咨询与建议

限定检索结果

文献类型

  • 8,560 篇 会议
  • 7,916 篇 期刊文献
  • 158 册 图书

馆藏范围

  • 16,634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,828 篇 工学
    • 7,432 篇 计算机科学与技术...
    • 6,055 篇 软件工程
    • 2,609 篇 信息与通信工程
    • 1,430 篇 电气工程
    • 1,395 篇 控制科学与工程
    • 1,212 篇 电子科学与技术(可...
    • 1,176 篇 生物工程
    • 888 篇 光学工程
    • 745 篇 生物医学工程(可授...
    • 719 篇 机械工程
    • 478 篇 仪器科学与技术
    • 454 篇 动力工程及工程热...
    • 431 篇 化学工程与技术
    • 349 篇 材料科学与工程(可...
    • 300 篇 安全科学与工程
    • 295 篇 交通运输工程
    • 290 篇 网络空间安全
  • 6,084 篇 理学
    • 2,975 篇 数学
    • 2,014 篇 物理学
    • 1,338 篇 生物学
    • 898 篇 统计学(可授理学、...
    • 654 篇 系统科学
    • 498 篇 化学
  • 2,865 篇 管理学
    • 1,806 篇 管理科学与工程(可...
    • 1,154 篇 图书情报与档案管...
    • 834 篇 工商管理
  • 764 篇 医学
    • 653 篇 临床医学
    • 546 篇 基础医学(可授医学...
    • 321 篇 药学(可授医学、理...
  • 452 篇 法学
    • 360 篇 社会学
  • 280 篇 经济学
  • 193 篇 教育学
  • 169 篇 农学
  • 71 篇 文学
  • 58 篇 军事学
  • 28 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 604 篇 computer science
  • 387 篇 laboratories
  • 362 篇 software enginee...
  • 310 篇 deep learning
  • 235 篇 computational mo...
  • 222 篇 data mining
  • 192 篇 machine learning
  • 190 篇 application soft...
  • 190 篇 optimization
  • 159 篇 semantics
  • 155 篇 computer archite...
  • 155 篇 feature extracti...
  • 150 篇 educational inst...
  • 142 篇 bandwidth
  • 142 篇 quality of servi...
  • 141 篇 internet of thin...
  • 138 篇 resource managem...
  • 136 篇 neural networks
  • 134 篇 support vector m...
  • 129 篇 wireless sensor ...

机构

  • 285 篇 faculty of scien...
  • 283 篇 department for p...
  • 282 篇 department of ph...
  • 280 篇 departamento de ...
  • 275 篇 department of ph...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 264 篇 kirchhoff-instit...
  • 259 篇 faculté des scie...
  • 239 篇 fakultät für phy...
  • 230 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 221 篇 institute of phy...
  • 218 篇 physics division...
  • 213 篇 college of compu...
  • 213 篇 department of ph...
  • 213 篇 institut für ast...
  • 206 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 261 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 250 篇 d. guest
  • 250 篇 s. guindon

