咨询与建议

限定检索结果

文献类型

  • 20,082 篇 会议
  • 13,063 篇 期刊文献
  • 314 册 图书

馆藏范围

  • 33,459 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,763 篇 工学
    • 14,511 篇 计算机科学与技术...
    • 11,958 篇 软件工程
    • 4,832 篇 信息与通信工程
    • 3,339 篇 控制科学与工程
    • 2,704 篇 生物工程
    • 2,695 篇 电气工程
    • 2,163 篇 电子科学与技术(可...
    • 2,052 篇 生物医学工程(可授...
    • 1,773 篇 光学工程
    • 1,369 篇 机械工程
    • 1,257 篇 化学工程与技术
    • 1,193 篇 动力工程及工程热...
    • 1,047 篇 网络空间安全
    • 1,027 篇 仪器科学与技术
    • 951 篇 安全科学与工程
    • 922 篇 材料科学与工程(可...
  • 11,935 篇 理学
    • 5,844 篇 数学
    • 3,859 篇 物理学
    • 2,998 篇 生物学
    • 1,983 篇 统计学(可授理学、...
    • 1,385 篇 化学
    • 1,248 篇 系统科学
  • 5,597 篇 管理学
    • 3,418 篇 管理科学与工程(可...
    • 2,398 篇 图书情报与档案管...
    • 1,511 篇 工商管理
  • 2,212 篇 医学
    • 1,769 篇 临床医学
    • 1,587 篇 基础医学(可授医学...
    • 1,060 篇 公共卫生与预防医...
    • 954 篇 药学(可授医学、理...
  • 1,167 篇 法学
    • 960 篇 社会学
  • 600 篇 经济学
  • 514 篇 农学
  • 366 篇 教育学
  • 208 篇 文学
  • 65 篇 军事学
  • 44 篇 艺术学
  • 9 篇 哲学
  • 5 篇 历史学

主题

  • 1,129 篇 accuracy
  • 1,111 篇 deep learning
  • 733 篇 machine learning
  • 726 篇 computational mo...
  • 692 篇 training
  • 667 篇 feature extracti...
  • 514 篇 predictive model...
  • 498 篇 real-time system...
  • 464 篇 internet of thin...
  • 454 篇 convolutional ne...
  • 433 篇 support vector m...
  • 408 篇 data models
  • 335 篇 semantics
  • 298 篇 computer science
  • 278 篇 reliability
  • 272 篇 artificial intel...
  • 269 篇 optimization
  • 263 篇 neural networks
  • 257 篇 scalability
  • 256 篇 computer archite...

机构

  • 232 篇 school of comput...
  • 194 篇 department of co...
  • 153 篇 key laboratory o...
  • 150 篇 university of ch...
  • 125 篇 university of sc...
  • 120 篇 department of co...
  • 119 篇 school of comput...
  • 116 篇 school of comput...
  • 115 篇 school of comput...
  • 112 篇 department of co...
  • 111 篇 school of comput...
  • 111 篇 institute of com...
  • 104 篇 college of compu...
  • 102 篇 department of co...
  • 101 篇 school of comput...
  • 100 篇 school of comput...
  • 97 篇 school of comput...
  • 94 篇 north-west unive...
  • 92 篇 national enginee...
  • 90 篇 department of co...

作者

  • 172 篇 niyato dusit
  • 104 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 zheng wei-shi
  • 82 篇 bozza c.
  • 80 篇 anjali t.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 72 篇 li xin
  • 69 篇 li cheng
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 64 篇 liu d.
  • 63 篇 kalekin o.
  • 61 篇 chen m.j.
  • 60 篇 min z.

