咨询与建议

限定检索结果

文献类型

  • 4,472 篇 会议
  • 2,971 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,762 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 342 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,257 篇 理学
    • 1,322 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 210 篇 training
  • 205 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 148 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 83 篇 artificial intel...

机构

  • 1,215 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 114 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 95 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 82 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 59 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 56 篇 college of softw...
  • 52 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 36 篇 he jingsha
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 25 篇 wu kaishun
  • 24 篇 yan li

语言

  • 7,070 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science And Software Engineering"
7510 条 记 录,以下是71-80 订阅
排序:
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
收藏 引用
computer Modeling in engineering & sciences 2023年 第3期134卷 2137-2162页
作者: Lei Yan Maode Ma Dandan Li Xiaohong Huang Yan Ma Kun Xie School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijingChina College of Engineering QatarUniversityDohaQatar
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mech... 详细信息
来源: 评论
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Zero Trust+: A Trusted-based Zero Trust architecture for IoT...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Huber, Brennan Kandah, Farah Auburn University Computer Science and Software Engineering Samuel Ginn College of Engineering United States
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a... 详细信息
来源: 评论
Optimized Autonomous Computing with Trusted Resilient Data Management for IoT Emerging Networks
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20778-20785页
作者: Shafique, Ayesha Cheng, Benmao Zhao, Bo Alwakid, Ghadah Naif Haq, Muhammad Inaam Ul Laboratory of Intelligent IOT Technology and Applications in Universities China Jouf University College of Computer and Information Sciences Department of Computer Science Al Jowf Sakaka72341 Saudi Arabia Quanzhou University of Information Engineering School of Computer Science and Software Engineering Quanzhou362000 China
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre... 详细信息
来源: 评论
A Novel Approach to Energy Optimization:Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2945-2970页
作者: Muhammad Salman Qamar Ihsan ulHaq Amil Daraz Atif MAlamri Salman A.AlQahtani Muhammad Fahad Munir Department of Electrical and Computer Engineering International Islamic UniversityIslamabad44000Pakistan School of Information Science and Engineering NingboTech UniversityNingbo315100China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia
In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing ***,the limited energy resources of Sensor Nodes(SNs)a... 详细信息
来源: 评论
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2287-2308页
作者: Shiyan Zhang Ruohan Xu Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing100876China College of Computer Science and Technology Tianjin UniversityTianjin300072China Institute of Artificial Intelligence Nankai UniversityTianjin300071China College of Information Science and Engineering East China University of Science and TechnologyShanghai200237China
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... 详细信息
来源: 评论
Algorithm for Identifying Critical Nodes in Networks Based on Spectral Clustering to Construct Hypergraphs  16
Algorithm for Identifying Critical Nodes in Networks Based o...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Li, Xujie Shao, Fei Li, Haotian College of Computer Science and Software Engineering Hohai University Nanjing China College of Information Science and Engineering Hohai University Nanjing China
Currently, the basis for critical nodes definition and identification lies in the representation learning of the network and the extraction of local and global features of the nodes. The effectiveness of the algorithm... 详细信息
来源: 评论
A Length-Adaptive Non-Dominated Sorting Genetic Algorithm for Bi-Objective High-Dimensional Feature Selection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第9期10卷 1834-1844页
作者: Yanlu Gong Junhai Zhou Quanwang Wu MengChu Zhou Junhao Wen College of Computer Science Chongqing UniversityChongqing 400044China IEEE Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA College of Big Data and Software Engineering Chongqing UniversityChongqing 400044China
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** c... 详细信息
来源: 评论
BMLP:behavior-aware MLP for heterogeneous sequential recommendation
收藏 引用
Frontiers of computer science 2024年 第3期18卷 235-237页
作者: Weixin LI Yuhao WU Yang LIU Weike PAN Zhong MING College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen 518123China
1 Introduction Recommender systems can effectively alleviate the problem of information ***,traditional recommendation methods cannot capture users’dynamic *** recommendation methods model user sequences to obtain mo... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
A Brief Review on Prediction Methods for Cloud Resource Management  9
A Brief Review on Prediction Methods for Cloud Resource Mana...
收藏 引用
9th IEEE International Conference on Smart Cloud, SmartCloud 2024
作者: Kuang, Chenxing Qiu, Yunyun Cao, Weipeng Xiao, Zhijiao Ming, Zhong Shenzhen University College of Computer Science and Software Engineering Shenzhen China Shenzhen China
The complexity of apps running on cloud platforms is evident in their nature. Every application has distinct needs for processing power and memory at various times. In order to effectively cater to tenants' varied... 详细信息
来源: 评论