咨询与建议

限定检索结果

文献类型

  • 29,608 篇 会议
  • 20,361 篇 期刊文献
  • 503 册 图书

馆藏范围

  • 50,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31,035 篇 工学
    • 18,275 篇 计算机科学与技术...
    • 14,736 篇 软件工程
    • 8,018 篇 信息与通信工程
    • 5,663 篇 电气工程
    • 5,652 篇 电子科学与技术(可...
    • 5,380 篇 控制科学与工程
    • 3,594 篇 生物工程
    • 3,169 篇 光学工程
    • 2,868 篇 生物医学工程(可授...
    • 2,117 篇 机械工程
    • 2,099 篇 动力工程及工程热...
    • 1,933 篇 化学工程与技术
    • 1,864 篇 仪器科学与技术
    • 1,849 篇 材料科学与工程(可...
    • 1,091 篇 交通运输工程
    • 1,052 篇 网络空间安全
  • 18,823 篇 理学
    • 8,833 篇 数学
    • 6,990 篇 物理学
    • 4,051 篇 生物学
    • 3,239 篇 统计学(可授理学、...
    • 2,260 篇 系统科学
    • 2,210 篇 化学
  • 6,946 篇 管理学
    • 4,591 篇 管理科学与工程(可...
    • 2,535 篇 图书情报与档案管...
    • 2,283 篇 工商管理
  • 2,976 篇 医学
    • 2,389 篇 临床医学
    • 2,135 篇 基础医学(可授医学...
    • 1,265 篇 公共卫生与预防医...
    • 1,265 篇 药学(可授医学、理...
  • 1,425 篇 法学
    • 1,232 篇 社会学
  • 841 篇 经济学
  • 538 篇 农学
  • 477 篇 教育学
  • 261 篇 文学
  • 101 篇 军事学
  • 55 篇 艺术学
  • 7 篇 哲学
  • 6 篇 历史学

主题

  • 1,190 篇 accuracy
  • 1,110 篇 deep learning
  • 1,069 篇 computer science
  • 889 篇 computational mo...
  • 878 篇 machine learning
  • 755 篇 training
  • 750 篇 feature extracti...
  • 662 篇 internet of thin...
  • 566 篇 optimization
  • 554 篇 real-time system...
  • 513 篇 predictive model...
  • 476 篇 artificial intel...
  • 457 篇 convolutional ne...
  • 424 篇 support vector m...
  • 398 篇 data models
  • 374 篇 neural networks
  • 351 篇 robustness
  • 338 篇 analytical model...
  • 334 篇 wireless sensor ...
  • 333 篇 reinforcement le...

机构

  • 617 篇 department of el...
  • 185 篇 department of co...
  • 155 篇 school of electr...
  • 129 篇 school of automa...
  • 128 篇 school of comput...
  • 118 篇 department of co...
  • 115 篇 school of electr...
  • 115 篇 school of electr...
  • 110 篇 school of comput...
  • 109 篇 college of compu...
  • 106 篇 department of ph...
  • 105 篇 department of co...
  • 104 篇 faculty of scien...
  • 101 篇 departamento de ...
  • 100 篇 faculté des scie...
  • 98 篇 school of comput...
  • 93 篇 department of ph...
  • 93 篇 department of ph...
  • 91 篇 north-west unive...
  • 89 篇 department of ph...

作者

  • 323 篇 niyato dusit
  • 116 篇 han zhu
  • 95 篇 ferrara g.
  • 94 篇 ardid m.
  • 93 篇 calvo d.
  • 92 篇 chen a.
  • 91 篇 c. alexa
  • 90 篇 j. m. izen
  • 90 篇 s. veneziano
  • 90 篇 g. bella
  • 90 篇 d. calvet
  • 90 篇 c. amelung
  • 90 篇 y. tayalati
  • 89 篇 j. strandberg
  • 89 篇 n. orlando
  • 89 篇 g. spigo
  • 89 篇 v. chiarella
  • 89 篇 f. siegert
  • 88 篇 f. buehrer
  • 88 篇 a. t. law

