咨询与建议

限定检索结果

文献类型

  • 6,150 篇 会议
  • 5,208 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 11,484 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,436 篇 工学
    • 5,354 篇 计算机科学与技术...
    • 4,415 篇 软件工程
    • 1,755 篇 信息与通信工程
    • 1,070 篇 控制科学与工程
    • 905 篇 生物工程
    • 891 篇 电气工程
    • 682 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 577 篇 光学工程
    • 541 篇 机械工程
    • 366 篇 仪器科学与技术
    • 347 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 315 篇 网络空间安全
    • 265 篇 交通运输工程
    • 250 篇 安全科学与工程
  • 4,131 篇 理学
    • 2,041 篇 数学
    • 1,310 篇 物理学
    • 1,014 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 416 篇 系统科学
    • 379 篇 化学
  • 2,072 篇 管理学
    • 1,227 篇 管理科学与工程(可...
    • 925 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 611 篇 医学
    • 528 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 257 篇 药学(可授医学、理...
  • 398 篇 法学
    • 309 篇 社会学
  • 189 篇 经济学
  • 156 篇 教育学
  • 142 篇 农学
  • 36 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 298 篇 deep learning
  • 261 篇 machine learning
  • 260 篇 feature extracti...
  • 221 篇 computational mo...
  • 192 篇 accuracy
  • 185 篇 semantics
  • 171 篇 predictive model...
  • 168 篇 internet of thin...
  • 168 篇 training
  • 144 篇 real-time system...
  • 117 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 artificial intel...
  • 109 篇 neural networks
  • 109 篇 security
  • 108 篇 computer science
  • 108 篇 optimization
  • 95 篇 visualization
  • 88 篇 data models
  • 87 篇 cloud computing

