咨询与建议

限定检索结果

文献类型

  • 140,299 篇 会议
  • 69,346 篇 期刊文献
  • 1,412 册 图书

馆藏范围

  • 211,056 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 127,877 篇 工学
    • 84,941 篇 计算机科学与技术...
    • 69,640 篇 软件工程
    • 30,731 篇 信息与通信工程
    • 20,115 篇 控制科学与工程
    • 16,023 篇 电气工程
    • 15,932 篇 电子科学与技术(可...
    • 14,758 篇 生物工程
    • 10,351 篇 生物医学工程(可授...
    • 10,132 篇 光学工程
    • 9,603 篇 机械工程
    • 7,029 篇 化学工程与技术
    • 6,870 篇 仪器科学与技术
    • 6,355 篇 动力工程及工程热...
    • 5,097 篇 材料科学与工程(可...
    • 4,555 篇 交通运输工程
    • 4,482 篇 安全科学与工程
    • 4,318 篇 网络空间安全
  • 70,006 篇 理学
    • 35,619 篇 数学
    • 21,348 篇 物理学
    • 16,517 篇 生物学
    • 11,801 篇 统计学(可授理学、...
    • 7,729 篇 系统科学
    • 7,502 篇 化学
  • 33,001 篇 管理学
    • 20,525 篇 管理科学与工程(可...
    • 13,720 篇 图书情报与档案管...
    • 9,011 篇 工商管理
  • 9,757 篇 医学
    • 8,007 篇 临床医学
    • 7,173 篇 基础医学(可授医学...
    • 4,439 篇 药学(可授医学、理...
  • 5,614 篇 法学
    • 4,677 篇 社会学
  • 3,448 篇 经济学
  • 2,489 篇 农学
  • 2,177 篇 教育学
  • 948 篇 文学
  • 458 篇 军事学
  • 354 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,145 篇 computer science
  • 5,326 篇 accuracy
  • 5,174 篇 feature extracti...
  • 4,677 篇 computational mo...
  • 4,630 篇 deep learning
  • 4,626 篇 training
  • 3,738 篇 machine learning
  • 2,969 篇 optimization
  • 2,915 篇 predictive model...
  • 2,820 篇 semantics
  • 2,595 篇 data models
  • 2,456 篇 real-time system...
  • 2,331 篇 support vector m...
  • 2,315 篇 neural networks
  • 2,313 篇 data mining
  • 2,266 篇 convolutional ne...
  • 2,069 篇 internet of thin...
  • 1,955 篇 artificial intel...
  • 1,874 篇 image segmentati...
  • 1,871 篇 educational inst...

机构

  • 2,471 篇 school of comput...
  • 2,215 篇 school of comput...
  • 2,088 篇 school of comput...
  • 1,823 篇 school of comput...
  • 1,522 篇 school of comput...
  • 1,484 篇 school of comput...
  • 1,361 篇 school of electr...
  • 1,338 篇 school of comput...
  • 1,261 篇 school of comput...
  • 1,075 篇 cavendish labora...
  • 1,033 篇 school of comput...
  • 974 篇 school of comput...
  • 972 篇 department of ph...
  • 917 篇 school of comput...
  • 885 篇 physikalisches i...
  • 873 篇 university of ch...
  • 871 篇 oliver lodge lab...
  • 546 篇 school of comput...
  • 544 篇 school of comput...
  • 517 篇 chitkara univers...

作者

  • 393 篇 niyato dusit
  • 269 篇 a. gomes
  • 261 篇 barter w.
  • 245 篇 c. alexa
  • 237 篇 j. m. izen
  • 234 篇 s. chen
  • 232 篇 blake t.
  • 229 篇 bowcock t.j.v.
  • 224 篇 bellee v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 217 篇 brundu d.
  • 216 篇 beiter a.
  • 213 篇 g. bella
  • 212 篇 bencivenni g.
  • 210 篇 bay a.
  • 209 篇 j. strandberg
  • 208 篇 d. calvet

