咨询与建议

限定检索结果

文献类型

  • 5,151 篇 期刊文献
  • 4,281 篇 会议
  • 28 册 图书

馆藏范围

  • 9,460 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,205 篇 工学
    • 3,702 篇 计算机科学与技术...
    • 3,034 篇 软件工程
    • 1,366 篇 信息与通信工程
    • 808 篇 控制科学与工程
    • 724 篇 电子科学与技术(可...
    • 696 篇 电气工程
    • 560 篇 生物工程
    • 535 篇 光学工程
    • 501 篇 机械工程
    • 405 篇 仪器科学与技术
    • 343 篇 化学工程与技术
    • 331 篇 生物医学工程(可授...
    • 328 篇 核科学与技术
    • 244 篇 动力工程及工程热...
    • 194 篇 交通运输工程
    • 170 篇 材料科学与工程(可...
    • 144 篇 航空宇航科学与技...
    • 144 篇 安全科学与工程
  • 4,033 篇 理学
    • 1,872 篇 物理学
    • 1,652 篇 数学
    • 626 篇 生物学
    • 583 篇 统计学(可授理学、...
    • 425 篇 化学
    • 289 篇 系统科学
    • 174 篇 地球物理学
  • 1,390 篇 管理学
    • 877 篇 管理科学与工程(可...
    • 570 篇 图书情报与档案管...
    • 319 篇 工商管理
  • 280 篇 医学
    • 240 篇 临床医学
    • 197 篇 基础医学(可授医学...
  • 180 篇 法学
  • 104 篇 经济学
  • 88 篇 农学
  • 60 篇 教育学
  • 31 篇 文学
  • 23 篇 艺术学
  • 16 篇 军事学
  • 2 篇 历史学

主题

  • 229 篇 feature extracti...
  • 174 篇 training
  • 173 篇 deep learning
  • 168 篇 semantics
  • 139 篇 computational mo...
  • 120 篇 image segmentati...
  • 112 篇 optimization
  • 106 篇 machine learning
  • 106 篇 accuracy
  • 99 篇 hadron colliders
  • 94 篇 hadrons
  • 94 篇 face recognition
  • 92 篇 object detection
  • 92 篇 bosons
  • 89 篇 computer science
  • 86 篇 predictive model...
  • 85 篇 data models
  • 83 篇 convolution
  • 83 篇 cloud computing
  • 80 篇 internet of thin...

机构

  • 1,419 篇 school of comput...
  • 1,024 篇 cavendish labora...
  • 846 篇 department of ph...
  • 765 篇 oliver lodge lab...
  • 764 篇 physikalisches i...
  • 532 篇 fakultät physik ...
  • 521 篇 department for p...
  • 493 篇 infn sezione di ...
  • 488 篇 university of ch...
  • 481 篇 infn laboratori ...
  • 472 篇 institute of phy...
  • 469 篇 infn sezione di ...
  • 467 篇 iccub universita...
  • 448 篇 infn sezione di ...
  • 444 篇 institute of phy...
  • 442 篇 infn sezione di ...
  • 441 篇 infn sezione di ...
  • 430 篇 department of ph...
  • 385 篇 h.h. wills physi...
  • 383 篇 department of ph...

作者

  • 276 篇 barter w.
  • 269 篇 c. alexa
  • 269 篇 c. amelung
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 266 篇 j. m. izen
  • 263 篇 brundu d.
  • 261 篇 g. spigo
  • 260 篇 f. siegert
  • 254 篇 beiter a.
  • 243 篇 blake t.
  • 239 篇 y. tayalati
  • 239 篇 bellee v.
  • 239 篇 betancourt c.
  • 238 篇 r. ströhmer
  • 232 篇 m. rijssenbeek
  • 232 篇 borsato m.
  • 229 篇 s. jin
  • 228 篇 g. gaudio

