咨询与建议

限定检索结果

文献类型

  • 91,577 篇 会议
  • 46,233 篇 期刊文献
  • 931 册 图书
  • 2 篇 科技报告

馆藏范围

  • 138,743 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 83,197 篇 工学
    • 53,016 篇 计算机科学与技术...
    • 43,524 篇 软件工程
    • 20,910 篇 信息与通信工程
    • 13,740 篇 控制科学与工程
    • 11,904 篇 电气工程
    • 11,900 篇 电子科学与技术(可...
    • 9,206 篇 生物工程
    • 7,017 篇 光学工程
    • 6,780 篇 机械工程
    • 6,514 篇 生物医学工程(可授...
    • 5,003 篇 仪器科学与技术
    • 4,916 篇 化学工程与技术
    • 4,688 篇 动力工程及工程热...
    • 3,550 篇 材料科学与工程(可...
    • 3,150 篇 交通运输工程
    • 3,040 篇 网络空间安全
    • 2,991 篇 安全科学与工程
  • 46,405 篇 理学
    • 23,029 篇 数学
    • 15,107 篇 物理学
    • 10,291 篇 生物学
    • 7,643 篇 统计学(可授理学、...
    • 5,233 篇 系统科学
    • 5,176 篇 化学
  • 21,303 篇 管理学
    • 13,648 篇 管理科学与工程(可...
    • 8,523 篇 图书情报与档案管...
    • 5,673 篇 工商管理
  • 6,183 篇 医学
    • 5,048 篇 临床医学
    • 4,539 篇 基础医学(可授医学...
    • 2,796 篇 药学(可授医学、理...
  • 3,422 篇 法学
    • 2,806 篇 社会学
  • 2,304 篇 经济学
  • 1,658 篇 农学
  • 1,276 篇 教育学
  • 592 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 11 篇 哲学
  • 7 篇 历史学

主题

  • 3,501 篇 accuracy
  • 3,481 篇 feature extracti...
  • 3,030 篇 deep learning
  • 2,993 篇 computational mo...
  • 2,977 篇 training
  • 2,337 篇 machine learning
  • 2,157 篇 computer science
  • 2,029 篇 optimization
  • 1,874 篇 predictive model...
  • 1,572 篇 neural networks
  • 1,570 篇 semantics
  • 1,535 篇 real-time system...
  • 1,519 篇 internet of thin...
  • 1,487 篇 data models
  • 1,475 篇 support vector m...
  • 1,446 篇 data mining
  • 1,409 篇 convolutional ne...
  • 1,216 篇 wireless sensor ...
  • 1,192 篇 artificial intel...
  • 1,143 篇 robustness

机构

  • 3,275 篇 school of electr...
  • 2,437 篇 school of comput...
  • 1,523 篇 school of comput...
  • 1,338 篇 school of comput...
  • 1,080 篇 cavendish labora...
  • 994 篇 department of ph...
  • 965 篇 school of comput...
  • 942 篇 physikalisches i...
  • 920 篇 oliver lodge lab...
  • 844 篇 university of ch...
  • 679 篇 school of comput...
  • 616 篇 school of electr...
  • 553 篇 chitkara univers...
  • 534 篇 school of comput...
  • 534 篇 horia hulubei na...
  • 527 篇 school of comput...
  • 524 篇 school of physic...
  • 518 篇 department of ph...
  • 515 篇 fakultät physik ...
  • 513 篇 school of physic...

作者

  • 280 篇 niyato dusit
  • 271 篇 a. gomes
  • 256 篇 barter w.
  • 252 篇 c. alexa
  • 250 篇 j. m. izen
  • 244 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 c. amelung
  • 240 篇 d. calvet
  • 236 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 212 篇 bencivenni g.

