department of Computer Science and Technology Taiyuan University of Technology Shanxi China
The Spoofing-Aware Speaker Verification (SASV) system is designed to protect automatic speaker verification (ASV) systems from potential speech spoofing attacks by integrating the ASV and countermeasure systems. The o... 详细信息
来源: 评论
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4573-4591页
作者: Aiguo Li Yunfei Jia Department of Network Engineering Xi’an University of Science and TechnologyXi’an710600China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710600China
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
A Review Of Text Mining Techniques: Trends, and Applications In Various Domains
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第1期5卷 125-141页
作者: Aleqabie, Hiba J. Sfoq, Mais Saad Albeer, Rand Abdulwahid Abd, Enaam Hadi Computer Science Department Collage of Computer Science and Information Technology University of Kerbala Karbala Iraq Information Technology Department Collage of Computer Science and Information Technology University of Kerbala. Karbala Iraq
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r... 详细信息
来源: 评论
OpBench: an operator-level GPU benchmark for deep learning
收藏 引用
science China(Information sciences) 2024年 第9期67卷 76-87页
作者: Qingwen GU Bo FAN Zhengning LIU Kaicheng CAO Songhai ZHANG Shimin HU Department of Computer Science and Technology Tsinghua University National Innovation Institute of Defense Technology Academy of Military Science Beijing Fitten Technology Co. Ltd.
Operators(such as Conv and ReLU) play an important role in deep neural networks. Every neural network is composed of a series of differentiable operators. However, existing AI benchmarks mainly focus on accessing mode... 详细信息
来源: 评论
Efficient and lightweight CNN model for COVID-19 diagnosis from CT and X-ray images using customized pruning and quantization techniques
收藏 引用
Neural Computing and Applications 2025年 1-20页
作者: Sriwiboon, Nattavut Department of Computer Science and Information Technology Faculty of Science and Health Technology Kalasin University Kalasin Thailand
The coronavirus disease 2019 (COVID-19) has posed significant challenges globally, with image classification becoming a critical tool for detecting COVID-19 from chest X-ray and CT images. Convolutional neural network... 详细信息
来源: 评论