咨询与建议

限定检索结果

文献类型

  • 10,345 篇 会议
  • 4,943 篇 期刊文献
  • 117 册 图书

馆藏范围

  • 15,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,407 篇 工学
    • 6,329 篇 计算机科学与技术...
    • 5,048 篇 软件工程
    • 3,124 篇 信息与通信工程
    • 1,494 篇 电子科学与技术(可...
    • 1,439 篇 控制科学与工程
    • 1,302 篇 电气工程
    • 1,088 篇 生物工程
    • 823 篇 光学工程
    • 703 篇 机械工程
    • 683 篇 仪器科学与技术
    • 660 篇 生物医学工程(可授...
    • 561 篇 动力工程及工程热...
    • 516 篇 网络空间安全
    • 385 篇 安全科学与工程
    • 382 篇 化学工程与技术
    • 370 篇 交通运输工程
  • 4,782 篇 理学
    • 2,429 篇 数学
    • 1,421 篇 物理学
    • 1,198 篇 生物学
    • 870 篇 统计学(可授理学、...
    • 457 篇 化学
    • 431 篇 系统科学
  • 2,480 篇 管理学
    • 1,629 篇 管理科学与工程(可...
    • 934 篇 图书情报与档案管...
    • 689 篇 工商管理
  • 820 篇 医学
    • 624 篇 临床医学
    • 566 篇 基础医学(可授医学...
    • 432 篇 公共卫生与预防医...
    • 299 篇 药学(可授医学、理...
  • 446 篇 法学
    • 371 篇 社会学
  • 262 篇 经济学
  • 166 篇 农学
  • 95 篇 教育学
  • 83 篇 文学
  • 47 篇 军事学
  • 30 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 451 篇 deep learning
  • 383 篇 internet of thin...
  • 377 篇 accuracy
  • 363 篇 feature extracti...
  • 307 篇 real-time system...
  • 260 篇 optimization
  • 244 篇 computational mo...
  • 221 篇 wireless communi...
  • 217 篇 training
  • 215 篇 wireless sensor ...
  • 202 篇 machine learning
  • 189 篇 computer science
  • 189 篇 simulation
  • 182 篇 support vector m...
  • 182 篇 predictive model...
  • 152 篇 image segmentati...
  • 151 篇 semantics
  • 147 篇 reliability
  • 144 篇 monitoring
  • 140 篇 neural networks

机构

  • 1,097 篇 school of comput...
  • 274 篇 school of comput...
  • 214 篇 school of inform...
  • 185 篇 maharishi school...
  • 147 篇 school of comput...
  • 130 篇 school of comput...
  • 121 篇 school of comput...
  • 98 篇 department of el...
  • 97 篇 university of sc...
  • 87 篇 school of inform...
  • 77 篇 school of comput...
  • 77 篇 school of inform...
  • 74 篇 school of commun...
  • 71 篇 school of comput...
  • 70 篇 jiangsu universi...
  • 65 篇 department of el...
  • 62 篇 hubei key labora...
  • 62 篇 school of commun...
  • 61 篇 centre of resear...
  • 57 篇 department of co...

作者

  • 75 篇 niyato dusit
  • 62 篇 yang yang
  • 57 篇 sakorn mekruksav...
  • 52 篇 guo hong
  • 46 篇 j. relin francis...
  • 40 篇 jinfu chen
  • 38 篇 luo xiong
  • 34 篇 srinivasan c.
  • 33 篇 mekruksavanich s...
  • 32 篇 liu yang
  • 31 篇 shi zhiguo
  • 31 篇 jitpattanakul an...
  • 30 篇 zhiguo shi
  • 30 篇 arjan durresi
  • 29 篇 wang lei
  • 29 篇 hnoohom narit
  • 28 篇 xianwei zhou
  • 28 篇 tao dacheng
  • 26 篇 raj j. relin fra...
  • 25 篇 zhang lei

