咨询与建议

限定检索结果

文献类型

  • 92,655 篇 会议
  • 46,660 篇 期刊文献
  • 934 册 图书

馆藏范围

  • 140,249 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,067 篇 工学
    • 53,376 篇 计算机科学与技术...
    • 43,671 篇 软件工程
    • 20,971 篇 信息与通信工程
    • 13,905 篇 控制科学与工程
    • 12,020 篇 电子科学与技术(可...
    • 11,942 篇 电气工程
    • 9,214 篇 生物工程
    • 7,025 篇 光学工程
    • 6,829 篇 机械工程
    • 6,547 篇 生物医学工程(可授...
    • 5,013 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,677 篇 材料科学与工程(可...
    • 3,159 篇 交通运输工程
    • 3,065 篇 网络空间安全
    • 2,992 篇 安全科学与工程
  • 46,529 篇 理学
    • 23,091 篇 数学
    • 15,175 篇 物理学
    • 10,302 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,225 篇 系统科学
    • 5,194 篇 化学
  • 21,358 篇 管理学
    • 13,679 篇 管理科学与工程(可...
    • 8,554 篇 图书情报与档案管...
    • 5,693 篇 工商管理
  • 6,215 篇 医学
    • 5,080 篇 临床医学
    • 4,545 篇 基础医学(可授医学...
    • 2,794 篇 药学(可授医学、理...
  • 3,425 篇 法学
    • 2,810 篇 社会学
  • 2,307 篇 经济学
  • 1,666 篇 农学
  • 1,298 篇 教育学
  • 588 篇 文学
  • 329 篇 军事学
  • 248 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,635 篇 accuracy
  • 3,572 篇 feature extracti...
  • 3,130 篇 deep learning
  • 3,060 篇 computational mo...
  • 3,023 篇 training
  • 2,367 篇 machine learning
  • 2,155 篇 computer science
  • 2,090 篇 optimization
  • 1,935 篇 predictive model...
  • 1,617 篇 real-time system...
  • 1,578 篇 neural networks
  • 1,573 篇 semantics
  • 1,542 篇 internet of thin...
  • 1,539 篇 data models
  • 1,495 篇 support vector m...
  • 1,472 篇 convolutional ne...
  • 1,462 篇 data mining
  • 1,238 篇 artificial intel...
  • 1,225 篇 wireless sensor ...
  • 1,191 篇 robustness

机构

  • 3,282 篇 school of electr...
  • 2,473 篇 school of comput...
  • 1,531 篇 school of comput...
  • 1,370 篇 school of comput...
  • 1,085 篇 cavendish labora...
  • 1,000 篇 department of ph...
  • 985 篇 school of comput...
  • 948 篇 physikalisches i...
  • 921 篇 oliver lodge lab...
  • 856 篇 university of ch...
  • 683 篇 school of comput...
  • 621 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 531 篇 horia hulubei na...
  • 530 篇 school of comput...
  • 527 篇 fakultät physik ...
  • 521 篇 school of physic...
  • 520 篇 school of physic...
  • 514 篇 department of ph...

作者

  • 278 篇 niyato dusit
  • 268 篇 a. gomes
  • 264 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 c. amelung
  • 237 篇 blake t.
  • 236 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 228 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 215 篇 bencivenni g.

