咨询与建议

限定检索结果

文献类型

  • 6,065 篇 会议
  • 5,664 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 11,841 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 7,338 篇 工学
    • 4,733 篇 计算机科学与技术...
    • 3,832 篇 软件工程
    • 1,632 篇 信息与通信工程
    • 1,082 篇 电气工程
    • 1,038 篇 控制科学与工程
    • 994 篇 电子科学与技术(可...
    • 905 篇 生物工程
    • 845 篇 光学工程
    • 783 篇 生物医学工程(可授...
    • 502 篇 化学工程与技术
    • 457 篇 仪器科学与技术
    • 425 篇 机械工程
    • 414 篇 材料科学与工程(可...
    • 349 篇 动力工程及工程热...
    • 334 篇 网络空间安全
    • 268 篇 安全科学与工程
  • 4,694 篇 理学
    • 2,071 篇 物理学
    • 1,799 篇 数学
    • 1,035 篇 生物学
    • 621 篇 统计学(可授理学、...
    • 607 篇 化学
    • 324 篇 系统科学
    • 270 篇 地球物理学
  • 1,803 篇 管理学
    • 1,112 篇 管理科学与工程(可...
    • 767 篇 图书情报与档案管...
    • 477 篇 工商管理
  • 783 篇 医学
    • 636 篇 临床医学
    • 559 篇 基础医学(可授医学...
    • 351 篇 药学(可授医学、理...
    • 326 篇 公共卫生与预防医...
  • 292 篇 法学
  • 189 篇 农学
  • 178 篇 经济学
  • 107 篇 教育学
  • 26 篇 文学
  • 20 篇 艺术学
  • 14 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 382 篇 deep learning
  • 306 篇 accuracy
  • 265 篇 machine learning
  • 263 篇 feature extracti...
  • 219 篇 computational mo...
  • 204 篇 real-time system...
  • 199 篇 predictive model...
  • 188 篇 internet of thin...
  • 159 篇 training
  • 148 篇 optimization
  • 144 篇 semantics
  • 136 篇 computer science
  • 136 篇 support vector m...
  • 135 篇 artificial intel...
  • 102 篇 image segmentati...
  • 100 篇 data mining
  • 99 篇 visualization
  • 97 篇 security
  • 96 篇 neural networks
  • 96 篇 convolutional ne...

机构

  • 340 篇 department of ph...
  • 237 篇 faculty of scien...
  • 234 篇 university of ch...
  • 232 篇 department of mo...
  • 231 篇 department for p...
  • 228 篇 department of ph...
  • 225 篇 infn e laborator...
  • 225 篇 west university ...
  • 219 篇 department of ph...
  • 213 篇 department of ph...
  • 200 篇 kirchhoff-instit...
  • 191 篇 cavendish labora...
  • 189 篇 research center ...
  • 164 篇 fakultät für phy...
  • 160 篇 department physi...
  • 153 篇 infn sezione di ...
  • 152 篇 graduate school ...
  • 151 篇 physikalisches i...
  • 150 篇 oliver lodge lab...
  • 141 篇 institute of phy...

作者

  • 173 篇 d. calvet
  • 167 篇 c. alexa
  • 167 篇 g. bella
  • 167 篇 c. amelung
  • 165 篇 j. strandberg
  • 165 篇 n. orlando
  • 165 篇 y. tayalati
  • 165 篇 v. chiarella
  • 164 篇 j. m. izen
  • 164 篇 g. spigo
  • 164 篇 f. siegert
  • 159 篇 a. dimitrievska
  • 159 篇 f. deliot
  • 157 篇 r. ströhmer
  • 155 篇 m. rijssenbeek
  • 154 篇 s. jin
  • 154 篇 g. gaudio
  • 152 篇 y. tu
  • 152 篇 y. abulaiti
  • 151 篇 s. mohapatra

