咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是81-90 订阅
排序:
Multi-Agent Reinforcement learning Based on Cross Task Information Sharing  2
Multi-Agent Reinforcement Learning Based on Cross Task Infor...
收藏 引用
2nd international conference on Signal Processing and Intelligent computing, SPIC 2024
作者: Gao, Yu Zhu, Lizhong Liu, Yunting Yang, Jiaming Harbin First Machinery Group Corporation Harbin China Shenyang Ligong University Shenyang China
This article selects StarCraft as the experimental environment, which has a complex and vast action and state space, making it difficult for intelligent agents to make optimal decisions. In this article, the sharing o... 详细信息
来源: 评论
Evaluation of Network Intrusion Detection with machine learning and Deep learning Using Ensemble Methods on CICIDS-2017 Dataset  5
Evaluation of Network Intrusion Detection with Machine Learn...
收藏 引用
5th IEEE international conference on Advances in computing, Communication Control and Networking, ICAC3N 2023
作者: Rakesh, Lanka Upadhyay, Lav Reddy, Pochamreddy Mukesh Manipal University Jaipur Department Of Cse Jaipur India Manipal University Jaipur Department Of Cce Jaipur India
An intrusion detection system (IDS), also referred to as an IDS, is a type of network security equipment that monitors network communications in real-time and, should any potentially hostile transmissions be identifie... 详细信息
来源: 评论
Harmonizing Deep learning and Ensemble Techniquesfor Network Traffic Anomaly Detection
Harmonizing Deep Learning and Ensemble Techniquesfor Network...
收藏 引用
2024 international conference on Sustainable computing and Integrated Communication in Changing Landscape of AI, ICSCAI 2024
作者: Kashyap, Ayush Kumar Mahapatra, Madhumita Yadav, Piyush Verma, Seema Department of Computer Science Delhi Technical Campus Greater Noida India Delhi technical Campus Greater Noida India
Keeping not only the security of the network infrastructure, but the innovativeness of the cyber threats in mind, is vital for the safety of the digital landscape today. This study aims to inspect which strategies are... 详细信息
来源: 评论
Viability of machine learning in Android Scareware Detection  38th
Viability of Machine Learning in Android Scareware Detection
收藏 引用
38th international conference on Computers and Their Applications, CATA 2023
作者: Gautam, Aayush Rahimi, Nick School of Computing Sciences & Computer Engineering The University of Southern Mississippi USM United States
With the rapid increase in the use of mobile phones and other technologies, there has been a proportional growth in malware that tries to collect sensitive user data. Android is the most popular operating system for s... 详细信息
来源: 评论
machine learning Approaches for Anomaly Detection in Cybersecurity  12th
Machine Learning Approaches for Anomaly Detection in Cyberse...
收藏 引用
12th international conference on Frontiers of Intelligent computing: Theory and Applications, FICTA 2024
作者: Dhabliya, Ritika Sivakumar, S.A. Khubalkar, Deepti Sen, Pawan Banchhor, Chitrakant O. Jadhav, Jyoti Hindurao Researcher Connect Nagpur India Department of Electronics and Communication Engineering Dr. N. G. P. Institute of Technology Tamil Nadu Coimbatore641048 India Nagpur Campus Pune India Computer Science and Engineering Arya College of Engineering Jaipur India VIIT Pune India Pune Institute of Computer Technology Pune India
Given the increasing complexity of cyber threats, it is crucial to have strong anomaly detection systems in place for cybersecurity. This study investigates the utilization of machine learning techniques, particularly... 详细信息
来源: 评论
The State of Algorithmic Fairness in Mobile Human-Computer Interaction  25
The State of Algorithmic Fairness in Mobile Human-Computer I...
收藏 引用
25th ACM international conference on Mobile Human-Computer Interaction (MobileHCI)
作者: Yfantidou, Sofia Constantinides, Marios Spathis, Dimitris Vakali, Athena Quercia, Daniele Kawsar, Fahim Aristotle Univ Thessaloniki Thessaloniki Greece Nokia Bell Labs Cambridge England Univ Cambridge Cambridge England
This paper explores the intersection of Artificial Intelligence and machine learning (AI/ML) fairness and mobile human-computer interaction (MobileHCI). Through a comprehensive analysis of MobileHCI proceedings publis... 详细信息
来源: 评论
A Survey: machine learning and Deep learning in Wheat Disease Detection and Classification  7
A Survey: Machine Learning and Deep Learning in Wheat Diseas...
收藏 引用
7th international conference on Intelligent computing and Control Systems, ICICCS 2023
作者: Sahu, Nitin Bhat, Aruna Delhi Technological University Department of Computer Science & Engineering Delhi India
Cereals are a significant and vital source of food for humans. To feed the world's expanding population, farmers must produce more crops. Plant diseases, however, have an impact on crop production and food quality... 详细信息
来源: 评论
Distributed Denial of Service Attack Detection by machine learning Techniques  22
Distributed Denial of Service Attack Detection by Machine Le...
收藏 引用
22nd international learning and Technology conference, L and T 2025
作者: Jewani, Varkha K. Ajmire, Prafulla E. Atique, Mohd. Sharma, Bhisham Dhaou, Imed Ben Awadhesh Chaurasia, Suhashini Sant Gadge Baba Amravati University Amravati India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura140401 India Dar Al-Hekma University Hekma School of Engineering Computing and Design Department of Computer Science Jeddah Saudi Arabia RTM Nagpur University Department of Computer Science Nagpur India
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ... 详细信息
来源: 评论
Ensemble Two Stage machine learning for Network Abnormal Detection  23
Ensemble Two Stage Machine Learning for Network Abnormal Det...
收藏 引用
15th international conference on machine learning and computing, ICMLC 2023
作者: Du, Runze Li, Runzhi Zhang, Zijiao School of Cyberspace Security Zhengzhou University Zhengzhou China Network Center Zhengzhou University Zhengzhou China
With the endless emergence of network security problems, it also brings the corresponding security threats to the society. IDS is an effective means to deal with network threats, but in the modern large-scale network ... 详细信息
来源: 评论
Edge computing based IDS Detecting Threats using machine learning and PyCaret
Edge Computing based IDS Detecting Threats using Machine Lea...
收藏 引用
2023 international conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023
作者: Kumar, Amit Kumar, Sanjeev Kumar, Vivek Kumari, Amrita Saini, Ashish Gupta, Sarthak Haridwar India G L Bajaj Institute of Technology and Management Greater Noida India Quantum University Roorkee India Vivek College of Education Bijnor India
The Internet of Things is getting connected with the edge computing network day by day. These devices generate large amounts of confidential data that is stored and processed on edge computing. There is a need to prot... 详细信息
来源: 评论