咨询与建议

限定检索结果

文献类型

  • 141,479 篇 会议
  • 70,388 篇 期刊文献
  • 1,416 册 图书

馆藏范围

  • 213,282 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 129,311 篇 工学
    • 86,253 篇 计算机科学与技术...
    • 70,310 篇 软件工程
    • 31,541 篇 信息与通信工程
    • 20,943 篇 控制科学与工程
    • 16,576 篇 电气工程
    • 16,086 篇 电子科学与技术(可...
    • 14,811 篇 生物工程
    • 10,432 篇 生物医学工程(可授...
    • 10,356 篇 光学工程
    • 9,783 篇 机械工程
    • 7,106 篇 化学工程与技术
    • 7,034 篇 仪器科学与技术
    • 6,493 篇 动力工程及工程热...
    • 5,014 篇 材料科学与工程(可...
    • 4,778 篇 交通运输工程
    • 4,744 篇 网络空间安全
    • 4,691 篇 安全科学与工程
  • 70,824 篇 理学
    • 35,915 篇 数学
    • 21,650 篇 物理学
    • 16,607 篇 生物学
    • 11,833 篇 统计学(可授理学、...
    • 7,748 篇 系统科学
    • 7,719 篇 化学
  • 33,635 篇 管理学
    • 20,994 篇 管理科学与工程(可...
    • 13,972 篇 图书情报与档案管...
    • 9,080 篇 工商管理
  • 10,091 篇 医学
    • 8,167 篇 临床医学
    • 7,235 篇 基础医学(可授医学...
    • 4,447 篇 药学(可授医学、理...
  • 5,720 篇 法学
    • 4,776 篇 社会学
  • 3,492 篇 经济学
  • 2,529 篇 农学
  • 2,212 篇 教育学
  • 1,005 篇 文学
  • 460 篇 军事学
  • 355 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,146 篇 computer science
  • 5,440 篇 accuracy
  • 5,231 篇 feature extracti...
  • 4,807 篇 deep learning
  • 4,713 篇 computational mo...
  • 4,668 篇 training
  • 3,848 篇 machine learning
  • 3,027 篇 optimization
  • 2,951 篇 predictive model...
  • 2,834 篇 semantics
  • 2,624 篇 data models
  • 2,523 篇 real-time system...
  • 2,360 篇 neural networks
  • 2,336 篇 support vector m...
  • 2,323 篇 data mining
  • 2,314 篇 convolutional ne...
  • 2,102 篇 internet of thin...
  • 2,054 篇 artificial intel...
  • 1,893 篇 image segmentati...
  • 1,880 篇 educational inst...

机构

  • 2,488 篇 school of comput...
  • 2,226 篇 school of comput...
  • 2,087 篇 school of comput...
  • 1,831 篇 school of comput...
  • 1,524 篇 school of comput...
  • 1,501 篇 school of comput...
  • 1,369 篇 school of comput...
  • 1,339 篇 school of electr...
  • 1,265 篇 school of comput...
  • 1,077 篇 cavendish labora...
  • 1,032 篇 school of comput...
  • 981 篇 school of comput...
  • 974 篇 department of ph...
  • 915 篇 school of comput...
  • 883 篇 physikalisches i...
  • 876 篇 university of ch...
  • 870 篇 oliver lodge lab...
  • 564 篇 chitkara univers...
  • 545 篇 school of comput...
  • 542 篇 school of comput...

作者

  • 404 篇 niyato dusit
  • 268 篇 a. gomes
  • 262 篇 barter w.
  • 241 篇 c. alexa
  • 236 篇 j. m. izen
  • 235 篇 blake t.
  • 233 篇 s. chen
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 223 篇 bellee v.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 220 篇 brundu d.
  • 215 篇 bencivenni g.
  • 213 篇 bay a.
  • 211 篇 g. bella
  • 208 篇 j. strandberg
  • 208 篇 d. calvet
  • 208 篇 c. amelung

