咨询与建议

限定检索结果

文献类型

  • 12,846 篇 期刊文献
  • 10,679 篇 会议
  • 101 册 图书

馆藏范围

  • 23,625 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,925 篇 工学
    • 8,601 篇 计算机科学与技术...
    • 6,890 篇 软件工程
    • 3,068 篇 信息与通信工程
    • 2,352 篇 电子科学与技术(可...
    • 2,283 篇 电气工程
    • 1,981 篇 生物工程
    • 1,855 篇 光学工程
    • 1,846 篇 控制科学与工程
    • 1,696 篇 生物医学工程(可授...
    • 1,198 篇 化学工程与技术
    • 999 篇 机械工程
    • 916 篇 材料科学与工程(可...
    • 887 篇 仪器科学与技术
    • 691 篇 动力工程及工程热...
    • 433 篇 力学(可授工学、理...
    • 390 篇 土木工程
  • 10,311 篇 理学
    • 4,801 篇 物理学
    • 3,708 篇 数学
    • 2,375 篇 生物学
    • 1,420 篇 化学
    • 1,323 篇 统计学(可授理学、...
    • 683 篇 系统科学
  • 3,278 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,342 篇 图书情报与档案管...
    • 827 篇 工商管理
  • 1,772 篇 医学
    • 1,461 篇 临床医学
    • 1,200 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 515 篇 公共卫生与预防医...
  • 532 篇 法学
    • 416 篇 社会学
  • 356 篇 农学
  • 310 篇 经济学
  • 248 篇 教育学
  • 98 篇 文学
  • 56 篇 军事学
  • 36 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 481 篇 deep learning
  • 314 篇 machine learning
  • 293 篇 computer science
  • 286 篇 feature extracti...
  • 261 篇 training
  • 211 篇 image segmentati...
  • 204 篇 computational mo...
  • 200 篇 accuracy
  • 197 篇 semantics
  • 182 篇 optimization
  • 158 篇 neural networks
  • 158 篇 data mining
  • 152 篇 internet of thin...
  • 150 篇 reinforcement le...
  • 131 篇 magnetic resonan...
  • 128 篇 support vector m...
  • 128 篇 deep neural netw...
  • 126 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 217 篇 r. ströhmer
  • 217 篇 m. rijssenbeek
  • 213 篇 s. jin

