咨询与建议

限定检索结果

文献类型

  • 209,209 篇 会议
  • 2,854 篇 期刊文献
  • 2,191 册 图书
  • 10 篇 学位论文
  • 2 篇 科技报告
  • 1 件 标准

馆藏范围

  • 214,265 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 122,334 篇 工学
    • 88,680 篇 计算机科学与技术...
    • 65,258 篇 软件工程
    • 29,178 篇 信息与通信工程
    • 16,772 篇 控制科学与工程
    • 14,164 篇 电气工程
    • 10,731 篇 生物工程
    • 10,350 篇 机械工程
    • 9,895 篇 电子科学与技术(可...
    • 8,005 篇 生物医学工程(可授...
    • 6,857 篇 仪器科学与技术
    • 5,603 篇 光学工程
    • 5,192 篇 动力工程及工程热...
    • 4,928 篇 化学工程与技术
    • 4,721 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 4,166 篇 交通运输工程
  • 49,070 篇 理学
    • 26,352 篇 数学
    • 11,559 篇 生物学
    • 11,437 篇 物理学
    • 8,067 篇 统计学(可授理学、...
    • 6,126 篇 系统科学
    • 4,960 篇 化学
  • 37,495 篇 管理学
    • 22,475 篇 管理科学与工程(可...
    • 17,563 篇 图书情报与档案管...
    • 10,772 篇 工商管理
  • 7,371 篇 医学
    • 6,194 篇 临床医学
    • 5,826 篇 基础医学(可授医学...
  • 5,483 篇 法学
    • 4,416 篇 社会学
  • 4,382 篇 教育学
    • 4,162 篇 教育学
  • 4,343 篇 经济学
    • 4,221 篇 应用经济学
  • 2,984 篇 农学
  • 1,724 篇 文学
  • 569 篇 艺术学
  • 556 篇 军事学
  • 35 篇 历史学
  • 28 篇 哲学

主题

  • 10,584 篇 cloud computing
  • 6,596 篇 computational mo...
  • 6,306 篇 information tech...
  • 5,006 篇 feature extracti...
  • 4,553 篇 accuracy
  • 4,088 篇 data mining
  • 4,065 篇 training
  • 3,681 篇 computer archite...
  • 3,289 篇 computer science
  • 3,270 篇 mobile computing
  • 3,142 篇 security
  • 3,099 篇 internet of thin...
  • 2,994 篇 machine learning
  • 2,977 篇 servers
  • 2,948 篇 educational inst...
  • 2,946 篇 deep learning
  • 2,931 篇 data models
  • 2,903 篇 protocols
  • 2,698 篇 monitoring
  • 2,690 篇 real-time system...

机构

  • 675 篇 university of ch...
  • 577 篇 institute of com...
  • 444 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 department of co...
  • 143 篇 institute of inf...
  • 140 篇 shenyang institu...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 116 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 114 篇 school of comput...
  • 112 篇 school of electr...
  • 111 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 87 篇 wang wei
  • 83 篇 wei wang
  • 81 篇 zhang tao
  • 80 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 58 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 49 篇 wang lei
  • 48 篇 xiao liu
  • 48 篇 li li
  • 45 篇 xi chen

