咨询与建议

限定检索结果

文献类型

  • 2,235 篇 期刊文献
  • 1,890 篇 会议
  • 73 册 图书

馆藏范围

  • 4,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,436 篇 工学
    • 1,695 篇 计算机科学与技术...
    • 1,428 篇 软件工程
    • 509 篇 信息与通信工程
    • 339 篇 生物工程
    • 301 篇 电气工程
    • 291 篇 控制科学与工程
    • 277 篇 生物医学工程(可授...
    • 218 篇 光学工程
    • 188 篇 电子科学与技术(可...
    • 155 篇 机械工程
    • 144 篇 核科学与技术
    • 125 篇 化学工程与技术
    • 114 篇 仪器科学与技术
    • 87 篇 动力工程及工程热...
    • 78 篇 安全科学与工程
    • 73 篇 交通运输工程
  • 1,732 篇 理学
    • 787 篇 物理学
    • 634 篇 数学
    • 399 篇 生物学
    • 211 篇 统计学(可授理学、...
    • 139 篇 化学
    • 122 篇 系统科学
  • 594 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 265 篇 图书情报与档案管...
    • 161 篇 工商管理
  • 308 篇 医学
    • 252 篇 临床医学
    • 233 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
    • 110 篇 公共卫生与预防医...
  • 134 篇 法学
    • 97 篇 社会学
  • 61 篇 经济学
  • 47 篇 农学
  • 45 篇 教育学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 6 篇 文学
  • 2 篇 哲学

主题

  • 95 篇 machine learning
  • 89 篇 feature extracti...
  • 78 篇 artificial intel...
  • 75 篇 deep learning
  • 69 篇 hadron colliders
  • 69 篇 accuracy
  • 68 篇 training
  • 61 篇 higgs bosons
  • 54 篇 computational mo...
  • 53 篇 security
  • 51 篇 data models
  • 49 篇 internet of thin...
  • 48 篇 predictive model...
  • 47 篇 proton-proton in...
  • 46 篇 computer science
  • 44 篇 semantics
  • 41 篇 real-time system...
  • 40 篇 optimization
  • 39 篇 blockchain
  • 37 篇 informatics

机构

  • 414 篇 department for p...
  • 409 篇 faculty of scien...
  • 405 篇 kirchhoff-instit...
  • 398 篇 department of ph...
  • 388 篇 department of ph...
  • 386 篇 institute of phy...
  • 385 篇 department of ph...
  • 373 篇 institute of phy...
  • 369 篇 fakultät für phy...
  • 340 篇 instituto de fís...
  • 306 篇 department of ph...
  • 289 篇 graduate school ...
  • 285 篇 department of ph...
  • 279 篇 dipartimento di ...
  • 277 篇 department of ph...
  • 275 篇 universidade fed...
  • 272 篇 nikhef national ...
  • 270 篇 ictp trieste
  • 262 篇 department of ph...
  • 255 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 336 篇 g. bella
  • 336 篇 d. calvet
  • 336 篇 c. amelung
  • 334 篇 j. m. izen
  • 334 篇 j. strandberg
  • 334 篇 g. spigo
  • 333 篇 f. siegert
  • 321 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 319 篇 s. mohapatra
  • 311 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 306 篇 y. tayalati
  • 304 篇 j. schaarschmidt
  • 298 篇 a. d. pilkington
  • 290 篇 m. klein
  • 288 篇 l. chevalier

