咨询与建议

限定检索结果

文献类型

  • 9,285 篇 会议
  • 8,298 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,940 篇 工学
    • 8,265 篇 计算机科学与技术...
    • 6,860 篇 软件工程
    • 2,669 篇 信息与通信工程
    • 1,801 篇 生物工程
    • 1,532 篇 控制科学与工程
    • 1,301 篇 电气工程
    • 1,194 篇 生物医学工程(可授...
    • 1,016 篇 光学工程
    • 905 篇 电子科学与技术(可...
    • 591 篇 机械工程
    • 538 篇 化学工程与技术
    • 454 篇 网络空间安全
    • 441 篇 交通运输工程
    • 437 篇 动力工程及工程热...
    • 414 篇 仪器科学与技术
    • 414 篇 安全科学与工程
  • 6,512 篇 理学
    • 3,264 篇 数学
    • 2,049 篇 生物学
    • 1,737 篇 物理学
    • 1,251 篇 统计学(可授理学、...
    • 669 篇 化学
    • 593 篇 系统科学
  • 3,140 篇 管理学
    • 1,781 篇 管理科学与工程(可...
    • 1,492 篇 图书情报与档案管...
    • 901 篇 工商管理
  • 1,147 篇 医学
    • 956 篇 临床医学
    • 862 篇 基础医学(可授医学...
    • 518 篇 药学(可授医学、理...
    • 489 篇 公共卫生与预防医...
  • 563 篇 法学
    • 483 篇 社会学
  • 339 篇 经济学
  • 275 篇 农学
  • 171 篇 教育学
  • 60 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 683 篇 deep learning
  • 612 篇 accuracy
  • 440 篇 feature extracti...
  • 437 篇 machine learning
  • 398 篇 computational mo...
  • 390 篇 training
  • 325 篇 predictive model...
  • 323 篇 real-time system...
  • 294 篇 semantics
  • 262 篇 internet of thin...
  • 244 篇 optimization
  • 226 篇 support vector m...
  • 224 篇 convolutional ne...
  • 200 篇 reinforcement le...
  • 193 篇 neural networks
  • 187 篇 data mining
  • 185 篇 data models
  • 162 篇 image segmentati...
  • 147 篇 reliability
  • 143 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 372 篇 horia hulubei na...
  • 363 篇 h.h. wills physi...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 291 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 235 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 200 篇 borsato m.
  • 198 篇 betancourt c.
  • 165 篇 bediaga i.
  • 158 篇 niyato dusit
  • 157 篇 baker s.
  • 150 篇 amato s.
  • 147 篇 baryshnikov f.
  • 146 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 15,616 篇 英文
  • 1,973 篇 其他
  • 122 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering with Data Science"
17686 条 记 录,以下是4661-4670 订阅
排序:
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future
Study on Zero-Trust Architecture, Application Areas & Challe...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Richa Singh Gaurav Srivastav Rekha Kashyap Satvik Vats Computer Science & Engineering (AI) Krishna Group of Institutions Ghaziabad India Artificial Intelligence & Data Science Datta Meghe Institute of Higher Education & Research Maharashtra India Computer Science & Engineering Graphic Era Hill University Dehradun India
Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, th...
来源: 评论
Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects
arXiv
收藏 引用
arXiv 2024年
作者: Li, Na Zhou, Chunyi Gao, Yansong Chen, Hui Fu, Anmin Zhang, Zhi Yu, Shui School of Cyberspace Science and Engineering Nanjing University of Science and Technology Nanjing210094 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Data61 CSIRO CanberraACT2601 Australia Department of Computer Science and Software Engineering University of Western Australia PerthWA6009 Australia School of Computer Science University of Technology Sydney SydneyNSW2007 Australia
Personal digital data is a critical asset, and governments worldwide have enforced laws and regulations to protect data privacy. data users have been endowed with the 'right to be forgotten' of their data. In ... 详细信息
来源: 评论
A Pre-selected Local Weighted Method for Improving the Performance of LMKNN Classifier
A Pre-selected Local Weighted Method for Improving the Perfo...
收藏 引用
IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS)
作者: Yuzhi Zhang Ziyan Guan Chen Xiong School of Aeronautic Science and Engineering Beihang University Beijing China School of Big Data & Software Engineering Chongqing University Chongqing China School of Computer Science Xi'an Jiaotong University City College Xi'an China
The K-nearest neighbor (KNN) algorithm and its variant Local Mean K-nearest neighbor (LMKNN) have been widely used in the field of data mining due to their simplicity and intuition. However, these methods have limitat... 详细信息
来源: 评论
Extended Finite State Machine based Fault Tolerance in WSN
Extended Finite State Machine based Fault Tolerance in WSN
收藏 引用
International Conference on Computing Methodologies and Communication (ICCMC)
作者: D. Lekha Ahsan Shariff M S. Venkata Lakshmi Anwar Basha H Department of Computer Science and Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering Aalim Muhammed Salegh College of Engineering Chennai Tamil Nadu India Artificial Intelligence and Data Science Sri Krishna College of Engineering and Technology Coimbatore Tamil Nadu India School of Computer Science And Engineering REVA University Bengaluru Karnataka India
Wireless Sensor Network (WSN) suffers from different malware attacks. Several traditional approaches are proposed for detecting fault nodes in WSN. It is necessary to redistribute the nodes and detect the fault nodes ... 详细信息
