咨询与建议

限定检索结果

文献类型

  • 4,612 篇 期刊文献
  • 4,187 篇 会议
  • 41 册 图书

馆藏范围

  • 8,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,553 篇 工学
    • 4,163 篇 计算机科学与技术...
    • 3,509 篇 软件工程
    • 1,174 篇 信息与通信工程
    • 760 篇 生物工程
    • 685 篇 电气工程
    • 662 篇 控制科学与工程
    • 527 篇 生物医学工程(可授...
    • 482 篇 光学工程
    • 452 篇 电子科学与技术(可...
    • 275 篇 机械工程
    • 245 篇 化学工程与技术
    • 202 篇 安全科学与工程
    • 194 篇 网络空间安全
    • 191 篇 交通运输工程
    • 178 篇 仪器科学与技术
    • 174 篇 动力工程及工程热...
  • 3,311 篇 理学
    • 1,758 篇 数学
    • 901 篇 物理学
    • 866 篇 生物学
    • 644 篇 统计学(可授理学、...
    • 287 篇 化学
    • 281 篇 系统科学
  • 1,582 篇 管理学
    • 909 篇 管理科学与工程(可...
    • 743 篇 图书情报与档案管...
    • 469 篇 工商管理
  • 523 篇 医学
    • 459 篇 临床医学
    • 398 篇 基础医学(可授医学...
    • 238 篇 公共卫生与预防医...
    • 221 篇 药学(可授医学、理...
  • 281 篇 法学
    • 238 篇 社会学
  • 164 篇 经济学
  • 110 篇 教育学
  • 106 篇 农学
  • 19 篇 文学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 293 篇 accuracy
  • 273 篇 deep learning
  • 231 篇 machine learning
  • 228 篇 feature extracti...
  • 225 篇 training
  • 188 篇 computational mo...
  • 184 篇 semantics
  • 164 篇 predictive model...
  • 153 篇 data models
  • 146 篇 real-time system...
  • 127 篇 federated learni...
  • 114 篇 optimization
  • 107 篇 convolutional ne...
  • 103 篇 reinforcement le...
  • 102 篇 graph neural net...
  • 97 篇 internet of thin...
  • 93 篇 image segmentati...
  • 91 篇 contrastive lear...
  • 89 篇 neural networks
  • 87 篇 artificial intel...

机构

  • 559 篇 college of compu...
  • 175 篇 university of ch...
  • 127 篇 nanyang technolo...
  • 102 篇 national enginee...
  • 100 篇 college of compu...
  • 97 篇 beijing advanced...
  • 95 篇 school of data a...
  • 87 篇 school of comput...
  • 81 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 70 篇 school of comput...
  • 66 篇 national enginee...
  • 62 篇 department of co...
  • 60 篇 cas key laborato...
  • 52 篇 shandong enginee...
  • 50 篇 school of comput...
  • 48 篇 college of intel...
  • 47 篇 college of compu...
  • 44 篇 school of comput...
  • 43 篇 school of comput...

作者

  • 256 篇 niyato dusit
  • 158 篇 cheng xueqi
  • 67 篇 hai jin
  • 63 篇 guo jiafeng
  • 53 篇 tao dacheng
  • 50 篇 sun geng
  • 44 篇 shen huawei
  • 43 篇 jin hai
  • 37 篇 zheng wei-shi
  • 36 篇 xiaofei liao
  • 35 篇 peng hao
  • 31 篇 jin xiaolong
  • 29 篇 liu yang
  • 28 篇 shen linlin
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 25 篇 p. spinelli
  • 25 篇 chen chen
  • 25 篇 li jianxin
  • 24 篇 j. b. thayer