语言

  • 21,706 篇 英文
  • 1,525 篇 其他
  • 387 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23626 条 记 录,以下是41-50 订阅
排序:
A Graph-Assisted Digital-Twin-Driven Multiagent Shared Offloading for Internet of Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17349-17363页
作者: Zahangir Alam, Md Rahman, Suryaia Asif Bin Khaled, Md Islam, Ashraful Jamalipour, Abbas Independent University Bangladesh Department of Computer Science and Engineering Center for Computational and Data Sciences Dhaka1229 Bangladesh The University of Sydney School of Electrical and Computer Engineering SydneyNSW2006 Australia
Vehicular edge computing (VEC) allows vehicles to process part of the tasks locally at the network edge while offloading the rest of the tasks to a centralized cloud server for processing. A massive volume of tasks ge... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(Information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
A Novel Predictive Model for Edge Computing Resource Scheduling Based on Deep Neural Network
收藏 引用
computer Modeling in engineering & sciences 2024年 第4期139卷 259-277页
作者: Ming Gao Weiwei Cai Yizhang Jiang Wenjun Hu Jian Yao Pengjiang Qian School of Artificial Intelligence and Computer Science Jiangnan UniversityWuxi214122China The Center for Intelligent Systems and Applications Research School of Artificial Intelligence and Computer ScienceJiangnan UniversityWuxi214122China School of Information Engineering Huzhou UniversityHuzhou313000China
Currently,applications accessing remote computing resources through cloud data centers is the main mode of operation,but this mode of operation greatly increases communication latency and reduces overall quality of se... 详细信息
来源: 评论
A Novel Network Attack Evaluation Scheme Based on AHP Grey Clustering Model  8th
A Novel Network Attack Evaluation Scheme Based on AHP Grey C...
收藏 引用
8th International Conference on Computing, Control and Industrial engineering, CCIE 2024
作者: Zhang, Yiqun Jiang, Rui Wang, Lile School of Cyber Science and Engineering Southeast University Nanjing China National Engineering Research Center of Classified Protection and Safeguard Technology for Cybersecurity Shanghai China
Evaluation of network attacks has been a hot topic in the field of network protection in recent years. However, recent evaluation methods have some problems in consistency, subjectivity and comprehensiveness. In order... 详细信息
来源: 评论
Authorized Protection Mechanism of Software Cloud Based on Time-Specific Encryption
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第10期51卷 1474-1479页
作者: Yuan, Ke Wu, Junyi Zhang, Baolei Wang, Bozhen Wang, Yuye Jia, Chunfu School of Computer and Information Engineering Henan University Kaifeng475004 China Henan Province Engineering Research Center of Spatial Information Processing Henan University Kaifeng475004 China School of Computer and Information Engineering Henan University Kaifeng475004 China College of Cybersecurity Nankai University Tianjin 300350 China International BusinessSchool Henan University Zhengzhou450046 China
In order to improve the security, ease of use and flexibility of software products, this paper proposes a software cloud authorized protection mechanism based on specific time encryption. This mechanism sends the encr... 详细信息
来源: 评论
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1149-1171页
作者: Xiang Zhang Shenyan Han Wenbin Huang Daoyong Fu School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Nanjing University of Information Science and TechnologyMinistry of EducationNanjing210044China
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ... 详细信息
来源: 评论
Virtual-physical digital twin testbed for heterogeneous crowd operations
收藏 引用
science China(Information sciences) 2025年 第5期68卷 404-406页
作者: Mingliang XU Zheng WANG Yang MENG Wencan LUO Hua WANG Shuo HE Chaochao LI Yibo GUO Yafei LI Pei LV School of Computer Science and Artificial Intelligence Zhengzhou University Engineering Research Center of Intelligent Swarm Systems Ministry of Education National Supercomputing Center in Zhengzhou
Heterogeneous crowd operations involve complex procedural subtasks performed by dynamic teams with diverse agent behaviors,tailored to specific task *** of such operations include carrier aircraft support,airport grou...
来源: 评论
Mutual Retinex: Combining Transformer and CNN for Image Enhancement
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2024年 第3期8卷 2240-2252页
作者: Jiang, Kui Wang, Qiong An, Zhaoyi Wang, Zheng Zhang, Cong Lin, Chia-Wen Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan430072 China Wuhan Polytechnic University School of Mathematics and Computer Science Wuhan430024 China National Tsing Hua University Department of Electrical Engineering Institute of Communications Engineering Hsinchu30013 Taiwan
Images captured in low-light or underwater environments are often accompanied by significant degradation, which can negatively impact the quality and performance of downstream tasks. While convolutional neural network... 详细信息
来源: 评论
A Facial Expression Recognition Method Integrating Uncertainty Estimation and Active Learning
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 533-548页
作者: Yujian Wang Jianxun Zhang Renhao Sun School of Computer Science and Engineering Chongqing University of TechnologyChongqing400054China Data Space Research Institute of Hefei Comprehensive National Science Center Hefei230088China
The effectiveness of facial expression recognition(FER)algorithms hinges on the model’s quality and the availability of a substantial amount of labeled expression ***,labeling large datasets demands significant human... 详细信息
来源: 评论
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular Networks
收藏 引用
China Communications 2025年 第3期22卷 270-287页
作者: Wang Zhihua Wang Shuaibo Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China School of Cyber Science and Engineering Zhengzhou UniversityZhengzhou 449001China Lab of National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029China
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 详细信息
来源: 评论