来源: 评论
MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification  19
MalDIST: From Encrypted Traffic Classification to Malware Tr...
收藏 引用
19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022
作者: Bader, Ofek Lichy, Adi Hajaj, Chen Dubin, Ran Dvir, Amit Ariel Cyber Innovation Center Ariel University Department of Computer Science Ariel Israel Ariel Cyber Innovation Center Ariel University Data Science and Artificial Intelligence Research Center Department of Industrial Engineering & Management Ariel Israel
The world of malware is shifting towards using encrypted traffic. While encryption improves the privacy of users, it brings challenges in the fields of QoS, QoE, and cybersecurity. Recent state-of-the-art Deep-Learnin... 详细信息
来源: 评论
Earthquake Damage Prediction and Rapid Assessment of Building Damage Using Deep Learning
Earthquake Damage Prediction and Rapid Assessment of Buildin...
收藏 引用
Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS), International Conference on
作者: Yuvaraj Natarajan Gitanjali Wadhwa Preethi Akshaya Ranganathan Karthika Natarajan Dept. of Computer Science and Engineering KPR Institute of Engineering and Technology Coimbatore India Dept. of Artificial Intelligence and Data Science KPR Institute of Engineering and Technology Coimbatore India
One of the most expensive natural disasters that affect people, earthquakes occur suddenly. As a result, earthquake prediction has grown in importance and difficulty for humanity. Although numerous existing approaches...
来源: 评论
Maximum Effort Consensus Modeling Under Social Network Considering Individual Emotions  22nd
Maximum Effort Consensus Modeling Under Social Network Consi...
收藏 引用
22nd International Symposium on Knowledge and Systems sciences, KSS 2023
作者: Xu, Mengru Jing, Fuying Chao, Xiangrui Herrera-viedma, Enrique School of Management Science and Engineering Chongqing Technology and Business University Chongqing400067 China National Research Base of Intelligent Manufacturing Service Chongqing Technology and Business University Chongqing400067 China School of Business Sichuan University Chengdu610065 China Andalusian Research Institute in Data Science and Computational Intelligence Department of Computer Science and Artificial Intelligence University of Granada Granada18071 Spain
It’s beyond disputed that everyone has their own unique understandings of words, which induces personalized individual semantics (PISs) attached to linguistic expressions. Social network illustrates trust relationshi... 详细信息
来源: 评论
Applying Machine Learning to Strengthening Cyber Security
Applying Machine Learning to Strengthening Cyber Security
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: M. Vigenesh M Shalini P Mandar Inzimam Ul Hassan Sukhvinder Singh Dari S. Annamalai Department of Computer Science Engineering Karpagam Academy of Higher Education Coimbatore Department of Electronics and Communication Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai Department of Artificial Intelligence & Data Science Vishwakarma Institute of Technology Pune INDIA Department of Computer Science & Engineering Vivekananda Global University Jaipur India Symbiosis Law School Nagpur Symbiosis International (Deemed University) Pune India School of Computer Science and Engineering Jain (Deemed to be University) Bangalore Karnataka India
Cyber safety threats have become a central problem in the contemporary world, with hackers constantly finding new approaches to make the most systems and users to gain unauthorized admission. Gadget learning has been ... 详细信息
来源: 评论
A Novel Intelligent AI-Based Security to Enhance the data Communication: An Empirical Review
A Novel Intelligent AI-Based Security to Enhance the Data Co...
收藏 引用
International Conference on Intelligent Systems and Sustainable Computing, ICISSC 2022
作者: Shaik, Amjan Hung, Bui Thanh Chakrabarti, Prasun Siva Shankar, S. Parveen, Nikhat Department of Computer Science and Engineering Dean R&D St. Peter’s Engineering College Maisammaguda Telangana Hyderabad India Data Science Laboratory Faculty of Information Technology Industrial University of Ho Chi Minh Ho Chi Minh Viet Nam Department of Computer Science and Engineering Sir Padampat Singhania University Rajasthan Udaipur India Adjunct Distinguished Professor ITM SLS Baroda University Gujarat Vadodara India CSE K G Reddy College of Engineering and Technology Moinabad India CSE Koneru Lakshmaiah Education Foundation AP Guntur Vaddeswaram India
The transmission of digital data between two devices is termed data communication. As the world nowadays relies on digital communication, the transferring of data among various devices is vitally important, and hence,... 详细信息
来源: 评论