语言

  • 205,845 篇 英文
  • 6,398 篇 其他
  • 2,425 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 7 篇 葡萄牙文
  • 6 篇 西班牙文
  • 3 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
214269 条 记 录,以下是831-840 订阅
排序:
A study of the effects of residents' social support and online information anxiety on loneliness under public health emergencies  4
A study of the effects of residents' social support and onli...
收藏 引用
4rth international conference on applied Mathematics, Modelling, and Intelligent computing, CAMMIC 2024
作者: Ren, Jie Xia, Fang Liu, Linlin Zhang, Liya Niu, Fangjing Zhang, Haiyang Changchun University of Traditional Chinese Medicine Changchun130000 China
Objective: To explore the effects of residents' social support and network information anxiety on loneliness and their influencing factors under public health emergencies. Methods: CART decision tree and logistic ... 详细信息
来源: 评论
Security and Privacy-Preserving Techniques of Federated Learning in Edge computing: A Comparative Study  4
Security and Privacy-Preserving Techniques of Federated Lear...
收藏 引用
4th international conference on Innovative Research in applied Science, Engineering and technology, IRASET 2024
作者: Aasoum, Nouhaila Jellouli, Ismail Amjad, Souad Mohammed, Yahya M.A. Abdelmalek Essaadi University Department Of Emerging Computer Technologies Faculty Of Science Tetouan Morocco
Edge computing (EC) is an innovative architecture that aims to provide cloud computing services near data sources. In conventional deep learning systems that use edge computing, data producers frequently need to trans... 详细信息
来源: 评论
Adversarial Attacks Using Carlini Wagner
Adversarial Attacks Using Carlini Wagner
收藏 引用
2024 IEEE international conference on information technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Baddukonda, Tarun Aditya Kanakam, Ronit Kumar Yasotha, B. Srm Institute of Science and Technology Department of Computer Science and Engineering Kaatankulathur Tamilnadu Chennai India School of Computing Srm Institute of Science and Technology Department of Computing Technologies Kaatankulathur Tamilnadu Chennai India
Adversarial attacks in the Artificial Intelligence have received extensive coverage in the latest years. Such attacks have affected deep learning models and neural networks due to the weaknesses that are part of the A... 详细信息
来源: 评论
Virtual Reality-Based Interventions for Improving Learning Outcomes in Children with ADHD  19
Virtual Reality-Based Interventions for Improving Learning O...
收藏 引用
19th international conference on Future Networks and Communications, FNC 2024 / 21st international conference on Mobile Systems and Pervasive computing, MobiSPC 2024 / 14th international conference on Sustainable Energy information technology, SEIT 2024
作者: Alobidi, Noof Alnanih, Reem Bakhsh, Helen Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
The utilization of virtual reality (VR) has been increasingly applied in various fields, including medicine and education, to address the challenges faced by children with attention deficit hyperactivity disorder (ADH... 详细信息
来源: 评论
An Extended Agglomerative Hierarchical Clustering Techniques  2
An Extended Agglomerative Hierarchical Clustering Techniques
收藏 引用
2nd IEEE international conference on Advances in computing, Communication and applied Informatics, ACCAI 2023
作者: Maravarman, M. Babu, S. Pitchai, R. Srm Institute of Science and Technology School of Computing Department of Computing Technologies Tamil Nadu Kattangulathur India B v Raju Institute of Technology Department of Computer Science and Engineering Telangana Narsapur India
Clustering is a significant method of data analytics in real world environments since human labelling of the data is often costly. Clustering was developed as an alternative to manual tagging. In the field of data ana... 详细信息
来源: 评论
Genetic Optimization Techniques for Enhancing Web Attacks Classification in Machine Learning
Genetic Optimization Techniques for Enhancing Web Attacks Cl...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Jaradat, Ameera S. Nasayreh, Ahmad Al-Na'amneh, Qais Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Yarmouk University Dep. of Computer Science Irbid Jordan Yarmouk University Dep. of Computer Science Irbid211633 Jordan Applied Science Private University Dep. of Cyber Security and Cloud Computing Amman Jordan Trine University Dep. of Business Administration IN United States University Zawia Department of Industrial Engineering Tripoli Libya
Web-based applications are now the preferred approach for delivering a variety of services via the Internet. As a result of the globalization of commerce, web applications have been growing quickly and becoming increa... 详细信息
来源: 评论
Pixel Similarity-Based Steganography in Bit Planes: An Optimization-Driven Approach  4
Pixel Similarity-Based Steganography in Bit Planes: An Optim...
收藏 引用
4th international conference on Soft computing for Security Applications, ICSCSA 2024
作者: Roselinkiruba, R. Jude Moses Anto Devakanth, J. Sharmila, L. Vasumathy, M. Misba, M. Saranya Jothi, C. Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology Chennai Avadi India Madanapalle Institute of Technology and Science Department of Computer Applications Andra Pradesh India Department of Information Technology Kingston Engineering College Vellore India
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. The aim o... 详细信息
来源: 评论
SideLink: Exposing NVLink to Covert and Side-Channel Attacks Official Work-in-Progress Paper  14th
SideLink: Exposing NVLink to Covert and Side-Channel Attacks...
收藏 引用
14th international conference on Security, Privacy and applied Cryptographic Engineering (SPACE)
作者: Baddour, Issa Banerjec, Dip Sankar Sanadhya, Somitra Kumar Indian Inst Technol Jodhpur 342030 Rajasthan India
For the past decades, covert and side channels have posed significant threats to user privacy in computing systems, targeting almost every component. In this paper, we present SideLink, a novel attack that exploits th... 详细信息
来源: 评论
Towards Practical Hardware Fingerprinting for Remote Attestation  1
收藏 引用
39th international conference on ICT Systems Security and Privacy Protection (SEC)
作者: Eckel, Michael Fenzl, Florian Jaeger, Lukas Fraunhofer SIT Cyber Phys Syst Secur Rheinstr 75 D-64295 Darmstadt Germany ATHENE Natl Res Ctr Appl Cybersecur Rheinstr 75 D-64295 Darmstadt Germany
In the realm of Trusted computing for embedded systems, ensuring the integrity of both firmware and hardware presents a complex challenge. Traditional approaches have focused on detecting firmware and operating system... 详细信息
来源: 评论
EQNN: Enhanced Quantum Neural Network – A Case Study of Mobile Data Usage Prediction
EQNN: Enhanced Quantum Neural Network – A Case Study of Mob...
收藏 引用
2024 IEEE international conference on Machine Learning and applied Network Technologies, ICMLANT 2024
作者: Chen, Abel C.H. Information & Communications Security Laboratory Chunghwa Telecom Laboratories Taoyuan Taiwan
With the maturation of quantum computing technology, research has gradually shifted towards exploring its applications. Alongside the rise of artificial intelligence, various machine learning methods have been develop... 详细信息
来源: 评论