语言

  • 8,061 篇 英文
  • 1,254 篇 其他
  • 157 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer Science and Engineering Nanjing Univ. of Science and Technology"
9460 条 记 录,以下是151-160 订阅
排序:
IoT Meets computer Vision: An Improved Detection of Tomato Pests and Diseases  17
IoT Meets Computer Vision: An Improved Detection of Tomato P...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Wang, Junling Wu, Dongyang Wang, Yupeng Nanjing University of Science and Technology ZiJin College School of Computer and Artificial Intelligence Nanjing China Nanjing Forestry University College of Information Science and Technology Nanjing China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
Accurate detection of tomato pests and diseases is essential for efficient agriculture as global food demand continues to grow. Traditional methods often struggle with accurate localization and detection, highlighting... 详细信息
来源: 评论
LMCF-FS: A Novel Lightweight Malware Classification Framework Driven by Feature Selection  6th
LMCF-FS: A Novel Lightweight Malware Classification Framewor...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yun, Cui Zhou, Lei Xing, Shuangshuang Yang, Ning Zhao, Pan Chen, Zhiguo School of Computer Jiangsu University of Science and Technology Zhenjiang212100 China Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and School of Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China
The rapid increase in the number of malware and its variants poses a significant threat to internet security. While existing machine learning-based malware classification methods can improve accuracy, they often requi... 详细信息
来源: 评论
Cocrystal@protein-anchoring nanococktail for combinatorially treating multidrug-resistant cancer
收藏 引用
Acta Pharmaceutica Sinica B 2024年 第10期14卷 4509-4525页
作者: Jiahui Zou Xuyang Xing Chao Teng Qingling Zhao Wei He Xuri Wu Yuanzheng Xia School of Pharmacy China Pharmaceutical UniversityNanjing 211198China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Life Science and Technology China Pharmaceutical UniversityNanjing 211198China State Key Laboratory of Natural Medicines and Jiangsu Key Laboratory of Bioactive Natural Product Research School of Traditional Chinese PharmacyChina Pharmaceutical UniversityNanjing 211198China
Multidrug resistance(MDR),the major mechanism by which various cancers develop specific resistance to therapeutic agents,has set up enormous obstacles to many forms of tumor *** cocktail therapy administration,based o... 详细信息
来源: 评论
MambaLLIE: Implicit Retinex-Aware Low Light Enhancement with Global-then-Local State Space  38
MambaLLIE: Implicit Retinex-Aware Low Light Enhancement with...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Weng, Jiangwei Yan, Zhiqiang Tai, Ying Qian, Jianjun Yang, Jian Li, Jun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China School of Intelligence Science and Technology Nanjing University Suzhou215163 China
Recent advances in low light image enhancement have been dominated by Retinex-based learning framework, leveraging convolutional neural networks (CNNs) and Transformers. However, the vanilla Retinex theory primarily a...
来源: 评论
On building automation system security
收藏 引用
High-Confidence Computing 2024年 第3期4卷 103-122页
作者: Christopher Morales-Gonzalez Matthew Harper Michael Cash Lan Luo Zhen Ling Qun Z.Sun Xinwen Fu Department of Computer Science University of Massachusetts LowellLowell 01854USA Department of Electrical and Computer Engineering University of Central FloridaOrlando 32816USA School of Computer Science and Technology Southeast UniversityMa’anshan 243032China School of Computer Science and Engineering Anhui University of TechnologyNanjing 211189China
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use... 详细信息
来源: 评论
Counterfactual discriminative micro-expression recognition
收藏 引用
Visual Intelligence 2024年 第1期2卷 350-359页
作者: Yong Li Menglin Liu Lingjie Lao Yuanzhi Wang Zhen Cui Department of Computer Science City University of Hong KongHong Kong999077China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of EducationSchool of Computer Science and EngineeringNanjing University of Science and TechnologyNanjing210094China
Micro-expressions are spontaneous,rapid and subtle facial movements that can hardly be suppressed or ***-expression recognition(MER)is one of the most challenging topics in affective *** aims to recognize subtle facia... 详细信息
来源: 评论
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of computer science 2022年 第2期16卷 152-159页
作者: Zhangjie FU Yan WANG Xingming SUN Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c... 详细信息
来源: 评论
Reset-Free Reinforcement Learning via Multi-State Recovery and Failure Prevention for Autonomous Robots
收藏 引用
Tsinghua science and technology 2024年 第5期29卷 1481-1494页
作者: Xu Zhou Benlian Xu Zhengqiang Jiang Jun Li Brett Nener School of Mechanical Engineering Changshu Institute of TechnologyChangshu 215500China School of Automation Nanjing University of Science and TechnologyNanjing 210094China School of Electronic and Information Engineering Suzhou University of Science and TechnologySuzhou 215009China Faculty of Medicine and Health The University of SydneySydney 2006Australia Department of Electrical Electronic and Computer EngineeringThe University of Western AustraliaPerth 6009Australia
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episo... 详细信息
来源: 评论
Exposing Audio-Visual Forgeries in Frequency Domain  18th
Exposing Audio-Visual Forgeries in Frequency Domain
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Wan, Yuanfei Wang, Jian Cui, Jinrong Sun, Yunlian School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China South China Agricultural University Guangzhou China
Recently, the rapid development of deepfake technology attracted strong attention from the community. Some previous work on deepfake detection achieved good results in the frequency domain, which inspires us to combin... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论