咨询与建议

限定检索结果

文献类型

  • 3,390 篇 会议
  • 2,036 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,362 篇 工学
    • 2,334 篇 计算机科学与技术...
    • 1,868 篇 软件工程
    • 741 篇 信息与通信工程
    • 545 篇 控制科学与工程
    • 358 篇 电子科学与技术(可...
    • 355 篇 电气工程
    • 321 篇 生物工程
    • 295 篇 机械工程
    • 215 篇 仪器科学与技术
    • 206 篇 生物医学工程(可授...
    • 200 篇 光学工程
    • 164 篇 化学工程与技术
    • 132 篇 动力工程及工程热...
    • 126 篇 交通运输工程
    • 107 篇 安全科学与工程
    • 104 篇 网络空间安全
    • 102 篇 材料科学与工程(可...
  • 1,792 篇 理学
    • 914 篇 数学
    • 513 篇 物理学
    • 358 篇 生物学
    • 292 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 176 篇 化学
  • 952 篇 管理学
    • 581 篇 管理科学与工程(可...
    • 416 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 226 篇 医学
    • 189 篇 临床医学
    • 148 篇 基础医学(可授医学...
  • 148 篇 法学
    • 120 篇 社会学
  • 104 篇 经济学
    • 102 篇 应用经济学
  • 66 篇 教育学
  • 63 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 147 篇 feature extracti...
  • 137 篇 deep learning
  • 127 篇 accuracy
  • 100 篇 computational mo...
  • 91 篇 semantics
  • 91 篇 training
  • 88 篇 computer science
  • 82 篇 machine learning
  • 81 篇 optimization
  • 79 篇 data mining
  • 64 篇 predictive model...
  • 58 篇 internet of thin...
  • 54 篇 data models
  • 53 篇 support vector m...
  • 53 篇 security
  • 52 篇 neural networks
  • 51 篇 information syst...
  • 50 篇 artificial intel...
  • 50 篇 testing
  • 49 篇 real-time system...

机构

  • 186 篇 hubei province k...
  • 138 篇 school of comput...
  • 107 篇 college of compu...
  • 101 篇 department of co...
  • 61 篇 hubei province k...
  • 61 篇 shandong provinc...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 49 篇 national enginee...
  • 46 篇 national key lab...
  • 44 篇 tsinghua nationa...
  • 44 篇 school of comput...
  • 44 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 university of ch...
  • 31 篇 college of infor...
  • 26 篇 college of compu...
  • 26 篇 key laboratory f...

作者

  • 26 篇 shen linlin
  • 24 篇 ren jiadong
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 liu jun
  • 19 篇 li peng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 matsuo tokuro
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 hai jin
  • 16 篇 manar ahmed hamz...
  • 15 篇 liu zhe
  • 15 篇 wei hu

