咨询与建议

限定检索结果

文献类型

  • 162,250 篇 会议
  • 89,591 篇 期刊文献
  • 1,640 册 图书
  • 1 篇 学位论文

馆藏范围

  • 253,482 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 157,292 篇 工学
    • 97,681 篇 计算机科学与技术...
    • 79,481 篇 软件工程
    • 38,322 篇 信息与通信工程
    • 24,996 篇 控制科学与工程
    • 22,254 篇 电子科学与技术(可...
    • 21,278 篇 电气工程
    • 15,977 篇 生物工程
    • 13,279 篇 机械工程
    • 13,176 篇 光学工程
    • 11,520 篇 生物医学工程(可授...
    • 10,817 篇 化学工程与技术
    • 10,074 篇 仪器科学与技术
    • 8,531 篇 动力工程及工程热...
    • 8,295 篇 材料科学与工程(可...
    • 5,473 篇 交通运输工程
    • 5,282 篇 安全科学与工程
    • 5,265 篇 网络空间安全
  • 89,342 篇 理学
    • 43,605 篇 数学
    • 30,455 篇 物理学
    • 18,079 篇 生物学
    • 13,930 篇 统计学(可授理学、...
    • 10,918 篇 化学
    • 9,450 篇 系统科学
  • 39,088 篇 管理学
    • 24,729 篇 管理科学与工程(可...
    • 15,855 篇 图书情报与档案管...
    • 10,163 篇 工商管理
  • 10,995 篇 医学
    • 9,105 篇 临床医学
    • 7,959 篇 基础医学(可授医学...
    • 4,875 篇 药学(可授医学、理...
  • 6,064 篇 法学
    • 4,900 篇 社会学
  • 4,068 篇 经济学
  • 3,355 篇 农学
  • 2,626 篇 教育学
  • 1,054 篇 文学
  • 721 篇 军事学
  • 483 篇 艺术学
  • 32 篇 哲学
  • 25 篇 历史学

主题

  • 6,327 篇 feature extracti...
  • 5,677 篇 accuracy
  • 5,029 篇 deep learning
  • 4,969 篇 training
  • 4,722 篇 computational mo...
  • 4,681 篇 computer science
  • 3,923 篇 machine learning
  • 3,372 篇 optimization
  • 3,073 篇 data mining
  • 3,004 篇 predictive model...
  • 2,878 篇 semantics
  • 2,685 篇 data models
  • 2,668 篇 support vector m...
  • 2,658 篇 neural networks
  • 2,507 篇 educational inst...
  • 2,493 篇 real-time system...
  • 2,464 篇 internet of thin...
  • 2,423 篇 convolutional ne...
  • 2,189 篇 artificial intel...
  • 2,167 篇 wireless sensor ...

机构

  • 2,477 篇 school of comput...
  • 1,858 篇 school of inform...
  • 1,549 篇 university of ch...
  • 1,507 篇 school of comput...
  • 1,333 篇 school of comput...
  • 1,052 篇 cavendish labora...
  • 1,032 篇 physikalisches i...
  • 973 篇 department of ph...
  • 943 篇 school of comput...
  • 851 篇 oliver lodge lab...
  • 774 篇 school of comput...
  • 617 篇 department of co...
  • 595 篇 school of inform...
  • 560 篇 school of comput...
  • 559 篇 chitkara univers...
  • 534 篇 school of inform...
  • 523 篇 infn laboratori ...
  • 521 篇 university of sc...
  • 511 篇 nikhef national ...
  • 497 篇 school of comput...

作者

  • 325 篇 niyato dusit
  • 303 篇 yang yang
  • 248 篇 barter w.
  • 235 篇 wang wei
  • 221 篇 s. chen
  • 217 篇 blake t.
  • 217 篇 a. gomes
  • 214 篇 bellee v.
  • 213 篇 bowcock t.j.v.
  • 209 篇 betancourt c.
  • 207 篇 borsato m.
  • 205 篇 brundu d.
  • 203 篇 liu yang
  • 199 篇 beiter a.
  • 198 篇 amato s.
  • 195 篇 y. li
  • 194 篇 c. alexa
  • 190 篇 boettcher t.
  • 188 篇 j. m. izen
  • 184 篇 c. amelung

