咨询与建议

限定检索结果

文献类型

  • 2,338 篇 会议
  • 9 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 2,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,521 篇 工学
    • 1,377 篇 计算机科学与技术...
    • 1,168 篇 软件工程
    • 345 篇 生物工程
    • 324 篇 信息与通信工程
    • 197 篇 生物医学工程(可授...
    • 133 篇 控制科学与工程
    • 118 篇 电气工程
    • 110 篇 光学工程
    • 80 篇 机械工程
    • 76 篇 安全科学与工程
    • 74 篇 化学工程与技术
    • 69 篇 电子科学与技术(可...
    • 57 篇 农业工程
  • 790 篇 理学
    • 408 篇 数学
    • 362 篇 生物学
    • 201 篇 统计学(可授理学、...
    • 156 篇 物理学
    • 131 篇 系统科学
    • 69 篇 化学
  • 411 篇 管理学
    • 221 篇 管理科学与工程(可...
    • 217 篇 图书情报与档案管...
    • 135 篇 工商管理
  • 195 篇 医学
    • 185 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 129 篇 药学(可授医学、理...
    • 76 篇 公共卫生与预防医...
  • 90 篇 农学
    • 90 篇 作物学
  • 88 篇 法学
    • 77 篇 社会学
  • 65 篇 教育学
    • 65 篇 教育学
  • 54 篇 经济学
    • 54 篇 应用经济学
  • 3 篇 文学
  • 1 篇 军事学

主题

  • 323 篇 machine learning
  • 147 篇 deep learning
  • 94 篇 support vector m...
  • 93 篇 accuracy
  • 91 篇 machine learning...
  • 71 篇 predictive model...
  • 61 篇 adversarial mach...
  • 59 篇 feature extracti...
  • 50 篇 forecasting
  • 49 篇 training
  • 48 篇 convolutional ne...
  • 45 篇 computational mo...
  • 39 篇 data models
  • 32 篇 decision trees
  • 31 篇 real-time system...
  • 30 篇 analytical model...
  • 30 篇 computer vision
  • 29 篇 prediction algor...
  • 28 篇 data mining
  • 28 篇 sentiment analys...

机构

  • 25 篇 chitkara univers...
  • 9 篇 college of manag...
  • 8 篇 computer science...
  • 8 篇 graphic era hill...
  • 7 篇 school of comput...
  • 6 篇 computer science...
  • 6 篇 greater bay area...
  • 6 篇 school of nursin...
  • 6 篇 department of co...
  • 5 篇 kkr and ksr inst...
  • 5 篇 institute of art...
  • 5 篇 school of comput...
  • 5 篇 department of in...
  • 4 篇 school of comput...
  • 4 篇 the state key la...
  • 4 篇 guangdong univer...
  • 4 篇 henan engineerin...
  • 4 篇 chitkara centre ...
  • 4 篇 school of comput...
  • 4 篇 school of comput...

作者

  • 9 篇 kukreja vinay
  • 8 篇 mehta shiva
  • 7 篇 mahamudul hasan
  • 7 篇 shiva mehta
  • 7 篇 william p.
  • 7 篇 hasan mahamudul
  • 5 篇 p. william
  • 5 篇 wang yu
  • 4 篇 ali md sawkat
  • 4 篇 zhang tao
  • 4 篇 zhou tianwei
  • 4 篇 maheen islam
  • 4 篇 faisal rehman
  • 4 篇 patnaik sanghami...
  • 4 篇 maranan ramya
  • 4 篇 md sawkat ali
  • 4 篇 wang wei
  • 4 篇 mohanty arpeeta
  • 4 篇 taskeed jabid
  • 4 篇 pattnayak partha...

