咨询与建议

限定检索结果

文献类型

  • 92,464 篇 会议
  • 46,662 篇 期刊文献
  • 937 册 图书
  • 2 篇 科技报告

馆藏范围

  • 140,065 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,123 篇 工学
    • 53,594 篇 计算机科学与技术...
    • 43,912 篇 软件工程
    • 21,060 篇 信息与通信工程
    • 13,958 篇 控制科学与工程
    • 11,994 篇 电气工程
    • 11,971 篇 电子科学与技术(可...
    • 9,232 篇 生物工程
    • 7,110 篇 光学工程
    • 6,835 篇 机械工程
    • 6,568 篇 生物医学工程(可授...
    • 5,030 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,581 篇 材料科学与工程(可...
    • 3,172 篇 交通运输工程
    • 3,072 篇 网络空间安全
    • 3,007 篇 安全科学与工程
  • 46,710 篇 理学
    • 23,170 篇 数学
    • 15,214 篇 物理学
    • 10,323 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,235 篇 系统科学
    • 5,191 篇 化学
  • 21,451 篇 管理学
    • 13,744 篇 管理科学与工程(可...
    • 8,581 篇 图书情报与档案管...
    • 5,725 篇 工商管理
  • 6,246 篇 医学
    • 5,109 篇 临床医学
    • 4,579 篇 基础医学(可授医学...
    • 2,792 篇 药学(可授医学、理...
  • 3,442 篇 法学
    • 2,819 篇 社会学
  • 2,313 篇 经济学
  • 1,674 篇 农学
  • 1,305 篇 教育学
  • 590 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,570 篇 accuracy
  • 3,525 篇 feature extracti...
  • 3,088 篇 deep learning
  • 3,027 篇 computational mo...
  • 3,018 篇 training
  • 2,353 篇 machine learning
  • 2,159 篇 computer science
  • 2,062 篇 optimization
  • 1,915 篇 predictive model...
  • 1,583 篇 semantics
  • 1,578 篇 neural networks
  • 1,566 篇 real-time system...
  • 1,517 篇 internet of thin...
  • 1,508 篇 data models
  • 1,487 篇 support vector m...
  • 1,466 篇 convolutional ne...
  • 1,465 篇 data mining
  • 1,223 篇 artificial intel...
  • 1,214 篇 wireless sensor ...
  • 1,159 篇 robustness

机构

  • 3,276 篇 school of electr...
  • 2,477 篇 school of comput...
  • 1,547 篇 school of comput...
  • 1,383 篇 school of comput...
  • 1,082 篇 cavendish labora...
  • 993 篇 department of ph...
  • 978 篇 school of comput...
  • 938 篇 physikalisches i...
  • 917 篇 oliver lodge lab...
  • 858 篇 university of ch...
  • 681 篇 school of comput...
  • 620 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 534 篇 school of comput...
  • 533 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 518 篇 school of physic...
  • 517 篇 fakultät physik ...
  • 516 篇 department of ph...

作者

  • 281 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 c. amelung
  • 238 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 210 篇 bencivenni g.