语言

  • 131,149 篇 英文
  • 5,229 篇 其他
  • 2,315 篇 中文
  • 138 篇 日文
  • 16 篇 德文
  • 16 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Engineering and Technology"
138743 条 记 录,以下是351-360 订阅
排序:
E-SWAN:Efficient Sliding Window Analysis Network for Real-Time Speech Steganography Detection
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4797-4820页
作者: Kening Wang Feipeng Gao Jie Yang Hao Zhang School of Engineering and Technology Jiyang College of Zhejiang A & F UniversityZhuji311800China College of Mathematics and Computer Science Zhejiang A & F UniversityHangzhou311300China
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant c... 详细信息
来源: 评论
Global Color-Aware Arbitrary Style Transfer with Discrete Wavelet Transform  20th
Global Color-Aware Arbitrary Style Transfer with Discrete W...
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024
作者: Chen, Bochao Tan, Junhao Li, Xiaoqiang Pei, Songwen School of Computer Engineering and Science Shanghai University Shanghai200444 China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China
The purpose of image arbitrary style transfer is to apply a given artistic or photorealistic style to a target content image. While existing methods can effectively transfer style information, the variability in color... 详细信息
来源: 评论
Automatic Positioning of Intelligent Mobile Robot Based on Improved Front-End Scanning Matching
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 559-572页
作者: Wang, Hong Wang, Yi-Gui Zhang, Jie Department of Computer and Software Engineering Shandong College of Electronic Technology Jinan250200 China School of Computer Science and Technology Shandong Jianzhu University Jinan250101 China College of Agricultural Science and Technology Yana Royal Polytechnic University Chiang Mai50000 Thailand
Traditional autonomous navigation methods for mobile robots mainly rely on geometric feature-based LiDAR scan-matching algorithms, but in complex environments, this method is often affected due to the presence of movi... 详细信息
来源: 评论
An Improved Hybrid Deep Learning Approach for Security Requirements Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4041-4067页
作者: Shoaib Hassan QianmuLi Muhammad Zubair Rakan AAlsowail Muhammad Umair School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China Faculty of Information Technology and Computer Science University of Central PunjabLahore5400Pakistan Computer Skills Self-Development Skills DevelopmentDeanship of Common First YearKing Saud UniversityRiyadh11362Saudia Arabia
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ... 详细信息
来源: 评论
Behavioral insights into compression: a study of Move-to-Front-or-Middle deterministic online algorithm through sequence classification and characterization
收藏 引用
International Journal of Information technology (Singapore) 2025年 第1期17卷 189-203页
作者: Baisakh Mohapatra, Hitesh Guru, Abhishek Department of Computer Science and Engineering Sambalpur University Institute of Information Technology Sambalpur India Computer Science and Engineering GMR Institute of Technology Andhra Pradesh Rajam India School of Computer Engineering KIIT Deemed to Be University Bhubanseswar India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo... 详细信息
来源: 评论
Pruning techniques for artificial intelligence networks: a deeper look at their engineering design and bias: the first review of its kind
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9591-9665页
作者: Mohanty, Lopamudra Kumar, Ashish Mehta, Vivek Agarwal, Mohit Suri, Jasjit S. School of Computer Science Engineering and Technology Bennett University Gr. Noida India Department of Computer Science ABES Engineering College UP Ghaziabad India Stroke Diagnostic and Monitoring Division AtheroPoint™ RosevilleCA United States
Trained Artificial Intelligence (AI) models are challenging to install on edge devices as they are low in memory and computational power. Pruned AI (PAI) models are therefore needed with minimal degradation in perform... 详细信息
来源: 评论
An Encoding-Based Privacy-Preserving Security Control Strategy Under Stealthy Attacks
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 208-217页
作者: Liu, Jian Wang, Shuailong Zha, Lijuan Liu, Jinliang Tian, Engang Nanjing University of Finance and Economics School of Computer and Artificial Intelligence Nanjing210023 China Nanjing Forestry University School of Science Nanjing210037 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
This paper focuses on the privacy-preserving security control issue for cyber-physical systems (CPSs) via an encoding-decoding communication scheme (EDCS). To considerably contemplate the delayed data acquisition and ... 详细信息
来源: 评论
Sufficient learning: mining denser high-quality pixel-level labels for edge detection
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8245-8260页
作者: Chen, Xiaodiao Yang, Wenya Wu, Wen Tao, Xiuting Mao, Xiaoyang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China School of Media and Design Hangzhou Dianzi University Hangzhou310018 China Department of Computer Science and Engineering University of Yamanashi Kofu400-8511 Japan
The success of deep neural networks can largely be attributed to large-scale datasets with accurate annotations. In many practical applications, labels are annotated by multiple annotators, resulting in ambiguous labe... 详细信息
来源: 评论
Secured IIoT against trust deficit - A flexi cryptic approach
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5625-5652页
作者: Padmapriya, V.M. Thenmozhi, K. Hemalatha, M. Thanikaiselvan, V. Lakshmi, C. Chidambaram, Nithya Rengarajan, Amirtharajan Department of Computer Sciences Marquette University MilwaukeeWI53233 United States School of Electrical & Electronics Engineering SASTRA Deemed University Thanjavur613401 India Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah22254 Saudi Arabia School of Electronics Engineering Vellore Institute of Technology Vellore632014 India
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) ... 详细信息
来源: 评论
ResDecode: Accelerating Large Language Models Inference via Residual Decoding Heads
收藏 引用
Big Data Mining and Analytics 2025年 第4期8卷 779-793页
作者: Zeng, Ziqian Yu, Jiahong Pang, Qianshi Wang, Zihao Zhuang, Huiping Yu, Fan Shao, Hongen Zou, Xiaofeng Shien Ming Wu School of Intelligent Engineering South China University of Technology Guangzhou511442 China School of Computer Science and Engineering South China University of Technology Guangzhou510006 China School of Engineering The Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong Huawei Technologies Co. Ltd. Hangzhou310000 China School of Future Technology South China University of Technology Guangzhou511442 China
Large language Models (LLMs) have immense potential to enhance the capabilities of Cyber-Physical-Social Intelligence (CPSI) systems, enabling them to better engage with complex cyber, physical, and social environment... 详细信息
来源: 评论