咨询与建议

限定检索结果

文献类型

  • 398,275 篇 会议
  • 280,440 篇 期刊文献
  • 3,173 册 图书
  • 1 篇 学位论文

馆藏范围

  • 681,883 篇 电子文献
  • 13 种 纸本馆藏

日期分布

学科分类号

  • 435,312 篇 工学
    • 190,324 篇 计算机科学与技术...
    • 154,124 篇 软件工程
    • 74,854 篇 化学工程与技术
    • 74,831 篇 信息与通信工程
    • 67,112 篇 电子科学与技术(可...
    • 66,188 篇 电气工程
    • 63,013 篇 材料科学与工程(可...
    • 56,248 篇 控制科学与工程
    • 39,746 篇 机械工程
    • 36,193 篇 生物工程
    • 35,347 篇 动力工程及工程热...
    • 32,535 篇 光学工程
    • 28,915 篇 生物医学工程(可授...
    • 28,407 篇 冶金工程
    • 26,515 篇 仪器科学与技术
    • 19,499 篇 力学(可授工学、理...
    • 16,818 篇 土木工程
    • 15,538 篇 环境科学与工程(可...
    • 14,993 篇 建筑学
  • 262,332 篇 理学
    • 110,393 篇 物理学
    • 99,166 篇 数学
    • 64,886 篇 化学
    • 43,218 篇 生物学
    • 31,766 篇 统计学(可授理学、...
    • 21,424 篇 系统科学
  • 80,335 篇 管理学
    • 53,655 篇 管理科学与工程(可...
    • 28,887 篇 图书情报与档案管...
    • 22,244 篇 工商管理
  • 28,629 篇 医学
    • 22,389 篇 临床医学
    • 19,143 篇 基础医学(可授医学...
  • 12,601 篇 法学
  • 10,365 篇 经济学
  • 9,678 篇 农学
  • 5,286 篇 教育学
  • 2,316 篇 文学
  • 1,744 篇 军事学
  • 878 篇 艺术学
  • 127 篇 哲学
  • 73 篇 历史学

主题

  • 12,383 篇 accuracy
  • 11,808 篇 feature extracti...
  • 11,298 篇 computer science
  • 10,347 篇 computational mo...
  • 9,971 篇 deep learning
  • 9,818 篇 training
  • 8,403 篇 machine learning
  • 7,095 篇 optimization
  • 6,793 篇 predictive model...
  • 5,960 篇 support vector m...
  • 5,938 篇 real-time system...
  • 5,906 篇 neural networks
  • 5,621 篇 data models
  • 5,539 篇 convolutional ne...
  • 5,478 篇 data mining
  • 5,113 篇 educational inst...
  • 5,034 篇 mathematical mod...
  • 4,987 篇 robustness
  • 4,750 篇 semantics
  • 4,683 篇 analytical model...

机构

  • 3,252 篇 school of electr...
  • 2,943 篇 university of ch...
  • 2,447 篇 school of comput...
  • 2,158 篇 chitkara univers...
  • 2,108 篇 school of comput...
  • 1,987 篇 school of comput...
  • 1,958 篇 school of materi...
  • 1,946 篇 school of mechan...
  • 1,774 篇 school of inform...
  • 1,761 篇 school of materi...
  • 1,687 篇 cavendish labora...
  • 1,684 篇 school of comput...
  • 1,370 篇 institute of hig...
  • 1,340 篇 school of comput...
  • 1,321 篇 school of comput...
  • 1,205 篇 school of automa...
  • 1,178 篇 school of electr...
  • 1,175 篇 school of electr...
  • 1,167 篇 school of comput...
  • 1,127 篇 school of electr...

