咨询与建议

限定检索结果

文献类型

  • 61,440 篇 会议
  • 38,787 篇 期刊文献
  • 1,053 册 图书

馆藏范围

  • 101,280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 61,515 篇 工学
    • 40,284 篇 计算机科学与技术...
    • 32,736 篇 软件工程
    • 15,202 篇 信息与通信工程
    • 10,374 篇 控制科学与工程
    • 8,720 篇 电气工程
    • 8,262 篇 电子科学与技术(可...
    • 7,680 篇 生物工程
    • 6,337 篇 生物医学工程(可授...
    • 5,548 篇 光学工程
    • 4,215 篇 机械工程
    • 3,657 篇 化学工程与技术
    • 3,465 篇 动力工程及工程热...
    • 3,416 篇 仪器科学与技术
    • 2,923 篇 材料科学与工程(可...
    • 2,600 篇 网络空间安全
    • 2,461 篇 安全科学与工程
  • 36,934 篇 理学
    • 17,831 篇 数学
    • 12,257 篇 物理学
    • 8,921 篇 生物学
    • 6,044 篇 统计学(可授理学、...
    • 4,159 篇 化学
    • 4,027 篇 系统科学
  • 15,879 篇 管理学
    • 10,138 篇 管理科学与工程(可...
    • 6,233 篇 图书情报与档案管...
    • 4,805 篇 工商管理
  • 6,698 篇 医学
    • 5,400 篇 临床医学
    • 4,766 篇 基础医学(可授医学...
    • 2,849 篇 药学(可授医学、理...
    • 2,823 篇 公共卫生与预防医...
  • 3,061 篇 法学
    • 2,607 篇 社会学
  • 1,827 篇 经济学
  • 1,389 篇 农学
  • 1,136 篇 教育学
  • 543 篇 文学
  • 208 篇 军事学
  • 130 篇 艺术学
  • 25 篇 哲学
  • 20 篇 历史学

主题

  • 2,927 篇 accuracy
  • 2,563 篇 computer science
  • 2,517 篇 deep learning
  • 2,151 篇 machine learning
  • 1,967 篇 feature extracti...
  • 1,956 篇 computational mo...
  • 1,836 篇 training
  • 1,333 篇 predictive model...
  • 1,330 篇 optimization
  • 1,320 篇 internet of thin...
  • 1,312 篇 real-time system...
  • 1,243 篇 support vector m...
  • 1,237 篇 artificial intel...
  • 1,220 篇 convolutional ne...
  • 956 篇 neural networks
  • 929 篇 data models
  • 881 篇 data mining
  • 876 篇 wireless sensor ...
  • 821 篇 image segmentati...
  • 758 篇 security

机构

  • 1,101 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 979 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 660 篇 university of ch...
  • 582 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 535 篇 school of physic...
  • 528 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 514 篇 nikhef national ...
  • 512 篇 stfc rutherford ...
  • 501 篇 school of physic...
  • 500 篇 physik-institut ...
  • 495 篇 henryk niewodnic...
  • 484 篇 department of el...
  • 484 篇 center for high ...
  • 481 篇 iccub universita...

作者

  • 268 篇 a. gomes
  • 265 篇 barter w.
  • 249 篇 c. alexa
  • 248 篇 c. amelung
  • 247 篇 j. m. izen
  • 246 篇 g. bella
  • 246 篇 j. strandberg
  • 246 篇 d. calvet
  • 241 篇 beiter a.
  • 235 篇 s. chen
  • 231 篇 blake t.
  • 227 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 g. spigo
  • 220 篇 brundu d.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 borsato m.
  • 216 篇 f. siegert