语言

  • 4,005 篇 英文
  • 162 篇 其他
  • 32 篇 中文
  • 5 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=School of Computer Science and Informatics Cyber Technology Institute"
4198 条 记 录,以下是1-10 订阅
排序:
LucIE: Language-guided local image editing for fashion images
收藏 引用
Computational Visual Media 2025年 第1期11卷 179-194页
作者: Huanglu Wen Shaodi You Ying Fu School of Computer Science and Technology Beijing Institute of TechnologyBeijingChina Computer Vision Research Group in the Institute of Informatics University of AmsterdamAmsterdamthe Netherlands
Language-guided fashion image editing is challenging,as fashion image editing is local and requires high precision,while natural language cannot provide precise visual information for *** this paper,we propose LucIE,a... 详细信息
来源: 评论
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
Towards Net Zero Resilience: A Futuristic Architectural Strategy for cyber-Attack Defence in Industrial Control Systems (ICS) and Operational technology (OT)
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3619-3641页
作者: Hariharan Ramachandran Richard Smith Kenny Awuson David Tawfik Al-Hadhrami Parag Acharya The Office of Gas and Electricity Markets(Ofgem) LondonE144PUUK School of Computer Science and Informatics Cyber Technology Institute De Montfort UniversityLeicesterLE19BHUK Computer Science Department School of Science and TechnologyNottingham Trent UniversityNottinghamNG118NSUK
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational technology (OT) environments. The ISERA f... 详细信息
来源: 评论
Characterizing the app recommendation relationships in the iOS app store: a complex network's perspective
收藏 引用
science China(Information sciences) 2025年 第4期68卷 284-299页
作者: Gang HUANG Fuqi LIN Yun MA Haoyu WANG Qingxiang WANG Gareth TYSON Xuanzhe LIU Key Lab of High Confidence Software Technologies (Peking University) Ministry of Education School of Computer Science Peking University Institute for Artificial Intelligence Peking University School of Cyber Science and Engineering Huazhong University of Science and Technology Alibaba Group Hong Kong University of Science and Technology (Guangzhou)
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee... 详细信息
来源: 评论
A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 5349-5375页
作者: Shafique, Arslan Mehmood, Abid Alawida, Moatsum Elhadef, Mourad Rehman, Mujeeb Ur School of Biomedical Engineering University of Glasgow Glasgow United Kingdom Department of Computer Sciences Abu Dhabi University Abu Dhabi United Arab Emirates Cyber Technology Institute School of Computer Science and Informatics De Montfort University Leicester United Kingdom
Within the domain of image encryption, an intrinsic trade-off emerges between computational complexity and the integrity of data transmission security. Protecting digital images often requires extensive mathematical o... 详细信息
来源: 评论
COMPrompter: reconceptualized segment anything model with multiprompt network for camouflaged object detection
收藏 引用
science China(Information sciences) 2025年 第1期68卷 189-203页
作者: Xiaoqin ZHANG Zhenni YU Li ZHAO Deng-Ping FAN Guobao XIAO Zhejiang Province Key Laboratory of Intelligent Informatics for Safety and Emergency Wenzhou University Nankai International Advanced Research Institute (SHENZHEN FUTIAN) College of Computer Science Nankai University School of Computer Science and Technology Tongji University
We rethink the segment anything model(SAM) and propose a novel multiprompt network called COMPrompter for camouflaged object detection(COD). SAM has zero-shot generalization ability beyond other models and can provide... 详细信息
来源: 评论
A Novel Semantic Driven Meta-Learning Model for Rare Attack Detection
收藏 引用
IEEE Access 2025年 13卷 73219-73235页
作者: Annie Jerusha, Y. Syed Ibrahim, S.P. Varadharajan, Vijay Vellore Institute of Technology School of Computer Science and Engineering Chennai600127 India The University of Newcastle Advanced Cyber Security Engineering Research Centre Callaghan Australia
Accurate network intrusion detection requires extracting relevant semantic features that minimise mis-classification and identify several kinds of attacks. Traditional models often struggle to identify uncertain traff... 详细信息
来源: 评论
CSA4Rec: Collaborative Signals Augmentation Model Based on GCN for Recommendation  25th
CSA4Rec: Collaborative Signals Augmentation Model Based on ...
收藏 引用
25th International Conference on Web Information Systems Engineering, WISE 2024
作者: Liu, Haibo Yu, Lianjie Si, Yali Liu, Jinglian School of Cyber Security and Computer Hebei University Baoding Baoding China School of Computer Science and Engineering Changshu Institute of Technology Suzhou China
Graph Convolution Network (GCN) is a potent deep learning methodology and GCN-based graph data augmentation methods excel in recommender systems. The augmented data, as the higher-order collaborative signals, is gener... 详细信息
来源: 评论
Single-level Discrete Two Dimensional Wavelet Transform Based Multiscale Deep Learning Framework for Two-Wheeler Helmet Classification
EAI Endorsed Transactions on Industrial Networks and Intelli...
收藏 引用
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 2025年 第2期12卷 1-13页
作者: Annadurai, Amrutha Prusty, Manas Ranjan Pandey, Trilok Nath Patra, Subhra Rani School of Computer Science and Engineering Vellore Institute of Technology Chennai India Centre for Cyber Physical Systems Vellore Institute of Technology Chennai India Information Systems and Operations Management University of Texas at Arlington Texas 76019 United States
INTRODUCTION: A robust method is proposed in this paper to detect helmet usage in two-wheeler riders to enhance road safety. OBJECTIVES: This involves a custom made dataset that contains 1000 images captured under div... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论