语言

  • 121,379 篇 英文
  • 16,502 篇 其他
  • 2,427 篇 中文
  • 138 篇 日文
  • 25 篇 德文
  • 22 篇 法文
  • 13 篇 斯洛文尼亚文
  • 11 篇 朝鲜文
  • 5 篇 土耳其文
  • 3 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computer Engineering and Technology"
140249 条 记 录,以下是4521-4530 订阅
排序:
PriFace: a privacy-preserving face recognition framework under untrusted server
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2967-2979页
作者: Zhao, Shan Zhang, Lefeng Xiong, Ping School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China Center for Cyber Security and Privacy School of Computer Science University of Technology Sydney Sydney Australia
Alongside the rapid development of artificial intelligence and mobile Internet, face recognition has gradually become a mainstream intelligent terminal authentication technology that is widely applied in security, fin... 详细信息
来源: 评论
Frequency Attacks Based on Invertible Neural Networks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 292-300页
作者: Shao, Ming-Wen Yang, Jian-Xin Meng, Ling-Zhuang Hu, Zhi-Yong China University of Petroleum School of Computer Science and Technology East China Qingdao266580 China China University of Petroleum College of Control Science and Engineering East China Qingdao266580 China
Adversarial attacks reveal the vulnerability of classifiers based on deep neural networks to well-designed perturbations. Most existing attack methods focus on adding perturbations directly to the pixel space. However... 详细信息
来源: 评论
Simulation of Social Media-Driven Bubble Formation in Financial Markets using an Agent-Based Model with Hierarchical Influence Network  36
Simulation of Social Media-Driven Bubble Formation in Financ...
收藏 引用
36th European Modeling and Simulation Symposium, EMSS 2024, Held at the 21st International Multidisciplinary Modeling and Simulation Multiconference, I3M 2024
作者: Bohorquez, Gonzalo Cartlidge, John School of Computer Science University of Bristol Bristol United Kingdom School of Engineering Mathematics and Technology University of Bristol Bristol United Kingdom
We propose that a tree-like hierarchical structure represents a simple and effective way to model the emergent behaviour of financial markets, especially markets where there exists a pronounced intersection between so... 详细信息
来源: 评论
Resilience-Centric Trust Evaluation in Cloud Computing: A Comparative Assessment of Cloud Trust Evaluation Methods Using the RAA Metric
Resilience-Centric Trust Evaluation in Cloud Computing: A Co...
收藏 引用
2024 International Conference on Smart Electronics and Communication Systems, ISENSE 2024
作者: John, Jomina John Singh, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India
In cloud computing environments, trust evaluation models are critical for assessing the reliability and security of cloud service providers. The accuracy of trust evaluations may be impacted by the failure of traditio... 详细信息
来源: 评论
ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography  48
ICStega: Image Captioning-based Semantically Controllable Li...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Wang, Xilong Wang, Yaofei Chen, Kejiang Ding, Jinyang Zhang, Weiming Yu, Nenghai University of Science and Technology of China School of Cyber Science and Technology China Hefei University of Technology School of Computer Science and Information Engineering China
Nowadays, social media has become the preferred communication platform for web users but brought security threats. Linguistic steganography hides secret data into text and sends it to the intended recipient to realize... 详细信息
来源: 评论
TE-waves in waveguide structures filled with graded dielectric media  25
TE-waves in waveguide structures filled with graded dielectr...
收藏 引用
25th International Conference on Electromagnetics in Advanced Applications, ICEAA 2024
作者: Dalarsson, Mariana School of Electrical Engineering and Computer Science KTH Royal Institute of Technology StockholmSE 100-44 Sweden
Graded dielectric media composites, with negative-index materials (MM), are of interest for various applications such as microwave graded-index (GRIN) lenses [ 1,2], wideband THz filtering [3], and enhanced energy har... 详细信息
来源: 评论
Enhancing Network Security Against DDoS Attacks: An Analysis of OPNET Modelers  12
Enhancing Network Security Against DDoS Attacks: An Analysis...
收藏 引用
12th International Conference on System Modeling and Advancement in Research Trends, SMART 2023
作者: Agrawal, Atul Jain, Vishal Astya, Rani Computer Science & Engineering Sharda School of Engineering & Technology Sharda University UP Greater Noida India
DDoS attacks are becoming more prevalent, which poses serious problems for network performance and security. This investigation makes use of the OPNET Modeler to thoroughly analyze how DDoS attacks affect network perf... 详细信息
来源: 评论
AI-Driven Virtual Mock Interview Development  13
AI-Driven Virtual Mock Interview Development
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent Systems and 25th International Symposium on Advanced Intelligent Systems, SCIS and ISIS 2024
作者: Mishra, Prabhat Kumar Arulappan, Arun Kumar Ra, In-Ho Thanga Mariappan, L. Gina Rose, G. Lee, Young-Seok School of Computer Science Engineering and Information Systems Vit University Vellore India School of Computer and Software Kunsan National University Gunsan Korea Republic of Anna University Department of Computer Technology Chennai India
The integration of Artificial Intelligence (AI) into educational technologies marks a significant shift in learning methodologies and operational dynamics within educational institutions. At the forefront is an AI-dri... 详细信息
来源: 评论
Heart Disease Detection from Gene Expression Data Using Optimization Driven Deep Q-Network  10th
Heart Disease Detection from Gene Expression Data Using Opti...
收藏 引用
10th International Conference on Frontiers of Intelligent Computing: Theory and Applications, FICTA 2022
作者: Aher, Chetan Nimba Jena, Ajay Kumar School of Computer Engineering Kalinga Institute of Industrial Technology Deemed to be University Odisha Bhubaneshwar India Department of Computer Engineering AISSMS Institute of Information Technology Pune India
Heart disease is a clinical illness that is caused by structural and functional tissue dysfunction. According to the arena health company (WHO), heart disease is the leading cause of death worldwide, with a recent stu... 详细信息
来源: 评论
Saturation-tolerant prescribed control of MIMO nonlinear systems with actuator faults
收藏 引用
Journal of Automation and Intelligence 2025年 第1期4卷 10-20页
作者: Hao Lei Ruihang Ji Dongyu Li Shuzhi Sam Ge Electrical and Computer Engineering National University of SingaporeSingapore117583Singapore School of Cyber Science and Technology Beihang UniversityBeijing100191China
This paper addresses the tracking control problem of a class of multiple-input–multiple-output nonlinear systems subject to actuator *** a balance between input saturation and performance constraints,rather than cond... 详细信息
来源: 评论