作者

  • 724 篇 wang wei
  • 682 篇 liu yang
  • 616 篇 wei wang
  • 596 篇 yang yang
  • 482 篇 annovi a.
  • 475 篇 bachacou h.
  • 459 篇 li yang
  • 440 篇 akimov a.v.
  • 438 篇 alexopoulos t.
  • 438 篇 li li
  • 437 篇 zhang wei
  • 433 篇 aloisio a.
  • 416 篇 arce a.t.h.
  • 414 篇 azuelos g.
  • 414 篇 aad g.
  • 413 篇 alonso f.
  • 410 篇 amidei d.
  • 407 篇 alimonti g.
  • 407 篇 argyropoulos s.
  • 404 篇 arnaez o.

语言

  • 597,078 篇 英文
  • 60,652 篇 其他
  • 21,691 篇 中文
  • 2,304 篇 日文
  • 454 篇 法文
  • 452 篇 德文
  • 136 篇 朝鲜文
  • 43 篇 斯洛文尼亚文
  • 20 篇 阿拉伯文
  • 17 篇 俄文
  • 11 篇 西班牙文
  • 11 篇 荷兰文
  • 11 篇 土耳其文
  • 8 篇 意大利文
  • 5 篇 捷克文
  • 4 篇 葡萄牙文
  • 3 篇 波兰文
  • 1 篇 爱沙尼亚文
  • 1 篇 克罗地亚文
  • 1 篇 罗马尼亚文
检索条件"机构=School of Engineering and Technology Computer Science and Engineering"
681889 条 记 录,以下是121-130 订阅
排序:
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2675-2719页
作者: Singamaneni Krishnapriya Sukhvinder Singh Department of Computer Science School of Engineering and TechnologyPondicherry UniversityKalapet605014India
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att... 详细信息
来源: 评论
VKFQ:A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4205-4223页
作者: Youlin Ji Bo Yin Ke Gu School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s... 详细信息
来源: 评论
Feature-Grounded Single-Stage Text-to-Image Generation
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 469-480页
作者: Yuan Zhou Peng Wang Lei Xiang Haofeng Zhang School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache... 详细信息
来源: 评论
Domain generalization with semi-supervised learning for people-centric activity recognition
收藏 引用
science China(Information sciences) 2025年 第1期68卷 171-188页
作者: Jing LIU Wei ZHU Di LI Xing HU Liang SONG Academy for Engineering & Technology Fudan University Shanghai East-bund Research Institute on Networking Systems of AI School of Optoelectronic Information and Computer Engineering University of Shanghai for Science & Technology
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces.... 详细信息
来源: 评论
Slender loris optimization algorithm for solving optimization problems
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 8799-8810页
作者: Lakshmi, A. Vijaya Vaitheki, K. Joseph, K. Suresh Department of Computer Science School of Engineering and Technology Pondicherry University India
Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a nov... 详细信息
来源: 评论
Intelligent integrated sensing and communication:a survey
收藏 引用
science China(Information sciences) 2025年 第3期68卷 5-46页
作者: Jifa ZHANG Weidang LU Chengwen XING Nan ZHAO Naofal AL-DHAHIR George K.KARAGIANNIDIS Xiaoniu YANG School of Information and Communication Engineering Dalian University of Technology College of Information Engineering Zhejiang University of Technology School of Information and Electronics Beijing Institute of Technology Department of Electrical and Computer Engineering The University of Texas at Dallas Department of Electrical and Computer Engineering Aristotle University of Thessaloniki
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve... 详细信息
来源: 评论
Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks
收藏 引用
Soft Computing 2024年 第17-18期28卷 10345-10367页
作者: Subramani, Shalini Selvi, M. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such a scenario, the security of communication is a major challenge in t... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论
Improving agility in projects using machine learning algorithm
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 85987-86005页
作者: Varun, Janani Karthika, R.A. Department of Computer Science and Engineering Vels Institute of Science Technology and Advanced Studies Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India
All the software products developed will need testing to ensure the quality and accuracy of the product. It makes the life of testers much easier when they can optimize on the effort spent and predict defects for the ... 详细信息
来源: 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 评论