咨询与建议

限定检索结果

文献类型

  • 92,464 篇 会议
  • 46,662 篇 期刊文献
  • 937 册 图书
  • 2 篇 科技报告

馆藏范围

  • 140,065 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,123 篇 工学
    • 53,594 篇 计算机科学与技术...
    • 43,912 篇 软件工程
    • 21,060 篇 信息与通信工程
    • 13,958 篇 控制科学与工程
    • 11,994 篇 电气工程
    • 11,971 篇 电子科学与技术(可...
    • 9,232 篇 生物工程
    • 7,110 篇 光学工程
    • 6,835 篇 机械工程
    • 6,568 篇 生物医学工程(可授...
    • 5,030 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,581 篇 材料科学与工程(可...
    • 3,172 篇 交通运输工程
    • 3,072 篇 网络空间安全
    • 3,007 篇 安全科学与工程
  • 46,710 篇 理学
    • 23,170 篇 数学
    • 15,214 篇 物理学
    • 10,323 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,235 篇 系统科学
    • 5,191 篇 化学
  • 21,451 篇 管理学
    • 13,744 篇 管理科学与工程(可...
    • 8,581 篇 图书情报与档案管...
    • 5,725 篇 工商管理
  • 6,246 篇 医学
    • 5,109 篇 临床医学
    • 4,579 篇 基础医学(可授医学...
    • 2,792 篇 药学(可授医学、理...
  • 3,442 篇 法学
    • 2,819 篇 社会学
  • 2,313 篇 经济学
  • 1,674 篇 农学
  • 1,305 篇 教育学
  • 590 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,570 篇 accuracy
  • 3,525 篇 feature extracti...
  • 3,088 篇 deep learning
  • 3,027 篇 computational mo...
  • 3,018 篇 training
  • 2,353 篇 machine learning
  • 2,159 篇 computer science
  • 2,062 篇 optimization
  • 1,915 篇 predictive model...
  • 1,583 篇 semantics
  • 1,578 篇 neural networks
  • 1,566 篇 real-time system...
  • 1,517 篇 internet of thin...
  • 1,508 篇 data models
  • 1,487 篇 support vector m...
  • 1,466 篇 convolutional ne...
  • 1,465 篇 data mining
  • 1,223 篇 artificial intel...
  • 1,214 篇 wireless sensor ...
  • 1,159 篇 robustness

机构

  • 3,276 篇 school of electr...
  • 2,477 篇 school of comput...
  • 1,547 篇 school of comput...
  • 1,383 篇 school of comput...
  • 1,082 篇 cavendish labora...
  • 993 篇 department of ph...
  • 978 篇 school of comput...
  • 938 篇 physikalisches i...
  • 917 篇 oliver lodge lab...
  • 858 篇 university of ch...
  • 681 篇 school of comput...
  • 620 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 534 篇 school of comput...
  • 533 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 518 篇 school of physic...
  • 517 篇 fakultät physik ...
  • 516 篇 department of ph...

作者

  • 281 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 c. amelung
  • 238 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 210 篇 bencivenni g.