机构

  • 172 篇 university of ch...
  • 122 篇 key laboratory o...
  • 113 篇 university of sc...
  • 97 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 91 篇 hebei normal uni...
  • 89 篇 state key labora...
  • 87 篇 department of ph...
  • 87 篇 school of comput...
  • 86 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 college of compu...
  • 54 篇 school of comput...
  • 54 篇 college of intel...
  • 48 篇 institute for nu...
  • 47 篇 department of co...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 10,384 篇 英文
  • 959 篇 其他
  • 127 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11484 条 记 录,以下是4451-4460 订阅
排序:
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle Networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Plug-and-Hide: Provable and Adjustable Diffusion Generative Steganography
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Jiahao Chen, Zixuan Yang, Lingxiao Xie, Xiaohua Zhou, Yi The School of Computer Science and Engineering Sun Yat-Sen University China The Guangdong Province Key Laboratory of Information Security Technology China The Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou510006 China The Zhongshan School of Medicine Sun Yat-Sen University China
Generative Steganography (GS) is a novel technique that utilizes generative models to conceal messages without relying on cover images. Contemporary GS algorithms leverage the powerful generative capabilities of Diffu... 详细信息
来源: 评论
Health care counselling via voicebot using multinomial naive bayes algorithm  5
Health care counselling via voicebot using multinomial naive...
收藏 引用
5th International Conference on Communication and Electronics Systems, ICCES 2020
作者: Revathy, S. Niranjani, R. Roslin Kanushya, J. School of Computing Sathyabama Institute of Science And Technology Chennai Tamil Nadu India Department of Information Technology Sathyabama Institute of Science And Technology Chennai Tamil Nadu India
Voicebot bestow the user, the ability of receiving retort within minutes, no matter their geographic location, or the apparatus, they are using to transmission. Data related to the health issues are gathered from medi... 详细信息
来源: 评论
More Interpretable Graph Similarity Computation via Maximum Common Subgraph Inference
arXiv
收藏 引用
arXiv 2022年
作者: Lan, Zixun Hong, Binjie Ma, Ye Ma, Fei Department of Applied Mathematics School of Science China Department of Information and Computing Science School of Advanced Technology China Department of Financial and Actuarial Mathematics School of Science Xi’an Jiaotong-Liverpool University SIP Suzhou215123 China
Graph similarity measurement, which computes the distance/similarity between two graphs, arises in various graph-related tasks. Recent learning-based methods lack interpretability, as they directly transform interacti... 详细信息
来源: 评论
Joint Sparsification and Quantization for Wireless Federated Learning under Communication Constraints
Joint Sparsification and Quantization for Wireless Federated...
收藏 引用
IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
作者: Junshen Su Xijun Wang Xiang Chen Ray-Guang Cheng School of Electronics and Information Technology Sun Yat-Sen University Guangzhou China Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen China Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taipei Taiwan
Communication efficiency is one of the key bottlenecks in Federated Learning (FL). Compression techniques, such as sparsification and quantization, are used to reduce communication overhead. However, joint designs of ...
来源: 评论
Terminal Sliding Modes-Based PLLs for Three-Phase Grid-Connected Inverters
Terminal Sliding Modes-Based PLLs for Three-Phase Grid-Conne...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Pooyan Alinaghi Hosseinabadi Mostefa Kermadi Hemanshu Pota Saad Mekhilef Ali Soltani Sharif Abadi The School of Engineering and Information Technology The University of New South Wales Canberra ACT Australia The Power Electronics and Renewable Energy Research Laboratory (PEARL) University of Malaya Kuala Lumpur Malaysia The School of Science Computing and Engineering Technologies Swinburne University of Technology Hawthorn VIC Australia Faculty of Mechatronics Institute of Automatic Control and Robotics Warsaw University of Technology Warsaw Poland
This paper proposes and experimentally implements new phase-locked loop algorithms using non-adaptive and adaptive terminal sliding modes for the three-phase grid-connected inverters. The proposed algorithms aim to ex...
来源: 评论
T-PickSeer: Visual Analysis of Taxi Pick-up Point Selection Behavior
arXiv
收藏 引用
arXiv 2023年
作者: Gu, Shuxian Dai, Yemo Feng, Zezheng Wang, Yong Zeng, Haipeng School of Intelligent Systems Engineering Sun Yat-sen University China Huawei Technologies Co. Ltd China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong School of Computing and Information Systems Singapore Management University Singapore
Taxi drivers often take much time to navigate the streets to look for passengers, which leads to high vacancy rates and wasted resources. Empty taxi cruising remains a big concern for taxi companies. Analyzing the pic... 详细信息
来源: 评论
Dynamic AI-Driven Network Slicing with O-RAN for Continuous Connectivity in Connected Vehicles and Onboard Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Shah, Syed Danial Ali Bashir, Ali Kashif Al-Otaibi, Yasser D. Dabel, Maryam M. Al Ali, Farman University of Leeds School of Electronic and Electrical Engineering LeedsLS2 9JT United Kingdom Manchester Metropolitan University Department of Computing and Mathematics M15 6BH United Kingdom Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact and Outcome Punjab Rajpura140401 India King Abdulaziz University Faculty of Computing and Information Technology in Rabigh Department of Information Systems Jeddah21589 Saudi Arabia University of Hafr Al Department of Computer Science and Engineering Batin Saudi Arabia Sungkyunkwan University School of Convergence Seoul Korea Republic of
The rise of connected and autonomous vehicles signifies an era of intelligent transportation systems, where robust and continued network connectivity is essential for critical applications and enhanced in-vehicle Cons... 详细信息
来源: 评论
An Extended Direction-Oriented Interpolation Method via Spatial Direction Vector Validity Measure
An Extended Direction-Oriented Interpolation Method via Spat...
收藏 引用
Frontiers technology of information and Computer (ICFTIC), IEEE International Conference on
作者: Yuhui Lin Zubin Ye Wenbin Kuang School of Computing and Information Science Fuzhou Institute of Technology Fuzhou China Hunan *** Interactive Entertainment Media Co. Ltd. Changsha China
In this paper, an extended and improved direction-oriented interpolation method is proposed for de-interlacing. The proposed method records the minimum square error and max square error while block-matching, and uses ... 详细信息
来源: 评论
Rough Set Model and Approximations in Fuzzy Formal Contexts
Rough Set Model and Approximations in Fuzzy Formal Contexts
收藏 引用
Machine Learning and computing (ACMLC), Asia Conference on
作者: Yu-Ru Syau En-Bing Lin Department of Information Management National Formosa University Huwei Yunlin Taiwan School of Computing and Data Science Wentworth Institute of Technology Boston MA USA
Given a set of objects G with a set of attributes M and a binary relation I, a formal context (G, M, I) corresponds to a Boolean-valued information table in rough set theory, and the kernel relation of the function fr...
来源: 评论