咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是341-350 订阅
排序:
Hierarchical Classification of Android Malware Traffic
Hierarchical Classification of Android Malware Traffic
收藏 引用
IEEE international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Giampaolo Bovenzi Valerio Persico Antonio Pescapé Anna Piscitelli Vincenzo Spadari University of Napoli "Federico II" Italy
In the last few years, Android mobile devices have encountered a large spread and nowadays a huge part of the traffic traversing the Internet is related to them. In parallel, the number of possible threats and attacks... 详细信息
来源: 评论
A Secure and Verifiable Outsourcing Scheme for machine learning Data  3rd
A Secure and Verifiable Outsourcing Scheme for Machine Learn...
收藏 引用
3rd international conference on Security and Privacy in New computing Environments, SPNCE 2020
作者: Li, Cheng Yang, Li Ma, Jianfeng Xidian University Xi’an Shaanxi710071 China
In smart applications, such as smart medical devices, in order to prevent privacy leaks, more data needs to be processed and trained locally or near the local end. However, the storage and computing capabilities of sm... 详细信息
来源: 评论
Security Intelligence for Real-Time Security Monitoring software  1
收藏 引用
22nd international conference on Artificial Intelligence and soft computing, ICAISC 2023
作者: Poniszewska-Marańda, Aneta Grela, Radoslaw Kryvinska, Natalia Institute of Information Technology Lodz University of Technology Lodz Poland Information Systems Department Comenius University in Bratislava Bratislava Slovakia
Security Intelligence (SI) describes the practice of collecting, standardizing and analysing data generated by networks, applications and other IT infrastructure in real time and using this information to assess and i... 详细信息
来源: 评论
Predicting Academic Performance of University Students Using machine learning: A Case Study in the UK
Predicting Academic Performance of University Students Using...
收藏 引用
IEEE WIC ACM international conference on Web Intelligence (WI)
作者: Titilayo Olabisi Soyoye Tianhua Chen Richard Hill Keith Mccabe School of Computing and Engineering University of Huddersfield Huddersfield UK Planning and Business Intelligence University of Huddersfield Huddersfield UK
Students' performance is one of the key success factors in educational institutions. Understanding the performance of students can help identify issues, enabling real-time action where and when necessary. Further,...
来源: 评论
machine learning Approaches for Predicting Tree Growth Trends Based on Basal Area Increment  18th
Machine Learning Approaches for Predicting Tree Growth Tren...
收藏 引用
Proceedings of the 18th international conference on soft computing Models in Industrial and Environmental Applications, SOCO 2023
作者: Casas-Gómez, Pablo Martínez-Álvarez, Francisco Troncoso, Alicia Linares, Juan Carlos Physical Chemical and Natural Systems Department Faculty of Experimental Sciences Universidad Pablo de Olavide Seville41013 Spain Data Science and Big Data Lab Pablo de Olavide University Seville41013 Spain
This paper explores the potential of machine learning in predicting Basal Area Increment (BAI) for the species Abies spectabilis, a commonly used metric for measuring tree growth. machine learning algorithms are used ... 详细信息
来源: 评论
Dynamic Model for the pH in a Raceway Reactor Using Deep learning Techniques  14th
Dynamic Model for the pH in a Raceway Reactor Using Deep Lea...
收藏 引用
14th APCA international conference on Automatic Control and soft computing (CONTROLO)
作者: Otalora, Pablo Guzman, Jose Luis Berenguel, Manuel Acien, Francisco Gabriel Univ Almeria Dept Informat CIESOL Sacramento S-N Almeria 04120 Spain Univ Almeria Dept Chem Engn CIESOL Sacramento S-N Almeria 04120 Spain
This paper presents a black-box dynamic model for microalgae production in raceway reactors. The black-box model, developed using Deep learning techniques, allows the estimation of the pH in a 100m(2) raceway reactor.... 详细信息
来源: 评论
Dual Principal Component Pursuit for learning a Union of Hyperplanes: Theory and Algorithms  24
Dual Principal Component Pursuit for Learning a Union of Hyp...
收藏 引用
24th international conference on Artificial Intelligence and Statistics (AISTATS)
作者: Ding, Tianyu Zhu, Zhihui Tsakiris, Manolis Vidal, Rene Robinson, Daniel Johns Hopkins Univ Baltimore MD 21218 USA Univ Denver Denver CO 80208 USA ShanghaiTech Univ Shanghai Peoples R China Lehigh Univ Bethlehem PA 18015 USA
State-of-the-art subspace clustering methods are based on convex formulations whose theoretical guarantees require the subspaces to be low-dimensional. Dual Principal Component Pursuit (DPCP) is a non-convex method th... 详细信息
来源: 评论
An Analysis Employing Various machine learning Algorithms for Detection of Malicious URLs  14th
An Analysis Employing Various Machine Learning Algorithms fo...
收藏 引用
12th international Advanced computing conference, IACC 2022
作者: Rizvi, Fizza Mohi ud din, Saika Sharma, Nonita Sharma, Deepak Kumar Department of Information Technology Indira Gandhi Delhi Technical University for Women Kashmere Gate Delhi India
Currently, there are millions and trillions of webpages online. Therefore, in order to protect their data, users must be able to distinguish between trustworthy and dangerous websites. Since they are on the rise, mali... 详细信息
来源: 评论
One-Dimensional Dilated Hypothesized learning Method for Intrusion Detection System Under Constraint Resource Environment
One-Dimensional Dilated Hypothesized Learning Method for Int...
收藏 引用
Advancements in Electrical, Electronics, Communication, computing and Automation (ICAECA), international conference on
作者: B. Shuriya Umamaheswari S A. Rajendran P. Sivaprakash Dept of Computer Science and Engineering PPG Institute of Technology Coimbatore Dept of Electronics and Communication Engineering Kumaraguru College of Technology Coimbatore Dept of Electronics and Communication Engineering Karpagam College of Engineering Coimbatore Dept of Computer Science and Engineering Rathinam College of Arts and Science Coimbatore
When a breach is discovered, intrusion detection systems can alert server administrators and researchers and channel packets for cyber security incidents. In complex systems, these reports are becoming uncontrollable....
来源: 评论
The performance comparison of some methods based on machine learning and deep learning for the web attack detection
The performance comparison of some methods based on machine ...
收藏 引用
2021 international conference on Electronic Information Engineering and Computer Technology, EIECT 2021
作者: Li, Bodong Lin, Xuanxuan Lu, Xi Computer Information System Post University Waterbury06723 United States Information and Computing Science Ningbo Tech University Ningbo315100 China Electronic Commerce South China University of Technology Guangzhou510006 China
Over the past few decades, 'as all kinds of network attacks have bad effects on people's daily life, cybersecurity has become an issue that is commonly concerned by society. In traditional ways, it belongs to ... 详细信息
来源: 评论