咨询与建议

限定检索结果

文献类型

  • 12,846 篇 期刊文献
  • 10,679 篇 会议
  • 101 册 图书

馆藏范围

  • 23,625 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,925 篇 工学
    • 8,601 篇 计算机科学与技术...
    • 6,890 篇 软件工程
    • 3,068 篇 信息与通信工程
    • 2,352 篇 电子科学与技术(可...
    • 2,283 篇 电气工程
    • 1,981 篇 生物工程
    • 1,855 篇 光学工程
    • 1,846 篇 控制科学与工程
    • 1,696 篇 生物医学工程(可授...
    • 1,198 篇 化学工程与技术
    • 999 篇 机械工程
    • 916 篇 材料科学与工程(可...
    • 887 篇 仪器科学与技术
    • 691 篇 动力工程及工程热...
    • 433 篇 力学(可授工学、理...
    • 390 篇 土木工程
  • 10,311 篇 理学
    • 4,801 篇 物理学
    • 3,708 篇 数学
    • 2,375 篇 生物学
    • 1,420 篇 化学
    • 1,323 篇 统计学(可授理学、...
    • 683 篇 系统科学
  • 3,278 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,342 篇 图书情报与档案管...
    • 827 篇 工商管理
  • 1,772 篇 医学
    • 1,461 篇 临床医学
    • 1,200 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 515 篇 公共卫生与预防医...
  • 532 篇 法学
    • 416 篇 社会学
  • 356 篇 农学
  • 310 篇 经济学
  • 248 篇 教育学
  • 98 篇 文学
  • 56 篇 军事学
  • 36 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 481 篇 deep learning
  • 314 篇 machine learning
  • 293 篇 computer science
  • 286 篇 feature extracti...
  • 261 篇 training
  • 211 篇 image segmentati...
  • 204 篇 computational mo...
  • 200 篇 accuracy
  • 197 篇 semantics
  • 182 篇 optimization
  • 158 篇 neural networks
  • 158 篇 data mining
  • 152 篇 internet of thin...
  • 150 篇 reinforcement le...
  • 131 篇 magnetic resonan...
  • 128 篇 support vector m...
  • 128 篇 deep neural netw...
  • 126 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 217 篇 r. ströhmer
  • 217 篇 m. rijssenbeek
  • 213 篇 s. jin

语言

  • 21,706 篇 英文
  • 1,525 篇 其他
  • 387 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23626 条 记 录,以下是51-60 订阅
排序:
A Reinforcement Learning-Based Method for Wing Grid Optimization  9
A Reinforcement Learning-Based Method for Wing Grid Optimiza...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Wu, Pin Xu, Liji Tu, Zekai Feng, Weibing He, Yaolong School of Computer Engineering and Science Shanghai University Shanghai Frontier Science Center of Mechanoinformatics Shanghai China School of Computer Engineering and Science Shanghai University Shanghai China
This study investigates enhancing airfoil grid generation's automation and computational efficiency in aerospace engineering using reinforcement learning and Graph Convolutional Networks (GCNs). Traditional grid g... 详细信息
来源: 评论
Silent Speech Interfaces: Non-Invasive Neuromuscular Signal Processing for Assistive Communication  4
Silent Speech Interfaces: Non-Invasive Neuromuscular Signal ...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in cybersecurity, ICAIC 2025
作者: Khan, Sallar Ali, Khawaja Usman Qadri, Ali Raza Ali Rizvi, Maisam Technological University Dublin School of Informatics and Cybersecurity Dublin Ireland Sir Syed University of Engineering and Technology Department of Computer Science & Information Technology Karachi Pakistan
Our research demonstrates a discrete speech system that empowers those afflicted with speech impairments to convey ideas by internally articulating words without producing audible sound. This method harnesses the mini... 详细信息
来源: 评论
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
收藏 引用
Chinese Physics B 2024年 第7期33卷 233-243页
作者: 苏静明 方士辉 洪炎 温言 Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center Anhui University of Science and TechnologyHuainan 232001China School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... 详细信息
来源: 评论
Adversarial Geometric Attacks for 3D Point Cloud Object Tracking
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3144-3157页
作者: Yao, Rui Zhang, Anqi Zhou, Yong Zhao, Jiaqi Liu, Bing El Saddik, Abdulmotaleb China University of Mining and Technology School of Computer Science and Technology Mine Digitization Engineering Research Center of the Ministry of Education Xuzhou221116 China University of Ottawa School of Electrical Engineering and Computer Science OttawaONK1N 6N5 Canada
3D point cloud object tracking (3D PCOT) plays a vital role in applications such as autonomous driving and robotics. Adversarial attacks offer a promising approach to enhance the robustness and security of tracking mo... 详细信息
来源: 评论
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 评论
Unveiling vulnerable smart contracts:Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset
收藏 引用
Blockchain(Research and Applications) 2024年 第1期5卷 58-84页
作者: Sepideh HajiHosseinKhani Arash Habibi Lashkari Ali Mizani Oskui Computer Science Department of Computer Science and EngineeringYork UniversityTorontoOntario M3J1P3Canada Behavior-Centric Cybersecurity Center(BCCC) School of Information TechnologyYork UniversityTorontoOntario M3J1P3Canada Financial and Crypto Advisory of Switzerland(FiCAS AG) ZugSwitzerland
Smart contracts(SCs)are crucial in maintaining trust within blockchain ***,existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness,while approaches based on Deep Neural Networks(DNNs)st... 详细信息
来源: 评论
Recognition of carrier-based aircraft flight deck operations based on dynamic graph
收藏 引用
Chinese Journal of Aeronautics 2025年 第3期38卷 474-490页
作者: Xingyu GUO Jiaxin LI Hua WANG Junnan LIU Yafei LI Mingliang XU School of Computer Science and Artificial Intelligence Zhengzhou UniversityZhengzhou 450001China Engineering Research Center of Intelligent Swarm Systems Ministry of EducationZhengzhou 450001China National Supercomputing Center in Zhengzhou Zhengzhou 450001China School of Geo-Science&Technology Zhengzhou UniversityZhengzhou 450001China
Accurate recognition of flight deck operations for carrier-based aircraft, based on operation trajectories, is critical for optimizing carrier-based aircraft performance. This recognition involves understanding short-... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论
Hetu: a highly efficient automatic parallel distributed deep learning system
收藏 引用
science China(Information sciences) 2023年 第1期66卷 314-315页
作者: Xupeng MIAO Xiaonan NIE Hailin ZHANG Tong ZHAO Bin CUI School of Computer Science Peking University Center for Data Science Peking University National Engineering Laboratory for Big Data Analysis and Applications
On July 18, 2021, the PKU-DAIR Lab1)(Data and Intelligence Research Lab at Peking University) openly released the source code of Hetu, a highly efficient and easy-to-use distributed deep learning(DL) framework. Hetu i...
来源: 评论
Towards intelligent and trustworthy task assignments for 5G-enabled industrial communication systems
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 246-255页
作者: Mingfeng Huang Anfeng Liu Neal N.Xiong Athanasios V.Vasilakos School of Computer and Communication Engineering Changsha University of Science&TechnologyChangsha410114China School of Electronic Information Central South UniversityChangsha410083China Department of Computer Science and Mathematics Sul Ross State UniversityAlpineTX 79830USA College of Mathematics and Computer Science Fuzhou UniversityFuzhou350116China Center for AI Research University of AgderGrimstad 999026Norway
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic... 详细信息
来源: 评论