咨询与建议

限定检索结果

文献类型

  • 6,177 篇 会议
  • 5,196 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,400 篇 工学
    • 5,327 篇 计算机科学与技术...
    • 4,386 篇 软件工程
    • 1,746 篇 信息与通信工程
    • 1,064 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 676 篇 电子科学与技术(可...
    • 600 篇 生物医学工程(可授...
    • 556 篇 光学工程
    • 538 篇 机械工程
    • 366 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 318 篇 动力工程及工程热...
    • 316 篇 网络空间安全
    • 264 篇 交通运输工程
    • 249 篇 安全科学与工程
  • 4,100 篇 理学
    • 2,036 篇 数学
    • 1,294 篇 物理学
    • 1,009 篇 生物学
    • 681 篇 统计学(可授理学、...
    • 415 篇 系统科学
    • 375 篇 化学
  • 2,056 篇 管理学
    • 1,214 篇 管理科学与工程(可...
    • 920 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 612 篇 医学
    • 527 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 393 篇 法学
    • 306 篇 社会学
  • 188 篇 经济学
  • 155 篇 教育学
  • 141 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 304 篇 deep learning
  • 260 篇 feature extracti...
  • 260 篇 machine learning
  • 224 篇 computational mo...
  • 208 篇 accuracy
  • 187 篇 semantics
  • 175 篇 internet of thin...
  • 175 篇 predictive model...
  • 167 篇 training
  • 149 篇 real-time system...
  • 118 篇 data mining
  • 114 篇 neural networks
  • 113 篇 support vector m...
  • 113 篇 optimization
  • 112 篇 artificial intel...
  • 111 篇 security
  • 106 篇 computer science
  • 95 篇 visualization
  • 92 篇 data models
  • 90 篇 cloud computing

机构

  • 175 篇 university of ch...
  • 123 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 95 篇 hebei normal uni...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 88 篇 school of comput...
  • 87 篇 department of ph...
  • 78 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 57 篇 school of inform...
  • 57 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 school of comput...
  • 53 篇 college of compu...
  • 53 篇 college of intel...
  • 52 篇 institute for nu...
  • 52 篇 school of physic...

