咨询与建议

限定检索结果

文献类型

  • 44,486 篇 期刊文献
  • 3,954 篇 会议
  • 3 册 图书

馆藏范围

  • 48,443 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,045 篇 工学
    • 19,006 篇 计算机科学与技术...
    • 11,440 篇 材料科学与工程(可...
    • 11,043 篇 电气工程
    • 8,095 篇 信息与通信工程
    • 8,093 篇 控制科学与工程
    • 8,079 篇 电子科学与技术(可...
    • 8,059 篇 机械工程
    • 3,512 篇 仪器科学与技术
    • 3,149 篇 软件工程
    • 2,633 篇 网络空间安全
    • 2,503 篇 力学(可授工学、理...
    • 2,219 篇 生物医学工程(可授...
    • 1,976 篇 动力工程及工程热...
    • 1,907 篇 化学工程与技术
    • 1,332 篇 光学工程
    • 1,175 篇 环境科学与工程(可...
    • 1,091 篇 航空宇航科学与技...
  • 24,947 篇 理学
    • 8,780 篇 数学
    • 8,661 篇 物理学
    • 3,604 篇 化学
    • 3,517 篇 生物学
    • 3,111 篇 天文学
    • 1,807 篇 系统科学
    • 1,455 篇 地球物理学
    • 1,035 篇 大气科学
  • 4,049 篇 医学
    • 3,168 篇 临床医学
    • 1,048 篇 基础医学(可授医学...
  • 3,115 篇 管理学
    • 1,555 篇 图书情报与档案管...
    • 1,295 篇 管理科学与工程(可...
  • 1,364 篇 经济学
    • 1,262 篇 应用经济学
  • 1,236 篇 农学
  • 1,005 篇 法学
  • 891 篇 教育学
  • 661 篇 文学
  • 191 篇 艺术学
  • 103 篇 军事学
  • 52 篇 历史学
  • 47 篇 哲学

主题

  • 1,167 篇 deep learning
  • 667 篇 machine learning
  • 310 篇 network
  • 232 篇 internet of thin...
  • 221 篇 blockchain
  • 215 篇 clustering
  • 211 篇 analysis
  • 199 篇 optimization
  • 194 篇 security
  • 192 篇 model
  • 188 篇 artificial intel...
  • 182 篇 simulation
  • 174 篇 classification
  • 173 篇 system
  • 160 篇 data
  • 145 篇 convolutional ne...
  • 137 篇 cloud computing
  • 135 篇 reinforcement le...
  • 133 篇 of
  • 132 篇 algorithm

机构

  • 301 篇 university of ch...
  • 200 篇 ieee
  • 141 篇 school of inform...
  • 83 篇 school of comput...
  • 74 篇 school of inform...
  • 66 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of physic...
  • 64 篇 department of co...
  • 60 篇 school of inform...
  • 57 篇 college of compu...
  • 52 篇 school of comput...
  • 51 篇 school of inform...
  • 49 篇 beijing academy ...
  • 49 篇 university of ch...
  • 48 篇 school of automa...
  • 47 篇 college of infor...
  • 46 篇 school of automa...
  • 44 篇 school of inform...
  • 40 篇 state key labora...

作者

  • 86 篇 jian wang
  • 82 篇 jun wang
  • 76 篇 jing zhang
  • 69 篇 wei liu
  • 56 篇 xin liu
  • 56 篇 wei wang
  • 55 篇 jun zhang
  • 51 篇 rui wang
  • 48 篇 li zhang
  • 43 篇 ming li
  • 42 篇 abdelwahed motwa...
  • 38 篇 wei gao
  • 38 篇 mehedi masud
  • 37 篇 hui wang
  • 37 篇 yu zhang
  • 35 篇 jianlin zhao
  • 32 篇 wei he
  • 32 篇 qing wang
  • 32 篇 cheng-wei qiu
  • 32 篇 yunyoung nam

