咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是211-220 订阅
排序:
The Fusion of Feature for Person Re-identification Based on Siamese Network  7
The Fusion of Feature for Person Re-identification Based on ...
收藏 引用
7th international conference on Cloud computing and Big Data Analytics, ICCCBDA 2022
作者: Du, Tianwen Zhang, Yifeng School of Information Science and Engineering Southeast University Nanjing China
This paper proposes Fusion-based Siamese Network (FSN), a new deep learning architecture that targets at learning global and local features convergently for person re-identification (re-ID). This paper demonstrates th... 详细信息
来源: 评论
Research on Intrusion Detect System of Internet of Things based on Deep learning
Research on Intrusion Detect System of Internet of Things ba...
收藏 引用
2022 international conference on machine learning and Knowledge Engineering, MLKE 2022
作者: Li, Jiang Zhejiang Gongshang University Hangzhou China
In this paper, by combining the known deep learning related literature in the field of intrusion detection, and the existing in the design of intrusion detection system based on the deep learning common low detection ... 详细信息
来源: 评论
Enhancing Explainability of machine learning-based Intrusion Detection Systems
Enhancing Explainability of Machine Learning-based Intrusion...
收藏 引用
2022 RIVF international conference on computing and Communication Technologies, RIVF 2022
作者: Ho, Thi-Ngoc-Phuc Nguyen, Thuy-Linh Nguyen, Xuan-Ha Le, Kim-Hung University of Information Technology Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Viet Nam
Over the past decade, the anomaly-based Intrusion Detection System (IDS) has established itself with many studies proving its effectiveness, especially with deep learning models. However, these models have become more... 详细信息
来源: 评论
A DDoS Attack Detection on Cloud Framework Using Improved Features Based machine learning Approach  2
A DDoS Attack Detection on Cloud Framework Using Improved Fe...
收藏 引用
2nd IEEE international conference on Advances in Electrical, computing, Communication and Sustainable Technologies (IEEE ICAECT)
作者: Bhargav, Ravi Jain, Vishal Verma, Manish Sharda Univ Sch Engn & Technol Dept Comp Sci & Engn Greater Noida 201306 UP India
A Denial of Service (DDoS) attack consumes the network bandwidth and computing resources of a targeted system, preventing the target system from being DDoS attacked by unauthorized users. This research work proposed a... 详细信息
来源: 评论
DSFL: Decentralized Satellite Federated learning for Energy-Aware LEO Constellation computing
DSFL: Decentralized Satellite Federated Learning for Energy-...
收藏 引用
IEEE international conference on Satellite computing (Satellite)
作者: Wu, Chenrui Zhu, Yifei Wang, Fangxin Chinese Univ Hong Kong FNii Shenzhen Peoples R China Chinese Univ Hong Kong SSE Shenzhen Peoples R China Guangdong Prov Key Lab Future Networks Intelligen Shenzhen Peoples R China Peng Cheng Lab Shenzhen Guangdong Peoples R China Shanghai Jiao Tong Univ Univ Michigan Shanghai Jiao Tong Univ Joint Inst Shanghai Peoples R China
The dense constellation of Low Earth Orbit (LEO) satellites plays a significant role in the sixth generation mobile network (6G) and Terrestrial-Aerial-Space network. With the communication network composed of the LEO... 详细信息
来源: 评论
Analyzing Market Dynamics of Agricultural Commodities: A Case Study Based on Cotton  3rd
Analyzing Market Dynamics of Agricultural Commodities: A Cas...
收藏 引用
The 3rd international conference on Frontiers in computing and Systems (COMSYS 2022)
作者: Korivi, Nikhila Sravani, Peteti Ali, Jafar Sobin, C.C. SRM University Andhra Pradesh Amaravati India LTRC IIIT Hyderabad Telangana Hyderabad India
Market deregulation of agricultural commodities requires in-depth analysis of day-to-day transactions. The analysis helps to draw greater insights into the market dynamics and builds better policies and advisory syste... 详细信息
来源: 评论
Predictive Modeling for Network Anomaly Detection Using machine learning
Predictive Modeling for Network Anomaly Detection Using Mach...
收藏 引用
Sustainable computing and Smart Systems (ICSCSS), international conference on
作者: G. Sivakumar K. Amsaveni Chandralekha R V. SrirengaNachiyar S. Vaitheki P. Marichamy Department of ECE Ramco Institute of Technology Department of CSE National Engineering College Kovilpatti Department of Electronics and Communication Engineering Ramco Institute of Technology Tamilnadu India Department of ECE PSRR College of Engineering Sivakasi Department of ECE PSR Engineering College Sivakasi
The protection of networks from unauthorized access is challenging, traditional cannot effectively prevent malicious intrusions. Now –a –days Anomaly detection relies heavily on machine learning to identify the comp... 详细信息
来源: 评论
HPFL-CN: Communication-Efficient Hierarchical Personalized Federated Edge learning via Complex Network Feature Clustering  19
HPFL-CN: Communication-Efficient Hierarchical Personalized F...
收藏 引用
19th Annual IEEE international conference on Sensing, Communication, and Networking (IEEE SECON)
作者: Li, Zijian Chen, Zihan Wei, Xiaohui Gao, Shang Ren, Chenghao Quek, Tony Q. S. Jilin Univ Coll Comp Sci & Technol Changchun Peoples R China Singapore Univ Technol & Design Informat Syst Technol & Design Pillar Singapore Singapore
Federated learning (FL), a promising privacy-preserving distributed learning paradigm, has been extensively applied in urban environmental prediction tasks of Mobile Edge computing (MEC) by training a global machine l... 详细信息
来源: 评论
HMLF_CDD_SSBM: A Hybrid machine learning Framework for Cardiovascular Disease Diagnosis Prediction Using the SMOTE Stacking Method  6th
HMLF_CDD_SSBM: A Hybrid Machine Learning Framework for Cardi...
收藏 引用
6th international conference on Innovative computing and Communication, ICICC 2023
作者: Naganjaneyulu, Satuluri Akanksha, Gurija Shaheeda, Shaik Sadhak, Mohammed Department of Information Technology Lakireddy Bali Reddy College of Engineering Andhra Pradesh Mylavaram India Lakireddy Bali Reddy College of Engineering Andhra Pradesh Mylavaram India
Nowadays, predicting the diagnosis of cardiovascular disease (CDD) is one of the critical challenges in the medical field. Every year, millions of people die from cardiovascular diseases, the majority of which are pre... 详细信息
来源: 评论
DDoSNet: A Deep learning Model for detecting Network Attacks in Cloud computing  4
DDoSNet: A Deep Learning Model for detecting Network Attacks...
收藏 引用
4th international conference on Inventive Research in computing Applications, ICIRCA 2022
作者: Srilatha, Doddi Thillaiarasu, N. School of Computing and Information Technology Reva University Bengaluru560064 India Sreenidhi Institute of Science and Technology Department of Cse Hyderabad501301 India
Cloud services are the major target for malicious attacks as more organizations and individuals shift to the cloud. When DDoS assaults pose one of the most significant dangers to Internet users and cloud services, thi... 详细信息
来源: 评论