咨询与建议

限定检索结果

文献类型

  • 118,301 篇 会议
  • 79,541 篇 期刊文献
  • 1,150 册 图书

馆藏范围

  • 198,992 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 124,147 篇 工学
    • 75,207 篇 计算机科学与技术...
    • 61,278 篇 软件工程
    • 26,035 篇 信息与通信工程
    • 17,579 篇 控制科学与工程
    • 15,386 篇 电子科学与技术(可...
    • 15,199 篇 电气工程
    • 12,032 篇 生物工程
    • 10,146 篇 化学工程与技术
    • 10,103 篇 机械工程
    • 8,889 篇 光学工程
    • 8,065 篇 生物医学工程(可授...
    • 7,543 篇 材料科学与工程(可...
    • 6,694 篇 仪器科学与技术
    • 6,608 篇 动力工程及工程热...
    • 4,018 篇 交通运输工程
    • 3,778 篇 网络空间安全
    • 3,688 篇 安全科学与工程
    • 3,662 篇 土木工程
  • 72,804 篇 理学
    • 34,859 篇 数学
    • 24,017 篇 物理学
    • 13,785 篇 生物学
    • 10,964 篇 统计学(可授理学、...
    • 9,894 篇 化学
    • 6,726 篇 系统科学
  • 30,951 篇 管理学
    • 19,341 篇 管理科学与工程(可...
    • 12,585 篇 图书情报与档案管...
    • 7,637 篇 工商管理
  • 8,108 篇 医学
    • 6,460 篇 临床医学
    • 5,309 篇 基础医学(可授医学...
  • 4,576 篇 法学
    • 3,711 篇 社会学
  • 3,416 篇 经济学
  • 2,650 篇 农学
  • 1,928 篇 教育学
  • 837 篇 文学
  • 713 篇 军事学
  • 416 篇 艺术学
  • 36 篇 历史学
  • 31 篇 哲学

主题

  • 4,802 篇 feature extracti...
  • 4,635 篇 computer science
  • 4,084 篇 accuracy
  • 3,912 篇 training
  • 3,822 篇 computational mo...
  • 3,572 篇 deep learning
  • 2,897 篇 semantics
  • 2,748 篇 machine learning
  • 2,602 篇 optimization
  • 2,319 篇 data mining
  • 2,204 篇 predictive model...
  • 2,162 篇 data models
  • 1,896 篇 neural networks
  • 1,836 篇 educational inst...
  • 1,762 篇 support vector m...
  • 1,716 篇 image segmentati...
  • 1,599 篇 robustness
  • 1,582 篇 real-time system...
  • 1,560 篇 algorithm design...
  • 1,518 篇 internet of thin...

机构

  • 2,452 篇 school of comput...
  • 2,020 篇 school of mechan...
  • 1,922 篇 university of ch...
  • 1,628 篇 cavendish labora...
  • 1,551 篇 school of comput...
  • 1,493 篇 school of automa...
  • 1,449 篇 school of comput...
  • 1,265 篇 school of comput...
  • 1,254 篇 school of comput...
  • 1,172 篇 school of comput...
  • 1,106 篇 school of electr...
  • 1,085 篇 department of co...
  • 1,029 篇 school of comput...
  • 1,014 篇 school of comput...
  • 1,013 篇 college of compu...
  • 895 篇 department of ph...
  • 886 篇 school of comput...
  • 880 篇 department for p...
  • 876 篇 department of ph...
  • 849 篇 institute of phy...

作者

  • 460 篇 annovi a.
  • 447 篇 bachacou h.
  • 430 篇 aad g.
  • 420 篇 alonso f.
  • 419 篇 akimov a.v.
  • 415 篇 amidei d.
  • 409 篇 arnaez o.
  • 409 篇 alimonti g.
  • 407 篇 alexopoulos t.
  • 399 篇 azuelos g.
  • 399 篇 alexa c.
  • 398 篇 argyropoulos s.
  • 394 篇 anastopoulos c.
  • 390 篇 abulaiti y.
  • 388 篇 augsten k.
  • 388 篇 adelman j.
  • 386 篇 aloisio a.
  • 384 篇 arce a.t.h.
  • 384 篇 abidi s.h.
  • 382 篇 amelung c.

