咨询与建议

限定检索结果

文献类型

  • 91,605 篇 会议
  • 47,143 篇 期刊文献
  • 924 册 图书
  • 2 篇 科技报告

馆藏范围

  • 139,674 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,071 篇 工学
    • 53,571 篇 计算机科学与技术...
    • 43,771 篇 软件工程
    • 21,233 篇 信息与通信工程
    • 13,968 篇 控制科学与工程
    • 12,387 篇 电气工程
    • 12,074 篇 电子科学与技术(可...
    • 9,226 篇 生物工程
    • 7,089 篇 光学工程
    • 6,911 篇 机械工程
    • 6,541 篇 生物医学工程(可授...
    • 5,049 篇 仪器科学与技术
    • 4,964 篇 化学工程与技术
    • 4,736 篇 动力工程及工程热...
    • 3,667 篇 材料科学与工程(可...
    • 3,214 篇 交通运输工程
    • 3,180 篇 网络空间安全
    • 3,035 篇 安全科学与工程
  • 46,841 篇 理学
    • 23,218 篇 数学
    • 15,299 篇 物理学
    • 10,357 篇 生物学
    • 7,716 篇 统计学(可授理学、...
    • 5,241 篇 系统科学
    • 5,239 篇 化学
  • 21,464 篇 管理学
    • 13,731 篇 管理科学与工程(可...
    • 8,625 篇 图书情报与档案管...
    • 5,690 篇 工商管理
  • 6,264 篇 医学
    • 5,091 篇 临床医学
    • 4,578 篇 基础医学(可授医学...
    • 2,802 篇 药学(可授医学、理...
  • 3,437 篇 法学
    • 2,813 篇 社会学
  • 2,319 篇 经济学
  • 1,668 篇 农学
  • 1,291 篇 教育学
  • 593 篇 文学
  • 329 篇 军事学
  • 246 篇 艺术学
  • 11 篇 哲学
  • 7 篇 历史学

主题

  • 3,513 篇 accuracy
  • 3,504 篇 feature extracti...
  • 3,088 篇 deep learning
  • 3,004 篇 computational mo...
  • 2,999 篇 training
  • 2,376 篇 machine learning
  • 2,157 篇 computer science
  • 2,040 篇 optimization
  • 1,889 篇 predictive model...
  • 1,586 篇 semantics
  • 1,581 篇 neural networks
  • 1,537 篇 real-time system...
  • 1,530 篇 internet of thin...
  • 1,490 篇 data models
  • 1,476 篇 support vector m...
  • 1,458 篇 data mining
  • 1,436 篇 convolutional ne...
  • 1,217 篇 wireless sensor ...
  • 1,212 篇 artificial intel...
  • 1,142 篇 robustness

机构

  • 3,275 篇 school of electr...
  • 2,443 篇 school of comput...
  • 1,525 篇 school of comput...
  • 1,353 篇 school of comput...
  • 1,083 篇 cavendish labora...
  • 996 篇 department of ph...
  • 968 篇 school of comput...
  • 947 篇 physikalisches i...
  • 921 篇 oliver lodge lab...
  • 846 篇 university of ch...
  • 683 篇 school of comput...
  • 615 篇 school of electr...
  • 555 篇 chitkara univers...
  • 535 篇 horia hulubei na...
  • 534 篇 school of comput...
  • 532 篇 school of comput...
  • 524 篇 school of physic...
  • 517 篇 department of ph...
  • 515 篇 school of physic...
  • 515 篇 fakultät physik ...