语言

  • 4,674 篇 英文
  • 648 篇 其他
  • 131 篇 中文
  • 7 篇 日文
  • 5 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Computer System and Information Technology"
5446 条 记 录,以下是961-970 订阅
排序:
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Change Bit-Depth Procedure for Data Measured Preprocessing before Compression
Change Bit-Depth Procedure for Data Measured Preprocessing b...
收藏 引用
2022 IEEE International Multi-Conference on Engineering, computer and information Sciences, SIBIRCON 2022
作者: Levenets, Alexey V. Bondarenko, Vladislav V. Bahenov, Ruslan I. Belozerov, Oleg I. Belozerova, Svetlana I. Bogatenkov, Sergey A. Pacific National University Dept. Automation and System Engineering Khabarovsk Russia Sholom-Aleichem Priamursky State University Dept. Information Systems and Mathematics Birobidzhan Russia Far Eastern State Transport University Dept. Computer Technology and Computer Graphics Khabarovsk Russia South Ural State University Dept. Information Technology in Economics Chelyabinsk Russia
The paper proposes to change the bit-depth of the original data sequence as a preprocessing of the measuring data, which is carried out before the compression procedure. In this case the digit capacity conversion is p... 详细信息
来源: 评论
Improving Brain MRI Image Segmentation Quality: A Hybrid Technique for Intensity Inhomogeneity Correction  34
Improving Brain MRI Image Segmentation Quality: A Hybrid Tec...
收藏 引用
34th Conference of Open Innovations Association FRUCT, FRUCT 2023
作者: Aziz, Samah Abdel Hawbani, Ammar Wang, Xingfu Abdelhamid, Talaat Maolood, Ismail Y. Alsamhi, Saeed Ismail, A.S. School of Computer Science and Technology University of Science and Technology of China Hefei23002 China Zagazig University Zagazig44519 Egypt Menoufia University Faculty of Electronic Engineering Menoufia Egypt -System Information Ministry of Higher Education and Scientific Research Kurdistan Region Erbil Iraq National University of Ireland Insight Centre for Data Analytics Galway Ireland
Intensity inhomogeneity is a significant issue in magnetic resonance imaging (MRI), where the presence of bias field causes distortions in pixel values, resulting in inconsistent and erroneous intensities across the i... 详细信息
来源: 评论
Smart Home system Based on IoT Concept Using Multi-Sensor Communication
Smart Home System Based on IoT Concept Using Multi-Sensor Co...
收藏 引用
computer Sciences, Engineering, and technology Innovation (ICoCSETI), International Conference on
作者: Dian Pramana I Putu Sumardika Eka Putra Komang Gede Krisna Bayu Pamungkas Dandy Pramana Hostiadi Made Liandana Gede Angga Pradipta Department of Information Technology Faculty of Informatics and Computer Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia Department of Computer System Faculty of Informatics and Computer Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia Department of Magister Information Systems Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia
The smart home concept is being developed using the Internet of Things (IoT) technology. The smart home concept offers security services such as monitoring dangerous gas leaks and fires, light control, and keyless doo... 详细信息
来源: 评论
Development of User Management in Ihya Digital Ecosystem Using Iterative Incremental Method  4
Development of User Management in Ihya Digital Ecosystem Usi...
收藏 引用
4th International Conference Advancement in Data Science, E-Learning and information systems, ICADEIS 2022
作者: Priandhika Izzulhaq, Afif Fauzi, Rahmat Suakanto, Sinung Kadir Hassan Disina, Abdul Mahdin, Hairulnizam Anka Salihu, Ibrahim Information System Telkom University Bandung Indonesia Nigeria Army University Biu Borno State Department of Cyber Security Nigeria Universiti Tun Hussein Onn Malaysia Faculty of Computer Science and Information Technology Johor Malaysia Nile University of Nigeria Abuja Nigeria
information systems have an essential role in the development of technology and information in Indonesia. information systems are employed and utilized in many facets of society and organizations. Digitizing and utili... 详细信息
来源: 评论
Petri net-based illegal information flow detection method for node-chain access control model  23
Petri net-based illegal information flow detection method fo...
收藏 引用
Proceedings of the 2023 International Conference on Communication Network and Machine Learning
作者: Binyong Li Jie Fang Xianhui Deng Yuhan Sheng School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology China and Advanced Cryptography and System Security Key Laboratory of Sichuan Province China Sichuan Institute of Computer Sciences China School of Cybersecurity Chengdu University of Information Technology China
To address the problem of illegal information flow in the node chain access control model constructed by the existing attribute-based access control (ABAC) model when applied to a large-scale node chain scenario with ...
来源: 评论
User Interface Design’s Impact on Customer Satisfaction and Loyalty in SaaS E-Commerce
User Interface Design’s Impact on Customer Satisfaction and...
收藏 引用
Creative Communication and Innovative technology (ICCIT), IEEE
作者: Eka Purnama Harahap Pandu Hermawan Dhiyah Ayu Rini Kusumawardhani Nina Rahayu Maulana Arif Komara Harry Agustian Master of Technology Information University of Raharja Tangerang Indonesia Dept. of Information System Bina Bangsa University Serang Indonesia Dept. of Information System Pandawan Sejahtera Indonesia Tangerang Indonesia Dept. of Computer Systems University of Raharja Tangerang Indonesia Dept. of Digital Bussiness CAI Sejahtera Indonesia Tangerang Indonesia Dept. of Computer Systems Sesindo Tangerang Indonesia
This study aims to analyze the impact of user interface (UI) design on customer satisfaction and loyalty in SaaS e-commerce applications, using a quantitative approach to measure the perceptions of SaaS e-commerce app... 详细信息
来源: 评论
Enhancing Network Intrusion Detection Using Effective Stacking of Ensemble Classifiers With Multi-Pronged Feature Selection Technique  2
Enhancing Network Intrusion Detection Using Effective Stacki...
收藏 引用
2nd International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering, ETECTE 2023
作者: Rahman, Saifur Mursal, Salim Nasar Faraj Latif, Muhammad Armghan Mushtaq, Zohaib Irfan, Muhammad Waqar, Ali Najran University College of Engineering Department of Electrical Engineering Najran Saudi Arabia Cleveland State University Department of Computer and Information System United States University of Sargodha College of Engineering and Technology Department of Electrical Engineering Sargodha Pakistan North China electric power University Beijing China
information security depends on Network Intrusion Detection (NID), which properly identifies network threats. This work explores simulating a NID system by stacking ensemble classifiers with various feature selection ... 详细信息
来源: 评论
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection system
收藏 引用
Multimedia Tools and Applications 2024年 第21期83卷 59887-59913页
作者: Abualigah, Laith Ahmed, Saba Hussein Almomani, Mohammad H. Zitar, Raed Abu Alsoud, Anas Ratib Abuhaija, Belal Hanandeh, Essam Said Jia, Heming Elminaam, Diaa Salama Abd Elaziz, Mohamed Abd Computer Science Department Al Al-Bayt University Mafraq25113 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan MEU Research Unit Middle East University Amman11831 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia Department of Mathematics Facility of Science The Hashemite University P.O box 330127 Zarqa13133 Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wenzhou-Kean University Wenzhou China Department of Computer Information System Zarqa University P.O. Box 13132 Zarqa Jordan School of Information Engineering Sanming University Sanming365004 China Information Systems Department Faculty of Computers and Artificial Intelligence Benha University Benha12311 Egypt Computer Science Department Faculty of Computer Science Misr International University Cairo12585 Egypt Faculty of Computer Science & Engineering Galala University Suze435611 Egypt Ajman University Ajman346 United Arab Emirates Department of Mathematics Faculty of Science Zagazig University Zagazig44519 Egypt
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusio... 详细信息
来源: 评论
A Hierarchical Traffic Sign Image Recognition Algorithm Keeping the Local Topology
A Hierarchical Traffic Sign Image Recognition Algorithm Keep...
收藏 引用
Advanced Algorithms and Control Engineering (ICAACE), International Conference on
作者: Longhui Liu Wenhui Gong Wenjie Wang Zhiqiang Zeng Wei Li Xiamen Global Navigation Satellite System Development & Application Co. Ltd. Xiamen China School of Computer and Information Engineering Xiamen University of Technology Xiamen China
Traffic sign recognition is crucial in enabling intelligent driving. This paper proposes a robust hierarchical traffic sign image recognition algorithm that maintains local topology. The algorithm is divided into two ... 详细信息
来源: 评论