语言

  • 172,286 篇 英文
  • 22,023 篇 其他
  • 4,780 篇 中文
  • 101 篇 日文
  • 76 篇 法文
  • 72 篇 德文
  • 10 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 4 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Technology Nanjing University of Science and Technology"
198992 条 记 录,以下是701-710 订阅
排序:
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
A Novel CAPTCHA Recognition System Based on Refined Visual Attention
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 115-136页
作者: Zaid Derea Beiji Zou Xiaoyan Kui Monir Abdullah Alaa Thobhani Amr Abdussalam School of Computer Science and Engineering Central South UniversityChangsha410083China College of Computer Science and Information Technology Wasit UniversityWasit52001Iraq Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha67714Saudi Arabia Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma... 详细信息
来源: 评论
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2207-2220页
作者: Dawei Xu Fan Huang Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao School of Computer Science Changchun UniversityChangchun130012China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100081China School of InformationManagement for Law China University of Political Science and LawBeijing102249China
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly *** and smart contract technologies,with their decentralized nature,provide strong security g... 详细信息
来源: 评论
Many-Objective Optimization-Based Task Scheduling in Hybrid Cloud Environments
收藏 引用
computer Modeling in Engineering & sciences 2023年 第9期136卷 2425-2450页
作者: Mengkai Zhao Zhixia Zhang Tian Fan Wanwan Guo Zhihua Cui The School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan030024China The School of Electronic Information Engineering Taiyuan University of Science and TechnologyTaiyuan030024China
Due to the security and scalability features of hybrid cloud architecture,it can bettermeet the diverse requirements of users for cloud *** a reasonable resource allocation solution is the key to adequately utilize th... 详细信息
来源: 评论
Generative artificial intelligence:a historical perspective
收藏 引用
National science Review 2025年 第5期12卷 465-479页
作者: Ran He Jie Cao Tieniu Tan New Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences School of Intelligence Science and Technology Nanjing University
Generative artificial intelligence(GAI) has recently achieved significant success, enabling anyone to create texts, images, videos and even computer codes while providing insights that might not be possible with tradi... 详细信息
来源: 评论
Single Image Deraining Using Dual Branch Network Based on Attention Mechanism for IoT
收藏 引用
computer Modeling in Engineering & sciences 2023年 第11期137卷 1989-2000页
作者: Di Wang Bingcai Wei Liye Zhang School of Computer Science and Technology Shandong University of TechnologyZibo255000China
Extracting useful details from images is essential for the Internet of Things ***,in real life,various external environments,such as badweather conditions,will cause the occlusion of key target information and image d... 详细信息
来源: 评论
Low Resolution Deepfake Face Detection using Multi-Scale Discrete Cosine Transform and Vision Transformer  3
Low Resolution Deepfake Face Detection using Multi-Scale Dis...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Uddin, Main Fu, Zhangjie Zhang, Xiang Arnob, Abu Bakor Hayat Nanjing University of Information Science and Technology School of Computer Science Nanjing China Nanjing University of Information Science and Technology School of Artificial Intelligence Nanjing China
Deepfake technology uses generative adversarial networks to produce highly authentic counterfeit images and videos, which raises a significant global security concern by disseminating fake information through online p... 详细信息
来源: 评论
Surface-modified composite separator for lithium-ion battery with enhanced durability and security
收藏 引用
Progress in Natural science:Materials International 2023年 第6期33卷 804-811页
作者: Wangbing Yao Xiaodong He Zhuoyuan Zheng Dongming Liu Jinbao Song Yusong Zhu School of Materials Science and Engineering Anhui University of Technology Nanjing Gotion Battery Co.LTD School of Energy Science and Engineering Nanjing Tech University
In the long-term repeated cycling process of lithium-ion batteries(LIBs), the seamless transmission of lithium ions through the separator is crucial for the normal operation of the batteries. However, the irregular ... 详细信息
来源: 评论
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU Jingfeng XUE Yong WANG Tianwei LEI Weijie HAN Xianwei GAO School of Computer Science and Technology Beijing Institute of Technology School of Space Information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 评论
WGO: a similarly encoded whale-goshawk optimization algorithm for uncertain cloud manufacturing service composition
收藏 引用
Autonomous Intelligent Systems 2025年 第1期5卷 1-13页
作者: Chen, Kezhou Wang, Tao Zhuo, Huimin Cheng, Lianglun School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China School of Automation Guangdong University of Technology Guangzhou510006 China
Service Composition and Optimization Selection (SCOS) is crucial in Cloud Manufacturing (CMfg), but the uncertainties in service states and working environments pose challenges for existing QoS-based methods. Recently... 详细信息
来源: 评论