咨询与建议

限定检索结果

文献类型

  • 50,897 篇 会议
  • 31,941 篇 期刊文献
  • 900 册 图书
  • 10 篇 学位论文

馆藏范围

  • 83,748 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52,348 篇 工学
    • 35,226 篇 计算机科学与技术...
    • 28,552 篇 软件工程
    • 13,056 篇 信息与通信工程
    • 8,562 篇 控制科学与工程
    • 6,317 篇 电气工程
    • 6,179 篇 电子科学与技术(可...
    • 5,704 篇 生物工程
    • 4,143 篇 机械工程
    • 3,859 篇 光学工程
    • 3,858 篇 生物医学工程(可授...
    • 2,947 篇 仪器科学与技术
    • 2,484 篇 化学工程与技术
    • 2,433 篇 动力工程及工程热...
    • 1,972 篇 交通运输工程
    • 1,865 篇 安全科学与工程
    • 1,742 篇 网络空间安全
    • 1,630 篇 材料科学与工程(可...
  • 28,294 篇 理学
    • 15,071 篇 数学
    • 7,880 篇 物理学
    • 6,411 篇 生物学
    • 4,863 篇 统计学(可授理学、...
    • 3,430 篇 系统科学
    • 2,657 篇 化学
  • 14,404 篇 管理学
    • 8,998 篇 管理科学与工程(可...
    • 5,970 篇 图书情报与档案管...
    • 3,936 篇 工商管理
  • 3,815 篇 医学
    • 3,139 篇 临床医学
    • 2,735 篇 基础医学(可授医学...
    • 1,651 篇 药学(可授医学、理...
  • 2,300 篇 法学
    • 1,896 篇 社会学
  • 1,501 篇 经济学
  • 981 篇 教育学
  • 941 篇 农学
  • 325 篇 文学
  • 233 篇 军事学
  • 182 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,944 篇 computer science
  • 1,849 篇 feature extracti...
  • 1,511 篇 deep learning
  • 1,485 篇 computational mo...
  • 1,448 篇 accuracy
  • 1,410 篇 training
  • 1,298 篇 machine learning
  • 1,105 篇 data mining
  • 1,090 篇 optimization
  • 992 篇 semantics
  • 911 篇 artificial intel...
  • 909 篇 educational inst...
  • 856 篇 predictive model...
  • 779 篇 neural networks
  • 762 篇 internet of thin...
  • 704 篇 support vector m...
  • 674 篇 wireless sensor ...
  • 663 篇 data models
  • 613 篇 security
  • 604 篇 real-time system...

机构

  • 658 篇 school of comput...
  • 535 篇 school of comput...
  • 476 篇 maharishi school...
  • 476 篇 school of inform...
  • 400 篇 school of comput...
  • 275 篇 department of ph...
  • 265 篇 school of comput...
  • 258 篇 faculté des scie...
  • 249 篇 department of ph...
  • 238 篇 school of comput...
  • 221 篇 faculty of scien...
  • 220 篇 department of ph...
  • 219 篇 school of comput...
  • 216 篇 physics division...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 192 篇 departamento de ...
  • 184 篇 department of ph...
  • 167 篇 school of comput...
  • 163 篇 department of ph...

作者

  • 281 篇 niyato dusit
  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 259 篇 g. spigo
  • 257 篇 h. a. gordon
  • 253 篇 f. siegert
  • 253 篇 a. c. könig
  • 249 篇 m. klein
  • 245 篇 r. ströhmer
  • 238 篇 y. tayalati
  • 237 篇 h. sakamoto
  • 216 篇 m. rijssenbeek
  • 200 篇 f. pastore
  • 200 篇 n. orlando
  • 195 篇 d. guest
  • 194 篇 s. jin