语言

  • 182,952 篇 英文
  • 25,051 篇 其他
  • 3,159 篇 中文
  • 181 篇 日文
  • 38 篇 朝鲜文
  • 29 篇 德文
  • 24 篇 法文
  • 12 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Engineering Engineering"
211057 条 记 录,以下是1001-1010 订阅
排序:
Deep Learning-based Hybrid Recommendation System for Safe Approach to Curated Cosmetics  3
Deep Learning-based Hybrid Recommendation System for Safe Ap...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Rohitha Chowdary, G. Tharun, J. Sivaiah, G. Raveena, S. Surendran, R. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Insititute of Medical and Technical Science Chennai India
In the rapidly evolving cosmetics market, it is imperative to prioritize customer safety while offering personalized recommendations. This study introduces a hybrid recommendation system for cosmetics, using deep lear... 详细信息
来源: 评论
Attention-based network embedding with higher-order weights and node attributes
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第2期9卷 440-451页
作者: Xian Mo Binyuan Wan Rui Tang Junkai Ding Guangdi Liu School of Information Engineering Ningxia UniversityYinchuanChina School of Cyber Science and Engineering Sichuan UniversityChengduChina Computer Science and Information Technology University of MalayaKuala LumpurMalaysia Academy of Medical Sciences Zhengzhou UniversityZhengzhouChina
Network embedding aspires to learn a low-dimensional vector of each node in networks,which can apply to diverse data mining *** real-life,many networks include rich attributes and temporal ***,most existing embedding ... 详细信息
来源: 评论
A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 3573-3581页
作者: Mahmood, Khalid Tariq, Tayyaba Sangaiah, Arun Kumar Ghaffar, Zahid Saleem, Muhammad Asad Shamshad, Salman National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology International Graduate School of AI Douliu64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102 2801 Lebanon University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China The University of Lahore Department of Software Engineering Lahore54590 Pakistan
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra... 详细信息
来源: 评论
A General Linguistic Steganalysis Framework Using Multi-Task Learning
收藏 引用
computer Systems science & engineering 2023年 第8期46卷 2383-2399页
作者: Lingyun Xiang Rong Wang Yuhang Liu Yangfan Liu Lina Tan School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computer Science and Electronic Engineering University of EssexColchesterCO43SQUK School of Computer Science Hunan University of Technology and BusinessChangsha410205China
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso... 详细信息
来源: 评论
Privacy-preserving Image Inpainting Using Markov Random Field Modeling
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3688-3701页
作者: Kong, Ping Li, An Guo, Daidou Zhou, Liang Qin, Chuan Zhang, Xinpeng Jiading District Central Hospital Affiliated Shanghai University of Medicine and Health Sciences Shanghai201800 China University of Shanghai for Science and Technology School of Health Science and Engineering Shanghai200093 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Fudan University School of Computer Science Shanghai200433 China
Cloud services have attracted extensive attention due to low cost, agility and mobility. However, when processing data on cloud servers, users may worry about semi-honest third parties stealing private information fro... 详细信息
来源: 评论
Impact of the chaotic semiconductor laser output power on time-delay-signature of chaos and random bit generation
收藏 引用
Chinese Physics B 2025年 第3期34卷 325-330页
作者: Chenpeng Xue Xu Wang Likai Zheng Haoyu Zhang Yanhua Hong Zuxing Zhang College of Electronic and Optical Engineering and College of Flexible Electronics(Future Technology) Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science and Engineering Bangor UniversityBangor LL571UTUK
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical *** to the inevitable noise during the pho... 详细信息
来源: 评论
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-17页
作者: Ji, Xiaoyu Zhang, Guoming Li, Xinfeng Qu, Gang Cheng, Xiuzhen Xu, Wenyuan Electrical Engineering of Zhejiang University Hangzhou China School of Computer Science and Technology of Shandong University Qingdao China Department of Electrical and Computer Engineering at the University of Maryland College Park MD USA
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E... 详细信息
来源: 评论
A new multimodal sentiment analysis for images containing textual information
收藏 引用
Multimedia Tools and Applications 2024年 1-30页
作者: Ahuja, Garvit Alaei, Alireza Pal, Umapada School of Computer Science and Engineering Manipal University Jaipur Jaipur India Faculty of Science and Engineering Southern Cross University Gold Coast Australia Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India
Multimodal sentiment analysis on images with textual content is a research area aiming to understand the sentiment conveyed by visual and textual elements in the images. While multimodal sentiment analysis on images a... 详细信息
来源: 评论
ScanSavant: Malware Detection for Android Applications with Explainable AI
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第19期18卷 171-181页
作者: Navaneethan, S. Udhaya Kumar, S. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Tamil Nadu Chennai India
Mobile devices face SQL injection, malware, and web-based threats. Current solutions lack real-time detection. This paper introduces an Android app with advanced algorithms for real-time threat scanning. During testin... 详细信息
来源: 评论
Deep Fake Analyser: A Review Based on Detecting the Deepfakes  1
收藏 引用
3rd International Conference on Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects, Com-IT-Con 2023
作者: Srivastava, Santosh Kumar Srivastava, Durgesh Kantha, Praveen Mahto, Manoj Kumar Kumar, Sheo Singh, Hare Ram Department of Computer Science and Engineering School of Computing Science and Engineering and Technology Galgotias University Greater Noida India Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India Department of Computer Science and Engineering School of Engineering and Technology Chitkara University Baddi Himachal Pradesh Baddi India Department of Computer Science and Engineering Vignan Institute of Technology and Science Hyderabad India Department of Computer Science and Engineering CMR Engineering College Hyderabad India Department of Computer Science and Engineering GNIOT Greater Noida India
With the speedy growth in the technology and automation sectors, different techniques have been developed which can easily manipulate multimedia content such as videos and images with the ultimate level of realism. It... 详细信息
来源: 评论