咨询与建议

限定检索结果

文献类型

  • 50,716 篇 会议
  • 32,192 篇 期刊文献
  • 893 册 图书
  • 10 篇 学位论文

馆藏范围

  • 83,811 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52,790 篇 工学
    • 35,413 篇 计算机科学与技术...
    • 28,711 篇 软件工程
    • 13,174 篇 信息与通信工程
    • 8,613 篇 控制科学与工程
    • 6,564 篇 电气工程
    • 6,248 篇 电子科学与技术(可...
    • 5,703 篇 生物工程
    • 4,168 篇 机械工程
    • 3,885 篇 生物医学工程(可授...
    • 3,838 篇 光学工程
    • 2,967 篇 仪器科学与技术
    • 2,498 篇 化学工程与技术
    • 2,448 篇 动力工程及工程热...
    • 1,995 篇 交通运输工程
    • 1,887 篇 安全科学与工程
    • 1,755 篇 材料科学与工程(可...
    • 1,751 篇 网络空间安全
  • 28,460 篇 理学
    • 15,241 篇 数学
    • 7,931 篇 物理学
    • 6,427 篇 生物学
    • 4,971 篇 统计学(可授理学、...
    • 3,437 篇 系统科学
    • 2,680 篇 化学
  • 14,451 篇 管理学
    • 9,029 篇 管理科学与工程(可...
    • 5,993 篇 图书情报与档案管...
    • 3,950 篇 工商管理
  • 3,850 篇 医学
    • 3,161 篇 临床医学
    • 2,768 篇 基础医学(可授医学...
    • 1,653 篇 药学(可授医学、理...
  • 2,316 篇 法学
    • 1,903 篇 社会学
  • 1,506 篇 经济学
  • 987 篇 教育学
  • 934 篇 农学
  • 325 篇 文学
  • 232 篇 军事学
  • 185 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,941 篇 computer science
  • 1,837 篇 feature extracti...
  • 1,514 篇 deep learning
  • 1,465 篇 computational mo...
  • 1,423 篇 training
  • 1,413 篇 accuracy
  • 1,295 篇 machine learning
  • 1,103 篇 data mining
  • 1,072 篇 optimization
  • 991 篇 semantics
  • 909 篇 artificial intel...
  • 906 篇 educational inst...
  • 853 篇 predictive model...
  • 774 篇 neural networks
  • 758 篇 internet of thin...
  • 714 篇 support vector m...
  • 677 篇 wireless sensor ...
  • 638 篇 data models
  • 601 篇 security
  • 586 篇 image segmentati...

机构

  • 651 篇 school of comput...
  • 540 篇 school of comput...
  • 479 篇 maharishi school...
  • 476 篇 school of inform...
  • 406 篇 school of comput...
  • 275 篇 department of ph...
  • 264 篇 school of comput...
  • 257 篇 faculté des scie...
  • 251 篇 department of ph...
  • 237 篇 school of comput...
  • 225 篇 school of comput...
  • 224 篇 faculty of scien...
  • 219 篇 department of ph...
  • 216 篇 school of comput...
  • 215 篇 physics division...
  • 196 篇 department of ph...
  • 187 篇 departamento de ...
  • 180 篇 department of ph...
  • 176 篇 school of comput...
  • 162 篇 department for p...

作者

  • 274 篇 niyato dusit
  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 260 篇 g. spigo
  • 258 篇 h. a. gordon
  • 255 篇 f. siegert
  • 254 篇 a. c. könig
  • 249 篇 m. klein
  • 247 篇 r. ströhmer
  • 238 篇 y. tayalati
  • 237 篇 h. sakamoto
  • 214 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 199 篇 n. orlando
  • 192 篇 s. jin
  • 190 篇 d. guest

