咨询与建议

限定检索结果

文献类型

  • 12,729 篇 期刊文献
  • 10,665 篇 会议
  • 101 册 图书

馆藏范围

  • 23,494 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,827 篇 工学
    • 8,527 篇 计算机科学与技术...
    • 6,901 篇 软件工程
    • 3,047 篇 信息与通信工程
    • 2,330 篇 电子科学与技术(可...
    • 2,262 篇 电气工程
    • 1,966 篇 生物工程
    • 1,862 篇 光学工程
    • 1,780 篇 控制科学与工程
    • 1,690 篇 生物医学工程(可授...
    • 1,189 篇 化学工程与技术
    • 996 篇 机械工程
    • 898 篇 材料科学与工程(可...
    • 890 篇 仪器科学与技术
    • 687 篇 动力工程及工程热...
    • 431 篇 力学(可授工学、理...
    • 398 篇 土木工程
  • 10,274 篇 理学
    • 4,791 篇 物理学
    • 3,703 篇 数学
    • 2,360 篇 生物学
    • 1,399 篇 化学
    • 1,324 篇 统计学(可授理学、...
    • 681 篇 系统科学
  • 3,279 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,348 篇 图书情报与档案管...
    • 828 篇 工商管理
  • 1,744 篇 医学
    • 1,444 篇 临床医学
    • 1,189 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 517 篇 公共卫生与预防医...
  • 536 篇 法学
    • 420 篇 社会学
  • 353 篇 农学
  • 312 篇 经济学
  • 248 篇 教育学
  • 97 篇 文学
  • 56 篇 军事学
  • 35 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 475 篇 deep learning
  • 303 篇 machine learning
  • 292 篇 computer science
  • 281 篇 feature extracti...
  • 255 篇 training
  • 217 篇 image segmentati...
  • 209 篇 computational mo...
  • 196 篇 accuracy
  • 193 篇 semantics
  • 183 篇 optimization
  • 160 篇 data mining
  • 159 篇 neural networks
  • 151 篇 internet of thin...
  • 149 篇 reinforcement le...
  • 128 篇 support vector m...
  • 128 篇 magnetic resonan...
  • 127 篇 deep neural netw...
  • 124 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 218 篇 r. ströhmer
  • 216 篇 m. rijssenbeek
  • 212 篇 s. jin