语言

  • 8,979 篇 英文
  • 2,744 篇 其他
  • 152 篇 中文
  • 4 篇 法文
  • 4 篇 日文
  • 3 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=The Institute of Advanced Computing Technology School of Computer Science and Engineering"
11841 条 记 录,以下是431-440 订阅
排序:
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge computing Environment
收藏 引用
China Communications 2024年 第3期21卷 149-159页
作者: Zhang Lejun Peng Minghui Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China College of Information Engineering Yangzhou UniversityYangzhou 225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou 362000China Computer Science Department City University of Hong KongHong Kong 999077China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 21004China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei 230601China Department of Computer Science and Artificial Intelligence Wenzhou UniversityWenzhou 325035China Guangzhou University Library Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of Sciences MIREA-Russian Technological University Moscow RegionRussia
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ... 详细信息
来源: 评论
DPT‐tracker:Dual pooling transformer for efficient visual tracking
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 948-959页
作者: Yang Fang Bailian Xie Uswah Khairuddin Zijian Min Bingbing Jiang Weisheng Li Key Laboratory of Data Engineering and Visual Computing Chongqing University of Posts and TelecommunicationsChongqingChina Department of Mechanical Precision Engineering Malaysia‐Japan International Institute of TechnologyUniversity of Technology MalaysiaKuala LumpurMalaysia Department of Electrical and Computer Engineering Inha UniversityIncheonRepublic of Korea School of Information Science and Technology Hangzhou Normal UniversityHangzhouChina
Transformer tracking always takes paired template and search images as encoder input and conduct feature extraction and target‐search feature correlation by self and/or cross attention operations,thus the model compl... 详细信息
来源: 评论
Multibio Authentication of Online Users in Proctoring and E-Learning  3
Multibio Authentication of Online Users in Proctoring and E-...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Ajitha, P. Sadish Sendi, M. Navaneethakrishnan, Sundara Rajulu Sivasangari, A. Surendran, R. Sathyabama Institue of Science and Technology School of Computing Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology School of Computing Chennai India Dhanalakshmi Srinivasan University Trichy Department of Computer Science and Engineering Samayapuram Campus Tiruchirappalli India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
online courses have become more liked recently as a brand-new method of instructing students in remoteness literacy environment. However, as request grows, educational accademies were faced with difficulty of determin... 详细信息
来源: 评论
Securing Neural Network-Based Personalized Medicine for advanced Liver Cancer Detection in Healthcare
Securing Neural Network-Based Personalized Medicine for Adva...
收藏 引用
2024 IEEE International Conference on Information technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Kasturi, Salvadi Singh, Jagendra Agarwal, Mohit Kumar, Ashwini Mishra, Komal Sharma, Yogita Cvr College of Engineering Department of Computer Science Engineering Vastunagar India School of Computer Science Engineering & Technology Bennett University Greater Noida India Compucom Institute of Technology & Management Department of Computer Science Engineering Jaipur India Chandigarh University Department of University Institute of Computing Chandigarh India School of Management and Commerce Manav Rachna University Faridabad India
This research is aimed at discussing the critical meeting point of healthcare and artificial intelligence, including the need to protect the required treatment solution. Investigation into the utility of various deep ... 详细信息
来源: 评论
Enhancing Healthcare Record Privacy Through the Integration of Visual Cryptography and Diverse Image Encryption Techniques  9
Enhancing Healthcare Record Privacy Through the Integration ...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Sandeep, Dayina Ganesh, Addala Siva Krishna, Angalakurthi Jaya Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
The methodology of this research focuses on analyzing real-world breaches, such as the Star Health Insurance leak, and demonstrating how multi-layered encryption techniques could have mitigated the impact. By splittin... 详细信息
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of computer science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Improving Biometric Security Using PulsePrint: Real-Time Defense Against Fingerprint Spoofing  2
Improving Biometric Security Using PulsePrint: Real-Time Def...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Vigneshwaran, P. Maranco, M. Ivaturi, Kashyapa Abhiram Takur, Purab Acharya University Department of Computer Science and Engineering Karakul Bukhara Uzbekistan SRM Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Networking and Communications Chengalpattu Kattankulathur603203 India
Biometric authentication systems have become increasingly popular due to their convenience and perceived security benefits. However, traditional biometric modalities such as fingerprint recognition are vulnerable to s... 详细信息
来源: 评论
Artificial Intelligence in Health Care computing and Assessments in Oman: an Effectual Study  2
Artificial Intelligence in Health Care Computing and Assessm...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Wilfred Blessing, N.R. Gunasekaran, Hemalatha Hariharan, B. Jabri, Jaber Saleh Salim Al Kavitha, S.J. Sutherlin Subitha, G. College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman SRM Institute of Science and Technology Department of Computational Intelligence Tamil Nadu Kattankulathur India Vels Institute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Stella Mary's College of Engineering Department of Computer Science and Engineering Tamil Nadu Aruthenganvilai India
Health care plays a vital responsibility in a human life span. World countries targets to provide better care for their citizens. Digital transformations and innovations in Artificial Intelligence (AI) technologies he... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
Secure Student Record Management using Visual Cryptography in Educational Systems  9
Secure Student Record Management using Visual Cryptography i...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Kiranchandu, E. Gireesh, C. Kiran, G. Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
Cloud computing is vital for data transmission and storage in the digital era, highlighting the urgent requirement for strong data security measures. Conventional encryption techniques such as RSA, while dependable, h... 详细信息
来源: 评论