咨询与建议

限定检索结果

文献类型

  • 50,900 篇 会议
  • 32,130 篇 期刊文献
  • 899 册 图书
  • 10 篇 学位论文

馆藏范围

  • 83,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52,514 篇 工学
    • 35,322 篇 计算机科学与技术...
    • 28,617 篇 软件工程
    • 13,099 篇 信息与通信工程
    • 8,579 篇 控制科学与工程
    • 6,400 篇 电气工程
    • 6,191 篇 电子科学与技术(可...
    • 5,706 篇 生物工程
    • 4,150 篇 机械工程
    • 3,879 篇 光学工程
    • 3,868 篇 生物医学工程(可授...
    • 2,951 篇 仪器科学与技术
    • 2,488 篇 化学工程与技术
    • 2,437 篇 动力工程及工程热...
    • 1,982 篇 交通运输工程
    • 1,872 篇 安全科学与工程
    • 1,743 篇 网络空间安全
    • 1,638 篇 材料科学与工程(可...
  • 28,360 篇 理学
    • 15,109 篇 数学
    • 7,900 篇 物理学
    • 6,422 篇 生物学
    • 4,883 篇 统计学(可授理学、...
    • 3,434 篇 系统科学
    • 2,664 篇 化学
  • 14,433 篇 管理学
    • 9,014 篇 管理科学与工程(可...
    • 5,981 篇 图书情报与档案管...
    • 3,949 篇 工商管理
  • 3,838 篇 医学
    • 3,157 篇 临床医学
    • 2,751 篇 基础医学(可授医学...
    • 1,652 篇 药学(可授医学、理...
  • 2,310 篇 法学
    • 1,901 篇 社会学
  • 1,504 篇 经济学
  • 986 篇 教育学
  • 944 篇 农学
  • 326 篇 文学
  • 233 篇 军事学
  • 182 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,944 篇 computer science
  • 1,856 篇 feature extracti...
  • 1,520 篇 deep learning
  • 1,485 篇 computational mo...
  • 1,448 篇 accuracy
  • 1,416 篇 training
  • 1,296 篇 machine learning
  • 1,105 篇 data mining
  • 1,092 篇 optimization
  • 998 篇 semantics
  • 909 篇 educational inst...
  • 909 篇 artificial intel...
  • 856 篇 predictive model...
  • 779 篇 neural networks
  • 769 篇 internet of thin...
  • 706 篇 support vector m...
  • 678 篇 wireless sensor ...
  • 661 篇 data models
  • 613 篇 security
  • 605 篇 real-time system...

机构

  • 659 篇 school of comput...
  • 537 篇 school of comput...
  • 476 篇 maharishi school...
  • 476 篇 school of inform...
  • 400 篇 school of comput...
  • 275 篇 department of ph...
  • 265 篇 school of comput...
  • 258 篇 faculté des scie...
  • 249 篇 department of ph...
  • 238 篇 school of comput...
  • 220 篇 department of ph...
  • 219 篇 faculty of scien...
  • 219 篇 school of comput...
  • 216 篇 physics division...
  • 202 篇 school of comput...
  • 197 篇 department of ph...
  • 191 篇 departamento de ...
  • 184 篇 department of ph...
  • 167 篇 school of comput...
  • 162 篇 department of ph...

作者

  • 282 篇 niyato dusit
  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 259 篇 g. spigo
  • 257 篇 h. a. gordon
  • 253 篇 f. siegert
  • 253 篇 a. c. könig
  • 249 篇 m. klein
  • 245 篇 r. ströhmer
  • 238 篇 y. tayalati
  • 237 篇 h. sakamoto
  • 216 篇 m. rijssenbeek
  • 200 篇 f. pastore
  • 200 篇 n. orlando
  • 194 篇 s. jin
  • 193 篇 d. guest

