咨询与建议

限定检索结果

文献类型

  • 69,206 篇 会议
  • 40,038 篇 期刊文献
  • 797 册 图书

馆藏范围

  • 110,041 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 67,598 篇 工学
    • 45,259 篇 计算机科学与技术...
    • 37,236 篇 软件工程
    • 16,912 篇 信息与通信工程
    • 11,040 篇 控制科学与工程
    • 8,782 篇 电气工程
    • 8,295 篇 电子科学与技术(可...
    • 7,889 篇 生物工程
    • 5,640 篇 光学工程
    • 5,475 篇 生物医学工程(可授...
    • 5,400 篇 机械工程
    • 3,860 篇 化学工程与技术
    • 3,795 篇 仪器科学与技术
    • 3,531 篇 动力工程及工程热...
    • 2,750 篇 网络空间安全
    • 2,671 篇 交通运输工程
    • 2,585 篇 材料科学与工程(可...
    • 2,545 篇 安全科学与工程
  • 37,633 篇 理学
    • 18,987 篇 数学
    • 11,645 篇 物理学
    • 8,849 篇 生物学
    • 6,343 篇 统计学(可授理学、...
    • 4,148 篇 化学
    • 4,022 篇 系统科学
  • 18,200 篇 管理学
    • 11,565 篇 管理科学与工程(可...
    • 7,363 篇 图书情报与档案管...
    • 4,697 篇 工商管理
  • 5,277 篇 医学
    • 4,300 篇 临床医学
    • 3,881 篇 基础医学(可授医学...
    • 2,366 篇 药学(可授医学、理...
  • 2,932 篇 法学
    • 2,391 篇 社会学
  • 1,847 篇 经济学
  • 1,420 篇 农学
  • 1,009 篇 教育学
  • 469 篇 文学
  • 255 篇 军事学
  • 211 篇 艺术学
  • 8 篇 哲学
  • 7 篇 历史学

主题

  • 3,113 篇 accuracy
  • 2,999 篇 feature extracti...
  • 2,764 篇 deep learning
  • 2,609 篇 training
  • 2,405 篇 computational mo...
  • 2,137 篇 computer science
  • 2,006 篇 machine learning
  • 1,638 篇 optimization
  • 1,534 篇 predictive model...
  • 1,414 篇 semantics
  • 1,346 篇 internet of thin...
  • 1,341 篇 convolutional ne...
  • 1,323 篇 real-time system...
  • 1,299 篇 support vector m...
  • 1,285 篇 data models
  • 1,181 篇 neural networks
  • 1,176 篇 data mining
  • 1,028 篇 image segmentati...
  • 981 篇 artificial intel...
  • 917 篇 security

机构

  • 2,450 篇 school of comput...
  • 1,541 篇 school of comput...
  • 1,361 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 974 篇 school of comput...
  • 944 篇 physikalisches i...
  • 942 篇 oliver lodge lab...
  • 813 篇 university of ch...
  • 694 篇 school of comput...
  • 538 篇 horia hulubei na...
  • 538 篇 school of comput...
  • 535 篇 fakultät physik ...
  • 531 篇 school of physic...
  • 526 篇 school of physic...
  • 524 篇 department of ph...
  • 522 篇 chitkara univers...
  • 518 篇 imperial college...
  • 514 篇 h.h. wills physi...
  • 508 篇 stfc rutherford ...

作者

  • 273 篇 niyato dusit
  • 270 篇 a. gomes
  • 260 篇 barter w.
  • 250 篇 c. alexa
  • 248 篇 j. m. izen
  • 246 篇 g. bella
  • 246 篇 j. strandberg
  • 246 篇 c. amelung
  • 245 篇 d. calvet
  • 237 篇 beiter a.
  • 233 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 216 篇 g. spigo