语言

  • 14,563 篇 英文
  • 599 篇 其他
  • 239 篇 中文
  • 8 篇 法文
  • 6 篇 德文
  • 6 篇 日文
  • 5 篇 朝鲜文
  • 4 篇 荷兰文
检索条件"机构=School of Computer Science and Communication Engineering"
15405 条 记 录,以下是51-60 订阅
排序:
OLMS: A Flexible Online Learning Multi-Path Scheduling Framework
收藏 引用
IEEE Transactions on Network science and engineering 2025年 第3期12卷 2277-2291页
作者: Cai, Kechao Chen, Zhuoyue Zhang, Jinbei Lui, John C. S. Shenzhen Campus of Sun Yat-sen University School of Electronics and Communication Engineering Shenzhen510275 China The Chinese University of Hong Kong Department of Computer Science and Engineering Shatin Hong Kong
Over the past decade, there has been a tremendous surge in the inter-connectivity among hosts in networks. Many multi-path transport protocols, such as MPTCP, MPQUIC, and MPRDMA, have emerged to facilitate multi-path ... 详细信息
来源: 评论
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 2059-2073页
作者: Cai, Saihua Tang, Han Chen, Jinfu Lv, Tianxiang Zhao, Wenjun Huang, Chunlei Jiangsu University School of Computer Science and Communication Engineering Zhenjiang212013 China Jiangsu Provincial Key Laboratory of Industrial Cyberspace Security Technology Zhenjiang212013 China
Malicious attack has shown a rapid growth in recent years, it is very important to accurately detect malicious traffic to defend against malicious attacks. Compared with machine learning and deep learning technologies... 详细信息
来源: 评论
Zero-dynamics attack detection based on data association in feedback pathway
收藏 引用
Cognitive Robotics 2025年 5卷 126-139页
作者: Zhang, Zeyu Li, Hongran Todo, Yuki Division of Electrical Engineering and Computer Science Kanazawa University Ishikawa Kanazawa9201192 Japan School of Computer Engineering Jiangsu Ocean University Jiangsu Lianyungang222005 China Faculty of Electrical Information and Communication Engineering Kanazawa University Ishikawa Kanazawa9201192 Japan
This paper considers the security of non-minimum phase systems, a typical kind of cyber-physical systems. Non-minimum phase systems are characterized by unstable zeros in their transfer functions, making them particul... 详细信息
来源: 评论
Fake News Detection Based on Cross-Modal Ambiguity Computation and Multi-Scale Feature Fusion
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2659-2675页
作者: Jianxiang Cao Jinyang Wu Wenqian Shang Chunhua Wang Kang Song Tong Yi Jiajun Cai Haibin Zhu State Key Laboratory of Media Convergence and Communication Communication University of ChinaBeijing100024China School of Computer Science and Engineering Guangxi Normal UniversityGuilin541004China Department of Computer Science Nipissing UniversityNorth BayON P1B 8L7Canada
With the rapid growth of socialmedia,the spread of fake news has become a growing problem,misleading the public and causing significant *** social media content is often composed of both images and text,the use of mul... 详细信息
来源: 评论
An Efficient Dialogue Policy Agent with Model-Based Causal Reinforcement Learning  31
An Efficient Dialogue Policy Agent with Model-Based Causal R...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Xu, Kai Wang, Zhenyu Zhao, Yangyang Fang, Bopeng School of Software Engineering South China University of Technology Guangdong China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Dialogue policy trains an agent to select dialogue actions frequently implemented via deep reinforcement learning (DRL). The model-based reinforcement methods built a world model to generate simulated data to alleviat... 详细信息
来源: 评论
Air quality and dust level monitoring systems in hospitals using IoT
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-18页
作者: Parkavi, A. Sowmya, B.J. Alex, Sini Anna Supreeth, S. Shruthi, G. Rohith, S. Chatterjee, Sudipta Lingaraj, K. Department of Computer Science and Engineering Ramaiah Institute of Technology Bengaluru560054 India Department of Artificial Intelligence and Data Science Ramaiah Institute of Technology Bengaluru560054 India Ramaiah Institute of Technology Bengaluru560054 India School of Computer Science and Engineering REVA University Bengaluru560064 India Department of Electronics and Communication Engineering Nagarjuna College of Engineering and Technology Bengaluru562164 India Department of Electronics and Communication Engineering Brainware University Barasat West Bengal Kolkata700125 India Department of Computer Science and Engineering Rao Bahadur Y. Mahabaleswarappa Engineering College Bellary583104 India
This system provides a comprehensive overview of hospital environments by tracking air quality, dust, temperature, and humidity simultaneously, offering a more complete picture of indoor conditions than systems that f... 详细信息
来源: 评论
A Lightweight Convolutional Neural Network with Squeeze and Excitation Module for Security Authentication Using Wireless Channel
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2025-2040页
作者: Xiaoying Qiu Xiaoyu Ma Guangxu Zhao Jinwei Yu Wenbao Jiang Zhaozhong Guo Maozhi Xu College of Computer Science Beijing Information Science and Technology UniversityBeijing100192China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China School of Mathematical Sciences Peking UniversityBeijing100871China
Physical layer authentication(PLA)in the context of the Internet of Things(IoT)has gained significant *** with traditional encryption and blockchain technologies,PLA provides a more computationally efficient alternati... 详细信息
来源: 评论
Breaking the Interference and Fading Gridlock in Backscatter communications: State-of-the-Art, Design Challenges, and Future Directions
收藏 引用
IEEE communications Surveys and Tutorials 2025年 第2期27卷 870-911页
作者: Gu, Bowen Li, Dong Ding, Haiyang Wang, Gongpu Tellambura, Chintha Macau University of Science and Technology School of Computer Science and Engineering China National University of Defense Technology College of Information and Communication Wuhan430019 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada
As the Internet of Things (IoT) advances by leaps and bounds, a multitude of devices are becoming interconnected, marking the onset of an era where everything is connected. While this growth opens up opportunities for... 详细信息
来源: 评论
Quantifying Racial Segregation Through Continuous-Time Quantum Walks  27th
Quantifying Racial Segregation Through Continuous-Time Quant...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Jiang, Yutong Wu, Xing Wang, Jianjia School of Computer Engineering and Science Shanghai University Shanghai China Engineering and Science Shanghai Institute for Advanced Communication and Data Science School of Computer Shanghai University Shanghai China Xi’an Jiaotong-Liverpool University Suzhou215123 China
With the development of cities, racial segregation is one of the reasons for social inequality on a large scale, it is also a major factor affecting economic development. However, racial segregation has received compa... 详细信息
来源: 评论
DeepFakeGuard: Safeguarding Digital Platforms Against Fake Profiles Using AI  4
DeepFakeGuard: Safeguarding Digital Platforms Against Fake P...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Swarna Sudha, M. Manjula, S. Bharathi, Indira Krishnasamy, Valarmathi Vijayalakshmi, K. Ramco Institute of Technology Department of Computer Science and Engineering Rajapalayam India School of Computer Science and Engineering Vellore Institute of Technology Chennai India PSR Engineering College Department of Electronics and Communication Engineering Sivakasi India
This research introduces DeepFakeGuard, a hybrid deep learning framework designed to detect fake profiles on social media platforms, addressing the growing threat of fraudulent accounts online. DeepFakeGuard integrate... 详细信息
来源: 评论