咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是111-120 订阅
排序:
machine learning for Intricate Detection in 6G Networks  2
Machine Learning for Intricate Detection in 6G Networks
收藏 引用
2nd IEEE international conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Tiwari, Annapurna Nand Revathi, N. Almusawi, Muntather Prabha, Sakthi Karpagam, J. Hafeena, Md. IES College of Technology Department of Electronics & Communication Engineering M. P Bhopal India Nehru Institute of Technology T.M Department of Electronics and Communication Engineering Tamil Nadu Palayam India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Prince Shri Venkateshwara Padmavathy Engineering College Department of Computer Science and Engineering TN India Academy of Higher Education Department of Electrical and Electronics Engineering Karpagam TN India CMR Technical Campus Medchal Hyderabad India
In the world of 6G networks, the merging of micro-services-oriented designing and intelligent network management demonstrates the central role of neural networks (AI), machine learning (ML), and supervised learning (D... 详细信息
来源: 评论
Performance Analysis of Ensemble Feature Selection based Network Intrusion Detection System using Ensemble machine learning  4
Performance Analysis of Ensemble Feature Selection based Net...
收藏 引用
4th international conference on Emerging Trends in Networks and Computer Communications, ETNCC 2024
作者: Upadhyay, Lav Tripathi, Meenakshi Grover, Jyoti MNIT Department of CSE Jaipur India
The proliferation of internet-connected devices, soft-ware, and protocols results in extremely heterogeneous data, and both the amount of traffic and the disparity between different types of data are only going to get... 详细信息
来源: 评论
Design of a Secure machine learning-Based Malware Detection and Analysis Scheme
Design of a Secure Machine Learning-Based Malware Detection ...
收藏 引用
2023 IEEE international conference on Communications, computing, Cybersecurity and Informatics, CCCI 2023
作者: Kumar, Pankaj Obaidat, Mohammad S. Pandey, Piyush Wazid, Mohammad Das, Ashok Kumar Singh, Devesh Pratap Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India King Abdullah Ii School of Information Technology The University of Jordan Amman11942 Jordan School of Computing Srm University Jordan University of Science and Technology Beijing Beijing100083 China School of Computing Srm University TN Kattankulathur603203 India Algorithmic Research International Institute of Information Technology Center for Security Theory Hyderabad India
Today's world is rapidly growing towards the advanced concept of technology. Technology nowadays is at its peak of development and has great advantages in all fields of work, whether it is in industrial automation... 详细信息
来源: 评论
Performance Analysis of a Stacking Ensemble machine learning Model in Forecasting University-industry Collaboration  7
Performance Analysis of a Stacking Ensemble Machine Learning...
收藏 引用
7th international conference on Data Science and Information Technology, DSIT 2024
作者: Hange, Uzapi Nwanesi, Ezenwa Chike Bah, Monhesea Obrey Patrick Wuhan University of Technology School of Management Wuhan China Yanshan University School of Economics and Management Qinhuangdao China
University-industry collaboration has become a pivotal strategy for fostering innovation and economic growth. However, these partnerships are often fraught with high failure rates. Early forecasting of university-indu... 详细信息
来源: 评论
A Novel Deep learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks  10
A Novel Deep Learning based Model to Defend Network Intrusio...
收藏 引用
17th INDIACom;2023 10th international conference on computing for Sustainable Global Development, INDIACom 2023
作者: Roshan, Khushnaseeb Zafar, Aasim Ul Haque, Shiekh Burhan Aligarh Muslim University Department of Computer Science Aligarh India
Network Intrusion Detection System (NIDS) is an essential tool in securing cyberspace from a variety of security risks and unknown cyberattacks. A number of solutions have been implemented for machine learning (ML), a... 详细信息
来源: 评论
Design and Implementation of a machine learning-Based Network Intrusion Detection System  24
Design and Implementation of a Machine Learning-Based Networ...
收藏 引用
2024 Asia Pacific conference on computing Technologies, Communications and Networking, CTCNet 2024
作者: Lisong, Shao Peng, Wang Weitao, Wang Lei, Lei Jiale, Chang Beijing KeDong Electric Power Control System Co. Ltd China China Electric Power Research Institute Beijing China Nari Group Corporation State Grid Electric Power Research Institute China
In today’s highly interconnected world, network security is a critical challenge for enterprises when storing and transmitting sensitive information. Traditional security measures are increasingly inadequate against ... 详细信息
来源: 评论
learning for Semantic Knowledge Base-Guided Online Feature Transmission in Dynamic Channels  59
Learning for Semantic Knowledge Base-Guided Online Feature T...
收藏 引用
59th Annual IEEE international conference on Communications (IEEE ICC)
作者: Gao, Xiangyu Sun, Yaping Wei, Dongyu Xu, Xiaodong Chen, Hao Yin, Hao Cui, Shuguang Univ Washington Dept Elect & Comp Engn Seattle WA 98195 USA Peng Cheng Lab Dept Broadband Commun Shenzhen 518000 Peoples R China Chinese Univ Hong Kong Shenzhen Future Network Intelligent Inst FNii Shenzhen 518172 Peoples R China Beijing Univ Posts & Telecommun Beijing 100876 Peoples R China Chinese Univ Hong Kong Shenzhen Sch Sci & Engn SSE Shenzhen 518172 Peoples R China
With the proliferation of edge computing, efficient AI inference on edge devices has become essential for intelligent applications such as autonomous vehicles and VR/AR. In this context, we address the problem of effi... 详细信息
来源: 评论
machine learning-Based Framework for Cybersecurity of Robotic System  6th
Machine Learning-Based Framework for Cybersecurity of Roboti...
收藏 引用
6th international conference on Recent Innovations in computing, ICRIC 2023
作者: Verma, Narinder Kumar, Neerendra Salotra, Harish Department of Computer Science and Information Technology Central University of Jammu Jammu181143 India
Robotic systems are increasingly integrated into sectors ranging from manufacturing to health care, presenting significant cybersecurity challenges. Ensuring the security and integrity of these systems is critical to ... 详细信息
来源: 评论
Blockchain and machine learning Security for the Internet of Things: A Bibliometric Analysis  3
Blockchain and Machine Learning Security for the Internet of...
收藏 引用
3rd international conference on Pervasive computing and Social Networking, ICPCSN 2023
作者: Mudhar, Jaideep Kaur Malhotra, Jyoteesh Singh, Ajay Kumar Anand, Monika Guru Nanak Dev University Computer Engineering Amritsar India Guru Nanak Dev University Electronics Engineering Regional Campus Jalandhar India Chandigarh University Computer Science and Engineering Mohali India
The Internet of Things has developed as a catalyst for innovation across numerous industries, from home automation to smart cities to 4IR primarily Industry 4.0. Through the internet, IoT devices interact and exchange... 详细信息
来源: 评论
Detection of XSS Attack and Defense of REST Web Service machine learning Perspective  21
Detection of XSS Attack and Defense of REST Web Service Mach...
收藏 引用
5th international conference on machine learning and soft computing, icmlsc 2021
作者: Ivanova, Malinka Rozeva, Anna Technical University of Sofia College of Energy and Electronics Bulgaria
The paper presents a machine learning approach for detection of stored XSS attack and for defense of REST web service. For this purpose, a XML-based REST web service is developed in JAVA, which is tested and attacked ... 详细信息
来源: 评论