语言

  • 129,429 篇 英文
  • 8,215 篇 其他
  • 2,388 篇 中文
  • 138 篇 日文
  • 18 篇 德文
  • 14 篇 法文
  • 11 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
检索条件"机构=School of Computer Engineering and Technology"
140065 条 记 录,以下是4671-4680 订阅
排序:
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Virtual viewpoint reconstruction utilizing monocular images with complex backgrounds  4
Virtual viewpoint reconstruction utilizing monocular images ...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Li, Ling-Ling Wang, Tianchen Zhang, Huiling Zhao, Jian Xia, Jun School of Computer Engineering Nanjing Institute of technology No.1 Hongjing Road Jiangsu Nanjing211167 China School of Electronic Science and Engineering Southeast University Nanjing210096 China
In recent years, significant advancements have been made in the field of three-dimensional light field display, positioning it as one of the most promising display technologies. To enhance the effectiveness and realis... 详细信息
来源: 评论
Innovative Real Estate Management System: Artificial Intelligence-based Segregation  5
Innovative Real Estate Management System: Artificial Intelli...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Joshi, Kapil Sidhu, Kawerinder Singh Malik, Neeru Jadhav, Archana Saini, Dilipkumar Jang Bahadur Siddharth, Dhirendra Uttaranchal University Department of Computer Science & Engineering Uttarakhand Dehradun India Uttaranchal Institute of Management Uttaranchal University Uttarakhand Dehradun India Pimpri Chinchwad University School of Engineering & Technology Maharashtra Pune India Pimpri Chinchwad University School of Engineering and Technology India Department of Computer Science and Engineering Bangalore560 068 India Galgotias University Computer Science and Engineering Greater Noida India
Information technology has grown very fast and has led to a lot of changes in the property industry, thus demanding businesses to enhance their operational standards. This research study analyses how an advanced Real ... 详细信息
来源: 评论
Evaluating Self-Supervised Learning Models for Multi-Label Pathology Detection: A Benchmark Against Supervised Learning  2
Evaluating Self-Supervised Learning Models for Multi-Label P...
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Agarwal, Nidhi Pooja Kumar, Nitish Anushka Garg, Yashica Department of Computer Science Engineering Galgotias University Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Information Technology Bharati Vidyapeeth College of Engineering New Delhi India Department of Computer Science and Engineering Indira Gandhi Delhi Technical University for Women New Delhi India
The analysis and objective of the current work is to check the performance of SSL Models in multi-label classification on the available dataset of NIH Chest X-ray images which is a large-scale medical imaging dataset.... 详细信息
来源: 评论
Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks  12
Adversarial Machine Learning for Detecting Advanced Threats ...
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Ahmad, Hafiz Bilal Gao, HaiChang Latif, Naila Aziiz, Abdul Auraangzeb, Muhammad Khan, Muhammad Tanveer School of Computer Science and Technology Xidian University Shaanxi 710071 China School of Telecommunications and Engineering Xidian University Shaanxi 710071 China School of Computer Science and Engineering Southeast University Nanjing China School of Electrical Engineering Southeast University Nanjing China School of Software Northwestern Polytechnical University Xi'an China
Inspired by the notorious StuxNet malware, this paper presents a unique and resilient architecture to address the imminent issue of identifying advanced threats within critical infrastructure networks. We use adversar... 详细信息
来源: 评论
Sensitive Information Protection Model Based on Bayesian Game
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 883-898页
作者: Yuzhen Liu Zhe Liu Xiaoliang Wang Qing Yang Guocai Zuo Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan411201China College of computer and information engineering Hunan University of Technology and BusinessChangshaChina School of Computer Science and Information Engineering Guangzhou Maritime UniversityGuangzhouChina Hunan Software Vocational and Technical University XiangtanChina School of Engineering and IT University of New South WalesNSWAustralia
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *... 详细信息
来源: 评论
DoS Attack Detection Based on Deep Factorization Machine in SDN
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1727-1742页
作者: Jing Wang Xiangyu Lei Qisheng Jiang Osama Alfarraj Amr Tolba Gwang-jun Kim School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Engineering Chonnam National UniversityGwangju61186Korea
Software-Defined Network(SDN)decouples the control plane of network devices from the data *** alleviating the problems presented in traditional network architectures,it also brings potential security risks,particularl... 详细信息
来源: 评论
Enhancement of High Angular Resolution Diffusion-Weighted Imaging Through Parallel Imaging and Motion Correction  5th
Enhancement of High Angular Resolution Diffusion-Weighted Im...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Sandhya, Prajapati Sreejith, V. Alam, Intekhab Haripriya Department of Electrical Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India
Excessive Angular decision Diffusion-Weighted Imaging (HARDI) is an effective imaging modality that produces high decision pictures of fiber tracts within the brain. Reconstruction of those pictures calls for a huge q... 详细信息
来源: 评论
Improved Electro Search Algorithm with Intelligent Controller Control System:ESPID Algorithm
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 2555-2572页
作者: Inayet Hakki Cizmeci Adem Alpaslan Altun Akseki Vocational High School Computer Technologies Department Alanya Alaaddin Keykubat UniversityAntalya07425Turkey Computer Engineering Department Selcuk UniversityFaculty of TechnologyKonya42100Turkey
Studies have established that hybrid models outperform single *** particle swarm algorithm(PSO)-based PID(proportional-integral-derivative)controller control system is used in this study to determine the parameters th... 详细信息
来源: 评论
Cross-guided Cross-modal Feature Fusion Network for RGB-D Salient Object Detection  8
Cross-guided Cross-modal Feature Fusion Network for RGB-D Sa...
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Sun, Chenwang Zhang, Mingqian Shanghai Institute of Technology School of Computer Science and Information Engineering Shang Hai China Shanghai Institute of Technology School of Mechanical Engineering Shang Hai China
RGB-D salient object detection has been one of the hottest research topics in the field of computer vision in recent years. The research in this field aims to achieve automatic detection and segmentation of salient ta... 详细信息
来源: 评论