咨询与建议

限定检索结果

文献类型

  • 65,802 篇 会议
  • 43,625 篇 期刊文献
  • 785 册 图书

馆藏范围

  • 110,212 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 69,543 篇 工学
    • 43,780 篇 计算机科学与技术...
    • 35,555 篇 软件工程
    • 16,300 篇 信息与通信工程
    • 11,027 篇 控制科学与工程
    • 9,331 篇 电气工程
    • 8,700 篇 电子科学与技术(可...
    • 7,550 篇 生物工程
    • 5,627 篇 机械工程
    • 5,590 篇 光学工程
    • 5,317 篇 化学工程与技术
    • 5,250 篇 生物医学工程(可授...
    • 3,911 篇 动力工程及工程热...
    • 3,787 篇 材料科学与工程(可...
    • 3,780 篇 仪器科学与技术
    • 2,716 篇 交通运输工程
    • 2,587 篇 网络空间安全
    • 2,416 篇 安全科学与工程
  • 39,119 篇 理学
    • 19,136 篇 数学
    • 12,516 篇 物理学
    • 8,554 篇 生物学
    • 6,250 篇 统计学(可授理学、...
    • 5,285 篇 化学
    • 3,906 篇 系统科学
  • 17,682 篇 管理学
    • 11,328 篇 管理科学与工程(可...
    • 6,992 篇 图书情报与档案管...
    • 4,515 篇 工商管理
  • 5,083 篇 医学
    • 4,093 篇 临床医学
    • 3,623 篇 基础医学(可授医学...
    • 2,188 篇 药学(可授医学、理...
  • 2,722 篇 法学
    • 2,206 篇 社会学
  • 1,815 篇 经济学
  • 1,401 篇 农学
  • 964 篇 教育学
  • 443 篇 文学
  • 256 篇 军事学
  • 204 篇 艺术学
  • 9 篇 哲学
  • 7 篇 历史学

主题

  • 2,750 篇 feature extracti...
  • 2,725 篇 accuracy
  • 2,485 篇 deep learning
  • 2,395 篇 training
  • 2,220 篇 computational mo...
  • 2,008 篇 computer science
  • 1,798 篇 machine learning
  • 1,565 篇 optimization
  • 1,407 篇 semantics
  • 1,378 篇 predictive model...
  • 1,173 篇 internet of thin...
  • 1,165 篇 data models
  • 1,147 篇 support vector m...
  • 1,119 篇 data mining
  • 1,116 篇 convolutional ne...
  • 1,106 篇 real-time system...
  • 1,098 篇 neural networks
  • 1,014 篇 image segmentati...
  • 917 篇 artificial intel...
  • 857 篇 educational inst...

机构

  • 2,477 篇 school of comput...
  • 1,557 篇 school of comput...
  • 1,396 篇 school of comput...
  • 1,088 篇 cavendish labora...
  • 1,016 篇 department of ph...
  • 988 篇 school of comput...
  • 944 篇 oliver lodge lab...
  • 944 篇 physikalisches i...
  • 867 篇 university of ch...
  • 702 篇 school of comput...
  • 576 篇 school of comput...
  • 536 篇 horia hulubei na...
  • 535 篇 fakultät physik ...
  • 530 篇 chitkara univers...
  • 526 篇 school of physic...
  • 526 篇 school of physic...
  • 522 篇 department of ph...
  • 517 篇 school of optica...
  • 516 篇 imperial college...
  • 514 篇 h.h. wills physi...

作者

  • 277 篇 niyato dusit
  • 268 篇 a. gomes
  • 258 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 244 篇 g. bella
  • 243 篇 c. amelung
  • 242 篇 j. strandberg
  • 242 篇 d. calvet
  • 234 篇 beiter a.
  • 233 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 212 篇 g. spigo