作者

  • 287 篇 niyato dusit
  • 269 篇 a. gomes
  • 258 篇 barter w.
  • 251 篇 c. alexa
  • 249 篇 j. m. izen
  • 244 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 c. amelung
  • 240 篇 d. calvet
  • 234 篇 s. chen
  • 233 篇 blake t.
  • 231 篇 beiter a.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 220 篇 boettcher t.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 131,939 篇 英文
  • 5,354 篇 其他
  • 2,316 篇 中文
  • 138 篇 日文
  • 16 篇 德文
  • 16 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Engineering and Technology"
139674 条 记 录,以下是421-430 订阅
排序:
An Improved Hybrid Deep Learning Approach for Security Requirements Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4041-4067页
作者: Shoaib Hassan QianmuLi Muhammad Zubair Rakan AAlsowail Muhammad Umair School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China Faculty of Information Technology and Computer Science University of Central PunjabLahore5400Pakistan Computer Skills Self-Development Skills DevelopmentDeanship of Common First YearKing Saud UniversityRiyadh11362Saudia Arabia
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ... 详细信息
来源: 评论
Behavioral insights into compression: a study of Move-to-Front-or-Middle deterministic online algorithm through sequence classification and characterization
收藏 引用
International Journal of Information technology (Singapore) 2025年 第1期17卷 189-203页
作者: Baisakh Mohapatra, Hitesh Guru, Abhishek Department of Computer Science and Engineering Sambalpur University Institute of Information Technology Sambalpur India Computer Science and Engineering GMR Institute of Technology Andhra Pradesh Rajam India School of Computer Engineering KIIT Deemed to Be University Bhubanseswar India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo... 详细信息
来源: 评论
Introduction to the Special Issue on Deep Learning for Robust Human Body Language Understanding
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2025年 第4期21卷 1-7页
作者: Guo, Dan McDaniel, Troy Wang, Shuhui Wang, Meng School of Computer and Information Hefei University of Technology Hefei China Department of Computer Science and Engineering Arizona State University TempeAZ United States Chinese Academy of Sciences Beijing China
来源: 评论
A Survey of Distributed Algorithms for Aggregative Games
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第5期12卷 859-871页
作者: Li, Huaqing Li, Jun Ran, Liang Zheng, Lifeng Huang, Tingwen College of Electronic and Information Engineering Southwest University Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Chongqing400715 China College of Computer Science and Engineering Chongqing University of Technology Chongqing400054 China School of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen518107 China
Game theory-based models and design tools have gained substantial prominence for controlling and optimizing behavior within distributed engineering systems due to the inherent distribution of decisions among individua... 详细信息
来源: 评论
Pruning techniques for artificial intelligence networks: a deeper look at their engineering design and bias: the first review of its kind
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9591-9665页
作者: Mohanty, Lopamudra Kumar, Ashish Mehta, Vivek Agarwal, Mohit Suri, Jasjit S. School of Computer Science Engineering and Technology Bennett University Gr. Noida India Department of Computer Science ABES Engineering College UP Ghaziabad India Stroke Diagnostic and Monitoring Division AtheroPoint™ RosevilleCA United States
Trained Artificial Intelligence (AI) models are challenging to install on edge devices as they are low in memory and computational power. Pruned AI (PAI) models are therefore needed with minimal degradation in perform... 详细信息
来源: 评论
An Encoding-Based Privacy-Preserving Security Control Strategy Under Stealthy Attacks
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 208-217页
作者: Liu, Jian Wang, Shuailong Zha, Lijuan Liu, Jinliang Tian, Engang Nanjing University of Finance and Economics School of Computer and Artificial Intelligence Nanjing210023 China Nanjing Forestry University School of Science Nanjing210037 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
This paper focuses on the privacy-preserving security control issue for cyber-physical systems (CPSs) via an encoding-decoding communication scheme (EDCS). To considerably contemplate the delayed data acquisition and ... 详细信息
来源: 评论
Sufficient learning: mining denser high-quality pixel-level labels for edge detection
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8245-8260页
作者: Chen, Xiaodiao Yang, Wenya Wu, Wen Tao, Xiuting Mao, Xiaoyang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China School of Media and Design Hangzhou Dianzi University Hangzhou310018 China Department of Computer Science and Engineering University of Yamanashi Kofu400-8511 Japan
The success of deep neural networks can largely be attributed to large-scale datasets with accurate annotations. In many practical applications, labels are annotated by multiple annotators, resulting in ambiguous labe... 详细信息
来源: 评论
Secured IIoT against trust deficit - A flexi cryptic approach
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5625-5652页
作者: Padmapriya, V.M. Thenmozhi, K. Hemalatha, M. Thanikaiselvan, V. Lakshmi, C. Chidambaram, Nithya Rengarajan, Amirtharajan Department of Computer Sciences Marquette University MilwaukeeWI53233 United States School of Electrical & Electronics Engineering SASTRA Deemed University Thanjavur613401 India Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah22254 Saudi Arabia School of Electronics Engineering Vellore Institute of Technology Vellore632014 India
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) ... 详细信息
来源: 评论
Diffusion Models Meet Network Management: Improving Traffic Matrix Analysis with Diffusion-Based Approach
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 1259-1275页
作者: Yuan, Xinyu Qiao, Yan Wei, Zhenchun Zhang, Zeyu Li, Minyue Zhao, Pei Hu, Rongyao Li, Wenjing Hefei University of Technology School of Computer Science and Information Engineering China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology China Macau University of Science and Technology Faculty of Information Technology China
Due to network operation and maintenance relying heavily on network traffic monitoring, traffic matrix analysis has been one of the most crucial issues for network management related tasks. However, it is challenging ... 详细信息
来源: 评论
ResDecode: Accelerating Large Language Models Inference via Residual Decoding Heads
收藏 引用
Big Data Mining and Analytics 2025年 第4期8卷 779-793页
作者: Zeng, Ziqian Yu, Jiahong Pang, Qianshi Wang, Zihao Zhuang, Huiping Yu, Fan Shao, Hongen Zou, Xiaofeng Shien Ming Wu School of Intelligent Engineering South China University of Technology Guangzhou 511442 China School of Computer Science and Engineering South China University of Technology Guangzhou 510006 China School of Engineering The Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong Huawei Technologies Co. Ltd. Hangzhou 310000 China School of Future Technology South China University of Technology Guangzhou 511442 China
Large language Models (LLMs) have immense potential to enhance the capabilities of Cyber-Physical-Social Intelligence (CPSI) systems, enabling them to better engage with complex cyber, physical, and social environment... 详细信息
来源: 评论