语言

  • 43,935 篇 英文
  • 4,508 篇 中文
检索条件"机构=the School of Computer and Information Technology"
48443 条 记 录,以下是1-10 订阅
排序:
Detection accuracy of target accelerations based on vortex electromagnetic wave in keyhole space
收藏 引用
Chinese Physics B 2024年 第2期33卷 283-290页
作者: 郭凯 雷爽 雷艺 周红平 郭忠义 school of computer and information Hefei University of TechnologyHefei 230009China
The influence of the longitudinal acceleration and the angular acceleration of detecting target based on vortex electromagnetic waves in keyhole space are analyzed.The spectrum spreads of different orbital angular mom... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
Science China(information Sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA school of Cyber Engineering Xidian University school of computer Science and technology Xidian University Department of computer and information Science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A deep learning model enabled multi-event recognition for distributed optical fiber sensing
收藏 引用
Science China(information Sciences) 2024年 第3期67卷 291-307页
作者: Yujiao LI Xiaomin CAO Wenhao NI Kuanglu YU Institute of information Science School of Computer and Information TechnologyBeijing Jiaotong University Beijing Key Laboratory of Advanced information Science and Network technology Beijing Jiaotong University
Fiber optic sensors that utilize backscattered light offer distributed real-time measurements and have been seen tremendous improvements in sensing distance and spatial resolution over the last decades.However, these ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3001-3019页
作者: Nannan Wu Xianyi Chen James Msughter Adeke Junjie Zhao school of computer and Software Nanjing University of Information Science and TechnologyNanjing210044China school of Electronics and information Engineering Nanjing University of Information Science and TechnologyNanjing210044China
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modifying Lyapunov exponent of chaotic map by self-cascading
收藏 引用
Science China Technological Sciences 2024年 第7期67卷 2203-2214页
作者: YI ChenLong LI ChunBiao LI YongXin XIA Ming HUA ZhongYun school of Electronic and information Engineering Nanjing University of Information Science & Technology school of Artificial Intelligence Nanjing University of Information Science & Technology school of computer Science and technology Harbin Institute of Technology Shenzhen Graduate School
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos maps.Additionally, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU Jingfeng XUE Yong WANG Tianwei LEI Weijie HAN Xianwei GAO school of computer Science and technology Beijing Institute of Technology school of Space information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Expression Complementary Disentanglement Network for Facial Expression Recognition
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 742-752页
作者: Shanmin WANG Hui SHUAI Lei ZHU Qingshan LIU College of computer Science and technology Nanjing University of Aeronautics and Astronautics College of computer and Software Nanjing University of Information Science and Technology school of information and Control Nanjing University of Information Science and Technology
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression recognition.Previous methods only care about facial expression disentanglement(FED)it... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
YOLOv5ST:A Lightweight and Fast Scene Text Detector
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 909-926页
作者: Yiwei Liu Yingnan Zhao Yi Chen Zheng Hu Min Xia school of computer and Science Nanjing University of Information Science and TechnologyNanjing210044China school of Automation Nanjing University of Information Science and TechnologyNanjing210044China
Scene text detection is an important task in computer vision.In this paper,we present YOLOv5 Scene Text(YOLOv5ST),an optimized architecture based on YOLOv5 v6.0 tailored for fast scene text detection.Our primary goal ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Comprehensive Overview of CFN From a Commonsense Perspective
收藏 引用
Machine Intelligence Research 2024年 第2期21卷 239-256页
作者: Ru Li Yunxiao Zhao Zhiqiang Wang Xuefeng Su Shaoru Guo Yong Guan Xiaoqi Han Hongyan Zhao Key Laboratory of Computational Intelligence and Chinese information Processing of Ministry of Education School of Computer and Information TechnologyShanxi UniversityTaiyuan 030006China
Chinese FrameNet(CFN)is a scenario commonsense knowledge base(CKB)that plays an important role in research on Chinese language understanding.It is based on the theory of frame semantics and English FrameNet(FN).The CF... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri school of computer Science Engineering and information Systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论