语言

  • 100,840 篇 英文
  • 7,179 篇 其他
  • 2,192 篇 中文
  • 68 篇 日文
  • 16 篇 德文
  • 14 篇 法文
  • 8 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering Hunan University of Science & Technology"
110212 条 记 录,以下是391-400 订阅
排序:
Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd Sensing  10
Achieving Efficient and Secure Task Allocation Scheme in Mob...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Li, Zhixue Zhang, Shiwen Xiong, Naixue Liang, Wei Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China
In recent years, as a novel perceptual paradigm, Mobile Crowd Sensing (MCS) has gradually become one of the most popular research contents. It utilizes mobile devices carried by users to collect various sensing data a... 详细信息
来源: 评论
DTSAC: Smart Contract-based Access Control with Delegation and Trust Management  29
DTSAC: Smart Contract-based Access Control with Delegation a...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liao, Junguo Wu, Qiong School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
With the proliferation of the Internet of Things (IoT), access control has become particularly important in protecting data security. However, traditional access control models have limited capabilities in addressing ... 详细信息
来源: 评论
A Terminal Device Authentication Scheme Based on Blockchain technology in WBAN  10
A Terminal Device Authentication Scheme Based on Blockchain ...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Wang, Ying Cheng, Lei Xu, Jianbo Zhang, Shaobo Hunan University of Science and Technology School of Computer science and Engineering Xiangtan China
The wireless body area network (WBAN) plays a vital role in the application of smart health care. However, due to the openness of wireless networks, the potential threats posed by attackers increase concerns about the... 详细信息
来源: 评论
A Composite Transformer-Based Multi-Stage Defect Detection Architecture for Sewer Pipes
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 435-451页
作者: Zifeng Yu Xianfeng Li Lianpeng Sun Jinjun Zhu Jianxin Lin School of Computer Science and Engineering Macao University of Science and TechnologyMacao999078China School of Environmental Science and Engineering Sun Yat-sen UniversityGuangzhou510275China Guangdong AIKE Environmental Science and Technology Co. Ltd.Zhongshan528400China
Urban sewer pipes are a vital infrastructure in modern cities,and their defects must be detected in time to prevent potential *** recent years,to relieve the manual efforts by human experts,models based on deep learni... 详细信息
来源: 评论
Anomaly Detection Based on Deep Learning: Insights and Opportunities  10
Anomaly Detection Based on Deep Learning: Insights and Oppor...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Zhang, Huan Xie, Rui Li, Kuanching Huang, Weihong Yang, Chaoyi Liu, Jingnian Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China
With the advent of the 5G/6G and Big Data, the network has become indispensable in people's lives, and Cyber security has turned a relevant topic that people pay attention to. For Cyber security, anomaly detection... 详细信息
来源: 评论
OSSIoT: An ontology-based Operational Security model for Social Internet of Things using Machine Learning Techniques
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第10期51卷 1440-1453页
作者: Kumar, K.S. Santhosh Hanumanthappa, J. Prakash, S.P. Shiva Krinkin, Kirill Department of Studies in Computer Science University of Mysore Karnataka Mysuru India Department of Information Science and Engineering JSS Science and Technology University Karnataka Mysuru India School of Computer Science and Engineering Constructor University Bremen Germany
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine t... 详细信息
来源: 评论
Multi-Task Visual Semantic Embedding Network for Image-Text Retrieval
收藏 引用
Journal of computer science & technology 2024年 第4期39卷 811-826页
作者: Xue-Yang Qin Li-Shuang Li Jing-Yao Tang Fei Hao Mei-Ling Ge Guang-Yao Pang School of Computer Science and Technology Dalian University of TechnologyDalian 116024China School of Computer Science Shaanxi Normal UniversityXi’an 710119China School of Computer Engineering Weifang UniversityWeifang 261061China Guangxi Colleges and Universities Key Laboratory of Intelligent Industry Software Wuzhou UniversityWuzhou 543002 China
Image-text retrieval aims to capture the semantic correspondence between images and texts,which serves as a foundation and crucial component in multi-modal recommendations,search systems,and online *** mainstream meth... 详细信息
来源: 评论
Routing Protocol Based on Mission-Oriented Opportunistic Networks  22nd
Routing Protocol Based on Mission-Oriented Opportunistic Net...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Cui, Yahui Zhou, Xinlian Liang, Wei Li, Kuan-Ching School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
Mission-oriented opportunistic networks are a new form of network. Its application background is to complete specific tasks. Its prominent feature is Mission-oriented mobility. This paper, based on the goal-driven mob... 详细信息
来源: 评论
Bearing-only Formation Maneuvering for UAV Swarm over Directed Interaction Topologies
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-12页
作者: Lin, Qiong Miao, Zhiqiang Chen, Yanjie Wang, Xiangke He, Wei Wang, Yaonan College of Electrical and Information Engineering Hunan University Changsha China School of Mechanical Engineering and Automation Fuzhou University China College of Intelligence Science and Technology National University of Defense Technology Changsha China School of Intelligence Science and Technology University of Science and Technology Beijing Beijing China
This research paper addresses the formation control problem in a swarm of quadrotor unmanned aerial vehicles (UAVs) over directed interaction topologies, with the primary objective of achieving persistent motion based... 详细信息
来源: 评论
ISAC-Fi: Enabling Full-Fledged Monostatic Sensing over Wi-Fi Communication
IEEE Journal of Selected Areas in Sensors
收藏 引用
IEEE Journal of Selected Areas in Sensors 2024年 1卷 139-153页
作者: Chen, Zhe Hu, Chao Zheng, Tianyue Cao, Hangcheng Yang, Yanbing Chu, Yen Jiang, Hongbo Luo, Jun Fudan University Institute of Space Internet School of Computer Science Shanghai200437 China Sichuan University College of Computer Science Chengdu610017 China Nanyang Technological University School of Computer Science and Engineering Singapore639798 Singapore Hunan University College of Computer Science and Electronics Engineering Changsha410012 China University of Electronic Science and Technology of China Chengdu610054 China
Although Wi-Fi communications have been exploited for sensing purpose for over a decade, the bistatic or multistatic nature of Wi-Fi still poses multiple challenges, hampering real-life deployment of integrated sensin... 详细信息
来源: 评论