语言

  • 2,264 篇 英文
  • 84 篇 其他
  • 18 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Computer Application, ICMLCA 2023"
2348 条 记 录,以下是21-30 订阅
排序:
A distributed machine learning dynamic remote proof scheme that resists collusion attacks  4
A distributed machine learning dynamic remote proof scheme t...
收藏 引用
4th international conference on Network Communication and Information Security, ICNCIS 2024
作者: Wang, Ke Wu, Qiuxin Qin, Yu School of Applied Science Beijing Information Science and Technology University Beijing100192 China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Science Beijing100190 China
Based on the security of distributed machine learning data and model based on remote proof, a cross-domain dynamic remote proof scheme based on ring signature improves the efficiency of computer cluster proof, the app... 详细信息
来源: 评论
Enhancing Mobile application Security through Android threat Classification  4
Enhancing Mobile Application Security Through Android Threat...
收藏 引用
4th international conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Josephine, Helen V.L. Rajagopal, Manikandan Gayatri, S. Lakshmi, K. Business Analytics School of Business and Management Chrisut University Bangalore560074 India School of Business and Management Chrisut University Bangalore560029 India School of Business and Management Christ Univeristy Bangalore560074 India School of Computer Science and Application Reva University Bangalore India
the Android application market has grown significantly, offering customers an ever-growing range of features to suit a variety of purposes. Users are exchanging more and more sensitive data thanks to the widespread us... 详细信息
来源: 评论
A Comparative Analysis of Aggregation Methods in Federated learning on MNIST  4th
A Comparative Analysis of Aggregation Methods in Federated L...
收藏 引用
4th international conference on Artificial Intelligence and Knowledge Processing
作者: Agarwal, Vedik Chandnani, Chirag Jitendra Kulkarni, Shlok Chetan Aren, Aditya Srinivasan, Kathiravan VIT Vellore Sch Comp Sci SCOPE Vellore 632014 Tamil Nadu India
machine learning methods that protect privacy are now highly sought after in the big data and ubiquitous connection era. Federated learning (FL) is a unique and revolutionary method that solves this problem by allowin... 详细信息
来源: 评论
A Grading Model for Jasmine Flowers Using Deep learning and Quantum machine learning  4
A Grading Model for Jasmine Flowers Using Deep Learning and ...
收藏 引用
4th international conference on Sentiment Analysis and Deep learning, ICSADL 2025
作者: Pratiksha Cauvery, K.P. thrisha, R. Harshitha, T. Panigrahi, Suman thangavel, Senthil Kumar Somasundaram, K. Boopathy, C.P. Amrita School of Physical Sciences Department of Mathematics Tamil Nadu Coimbatore India Amrita School of Computing Department of Computer Science and Engineering Tamil Nadu Coimbatore India Amrita School of Engineering Department of Elelctical and Electronics Engineering Tamil Nadu Coimbatore India
the flowers of Jasmine hold immense economic importance in the agricultural sector and the perfume industry, as the value and satisfaction of the market, are heavily influenced by the quality of these flowers. the alr... 详细信息
来源: 评论
A QoS and Load Balancing Predictive Model Based on LSTM and Random Forest Regression in SDN: A Rest API Approach  4th
A QoS and Load Balancing Predictive Model Based on LSTM and ...
收藏 引用
4th international conference on Data and Information in Online Environments
作者: Ansari, Muhammad Salman Zhang, JianXun Shaban Tianjin Univ Technol & Educ Tianjin Peoples R China Univ Elect Sci & Technol Chengdu Peoples R China
Fog Computing, Software Define Networking, RESTful API and machine learning are new technologies in the area of ICT as well as in Networking. Fog computing brought high performance computing at the edge of network and... 详细信息
来源: 评论
application of machine learning in port throughput prediction  4
Application of machine learning in port throughput predictio...
收藏 引用
4th international conference on computer Vision, application, and Algorithm, CVAA 2024
作者: Liu, Shulin Huang, Lei School of Economics and Management Beijing Jiaotong University Beijing China
the rapid growth of global trade has made ports indispensable core nodes in the global logistics network. the study of port throughput has become a hot topic for modern researchers. this study focuses on Guangzhou Por... 详细信息
来源: 评论
Comparative Analysis of Federated learning, Deep learning, and Traditional machine learning Techniques for IoT Malware Detection  4
Comparative Analysis of Federated Learning, Deep Learning, a...
收藏 引用
4th IEEE international conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Darwish, Rami Roy, Kaushik North Carolina A&T State University Department of Computer Science GreensboroNC United States
this paper addresses the challenge of classifying Internet of things (IoT) binary files as either malware or benign using graph-theoretical features derived from Control Flow Graphs (CFGs). We use a dataset of 248,276... 详细信息
来源: 评论
Streamlining Financial Predictions: A Web application for Stock, Cryptocurrency, and Market Sentiment Analysis  4
Streamlining Financial Predictions: A Web Application for St...
收藏 引用
4th international conference on Sentiment Analysis and Deep learning, ICSADL 2025
作者: Vivekanand, Chettiyar Vani Kumar, P. Amizhthini, A. Rajalakshmi Engineering College Computer Science and Engineering Chennai India
Among the high-degree lines of study in this area, one of the most interesting ones is stock price prediction, particularly in the context of machine learning and time series forecasting models. the traditional past o... 详细信息
来源: 评论
An Optimal Real-Time Routing and Clustering Protocol for UAV Networks Based on Security  4
An Optimal Real-Time Routing and Clustering Protocol for UAV...
收藏 引用
4th international conference on Sentiment Analysis and Deep learning, ICSADL 2025
作者: Sophia, S. Leelipushpam Paulraj, Getzi Jeba Yuvarajan, D. Karunya Institute of Technology and Sciences Division of Artificial Intelligence and Machine Learning Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India
Unmanned Aerial Vehicle (UAV) networks play an important role in different application areas such as military surveillance, emergency services, and infrastructure. However, these networks face significant challenges s... 详细信息
来源: 评论
Diffusion-Augmented learning for Long-tail recognition  4
Diffusion-Augmented learning for Long-tail recognition
收藏 引用
4th international conference on computer Vision, application, and Algorithm, CVAA 2024
作者: Wang, Xiaochun Nanjing University of Science and Technology Nanjing China
In general, natural data are long-tail distributed over semantic classes. Existing recognition methods tackle the imbalanced classification problem by designing architectures that focus more on the tail classes withou... 详细信息
来源: 评论