语言

  • 30,086 篇 英文
  • 3,117 篇 其他
  • 295 篇 中文
  • 6 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computing Science and Engineering School Of Computing Science & Engineering"
33459 条 记 录,以下是251-260 订阅
排序:
Adaptive sail fish optimizer based optimized region selection for robust video steganography
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第4期17卷 2417-2427页
作者: Babu, J. Suresh Niranjana, G. Ramana, Kadiyala Department of Computing Science & Engineering School of Computing College of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur Chengalpattu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Chengalpattu India Department of Artificial Intelligence and Data Science Chaitanya Bharathi Institute of Technology (Autonomous) Hyderabad India
Securing data transmission in a digital era is a difficult one due to the broad application of the Internet, personal computers, and mobile phones for communication. Traditional video steganography techniques sometime... 详细信息
来源: 评论
Leveraging HPC with GAN-CNN Integration for Enhanced Tuberculosis Detection using Synthetic Image Generation  3
Leveraging HPC with GAN-CNN Integration for Enhanced Tubercu...
收藏 引用
3rd International Conference on Automation, computing and Renewable Systems, ICACRS 2024
作者: Manasa, Pokala Veeramalla, Vaishnavi Vanusha, D. Vathana, D. Robinsha, Delsi S. Department of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Chengalpattu603203 India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Chengalpattu603203 India
Tuberculosis (TB) remains a significant global health challenge, especially in remote areas with limited medical resources. Early and accurate diagnosis is crucial to control its spread. This project harnesses high-pe... 详细信息
来源: 评论
Enhancing sarcasm detection through grasshopper optimization with deep learning based sentiment analysis on social media
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1785-1791页
作者: Srinu, Nidamanuri Sivaraman, K. Sriram, M. School of Computing Department of Computer Science and Engineering Bharath Institute of Higher Education and Research Chennai 600073 India
Detecting sarcasm in social media presents challenges in natural language processing (NLP) due to the informal language, contextual complexities, and nuanced expression of sentiment. Integrating sentiment analysis (SA... 详细信息
来源: 评论
Cognition2Vocation: meta-learning via ConvNets and continuous transformers
收藏 引用
Neural computing and Applications 2024年 第21期36卷 12935-12950页
作者: Kamran, Sara Hosseini, Saeid Esmailzadeh, Sayna Kangavari, Mohammad Reza Hua, Wen School of Computer Engineering Iran University of Science and Technology Tehran Iran Faculty of Computing and Information Technology Sohar University Sohar Oman Department of Computing The Hong Kong Polytechnic University Hong Kong
Estimating the suitability of individuals for a vocation via leveraging the knowledge within cognitive factors comes with numerous applications: employment resourcing, occupation counseling, and workload management. A... 详细信息
来源: 评论
Sybil Assault Detection in VANET with Efficient Network Analysis
Sybil Assault Detection in VANET with Efficient Network Anal...
收藏 引用
2024 MIT Art, Design and Technology school of computing International Conference, MITADTSoCiCon 2024
作者: Mukherjee Mathur, Shubhra Jadhav, Nagesh Gupta, Ravindra Design and Technology University Pune Sarvepalli Radakrishnan University School of Computing MIT Art Department of Computer Science and Engineering Bhopal India Design and Technology University School of Computing MIT Art Department of Computer Science and Engineering Pune India Sarvepalli Radakrishnan University School of Computing Department of Computer Science and Engineering Bhopal India
A developing technology that can be highly helpful for both intelligent transportation services and safety and security is the Automobile ad hoc network, or VANET. Nevertheless because of the great mobility and wirele... 详细信息
来源: 评论
Enhancing Asthma Diagnosis Through Machine Learning: A Stacking Ensemble Approach  1
Enhancing Asthma Diagnosis Through Machine Learning: A Stack...
收藏 引用
1st International Conference for Women in computing, InCoWoCo 2024
作者: Goel, Manas Gupta, Manya Jothikumar, C. Shanmugam, S. Ashokkumar, C. School of Computing College of Engineering and Technology SRM Institute of Science and Technology Department of Computing Technologies Chennai603203 India
Asthma diagnosis remains a major clinical concern since it has diverse symptoms and is caused by various contributory causes. Machine learning was applied in this study to solve these complications in order to analyze... 详细信息
来源: 评论
Uncertainty-Calibrated Test-Time Model Adaptation without Forgetting
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 1-14页
作者: Tan, Mingkui Chen, Guohao Wu, Jiaxiang Zhang, Yifan Chen, Yaofo Zhao, Peilin Niu, Shuaicheng South China University of Technology School of Software Engineering China Pazhou Laboratory Guangzhou China XVERSE China National University of Singapore School of Computing Singapore Tencent AI Lab China Nanyang Technological University College of Computing and Data Science Singapore
Test-time adaptation (TTA) seeks to tackle potential distribution shifts between training and testing data by adapting a given model w.r.t. any testing sample. This task is particularly important when the test environ... 详细信息
来源: 评论
YOLOv4-Powered Traffic Intelligence: From Detection to Optimization
YOLOv4-Powered Traffic Intelligence: From Detection to Optim...
收藏 引用
2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Sanjiv, Sinha Tharunn, E. Baskar, M. School of Computing College of Engineering and Technology Srm Institute of Science and Technology Department of Computing Technologies Chennai Kattankulathur India
The Traffic Analysis System utilizes machine learning for real-time traffic insights at a junction. It provides instant stats like vehicle count, density, and FPS, while summarizing average vehicle crossings, densitie... 详细信息
来源: 评论
An Integrated Approach To Mitigating Systemic Cyber Risk In Autonomous Electric Vehicles  100
An Integrated Approach To Mitigating Systemic Cyber Risk In ...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Mamun, Quazi Pan, Zhenni Shimamoto, Shigeru Charles Sturt University School of Computing Mathematics and Engineering Australia Waseda University Global Center for Science and Engineering Faculty of Science and Engineering Japan Waseda University School of Fundamental Science and Engineering Faculty of Science and Engineering Japan
Integrating autonomous vehicles (AVs) within our transportation ecosystem presents exciting possibilities and introduces intricate challenges. Systemic failures due to cyberattacks on AVs could have far-reaching conse... 详细信息
来源: 评论
A Survey on the Evolution of Bootkits Attack and Defense Techniques
收藏 引用
China Communications 2024年 第1期21卷 102-130页
作者: Yilin Zhou Guojun Peng Zichuan Li Side Liu Key Laboratory of Aerospace Information Security and Trust Computing Ministry of EducationWuhan 430072China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
According to the boot process of modern computer systems,whoever boots first will gain control *** advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass s... 详细信息
来源: 评论