语言

  • 103,532 篇 英文
  • 4,695 篇 其他
  • 1,771 篇 中文
  • 129 篇 日文
  • 14 篇 德文
  • 14 篇 法文
  • 10 篇 朝鲜文
  • 5 篇 荷兰文
  • 5 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Technology"
110041 条 记 录,以下是4991-5000 订阅
排序:
Large Data Processing for Cloud Service Collaborative Authenticity Computing Model  3
Large Data Processing for Cloud Service Collaborative Authen...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Pujar, Sagar Ramesh Patil, Raghavendra Vijay Sharma S, Vivek Srikanth, M.S. Kls Gogte Institute of Technology Department of Computer Science and Engineering Karnataka Belagavi India Reva University School of Computer Science and Engineering Karnataka Bangalore India
The provision of a highly secure service is by far the most important responsibility of any cloud computing network. Users are able to entrust cloud data centers with their most sensitive data and computing operations... 详细信息
来源: 评论
Anomaly Detection in Spatial Information Networks: A Security Knowledge Graph-based Approach
Anomaly Detection in Spatial Information Networks: A Securit...
收藏 引用
2024 International Conference on Intelligent Computing and Robotics, ICICR 2024
作者: Tan, Yayue Zhang, Yaqi Liu, Hui Tang, Yongqing College of Computer and Information Science School of Software Southwest University Chongqing China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies.... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
Fractional Linear Matroid Matching Is in Quasi-NC  32
Fractional Linear Matroid Matching Is in Quasi-NC
收藏 引用
32nd Annual European Symposium on Algorithms, ESA 2024
作者: Gurjar, Rohit Oki, Taihei Raj, Roshan Department of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai India Department of Mathematical Informatics Graduate School of Information Science and Technology The University of Tokyo Japan
The matching and linear matroid intersection problems are solvable in quasi-NC, meaning that there exist deterministic algorithms that run in polylogarithmic time and use quasi-polynomially many parallel processors. H... 详细信息
来源: 评论
Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
收藏 引用
computer Systems science & engineering 2022年 第5期41卷 479-492页
作者: A.S.Anakath R.Kannadasan Niju P.Joseph P.Boominathan G.R.Sreekanth School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002TamilnaduIndia Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science CHRIST(Deemed to be University)Bengaluru560029India Department of Information Security School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science and Engineering Kongu Engineering CollegeErode638060TamilnaduIndia
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor... 详细信息
来源: 评论
CEMA-LSTM:Enhancing Contextual Feature Correlation for Radar Extrapolation Using Fine-Grained Echo Datasets
收藏 引用
computer Modeling in engineering & sciences 2023年 第4期135卷 45-64页
作者: Zhiyun Yang Qi Liu HaoWu Xiaodong Liu Yonghong Zhang School of Computer and Software Engineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK School of Automation Nanjing University of Information Science TechnologyNanjing210044China
Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy *** relevant research activiti... 详细信息
来源: 评论
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
收藏 引用
Journal of Electronic science and technology 2022年 第4期20卷 396-415页
作者: Xiao-Hang Wang Shou-Bin Li Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo School of Cyber Science and Technology Zhejiang UniversityHangzhou 310012 ZJU-Hangzhou Global Scientific and Technological Innovation Center Hangzhou 310012 School of Software Engineering South China University of TechnologyGuangzhou 510006 Department of Electrical and Computer Engineering University of NevadaLas Vegas 89154 School of Computer Science and Electronic Engineering University of EssexColchester CO43SQ School of Electronics and Information Engineering South China University of TechnologyGuangzhou 510640 School of Electronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then *** receiver at the other end picks up the sound signal,from which... 详细信息
来源: 评论
Longitudinal velocity control of autonomous driving based on extended state observer
收藏 引用
CAAI Transactions on Intelligence technology 2025年 第1期10卷 36-46页
作者: Hongbo Gao Hanqing Yang Xiaoyu Zhang Xiangyun Ren Fenghua Liang Ruidong Yan Qingchao Liu Mingmao Hu Fang Zhang Jiabing Gao Siyu Bao Keqiang Li Deyi Li Danwei Wang Department of Automation University of Science and Technology of ChinaHefeiChina State Key Laboratory of Intelligent Vehicle Safety Technology ChongqingChina Institute of Advanced Technology University of Science and Technology of ChinaHefeiChina School of Electrical and Electronic Engineering Nanyang Technological UniversitySingaporeSingapore School of Traffic and Transportation Beijing Jiaotong UniversityBeijingChina Automotive Engineering Research Institute Jiangsu UniversityZhenjiangChina School of Mechanical and Aerospace Engineering Nanyang Technological UniversitySingaporeSingapore School of Automotive Engineering Hubei University of Automotive TechnologyShiyanChina Beijing Idriverplus Technology Co. Ltd.BeijingChina Chery Automobile Co. Ltd.WuhuChina State Key Laboratory of Automotive Safety and Energy Tsinghua UniversityBeijingChina Department of Computer Science and Technology Tsinghua UniversityBeijingChina
Active Disturbance Rejection Control(ADRC)possesses robust disturbance rejection capabilities,making it well-suited for longitudinal velocity ***,the conventional Extended State Observer(ESO)in ADRC fails to fully exp... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
Knowledge Extraction and Application of Railway Operation Equipment Fault Diagnosis Based on Knowledge Graph  15
Knowledge Extraction and Application of Railway Operation Eq...
收藏 引用
15th IEEE Global Reliability and Prognostics and Health Management Conference, PHM-Beijing 2024
作者: He, Ruiyi Li, Honghui Liu, Shufang Yang, Xiaorui Wang, Zibo School of Computer Science and Technology Beijing Jiaotong University Beijing China School of Computer Science and Technology Beijing Jiaotong University Engineering Research Center of Network Management Technology for High Speed Railway of MOE Beijing China School of Railway Safety Theory and Technology Southwest Jiaotong University Sichuan China
Focusing on the issue where traditional fault diagnosis methods cannot effectively utilize the textual records of railway equipment faults and heavily rely on experts' experience, a knowledge graph-based fault ana... 详细信息
来源: 评论