语言

  • 79,275 篇 英文
  • 3,105 篇 其他
  • 1,293 篇 中文
  • 169 篇 日文
  • 12 篇 德文
  • 10 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science Engineering and Information Systems"
83811 条 记 录,以下是51-60 订阅
排序:
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1149-1171页
作者: Xiang Zhang Shenyan Han Wenbin Huang Daoyong Fu School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Nanjing University of Information Science and TechnologyMinistry of EducationNanjing210044China
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ... 详细信息
来源: 评论
CBIR: a novel identification approach for college students in need based on consumer behavior psychology theory
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4663-4677页
作者: Liu, Xinze Liu, Shixi Hu, Xiaojing Zhang, Yudong Fang, Xianwen School of Computer and Information Engineering Chuzhou University Chuzhou239000 China School of Computer Science and Engineering Southeast University Nanjing210096 China School of Mathematics and Big Data Anhui University of Science and Technology Huainan232001 China
The accurate identification of students in need is crucial for governments and colleges to allocate resources more effectively and enhance social equity and educational fairness. Existing approaches to identifying stu... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV Networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
Scattering Medium Removal Using Adaptive Masks for Scatter in the Spatial Frequency Domain
收藏 引用
IEEE Access 2025年 13卷 72769-72777页
作者: Jeong, Jongpil Lee, Min-Chul Kyushu Institute of Technology Graduate School of Computer Science and Systems Engineering Iizuka Fukuoka820-8502 Japan
To address this issue, this paper presents an adaptive method for removing scattering media using a mask based on wireless communication fading models. We hypothesize a similarity between light propagation and wireles... 详细信息
来源: 评论
Scheduling Bi-Objective Lot-Streaming Hybrid Flow Shops with Consistent Sublots via an Enhanced Artificial Bee Colony Algorithm
收藏 引用
Complex System Modeling and Simulation 2025年 第1期5卷 46-67页
作者: Lu, Benxue Gao, Kaizhou Duan, Peiyong Slowik, Adam School of Computer Science Liaocheng University Liaocheng252000 China Macau Institute of Systems Engineering Macau University of Science and Technology Macau999078 China School of Information and Automation Engineering Qilu University of Technology Jinan250353 China Koszalin University of Technology Department of Electronics and Computer Science Koszalin75-453 Poland
This work addresses bi-objective hybrid flow shop scheduling problems considering consistent sublots (Bi-HFSP_CS). The objectives are to minimize the makespan and total energy consumption. First, the Bi-HFSP_CS is for... 详细信息
来源: 评论
Cardinality estimation for property graph queries with gated learning approach on the graph database
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9159-9183页
作者: He, Zhenzhen Yu, Jiong Du, Xusheng Guo, Binglei Li, Ziyang Li, Zhe School of Information Science and Engineering Xinjiang University Urumqi China School of Computer Engineering Hubei University of Arts and Science Xiangyang China School of Software Xinjiang University Urumqi China Department of Electronic and Information Engineering The Hong Kong Polytechnic University Hong Kong
With the increasing complexity of graph query processing tasks, it is difficult for users to obtain the accurate cardinality before or during the execution of query tasks. Accurate estimate query cardinality is crucia... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 357-384页
作者: Mohd Anjum Naoufel Kraiem Hong Min Ashit Kumar Dutta Yousef Ibrahim Daradkeh Department of Computer Engineering Aligarh Muslim UniversityAligarh202002India College of Computer Science King Khalid UniversityAbha61413Saudi Arabia School of Computing Gachon UniversitySeongnam13120Republic of Korea Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Engineering and Information College of Engineering in Wadi AlddawasirPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws... 详细信息
来源: 评论
A Frog-Shaped UWB MIMO Antenna Design for 5G
收藏 引用
Progress in Electromagnetics Research C 2025年 151卷 101-112页
作者: Yao, Shanhua Yang, Tianchu Qiu, Xiaorong Li, Xiang School of Electrical and Information Engineering Anhui University of Science and Technology Huainan232001 China School of Computer Science Huainan Normal University Huainan232001 China
In this paper, a frog-shaped ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna is proposed for 5G applications in the n77, n78, n79, and 6 GHz bands with a compact antenna structure of 31 × 55 &#... 详细信息
来源: 评论