语言

  • 21,656 篇 英文
  • 1,438 篇 其他
  • 384 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23495 条 记 录,以下是241-250 订阅
排序:
Cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify Cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in Cyber Security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
A Comprehensive Study on the Role of Artificial Intelligence in Animal Husbandry
A Comprehensive Study on the Role of Artificial Intelligence...
收藏 引用
2023 Intelligent Computing and Control for engineering and Business Systems, ICCEBS 2023
作者: Surya Deveswar Reddy, Kovvuri Uday Shaik, Ayesha Balasundaram, A. Nivedita, M. Ram Kakarla, Lakshmi Sai Nithin, Mattapally Sai School of Computer Science and Engineering Vellore Institute of Technology Chennai Chennai India School of Computer Science and Engineering Vellore Institute of Technology Center for Cyber Physical Systems Chennai India
Distinguishing the breeds of animals is one of the major examination areas in animal welfare. Recognition of animal breeds demands numerous determining elements which are necessary to be explored and following classif... 详细信息
来源: 评论
Machine learning-aided scoring of synthesis difficulties for designer chromosomes
收藏 引用
science China(Life sciences) 2023年 第7期66卷 1615-1625页
作者: Yan Zheng Kai Song Ze-Xiong Xie Ming-Zhe Han Fei Guo Ying-Jin Yuan Frontiers Science Center for Synthetic Biology and Key Laboratory of Systems Bioengineering Ministry of EducationTianjin UniversityTianjin300072China School of Chemical Engineering and Technology Tianjin UniversityTianjin300072China School of Computer Science and Engineering Central South UniversityChangsha410083China
Designer chromosomes are artificially synthesized ***,these chromosomes have numerous applications ranging from medical research to the development of ***,some chromosome fragments can interfere with the chemical synt... 详细信息
来源: 评论
Study on Method of Bearing Fault Detection Based on Vibration Signal Analysis
收藏 引用
engineering Letters 2023年 第3期31卷 1009-1015页
作者: Yang, Guang Liu, Xinrong Engineering Training Center Yantai University Yantai264005 China School of Computer Science and Technology Shandong Technology and Business University Yantai264005 China
This paper introduces a complete method for bearing fault detection. By analyzing the vibration signal when a fault occurs, the type of fault can be detected. The number of high-frequency intrinsic mode functions (IMF... 详细信息
来源: 评论
CHART:Intelligent Crime Hotspot Detection and Real-Time Tracking Using Machine Learning
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4171-4194页
作者: Rashid Ahmad Asif Nawaz Ghulam Mustafa Tariq Ali Mehdi Tlija Mohammed AEl-Meligy Zohair Ahmed University Institute of Information Technology PMAS Arid Agriculture UniversityRawalpindi46000Pakistan Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia Jadara University Research Center Jadara UniversityIrbid21110Jordan Applied Science Research Center Applied Science Private UniversityAmman11931Jordan School of Computer Science and Engineering Central South UniversityChangsha410083China
Crime hotspot detection is essential for law enforcement agencies to allocate resources effectively,predict potential criminal activities,and ensure public *** methods of crime analysis often rely on manual,time-consu... 详细信息
来源: 评论
Strategies to Improve LoRaWAN Performance in Multi Communication Use Listen Before Talk  12
Strategies to Improve LoRaWAN Performance in Multi Communica...
收藏 引用
12th Electrical Power, Electronics, Communications, Controls and Informatics Seminar, EECCIS 2024
作者: Adi, Puput Dani Prasetyo Maulana, Fairuz Iqbal Purwandoko, Pradeka Brilyan Adiprabowo, Tjahjo Maulana, Yudi Yulius Prasetyo, Sofyan Mufti Wahyu, Yuyu Satyawan, Arief Suryadi Yasir, Muhammad Research Center for Telecommunication BRIN Bandung Indonesia Bina Nusantara University Computer Science Department School of Computer Science Jakarta Indonesia Research Center for Appropriate Technology BRIN Subang Indonesia Research Center for Artificial Intelligence and Cybersecurity BRIN Bandung Indonesia Institut Teknologi dan Bisnis Nobel Department of System and Information System Makassar Indonesia
LoRaWAN (Long Range Wide Area Network) is a wireless communication technology widely used in intelligent transportation and supply chain sectors. Despite its advantages, such as wide range and low power consumption, L... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Nur Siddiqi, Hafied Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Research Institute for Future Media Computing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Improved Manta Ray Foraging Optimizer-based SVM for Feature Selection Problems:A Medical Case Study
收藏 引用
Journal of Bionic engineering 2024年 第1期21卷 409-425页
作者: Adel Got Djaafar Zouache Abdelouahab Moussaoui Laith Abualigah Ahmed Alsayat Faculty of informatics University of Science and Technology Houari BoumedieneAlgiersAlgeria LRIA Laboratory University of Science and Technology Houari BoumedieneAlgiersAlgeria Computer Science Department University of Mohamed El Bachir El IbrahimiBordj Bou ArreridjAlgeria Computer Science Department University of Ferhat AbbasSetifAlgeria Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl al-Bayt UniversityMafraq 25113Jordan Department of Computer Science College of Computer and Information SciencesJouf UniversityJoufSaudi Arabia Department of Electrical and Computer Engineering Lebanese American University13-5053ByblosLebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman 19328Jordan MEU Research Unit Middle East UniversityAmman 11831Jordan Applied science research center Applied science private universityAmman 11931Jordan School of Computer Sciences Universiti Sains Malaysia11800 PenangMalaysia School of Engineering and Technology Sunway University Malaysia27500 Petaling JayaMalaysia
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these paramete... 详细信息
来源: 评论
Simulation extractable SNARKs based on target linearly collision-resistant oracle
收藏 引用
science China(Technological sciences) 2024年 第9期67卷 2853-2866页
作者: WANG LiGuan LI Yuan ZHANG ShuangJun CAI DongLiang KAN HaiBin Shanghai Key Laboratory of Intelligent Information Processing School of Computer ScienceFudan UniversityShanghai 200433China Shanghai Engineering Research Center of Blockchain Shanghai 200433China Yiwu Research Institute of Fudan University Yiwu 322000China
The famous zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARK) was proposed by Groth in ***, the construction is based on quadratic arithmetic programs which are highly efficient concerning the pr... 详细信息
来源: 评论