咨询与建议

限定检索结果

文献类型

  • 12,846 篇 期刊文献
  • 10,679 篇 会议
  • 101 册 图书

馆藏范围

  • 23,625 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,925 篇 工学
    • 8,601 篇 计算机科学与技术...
    • 6,890 篇 软件工程
    • 3,068 篇 信息与通信工程
    • 2,352 篇 电子科学与技术(可...
    • 2,283 篇 电气工程
    • 1,981 篇 生物工程
    • 1,855 篇 光学工程
    • 1,846 篇 控制科学与工程
    • 1,696 篇 生物医学工程(可授...
    • 1,198 篇 化学工程与技术
    • 999 篇 机械工程
    • 916 篇 材料科学与工程(可...
    • 887 篇 仪器科学与技术
    • 691 篇 动力工程及工程热...
    • 433 篇 力学(可授工学、理...
    • 390 篇 土木工程
  • 10,311 篇 理学
    • 4,801 篇 物理学
    • 3,708 篇 数学
    • 2,375 篇 生物学
    • 1,420 篇 化学
    • 1,323 篇 统计学(可授理学、...
    • 683 篇 系统科学
  • 3,278 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,342 篇 图书情报与档案管...
    • 827 篇 工商管理
  • 1,772 篇 医学
    • 1,461 篇 临床医学
    • 1,200 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 515 篇 公共卫生与预防医...
  • 532 篇 法学
    • 416 篇 社会学
  • 356 篇 农学
  • 310 篇 经济学
  • 248 篇 教育学
  • 98 篇 文学
  • 56 篇 军事学
  • 36 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 481 篇 deep learning
  • 314 篇 machine learning
  • 293 篇 computer science
  • 286 篇 feature extracti...
  • 261 篇 training
  • 211 篇 image segmentati...
  • 204 篇 computational mo...
  • 200 篇 accuracy
  • 197 篇 semantics
  • 182 篇 optimization
  • 158 篇 neural networks
  • 158 篇 data mining
  • 152 篇 internet of thin...
  • 150 篇 reinforcement le...
  • 131 篇 magnetic resonan...
  • 128 篇 support vector m...
  • 128 篇 deep neural netw...
  • 126 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 217 篇 r. ströhmer
  • 217 篇 m. rijssenbeek
  • 213 篇 s. jin

语言

  • 21,706 篇 英文
  • 1,525 篇 其他
  • 387 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23626 条 记 录,以下是141-150 订阅
排序:
Adaptive bitwise division-based searching algorithm for batch verification  2022
Adaptive bitwise division-based searching algorithm for batc...
收藏 引用
9th international Conference on Wireless Communication and Sensor Networks, icWCSN 2022
作者: Xu, Gencheng Jin, Shiyu Tang, Kaicheng Zhou, Yimin School of Computer Science and Engineering University of Electronic Science and Technology of China China School of Cybersecurity Chengdu University of Information Technology China
With the development of multicore processor, parallel computation is adopted to accelerate computation for higher efficiency. In signature verification process, batch verification has a high efficiency due to its aggr... 详细信息
来源: 评论
Resisting Over-Smoothing in Graph Neural Networks via Dual-Dimensional Decoupling  24
Resisting Over-Smoothing in Graph Neural Networks via Dual-D...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Shen, Wei Ye, Mang Huang, Wenke National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Graph Neural Networks (GNNs) are widely employed to derive meaningful node representations from graphs. Despite their success, deep GNNs frequently grapple with the oversmoothing issue, where node representations beco... 详细信息
来源: 评论
Corrigendum to "Threat hunting for adversary impact inhibiting system recovery" [computers & Security, Volume 154, July 2025, 104464] (computers & Security (2025) 154, (S0167404825001531), (10.1016/***.2025.104464))
收藏 引用
computers and Security 2025年 156卷
作者: Alsharabi, Naif Bhardwaj, Akashdeep Ayaba, Abdulaziz Jadi, Amr College of Computer Science & Engineering University of Ha'il Ha'il Saudi Arabia Center for Cybersecurity School of Computer Science UPES Dehradun India
The authors regret an error in the Acknowledgment section of the article. The project number was incorrectly listed as: "This research has been funded by Scientific Research Deanship at University of Ha'il - ...
来源: 评论
Empowering Visible-Infrared Person Re-Identification with Large Foundation Models  38
Empowering Visible-Infrared Person Re-Identification with La...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Zhangyi Yang, Bin Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84275-84297页
作者: Feng, Sijia Zhao, Maochang Liu, Zhaobin Li, Yuanyu Tianjin public emergency early warning information release center Tianjin Meteorology Information Center Tianjin300074 China School of Information Science & amp Technology Dalian Maritime University Dalian116026 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro... 详细信息
来源: 评论
PKEST: Public-Key Encryption With Similarity Test for Medical Consortia Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 680-693页
作者: Chen, Junsong Zeng, Shengke Han, Song Yin, Jin Chen, Peng Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China Sichuan University West China Biomedical Big Data Center West China Hospital Chengdu610041 China
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo... 详细信息
来源: 评论
Harmonizing space–time dynamics for precision in human action recognition
收藏 引用
Multimedia Tools and Applications 2025年 第5期84卷 2805-2832页
作者: Majid, Abdul Wang, Yulin Ullah, Anwar Naiz, Fahim Zarar, Muhammad School of Computer Science Wuhan University Hubei Wuhan430072 China National Engineering Research Center for E-Leaning Central China Normal University Hubei Wuhan430072 China
Human action recognition (HAR) plays a vital role in various fields, including surveillance, healthcare, and human–computer interaction. Recognizing multi-actor actions in crowded scenarios poses a significant challe... 详细信息
来源: 评论
Building Holistic Situation Awareness through Large Language Models
Building Holistic Situation Awareness through Large Language...
收藏 引用
Conference on Cognitive and Computational Aspects of Situation Management, CogSIMA 2023
作者: McDaniel, Emma L. Ruvinsky, Alicia I. Georgia State University Department of Computer Science AtlantaGA United States US Army Engineer Research and Development Center Cybersecurity Engineering and Analysis Branch VicksburgMS United States
In order to design a system to support a users’ situation awareness as they navigate and execute in a complex domain, the information landscape for the domain must be defined. Such a landscape becomes critical for re... 详细信息
来源: 评论
Intelligent Predetermination of Generator Tripping Scheme: Knowledge Fusion-based Deep Reinforcement Learning Framework
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第1期10卷 66-75页
作者: Lingkang Zeng Wei Yao Ze Hu Hang Shuai Zhouping Li Jinyu Wen Shijie Cheng State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronics EngineeringHuazhong University of Science and TechnologyWuhan 430074China Dispatching and Control Center Central China Branch of State Grid Corporation of ChinaWuhan 430077China. Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ... 详细信息
来源: 评论