语言

  • 129,429 篇 英文
  • 8,215 篇 其他
  • 2,388 篇 中文
  • 138 篇 日文
  • 18 篇 德文
  • 14 篇 法文
  • 11 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
检索条件"机构=School of Computer Engineering and Technology"
140065 条 记 录,以下是1461-1470 订阅
排序:
A new edge weight-based measure for k-shell influential node identification in complex networks
收藏 引用
International Journal of Security and Networks 2024年 第1期19卷 1-9页
作者: Xiong, Yang Cheng, Yang School of Cyberspace Security Changzhou College of Information Technology Changzhou213164 China School of Computer and Information Engineering Changzhou Institute of Technology Changzhou213002 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China
There are mainly two problems with traditional k-shell centrality in complex networks. First, the traditional k-shell centrality divides many nodes into the same shell layer, which cannot accurately distinguish the pr... 详细信息
来源: 评论
Sea Surface Temperature Prediction Based on Spatio-Temporal Graph Contrastive Learning Network
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 14228-14239页
作者: Dai, Weihan He, Xiaoyu Geng, Xiulin Zhang, Shuai Gao, Ziheng Zhejiang Sci-Tech University School of Computer Science and Technology Hangzhou310018 China Hangzhou Dianzi University School of Communication Engineering Hangzhou310018 China Shanghai University School of Computer Engineering and Science Shanghai200444 China
There is a growing interest in using spatio-temporal graph networks to predict sea surface temperature (SST). Nevertheless, numerous existing methodologies struggle to accurately capture both local and global spatial ... 详细信息
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论
AI LipReader-Transcribing Speech from Lip Movements  6
AI LipReader-Transcribing Speech from Lip Movements
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Ajitha, D. Dutta, Disha Saha, Falguni Giri, Parus Kant, Rohan School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Software Systems Vellore India School of Computer Science and Engineering Vellore Institute of Technology Department of Database Systems Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Information Security Vellore India
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks... 详细信息
来源: 评论
Deepfake Detection: Emerging Techniques and Evolving Challenges  12
Deepfake Detection: Emerging Techniques and Evolving Challen...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Natarajan, Krishnaraj Mathur, Abeer Bhargava, Kshitiz Singh, Manvendra Tejpal, Moulik Department of Database Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a... 详细信息
来源: 评论
An IoMT data security framework with Hyperledger Fabric for smart cities
收藏 引用
International Journal of Information technology (Singapore) 2024年 第8期16卷 4875-4886页
作者: Samanta, Saikat Sarkar, Achyuth Kumari, Sangeeta Department of Computer Science and Engineering National Institute of Technology Arunachal Pradesh Jote India School of Computer Science Engineering and Technology Bennett University U.P. Greater Noida India
There is a high-risk privacy issue related to the Internet of Medical Things (IoMT) because of a lack of security in critical and sensitive information. We propose a framework for securing medical data in Healthcare 5... 详细信息
来源: 评论
Loop Subgraph-Level Greedy Mapping Algorithm for Grid Coarse-Grained Reconfigurable Array
收藏 引用
Tsinghua Science and technology 2023年 第2期28卷 330-343页
作者: Naijin Chen Fei Cheng Chenghao Han Jianhui Jiang Xiaoqing Wen School of Computer and Information Science Anhui Polytechnic UniversityWuhu 241000China School of Software Engineering Tongji UniversityShanghai 201804China Department of Computer Science and Networks Kyushu Institute of TechnologyFukuoka 820-8502Japan
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
JudPriNet: Video transition detection based on semantic relationship and Monte Carlo sampling
收藏 引用
Intelligent and Converged Networks 2024年 第2期5卷 134-146页
作者: Bo Ma Jinsong Wu Wei Qi Yan School of Engineering Computer and Mathematical SciencesAuckland University of TechnologyAuckland 1024New Zealand School of Artificial Intelligence Guilin University of Electronic TechnologyGuilin 540004Chinaand also with the Department of Electrical EngineeringUniversity of ChileSantiago 8010037Chile
Video understanding and content boundary detection are vital stages in video ***,previous content boundary detection methods require collecting information,including location,cast,action,and audio,and if any of these ... 详细信息
来源: 评论
Upper and Lower Bounds of the α-Universal Triple I Method for Unified Interval Implications
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1063-1088页
作者: Yiming Tang Jianwei Gao Yifan Huang School of Computer and Information Hefei University of TechnologyHefei230601China Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6R 2V4Canada
Theα-universal triple I(α-UTI)method is a recognized scheme in the field of fuzzy reasoning,whichwas proposed by our research group *** robustness of fuzzy reasoning determines the quality of reasoning algorithms to... 详细信息
来源: 评论