语言

  • 79,243 篇 英文
  • 3,065 篇 其他
  • 1,308 篇 中文
  • 169 篇 日文
  • 12 篇 德文
  • 8 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Engineering and Information Systems"
83748 条 记 录,以下是4931-4940 订阅
排序:
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
收藏 引用
Journal of Electronic science and Technology 2022年 第4期20卷 396-415页
作者: Xiao-Hang Wang Shou-Bin Li Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo School of Cyber Science and Technology Zhejiang UniversityHangzhou 310012 ZJU-Hangzhou Global Scientific and Technological Innovation Center Hangzhou 310012 School of Software Engineering South China University of TechnologyGuangzhou 510006 Department of Electrical and Computer Engineering University of NevadaLas Vegas 89154 School of Computer Science and Electronic Engineering University of EssexColchester CO43SQ School of Electronics and Information Engineering South China University of TechnologyGuangzhou 510640 School of Electronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then *** receiver at the other end picks up the sound signal,from which... 详细信息
来源: 评论
Reproducible reformation of a bilayer lipid membrane using microair bubbles
收藏 引用
Droplet 2023年 第3期2卷 90-98页
作者: Izumi Hashimoto Toshihisa Osaki Hirotaka Sugiura Hisatoshi Mimura Sho Takamori Norihisa Miki Shoji Takeuchi Artificial Cell Membrane Systems Group Kanagawa Institute of Industrial Science and TechnologyKanagawaJapan Department of Mechanical Engineering Keio UniversityKanagawaJapan Institute of Industrial Science The University of TokyoTokyoJapan Graduate School of Information Science and Technology The University of TokyoTokyoJapan
Planar bilayer lipid membranes(BLMs)are widely used as models for cell membranes in various applications,including drug discovery and ***,the nanometer-thick bilayer structure,assembled through hydrophobic interaction... 详细信息
来源: 评论
CPL-CLIP: Compound Prompt Learning for Flexible-Modal Face Anti-Spoofing  18
CPL-CLIP: Compound Prompt Learning for Flexible-Modal Face A...
收藏 引用
18th IEEE International Joint Conference on Biometrics, IJCB 2024
作者: Zhang, Ying Zhu, Xiangyu Liu, Ajian Lin, Xun Wan, Jun Zhang, Jing Lei, Zhen Beihang University School of Computer Science and Engineering China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation China University of Chinese Academy of Sciences School of Artificial Intelligence China Macau University of Science and Technology School of Computer Science and Engineering China Chinese Academy of Sciences Centre for Artificial Intelligence and Robotics Hong Kong Institute of Science & Innovation China
Face anti-spoofing (FAS) is pivotal in safeguarding the integrity of face recognition systems. Flexible-modal FAS utilizes multi-modal data and trains a unified model adaptable to any single-modal testing scenario. Th... 详细信息
来源: 评论
Metaverse User Portrait Construction Based on Human Gaze-tracking Data  9
Metaverse User Portrait Construction Based on Human Gaze-tra...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Deng, Xiaomei Wu, Sissi Xiaoxiao Ding, Huijun Zhu, Yingying Shenzhen University School of Electronic and Information Engineering Shenzhen China Shenzhen University School of Biomedical Engineering Shenzhen China University of Texas Arlington Computer Science Texas United States
With the rapid growth of virtual reality technology in the Metaverse, where a digital virtual world is integrated with the real world, users are exposed to a variety of content in different scenarios. Similar to the W... 详细信息
来源: 评论
Programmer Performance Prediction with Cognitive Tests: A Granular Approach
Programmer Performance Prediction with Cognitive Tests: A Gr...
收藏 引用
2023 International Symposium on Networks, computers and Communications, ISNCC 2023
作者: Farghaly, Ayman Aboulmagd El-Kafrawy, Passent Mohammed School of Information Technology and Computer Science Nile University Cairo Egypt Effat College of Engineering Effat University Jeddah Saudi Arabia
Universities and students face the challenge of finding the career that best suits the students. Programming is currently one of the highly sought-after careers and is one of the highest paying jobs. However not all s... 详细信息
来源: 评论
Xabcd: A Better Model for Named Entity Recognition in Cyber Threat Intelligence  9
Xabcd: A Better Model for Named Entity Recognition in Cyber ...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Wang, Ruiqi Zheng, Zhiqiang Ao, Shengqin Fu, Yuxia Wang, Xuren Jiang, Zhengwei Xie, Gang School of Big Data and Computer Science Guizhou Normal University Guiyang China Information Engineering College Capital Normal University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Due to the ambiguity between naming entity nouns and daily usage nouns in cyber threat intelligence, such as hacker organizations, attack tools, and attack techniques, the understanding of their content heavily relies... 详细信息
来源: 评论
A Comprehensive Study on Mechanism Knowledge Techniques for Intrusion Detection in Network Security
A Comprehensive Study on Mechanism Knowledge Techniques for ...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Manivasagam Agarwal, Ankita Bishnoi, Amit Kumar Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Teerthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India
This technical abstract provides a comprehensive observation of the system studying strategies for intrusion detection in network protection. Various tactics are discussed, along with supervised getting-to-know, unsup... 详细信息
来源: 评论
Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Physically Secure and Privacy-Preserving Authentication Sche...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and systems, AIoTSys 2024
作者: Chen, Dongmei Liang, Yangfan Li, Lihui Liu, Yining School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems Jiaxing China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China
The communication between vehicles and other entities occurs over open wireless networks, making them susceptible to various security attacks In Vehicular Ad Hoc Network (VANET). Consequently, many researchers have pr... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in engineering & sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
A Three-Model Deep Learning Framework for ASL Recognition: Integrating CNN, Skeletal Features, and Multi-Modal Fusion
A Three-Model Deep Learning Framework for ASL Recognition: I...
收藏 引用
International Conference on Trends in Electronics and Informatics (ICEI)
作者: Karthikeyan J Vedant Passi Akshit Mahajan Md Zaid Zeya Divyam Jain Manas Gautam School of Computer Science Engineering and Information System VIT University Vellore India School of Computer Science and Engineering VIT University Vellore India
American Sign Language (ASL) recognition is an important way of enhancing deaf and hard-of-hearing individu-als' access to communication. In this present paper, we propose a multi-modal deep learning model with th... 详细信息
来源: 评论