语言

  • 175,280 篇 英文
  • 34,987 篇 其他
  • 3,278 篇 中文
  • 183 篇 日文
  • 38 篇 朝鲜文
  • 34 篇 德文
  • 29 篇 法文
  • 16 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 4 篇 阿拉伯文
  • 3 篇 俄文
  • 2 篇 捷克文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Computer Engineering"
213283 条 记 录,以下是631-640 订阅
排序:
Efficient DDoS Detection in Software-Defined Networking: A Machine Learning Perspective  3
Efficient DDoS Detection in Software-Defined Networking: A M...
收藏 引用
3rd International Conference on Disruptive Technologies, ICDT 2025
作者: Ranjan, Alok Kumar Singh, Avtar School of Computer Science & Engineering Lovely Professional University Punjab Phagwara India School of Computer Science & Engineering Galgotias University UP India
DDoS attacks are among of the most dangerous forms of attack these days. They are the reason for many security issues in this era all around the globe, particularly in the landscape of SDN where core SDN controlllers ... 详细信息
来源: 评论
DMFCNN-HBO: deep maxout fusion convolutional neural network model enabled with honey badger optimization for DDoS attack detection
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第4期17卷 2347-2354页
作者: Rakshe, Dhananjay Shripad Jha, Sweta Bhaladhare, Pawan R. School of Computer Science and Engineering Sandip University Maharashtra Nashik India
In recent years, Distributed Denial of Service (DDoS) attacks have developed one of the greatest communal and disrupting threats to network security. These attacks flood focused systems with traffic, establishment the... 详细信息
来源: 评论
Towards Maximizing Semantic Coverage for Image-Text Retrieval
Towards Maximizing Semantic Coverage for Image-Text Retrieva...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Xu, Junhao Liu, Zheng Chen, Zhumin Shen, Fei School of Computer Science and Technology Shandong University China School of Computer Science and Technology Shandong University of Finance and Economics China School of Computer Science and Engineering Nanjing University of Science and Technology China
To establish semantic associations between images and texts, existing Image-Text Retrieval (ITR) methods primarily focus on fixed-scale fragments, which only identify explicit semantic categories. Consequently, semant... 详细信息
来源: 评论
Efficient CNN-Based Bone Fracture Detection in X-Ray Radiographs with MobileNetV2  2
Efficient CNN-Based Bone Fracture Detection in X-Ray Radiogr...
收藏 引用
2nd IEEE International Conference on Recent Advances in Information Technology for Sustainable Development, ICRAIS 2024
作者: Varun, V. Natarajan, Suresh Kumar Adithya, M. Nagatejas, P. Mithun Chavan, A. Moorthi Hosahalli, Nethra School of Computer Science and Engineering Ramanagara India
In this study, a deep learning-based approach for detecting bone fractures in X-ray images, utilizing a MobileNetV2 architecture combined with Convolutional Neural Networks (CNNs). Fractures are a prevalent musculoske... 详细信息
来源: 评论
CDTR: Semantic Alignment for Video Moment Retrieval Using Concept Decomposition Transformer  39
CDTR: Semantic Alignment for Video Moment Retrieval Using Co...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ran, Ran Wei, Jiwei Cai, Xiangyi Guan, Xiang Zou, Jie Yang, Yang Shen, Heng Tao School of Computer Science and Engineering University of Electronic Science and Technology of China China School of Computer Science and Technology Tongji University China
Video Moment Retrieval (VMR) involves locating specific moments within a video based on natural language queries. However, existing VMR methods that employ various strategies for cross-modal alignment still face chall...
来源: 评论
An Efficient Approach for VM and Database Segmentation of Cloud Resources Over Cloud Computing
收藏 引用
SN computer science 2024年 第8期5卷 977页
作者: Manoli, Sunil Metipatil, Prabhuraj Raghavendra Nayaka, P. School of Computer Science and Engineering REVA University Bangalore India
Virtual machine (VM) clusters are used in cloud computing models to safeguard resources from failure and provide redundancy. Tasks for cloud users are planned by choosing appropriate resources to carry out the work wi... 详细信息
来源: 评论
FLBC-IDS: a federated learning and blockchain-based intrusion detection system for secure IoT environments
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17229-17251页
作者: Govindaram, Anitha A, Jegatheesan Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Thandalam Chennai India
The development of the Internet of Things (IoT) in multiple sectors has led to substantial security issues due to its decentralized structure and resource limits. To solve these problems, this paper proposes a novel t... 详细信息
来源: 评论
Introduction
Signals and Communication Technology
收藏 引用
Signals and Communication Technology 2024年 Part F1492卷 3-17页
作者: Tian, Yu-Chu Gao, Jing School of Computer Science Queensland University of Technology BrisbaneQLD Australia College of Computer and Information Engineering Inner Mongolia Agricultural University Hohhot China
The main theme of this book is network analysis and architecture design for network planning. While there are various types of networks, this book specifically focuses on computer networks for data communication. Ther...
来源: 评论
Smart AI Voice Assistant through Generative Text Transformer and NLP Implementation in Python  4
Smart AI Voice Assistant through Generative Text Transformer...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Bajpai, Devesh Kiran, Mallela Uday Reddy, Busi Hemanth Natarajan, Suresh Kumar School of Computer Science and Engineering Ramanagara India
In our project, we employed Natural Language Processing (NLP), Artificial Intelligence (AI), Generative Text Transformer (GTT), and Speech Recognition technologies. Through the utilization of these advanced technologi... 详细信息
来源: 评论
Stacked autoencoder with weighted loss function for intrusion detection in IoT application
收藏 引用
Multimedia Tools and Applications 2024年 1-29页
作者: Gangula, Rekha Vutukuru, Murali Mohan Kumar, M. Ranjeeth Department of Computer Science and Engineering Vaagdevi Engineering College Telangana BollikuntaWarangal506005 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP Guntur522502 India School of Computer Science & amp Artificial Intelligence SR University Anantasagar Telangana Warangal506371 India
The fast increase of network traffic in recent times causes significant detection of intrusions in Internet of Things (IoT) environments. Currently, Deep Learning (DL) models play a crucial role in cyber security for ... 详细信息
来源: 评论