语言

  • 92,897 篇 英文
  • 7,293 篇 其他
  • 1,042 篇 中文
  • 114 篇 日文
  • 15 篇 德文
  • 11 篇 法文
  • 9 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 俄文
检索条件"机构=School of Computer Science and Engineering and the Department of Cognitive Science"
101280 条 记 录,以下是781-790 订阅
排序:
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-17页
作者: Ji, Xiaoyu Zhang, Guoming Li, Xinfeng Qu, Gang Cheng, Xiuzhen Xu, Wenyuan Electrical Engineering of Zhejiang University Hangzhou China School of Computer Science and Technology of Shandong University Qingdao China Department of Electrical and Computer Engineering at the University of Maryland College Park MD USA
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E... 详细信息
来源: 评论
Matching 5G Connected Vehicles to Sensed Vehicles for Safe Cooperative Autonomous Driving
收藏 引用
IEEE Network 2024年 第3期38卷 227-235页
作者: Tang, Zuoyin He, Jianhua Yang, Kun Chen, Hsiao-Hwa Aston University School of Computer Science and Digital Technologies BirminghamB4 7ET United Kingdom Essex University School of Computer Science and Electronic Engineering ColchesterCO4 3SQ United Kingdom National Cheng Kung University Department of Engineering Science Tainan70101 Taiwan
5G connected autonomous vehicles (CAVs) help enhance perception of driving environment and cooperation among vehicles by sharing sensing and driving information, which is a promising technology to avoid accidents and ... 详细信息
来源: 评论
AI LipReader-Transcribing Speech from Lip Movements  6
AI LipReader-Transcribing Speech from Lip Movements
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Ajitha, D. Dutta, Disha Saha, Falguni Giri, Parus Kant, Rohan School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Software Systems Vellore India School of Computer Science and Engineering Vellore Institute of Technology Department of Database Systems Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Information Security Vellore India
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks... 详细信息
来源: 评论
A Comparative Exploration of Time Series Models for Wild Fire Prediction  4
A Comparative Exploration of Time Series Models for Wild Fir...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Sri Sowmya, V. Sasikala, D. Theetchenya, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India Sona College of Technology Department of Computer Science and Engineering Salem India
Wildfires pose a great threat to human safety and property arising from both natural and human causes. According to a technical assessment by the Forest Survey of India more than 95% of fires are of anthropogenic orig... 详细信息
来源: 评论
Virtual Keyboard:A Real-Time Hand Gesture Recognition-Based Character Input System Using LSTM and Mediapipe Holistic
收藏 引用
computer Systems science & engineering 2024年 第2期48卷 555-570页
作者: Bijon Mallik Md Abdur Rahim Abu Saleh Musa Miah Keun Soo Yun Jungpil Shin Department of Computer Science and Engineering Pabna University of Science and TechnologyPabna6600Bangladesh School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan School of Computer and Information Technology Ulsan CollegeDong-guUlsan44610South Korea
In the digital age,non-touch communication technologies are reshaping human-device interactions and raising security concerns.A major challenge in current technology is the misinterpretation of gestures by sensors and... 详细信息
来源: 评论
Incorporation of Two-Fold Trust in Group Recommender System to Handle Popularity Bias
收藏 引用
SN computer science 2024年 第2期5卷 259页
作者: Richa Bedi, Punam Gupta, Shivani Kumar, Ranjeet Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India Department of Computer Science University of Delhi Delhi New Delhi India School of Computer Science Engineering and Technology Vellore Institute of Technology Tamilnadu Chennai India School of Electronics Engineering Vellore Institute of Technology Tamilnadu Chennai India
In recent years, there has been a rise in work which focuses on various issues of recommender systems other than accuracy. Popularity bias is one factor that causes the list of recommendations to deviate from the user... 详细信息
来源: 评论
RBLA: Rank-Based-LoRA-Aggregation for Fine-Tuning Heterogeneous Models in FLaaS  31st
RBLA: Rank-Based-LoRA-Aggregation for Fine-Tuning Heterogen...
收藏 引用
31st International Conference on Web Services, ICWS 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Chen, Shuaijun Tavallaie, Omid Nazemi, Niousha Zomaya, Albert Y. School of Computer Science The University of Sydney Camperdown Australia Department of Engineering Science University of Oxford Oxford United Kingdom
Federated Learning (FL) is a promising privacy-aware distributed learning framework that can be deployed on various devices, such as mobile phones, desktops, and devices equipped with CPUs or GPUs. In the context of s... 详细信息
来源: 评论
Tensorial Evolutionary Computation for Spatial Optimization Problems
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 154-166页
作者: Si-Chao, Lei Xiaolin, Xiao Yue-Jiao, Gong Yun, Li Jun, Zhang the School of Computer Science and Engineering South China University of Technology Guangzhou510006 China the Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen610056 China the School of Computer Science South China Normal University Guangzhou510006 China the Department of Electrical and Electronic Engineering Hanyang University Seoul15588 Korea Republic of
—Spatial optimization problems (SOPs) refer to a class of problems where the decision variables require spatial organization. Existing methods based on evolutionary algorithms (EAs) fit conventional evolutionary oper... 详细信息
来源: 评论
Survey on Video Security:Examining Threats,Challenges,and Future Trends
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3591-3635页
作者: Ali Asghar Amna Shifa Mamoona Naveed Asghar Department of Artificial Intelligence Faculty of ComputingThe Islamia University of BahawalpurBahawalpur63100Pakistan School of Computer Science College of Science and EngineeringUniversity of GalwayGalwayH91 TK33Ireland
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** ... 详细信息
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论