语言

  • 234,393 篇 英文
  • 13,289 篇 其他
  • 5,457 篇 中文
  • 490 篇 日文
  • 42 篇 德文
  • 38 篇 法文
  • 21 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"机构=School of Computer Science Engineering and Information Technology"
253482 条 记 录,以下是131-140 订阅
排序:
A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR)for double auctions
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 116-125页
作者: Xuedan Jia Liangmin Wang Ke Cheng Pujie Jing Xiangmei Song School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang 212013China School of Cyber Science and Engineering Southeast UniversityNanjing 211102China School of Computer Science and Technology Xidian UniversityXi’an 710071China
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **... 详细信息
来源: 评论
Efficient Quantum Secure Vector Dominance and Its Applications in Computational Geometry
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2129-2143页
作者: Liu, Wenjie Su, Bingmei Sun, Feiyang Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China
Secure vector dominance is a key cryptographic primitive in secure computational geometry (SCG), determining the dominance relationship of vectors between two participants without revealing their private information. ... 详细信息
来源: 评论
An enhanced AMBTC for color image compression using color palette
收藏 引用
Multimedia Tools and Applications 2024年 第11期83卷 31783-31803页
作者: Xiong, Lizhi Zhang, Mengtao Yang, Ching-Nung Kim, Cheonshik School of Computer Science Nanjing University of Information Science and Technology Nanjing China Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan Department of Computer Engineering Sejong University Seoul Korea Republic of
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T... 详细信息
来源: 评论
Multiple-event-triggered adaptive fuzzy output-feedback control for MIMO uncertain nonlinear systems
收藏 引用
science China(Technological sciences) 2025年 第2期68卷 216-226页
作者: Shuai SUI Yu YANG Shaocheng TONG C.L.Philip CHEN School of Science Liaoning University of TechnologyJinzhou 121001China School of Computer Science and Engineering South China University of TechnologyGuangzhou 510006China
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering stud... 详细信息
来源: 评论
TSCompiler: efficient compilation framework for dynamic-shape models
收藏 引用
science China(information sciences) 2024年 第10期67卷 67-84页
作者: Xiang LUO Chen ZHANG Chenbo GENG Yanzhi YI Jiahui HU Renwei ZHANG Zhen ZHANG Gianpietro CONSOLARO Fan YANG Tun LU Ning GU Li SHANG School of Computer Science Fudan University School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University School of Computer Science and Technology Harbin Institute of Technology Huawei Technologies Co. Ltd. Huawei Paris Research Center School of Microelectronics Fudan University
Today's deep learning models face an increasing demand to handle dynamic shape tensors and computation whose shape information remains unknown at compile time and varies in a nearly infinite range at runtime. This... 详细信息
来源: 评论
MalFSM: Feature Subset Selection Method for Malware Family Classification
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 26-38页
作者: KONG Zixiao XUE Jingfeng WANG Yong ZHANG Qian HAN Weijie ZHU Yufen School of Computer Science and Technology Beijing Institute of Technology School of Space Information Space Engineering University
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion ... 详细信息
来源: 评论
TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2985-3004页
作者: Ming Liu Qichao Yang Wenqing Wang Shengli Liu School of Cyber Science and Technology Information Engineering UniversityZhengzhou450001China
The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable chall... 详细信息
来源: 评论
Data Secure Storage Mechanism for IIoT Based on Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4029-4048页
作者: Jin Wang Guoshu Huang R.Simon Sherratt Ding Huang Jia Ni School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Systems Engineering The University of ReadingReadingRG66AYUK School of Computer Nanjing University of Information Science and TechnologyNanjing210044China
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... 详细信息
来源: 评论
A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 617-633页
作者: Weiqi Zhang Zhenzhen Xie Akshita Maradapu Vera Venkata Sai Qasim Zia Zaobo He Guisheng Yin College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science and Technology Shandong UniversityQingdao 266237China Department of Computer Science Georgia State UniversityAtlantaGA 30303USA College of Information Science and Technology Jinan UniversityGuangzhou 510632China
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser... 详细信息
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论