语言

  • 46,184 篇 英文
  • 3,775 篇 其他
  • 496 篇 中文
  • 32 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Engineering Department of Computer Science and Electrical Engineering"
50472 条 记 录,以下是91-100 订阅
排序:
Topology Construction for Max-Min Rate Optimization in Heterogeneous UAVs Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20203-20214页
作者: Wu, Kefeng Chin, Kwan-Wu Soh, Sieteng Sun Yat-sen University School of Cyber Science and Technology Guangzhou510275 China University of Wollongong School of Electrical Computer and Telecommunications Engineering NSW2522 Australia Curtin University School of Electrical Engineering Computing and Mathematical Sciences PerthWA6102 Australia
This paper considers a topology construction problem involving a fixed-wing Unmanned Aerial Vehicle (UAV), a set of quad-rotor UAVs and mobile ground users. The constructed topology must maximize the max-min flow rate... 详细信息
来源: 评论
Enhancing Early Exit Performance with Uncertainty-Aware Training in Convolutional Neural Networks for Image classification
收藏 引用
IEEE Access 2025年 13卷 91671-91681页
作者: Kurian, Thanu Thangam, S. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
Deep Neural Networks have become more and more complex over the past years delivering efficient results but demanding more requirements for resources. The traditional cloud-based DNN inference produces poor real-time ... 详细信息
来源: 评论
Generative AI based Secure Wireless Sensing for ISAC Networks
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5195-5210页
作者: Wang, Jiacheng Du, Hongyang Liu, Yinqiu Sun, Geng Niyato, Dusit Mao, Shiwen Kim, Dong In Shen, Xuemin Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Hong Kong Department of Electrical and Electronic Engineering Pok Fu Lam Hong Kong Jilin University College of Computer Science and Technology 130012 China Auburn University Department of Electrical and Computer Engineering Auburn United States Sungkyunkwan University Department of Electrical and Computer Engineering Suwon16419 Korea Republic of University of Waterloo Department of Electrical and Computer Engineering Canada
Integrated sensing and communications (ISAC) is one of the crucial technologies for 6G, and channel state information (CSI) based sensing serves as an essential part of ISAC. However, current research on ISAC focuses ... 详细信息
来源: 评论
New Antenna Array Beamforming Techniques Based on Hybrid Convolution/Genetic Algorithm for 5G and Beyond Communications
收藏 引用
computer Modeling in engineering & sciences 2024年 第3期138卷 2749-2767页
作者: Shimaa M.Amer Ashraf A.M.Khalaf Amr H.Hussein Salman A.Alqahtani Mostafa H.Dahshan Hossam M.Kassem Electronics and Communications Engineering Department Higher Institute of Engineering and TechnologyKafr ElsheikhEgypt Electronics and Electrical Communications Engineering Department Faculty of EngineeringMinia UniversityMiniaEgypt Electronics and Electrical Communications Engineering Department Faculty of EngineeringTanta UniversityTantaEgypt Electronics and Electrical Communications Engineering Department Faculty of EngineeringHorus University EgyptNew DamiettaEgypt Department of Computer Engineering College of computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia School of Computing Mathematics and EngineeringCharles Sturt UniversityBathurstNSW2795Australia
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up t... 详细信息
来源: 评论
Enhancing waste sorting and recycling efficiency: robust deep learning-based approach for classification and detection
收藏 引用
Neural computing and Applications 2025年 第6期37卷 4567-4583页
作者: Sayem, Faizul Rakib Islam, Md. Sakib Bin Naznine, Mansura Nashbat, Mohammad Hasan-Zia, Mazhar Kunju, Ali K Ansaruddin Khandakar, Amith Ashraf, Azad Majid, Molla Ehsanul Kashem, Saad Bin Abul Chowdhury, Muhammad E. H. Department of Electrical and Electronic Engineering University of Dhaka Dhaka Bangladesh Department of Biomedical Engineering Military Institute of Science and Technology Dhaka Bangladesh Department of Computer Science & Engineering Rajshahi University of Engineering & Technology Rajshahi6204 Bangladesh Chemical Engineering Department University of Doha for Science and Technology Doha Qatar Department of Electrical Engineering Qatar University Doha2713 Qatar Computer Applications Department Academic Bridge Program Qatar Foundation Doha Qatar Department of Computing Science AFG College With the University of Aberdeen Doha Qatar
Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio... 详细信息
来源: 评论
meMIA: Multilevel Ensemble Membership Inference Attack
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 93-106页
作者: Ullah, Najeeb Aman, Muhammad Naveed Sikdar, Biplab National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore University of Nebraska-Lincoln School of Computing LincolnNE68588 United States
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n... 详细信息
来源: 评论
Leveraging AI to Compromise IoT Device Privacy by Exploiting Hardware Imperfections
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第6期6卷 1561-1574页
作者: Baig, Mirza Athar Iqbal, Asif Aman, Muhammad Naveed Sikdar, Biplab University of Nebraska-Lincoln School of Computing LincolnNE68588 United States National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore
The constrained design, remote deployment, and sensitive data generated by Internet of Things (IoT) devices make them susceptible to various cyberattacks. One such attack is profiling IoT devices by tracking their pac... 详细信息
来源: 评论
Exploring the Impact of Deep Learning Models on Lane Detection Through Semantic Segmentation
收藏 引用
SN computer science 2024年 第1期5卷 139页
作者: Kumar, Sunil Pandey, Ankur Varshney, Sudeep School of Computing Science and Engineering Galgotias University Greater Noida India Department of Computer Science & Engineering Manipal University Jaipur Jaipur India Department of Computer Science & Engineering Sharda School of Engineering & Technology Greater Noida India
Due to advancements in the deep learning technology, object detection has become significantly important for lane detection and vehicle detection. In recent times, lane detection has become more popular as it plays a ... 详细信息
来源: 评论
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5901-5914页
作者: R.Brindha S.Nandagopal H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim Department of Computing Technologies SRM Institute of Science and TechnologyKattankulathur603203India Department of Computing Science and Engineering Nandha College of TechnologyErode638052India School of Computing Science and Engineering VIT Bhopal UniversityBhopal466114India Department of Computer Science and Engineering K.Ramakrishnan College of EngineeringTiruchirappalli621112India Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-si38541Gyeongbuk-doKorea
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论