语言

  • 15,409 篇 英文
  • 963 篇 其他
  • 271 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering Laboratory Department of Computer Science and Information Engineering"
16634 条 记 录,以下是291-300 订阅
排序:
Polarization‑entangled photon‑pair source with van der Waals 3R‑WS_(2) crystal
收藏 引用
eLight 2024年 第1期4卷 99-106页
作者: Jiangang Feng Yun‑Kun Wu Ruihuan Duan Jun Wang Weijin Chen Jiazhang Qin Zheng Liu Guang‑Can Guo Xi‑Feng Ren Cheng‑Wei Qiu Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore CAS Key Laboratory of Quantum Information University of Science and Technology of ChinaHefei 230026China CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of ChinaHefei 230026China Hefei National Laboratory University of Science and Technology of ChinaHefei 230088China School of Materials Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore Department of Optical Science and Engineering and Shanghai Frontiers Science Research Base of Intelligent Optoelectronics and PerceptionFudan UniversityShanghai 200433China
Ultracompact entangled photon sources are pivotal to miniaturized quantum photonic *** der Waals(vdW)nonlinear crystals promise efficient photon-pair generation and on-chip monolithic integration with nanophotonic ***... 详细信息
来源: 评论
An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security Testing  10
An Empirical Evaluation of the Effectiveness of Spider and P...
收藏 引用
10th International Conference on Dependable Systems and Their Applications, DSA 2023
作者: Chiu, Kuan-Wei Yang, Shih-Sheng Lee, Shin-Jie Lee, Wen-Tin National Cheng Kung University Department of Computer Science and Information Engineering Taiwan National Kaohsiung Normal University Department of Software Engineering and Management Taiwan
Spider and proxy modes are two commonly employed methods supported by dynamic application security testing (DAST) software. Despite efforts to enhance the automated spider's efficiency, deep exploration of web app... 详细信息
来源: 评论
Sensitive information Protection Model Based on Bayesian Game
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 883-898页
作者: Yuzhen Liu Zhe Liu Xiaoliang Wang Qing Yang Guocai Zuo Frank Jiang School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411201China Hunan Key Laboratory for Service computing and Novel Software Technology Xiangtan411201China College of computer and information engineering Hunan University of Technology and BusinessChangshaChina School of Computer Science and Information Engineering Guangzhou Maritime UniversityGuangzhouChina Hunan Software Vocational and Technical University XiangtanChina School of Engineering and IT University of New South WalesNSWAustralia
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *... 详细信息
来源: 评论
The Distributed Intelligent Collaboration to UAV-Assisted VEC: Joint Position Optimization and Task Scheduling
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21473-21487页
作者: Yi, Meng Lee, Vincent C.S. Yang, Peng Li, Peisong Zhang, Yifan Wei, Wei Gao, Honghao Southeast University School of Computer Science and Engineering Nanjing211189 China Monash University Faculty of IT Department of DS and AI ClaytonVIC3800 Australia Southeast University School of Computer Science and Engineering the Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing211189 China Xidian University Hangzhou Institute of Technology Hangzhou311200 China Southeast University-Monash University Joint Graduate School Suzhou215123 China Xi'an University of Technology School of Computer Science and Engineering Xi'an710048 China Shanghai University School of Computer Engineering and Science Shanghai200444 China
Deploying Unmanned Aerial Vehicles (UAVs) as aerial base stations enhances the coverage and performance of communication networks in Vehicular Edge Computing (VEC) scenarios. However, due to the limited communication ... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc Networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论
A Tutorial on Federated Learning from Theory to Practice:Foundations,software Frameworks,Exemplary Use Cases,and Selected Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 824-850页
作者: M.Victoria Luzón Nuria Rodríguez-Barroso Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera Department of Software Engineering Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain Department of Communications Engineering University of the Basque Country(UPV/EHU)and also with TECNALIABasque Research&Technology Alliance(BRTA)Spain School of Information Science and Technology Nantong UniversityNantong 226019China
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized *** allows ML models t... 详细信息
来源: 评论
Time series classification based on Unet with 2D transformation  12
Time series classification based on Unet with 2D transformat...
收藏 引用
12th IEEE International Conference on Identification, information and Knowledge in the Internet of Things, IIKI 2024
作者: Du, Mingsen Wang, Yunxia Wei, Yanxuan Wu, Xiaona Ji, Cun Shandong Normal University School of Information Science and Engineering Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
Time series classification has gained significant attention in the data mining field in recent years. Despite the proposal of numerous methods over the past decades, most of these approaches focus on feature extractio... 详细信息
来源: 评论
Graph-in-Graph Convolutional Network for Hyperspectral Image Classification
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2024年 第1期35卷 1157-1171页
作者: Jia, Sen Jiang, Shuguo Zhang, Shuyu Xu, Meng Jia, Xiuping College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Key Laboratory for Geo-Environmental Monitoring of Coastal Zone Shenzhen University Ministry of Natural Resources Shenzhen518060 China School of Engineering and Information Technology University of New South Wales CanberraACT 2612 Australia
With the development of hyperspectral sensors, accessible hyperspectral images (HSIs) are increasing, and pixel-oriented classification has attracted much attention. Recently, graph convolutional networks (GCNs) have ... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security information and Event Management *** machine learning–based... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to Data Clustering
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论