语言

  • 79,408 篇 英文
  • 3,095 篇 其他
  • 1,304 篇 中文
  • 169 篇 日文
  • 12 篇 德文
  • 8 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Engineering and Information Systems"
83939 条 记 录,以下是71-80 订阅
排序:
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU Jingfeng XUE Yong WANG Tianwei LEI Weijie HAN Xianwei GAO School of Computer Science and Technology Beijing Institute of Technology School of Space Information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 评论
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 847-869页
作者: Zengxiang Li Yongchong Wu Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu Department of Information Engineering Gongqing CollegeNanchang UniversityJiujiang332020China School of Information Engineering Gongqing Institute of Science and TechnologyJiujiang332020China Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou511400China School of Information Engineering Nanchang UniversityNanchang330031China School of Mathematics and Statistics Hainan Normal UniversityHaikou571158China
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** ... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
SA-Model:Multi-Feature Fusion Poetic Sentiment Analysis Based on a Hybrid Word Vector Model
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 631-645页
作者: Lingli Zhang Yadong Wu Qikai Chu Pan Li Guijuan Wang Weihan Zhang Yu Qiu Yi Li School of Computer Science and Engineering Sichuan University of Science and EngineeringZigong643000China School of Automation and Information Engineering Sichuan University of Science and EngineeringZigong643000China School of Computer Science and Technology Southwest University of Science and TechnologyMianyang621000China School of Information Engineering Southwest University of Science and TechnologyMianyang621000China
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not eff... 详细信息
来源: 评论
Enhanced Multi-Scale Object Detection Algorithm for Foggy Traffic Scenarios
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2451-2474页
作者: Honglin Wang Zitong Shi Cheng Zhu School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Electrical&Computer Engineering University of Illinois at Urbana ChampaignUrbanaIL 61801USA
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal... 详细信息
来源: 评论
DNACDS:Cloud IoE big data security and accessing scheme based on DNA cryptography
收藏 引用
Frontiers of computer science 2024年 第1期18卷 157-170页
作者: Ashish SINGH Abhinav KUMAR Suyel NAMASUDRA School of Computer Engineering KIIT Deemed to be UniversityBhubaneshwar 751024India Department of Computer Science and Engineering Indian Institute of Information Technology SuratSurat 394190India Department of Computer Science and Engineering National Institute of Technology AgartalaAgartala 799046India
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service... 详细信息
来源: 评论
Design of a Hybrid AI- based Phishing Website Detection using LSTM, CNN, and Random Forest based Ensemble Learning Analysis  8
Design of a Hybrid AI- based Phishing Website Detection usin...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Kavya, S. Sumathi, D. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li... 详细信息
来源: 评论
Modifying Lyapunov exponent of chaotic map by self-cascading
收藏 引用
science China(Technological sciences) 2024年 第7期67卷 2203-2214页
作者: YI ChenLong LI ChunBiao LI YongXin XIA Ming HUA ZhongYun School of Electronic and Information Engineering Nanjing University of Information Science&TechnologyNanjing 210044China School of Artificial Intelligence Nanjing University of Information Science&TechnologyNanjing 210044China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate SchoolShenzhen 518055China
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t... 详细信息
来源: 评论
Enhanced Road Safety Through Intelligent Lane Detection and Driver Drowsiness Monitoring  15
Enhanced Road Safety Through Intelligent Lane Detection and ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Arunpandian, J. Gunasekaran, V. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
The innovative system outlined in the provided research demonstrates a significant stride towards addressing the growing concern of road safety. Lane departure and driver drowsiness are two major causes of road accide... 详细信息
来源: 评论
CropViT: A light-weight Transformer Model for Crop Disease Detection  3
CropViT: A light-weight Transformer Model for Crop Disease D...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Chemmalar Selvi, G. Charan, H.J. Kumar, Dinesh Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Agricultural industry has grown significantly bring sustainable farming practices in improving the food quality, enhancing agricultural productivity and global food security. However, the crop yield and its quality ar... 详细信息
来源: 评论