作者

  • 97 篇 niyato dusit
  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 9,626 篇 英文
  • 1,742 篇 其他
  • 130 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11498 条 记 录,以下是881-890 订阅
排序:
Integrating Data-Driven Security, Model Checking, and Self-adaptation for IoT Systems Using BIP Components: A Conceptual Proposal Model  1st
Integrating Data-Driven Security, Model Checking, and Self-a...
收藏 引用
1st International Conference on Advances in computing Research, ACR’23
作者: Alsobeh, Anas Shatnawi, Amani Program School of Computing Southern Illinois University CarbondaleIL United States Faculty of Information Technology and Computer Science Yarmouk University Irbid Jordan
Efficiency and convenience have increased as a result of the Internet of Things’ (IoT) expanding adoption across several enterprises. Nevertheless, the dynamic nature of IoT devices severely hinders real-time securit... 详细信息
来源: 评论
Advanced Security Model for Cloud Infrastructure Using Cryptography and Steganography
Advanced Security Model for Cloud Infrastructure Using Crypt...
收藏 引用
2024 International Conference on Intelligent and Innovative Practices in Engineering and Management, IIPEM 2024
作者: Sujithra, T. Justus, Vivek Mahaboob, Mohamed Iqbal Durai, S. Manipal Academy of Higher Education Department of CSE Manipal Institute of Technology Manipal India SRM Institute of Science and Technology School of Computing Department of Computing Technologies Kattankulathur603203 India Sri Sivasubramaniya Nadar College of Engineering Department of Information Technology Chennai603110 India Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Avadi Dept. of CSE Chennai India
Cloud computing offers an infrastructure for individual to business with fluctuating workloads by enabling clients to use resources such as memory, software, hardware, bandwidth etc., on "pay on use"method. ... 详细信息
来源: 评论
An Audit on the Perspectives and Challenges of Hallucinations in NLP
An Audit on the Perspectives and Challenges of Hallucination...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Venkit, Pranav Narayanan Chakravorti, Tatiana Gupta, Vipul Biggs, Heidi Srinath, Mukund Goswami, Koustava Rajtmajer, Sarah Wilson, Shomir College of Information Sciences and Technology Pennsylvania State University United States Adobe Research United States School of Interactive Computing Georgia Institute of Technology United States Department of Computer Science & Engineering Pennsylvania State University United States
We audit how hallucination in large language models (LLMs) is characterized in peer-reviewed literature, using a critical examination of 103 publications across NLP research. Through the examination of the literature,... 详细信息
来源: 评论
Deep Video Demoireing via Compact Invertible Dyadic Decomposition
Deep Video Demoireing via Compact Invertible Dyadic Decompos...
收藏 引用
IEEE/CVF International Conference on Computer Vision (ICCV)
作者: Quan, Yuhui Huang, Haoran He, Shengfeng Xu, Ruotao South China University of Technology School of Computer Science and Engineering Guangzhou 510006 China Pazhou Lab Guangzhou 510335 China Singapore Management University School of Computing and Information Systems 188065 Singapore
Removing moire patterns from videos recorded on screens or complex textures is known as video demoireing. It is a challenging task as both structures and textures of an image usually exhibit strong periodic patterns, ... 详细信息
来源: 评论
Beamforming and Trajectory Design for Active IRS-Assisted UAV Relaying Systems  35
Beamforming and Trajectory Design for Active IRS-Assisted UA...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Huang, Qiulei Song, Zhaohui Xiong, Zehui Xu, Guanjun Zhao, Nan Niyato, Dusit Dalian University of Technology School of Information and Communication Engineering Dalian116024 China Space Information Research Institute Hangzhou Dianzi University Hangzhou310018 China Singapore University of Technology and Design 487372 Singapore Nanyang Technological University College of Computing and Data Science 639798 Singapore
Intelligent reflecting surface (IRS) can reconfigure the channel conditions, while the passive beamforming gain is limited by the severe double path-loss effect. Fortunately, active IRS (AIRS) is emerging to tackle ob... 详细信息
来源: 评论
Lightweight Convolutional Network For Automated Photovoltaic Defect Detection  9
Lightweight Convolutional Network For Automated Photovoltaic...
收藏 引用
9th International Conference on information technology Trends, ITT 2023
作者: Zahid, Arsalan Hussain, Muhammad Hill, Richard Al-Aqrabi, Hussain University of Huddersfield School of Computing and Engineering Huddersfield United Kingdom Higher Colleges of Technology Faculty of Computer Information Science Sharjah United Arab Emirates
As the World moves towards renewable energy, photovoltaic modules are a fundamental option due to their green nature. However, the manufacturing process of solar cells is complex and vulnerable to discrepancies which ... 详细信息
来源: 评论
HD-KT: Advancing Robust Knowledge Tracing via Anomalous Learning Interaction Detection  24
HD-KT: Advancing Robust Knowledge Tracing via Anomalous Lear...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Ma, Haiping Yang, Yong Qin, Chuan Yu, Xiaoshan Yang, Shangshang Zhang, Xingyi Zhu, Hengshu Information Materials and Intelligent Sensing Laboratory of Anhui Province Institutes of Physical Science and Information Technology Anhui University Anhui Hefei China Institutes of Physical Science and Information Technology Anhui University Anhui Hefei China Career Science Lab BOSS Zhipin PBC School of Finance Tsinghua University Beijing China School of Artificial Intelligence Anhui University Anhui Hefei China The Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Anhui Hefei China Career Science Lab BOSS Zhipin Beijing China
Knowledge tracing (KT) is a crucial task in online learning, aimed at tracing and predicting each student's knowledge states throughout their learning process. Over the past decade, it has garnered widespread atte... 详细信息
来源: 评论
Ransomware Detection Techniques Using Machine Learning Methods  1
Ransomware Detection Techniques Using Machine Learning Metho...
收藏 引用
1st IEEE Karachi Section Humanitarian technology Conference, Khi-HTC 2024
作者: Wadho, Shuaib Ahmed Yichiet, Aun Gan, Ming Lee Lee, Chen Kang Ali, Sijjad Akbar, Rehan Universiti of Tunku Abdul Rahman Faculty of Information and Comunication Technology Kampar Malaysia Shenzhen Universiy College of Computer Science and Software Engnierng China Florida International University School of Computing and Information Sciences Miami United States
Considering the rising frequency and refinement of ransomware attacks, there is a rising significance for dynamic and successful methods of detection and mitigation. Conventional mark-based approaches frequently demon... 详细信息
来源: 评论
Enhancing Video Anomaly Detection Using Spatio-Temporal Autoencoders and Convolutional LSTM Networks
收藏 引用
SN Computer science 2024年 第1期5卷 1-13页
作者: Almahadin, Ghayth Subburaj, Maheswari Hiari, Mohammad Sathasivam Singaram, Saranya Kolla, Bhanu Prakash Dadheech, Pankaj Vibhute, Amol D. Sengan, Sudhakar Department of Networks and Cybersecurity Faculty of Information Technology Al Ahliyya Amman University Country Amman Jordan School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai 600127 India Department of Networks and Cybersecurity Information Technology Al Ahliyya Amman University Amman Jordan Department Computing Technology School of Computing SRM Institute of Science and Technology Kattankulathur Campus Tamil Nadu Chennai 603203 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur 522302 India Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management and Gramothan (SKIT) Rajasthan Jaipur 302017 India Symbiosis Institute of Computer Studies and Research (SICSR) Symbiosis International (Deemed University) MH Pune 411016 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Identifying suspicious activities or behaviors is essential in the domain of Anomaly Detection (AD). In crowded scenes, the presence of inter-object occlusions often complicates the detection of such behaviors. Theref... 详细信息
来源: 评论
Prediction of Level of Damage of Brain Due To Tumor Via Integrated CNN Technique  5
Prediction of Level of Damage of Brain Due To Tumor Via Inte...
收藏 引用
5th IEEE International Conference on computing, Power, and Communication Technologies, IC2PCT 2024
作者: Agrawal, Vivek Kaswan, Kuldeep Singh Kumar, Sanjay Galgotias College of Engineering and Technology Department of Information Technology U.P Greater Noida India Galgotias University School of Computing Science and Engineering U.P Greater Noida India Galgotia College of Engineering and Technology Department of Computer Science Engineering U.P Greater Noida India
Image transform is the individual of ultimate questioning and intelligent field at the period. Tumor is an uneven expansion of container cruel intellect. The lump may be classification as favorable (non-malignant) and... 详细信息
来源: 评论