咨询与建议

限定检索结果

文献类型

  • 15,789 篇 会议
  • 14,087 篇 期刊文献
  • 149 册 图书
  • 2 篇 专利

馆藏范围

  • 30,027 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,692 篇 工学
    • 14,307 篇 计算机科学与技术...
    • 12,129 篇 软件工程
    • 4,288 篇 信息与通信工程
    • 2,994 篇 生物工程
    • 2,342 篇 控制科学与工程
    • 1,888 篇 生物医学工程(可授...
    • 1,856 篇 电气工程
    • 1,540 篇 光学工程
    • 1,286 篇 电子科学与技术(可...
    • 983 篇 机械工程
    • 901 篇 化学工程与技术
    • 712 篇 网络空间安全
    • 702 篇 安全科学与工程
    • 662 篇 动力工程及工程热...
    • 642 篇 交通运输工程
    • 622 篇 仪器科学与技术
  • 11,183 篇 理学
    • 6,019 篇 数学
    • 3,387 篇 生物学
    • 2,639 篇 物理学
    • 2,290 篇 统计学(可授理学、...
    • 1,074 篇 化学
    • 1,067 篇 系统科学
  • 5,506 篇 管理学
    • 2,899 篇 图书情报与档案管...
    • 2,871 篇 管理科学与工程(可...
    • 1,463 篇 工商管理
  • 1,821 篇 医学
    • 1,523 篇 临床医学
    • 1,388 篇 基础医学(可授医学...
    • 812 篇 药学(可授医学、理...
    • 774 篇 公共卫生与预防医...
  • 1,015 篇 法学
    • 864 篇 社会学
  • 545 篇 经济学
  • 413 篇 农学
  • 314 篇 教育学
  • 100 篇 文学
  • 45 篇 军事学
  • 41 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 973 篇 deep learning
  • 853 篇 accuracy
  • 769 篇 machine learning
  • 700 篇 training
  • 691 篇 feature extracti...
  • 575 篇 semantics
  • 554 篇 computational mo...
  • 413 篇 predictive model...
  • 412 篇 data models
  • 339 篇 internet of thin...
  • 339 篇 convolutional ne...
  • 327 篇 support vector m...
  • 315 篇 reinforcement le...
  • 308 篇 real-time system...
  • 288 篇 neural networks
  • 278 篇 data mining
  • 270 篇 image segmentati...
  • 256 篇 task analysis
  • 240 篇 optimization
  • 239 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 428 篇 department of ph...
  • 397 篇 iccub universita...
  • 343 篇 university of ch...
  • 331 篇 college of compu...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...
  • 279 篇 horia hulubei na...

作者

  • 242 篇 barter w.
  • 241 篇 beiter a.
  • 224 篇 bellee v.
  • 218 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 194 篇 brundu d.
  • 185 篇 blake t.
  • 160 篇 niyato dusit
  • 155 篇 baker s.
  • 154 篇 borsato m.
  • 151 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon

语言

  • 27,988 篇 英文
  • 1,892 篇 其他
  • 180 篇 中文
  • 6 篇 法文
  • 3 篇 德文
  • 3 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Data Science"
30027 条 记 录,以下是151-160 订阅
排序:
A study on Electronic Health Records (EHR) in India: Security challenges, initiatives and blockchain integration  4th
A study on Electronic Health Records (EHR) in India: Securit...
收藏 引用
4th International Conference on Computational Methods in science and Technology, ICCMST 2024
作者: Bhargava, Misha Mahi, Samarjit Rao, Vidya Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal India
With its vast population and extensive healthcare requirements, India is moving toward digitalizing its health records. Safeguarding Electronic Health Records (EHRs) is crucial given the increase in security breaches ... 详细信息
来源: 评论
Targeted Universal Adversarial Attack Based on Fourier Transform  2nd
Targeted Universal Adversarial Attack Based on Fourier Tran...
收藏 引用
2nd International Conference on data Security and Privacy Protection, DSPP 2024
作者: Sun, Yancheng Chen, Yuling Liu, Ziyang Dou, Hui Tan, Chaoyue The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ... 详细信息
来源: 评论
Deep ensemble optimal classifier-based software defect prediction for early detection and quality assurance
收藏 引用
Journal of Umm Al-Qura University for Engineering and Architecture 2025年 1-12页
作者: Srinivas, Kalyanapu Janapati, Krishna Chaithanya Sai Kiran, Mungalched Sudheer Reddy, Davu Vinay, Thota Vamshi Yashwanth, Choula Department of Computer Science and Engineering Dhanekula Institute of Engineering and Technology Andhra Pradesh Vijayawada India Department of Electronics and Communication Engineering Vardhaman College of Engineering Telangana Hyderabad India Department of Computer Science and Engineering (Data Science) Malla Reddy Engineering College and Management Sciences Medchal Telangana Kistapur India
Software Defect Prediction (SDP) is critical in identifying fault-prone modules during the software development life cycle, enhancing software quality, and reducing maintenance costs. However, existing SDP models face... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
FHO-based Hybrid Neural Networks for Short-Term Load Forecasting in Economic Dispatch of Power Systems
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 262-284页
作者: Wei, Yi Wang, Chia-Hung Suo, Yi-Fan Zhao, Qi-Gen Yuan, Jin-Chen Chen, Shu-Meng College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China
With the development of the smart grid era, the data volume of the power system on the user side is growing rapidly, and the dependence of citizens on electricity is increasing significantly. In this paper, we aim to ... 详细信息
来源: 评论
Enhanced Clickbait Detection through Ensemble Machine Learning Techniques
收藏 引用
Procedia computer science 2025年 258卷 599-608页
作者: Neetu Sardana Deepika Varshney Seema Luthra Department of Computer Science & Engineering-Data Science ABES Engineering College Ghaziabad India
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clic... 详细信息
来源: 评论
Revocable Hierarchical Identity-based Inner Product Function Encryption in Smart Healthcare
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15319-15332页
作者: Zhu, Yasi Zhou, Yanwei Wang, Jing Yang, Bo Zhang, Mingwu Shaanxi Normal University School of Computer Science Xi'an710119 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hubei University of Technology School of Computer Wuhan430068 China
With the development of cloud computing and the digital transformation of the medical industry, the application scenarios and effects of smart healthcare are constantly expanding and improving. Smart healthcare plays ... 详细信息
来源: 评论
NOMA Attack Prediction in Large-Scale Networks using Non-Linear Chaotic Belief Mechanism  3
NOMA Attack Prediction in Large-Scale Networks using Non-Lin...
收藏 引用
3rd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Sangeetha, K. Suguna, M. Jebakumar Immanuel, D. Suje, S.A. Department of Computer Science and Engineering SNS College of Technology Tamil Nadu Coimbatore India Department of Artificial Intelligence and Data Science Karpagam Institute of Technology Tamil Nadu Coimbatore India Department of Artificial Intelligence and Data Science Nandha Engineering College Tamil Nadu Erode India
Non-Orthogonal Multiple Access (NOMA) systems are becoming relevant in the fast-expanding terrain of large-scale networks because of their efficiency in concurrently managing many users. This is true since NOMA system... 详细信息
来源: 评论
Blockchain-Based Revocable Key-Aggregate Searchable Encryption for Group data Sharing in Cloud-Assisted Industrial IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16899-16911页
作者: Zhang, Kai Hu, Xinyi Zhao, Jian Wei, Lifei Ning, Jianting Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Shanghai University of Electric Power College of Electrical Engineering Shanghai China Shanghai Maritime University College of Information Engineering Shanghai China Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science China
In the cloud-assisted Industrial Internet of Things (IIoT), flexible and secure data sharing promotes industry processes optimization and new products-making. To enable selective data retrieval over categorized data c... 详细信息
来源: 评论