语言

  • 6,837 篇 英文
  • 1,955 篇 其他
  • 85 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Computing and Data Science"
8840 条 记 录,以下是851-860 订阅
排序:
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Security Intensification using Blockchain coupled with Internet of Things: Proposal, Challenges and Anatomization  4
Security Intensification using Blockchain coupled with Inter...
收藏 引用
4th International Conference on Advances in computing, Communication Control and Networking, ICAC3N 2022
作者: Anand, M. Vivek Sabharwal, Munish Vijayalakshmi, S. Galgotias University School of Computing Science and Engineering Greater Noida201308 India Christ University Dept of Data Science 412112 India
Internet of things is an important part of our day-to-day life where all things are connected in the network with the internet. The number of devices linked to the network grows steadily each day in recent years. The ... 详细信息
来源: 评论
data-Driven Design for Anomaly Detection in Network Access Control Systems  2
Data-Driven Design for Anomaly Detection in Network Access C...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Muhammad, Musa Abubakar Caraffini, Fabio Fasanmade, Adebamigbe Ishola, Olabayo Mohammed, Kabiru Morden, Jarrad Coventry University School of Computing Mathematics and Data Science Coventry United Kingdom Swansea University Department of Computer Science Swansea United Kingdom De Montfort University School of Computer Science and Informatics Leicester United Kingdom
Current network access control systems can contain unpredictable interactions between multiple device models, multiple network protocol layers (e.g. TCP, UDP and ICMP), hardware, and clock-skew-specific influences, an... 详细信息
来源: 评论
REQUIRED NUMBER OF ITERATIONS FOR SPARSE SIGNAL RECOVERY VIA ORTHOGONAL LEAST SQUARES
收藏 引用
Journal of Computational Mathematics 2023年 第1期41卷 1-17页
作者: Haifeng Li Jing Zhang Jinming Wen Dongfang Li Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control College of Mathematics and Information ScienceHenan Normal UniversityXinxiang 453007China College of Information Science and Technology Jinan UniversityGuangzhou 510632China School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China
In countless applications,we need to reconstruct a K-sparse signal x∈R n from noisy measurements y=Φx+v,whereΦ∈R^(m×n)is a sensing matrix and v∈R m is a noise *** least squares(OLS),which selects at each ste... 详细信息
来源: 评论
Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attacks Using Valid Ciphertexts on HQC KEM  16th
Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attack...
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Paiva, Thales B. Ravi, Prasanna Jap, Dirmanto Bhasin, Shivam Das, Sayan Chattopadhyay, Anupam University of Sao Paulo Fundep and CASNAV Sao Paulo Brazil Temasek Laboratories Nanyang Technological University Singapore Singapore College of Computing and Data Science Nanyang Technological University Singapore Singapore PQStation Singapore Singapore
HQC is a code-based key encapsulation mechanism (KEM) that was selected to move to the fourth round of the NIST post-quantum standardization process. While this scheme was previously targeted by side-channel assisted ... 详细信息
来源: 评论
DE-ConvGraph 3D UNet: A Novel Deep Learning Model for Optimizing Radiotherapy Treatment Plans in Oropharyngeal Cancer
DE-ConvGraph 3D UNet: A Novel Deep Learning Model for Optimi...
收藏 引用
2023 IEEE Applied Imagery Pattern Recognition Workshop, AIPR 2023
作者: Murugadoss, Bhuvanashree Amudha, J. Sugumaran, Vijayan Amrita Vishwa Vidyapeetham School of Computing Department of Computer Science and Engineering Karnataka Bengaluru India Oakland University Center for Data Science and Big Data Analytics RochesterMI United States Oakland University Department of Decision and Information Sciences RochesterMI United States
Automated radiotherapy treatment planning aims to improve treatment accuracy and efficiency. However, the prevalent Knowledge-Based Planning (KBP) method faces issues like lengthy manual problem formulation and challe... 详细信息
来源: 评论
RNTrajRec: Road Network Enhanced Trajectory Recovery with Spatial-Temporal Transformer  39
RNTrajRec: Road Network Enhanced Trajectory Recovery with Sp...
收藏 引用
39th IEEE International Conference on data Engineering, ICDE 2023
作者: Chen, Yuqi Zhang, Hanyuan Sun, Weiwei Zheng, Baihua Fudan University School of Computer Science Shanghai Key Laboratory of Data Science China Shanghai Institute of Intelligent Electronics & Systems China Singapore Management University School of Computing and Information Systems Singapore
GPS trajectories are the essential foundations for many trajectory-based applications. Most applications require a large number of high sample rate trajectories to achieve a good performance. However, many real-life t... 详细信息
来源: 评论
Is Score Matching Suitable for Estimating Point Processes?  38
Is Score Matching Suitable for Estimating Point Processes?
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Cao, Haoqun Meng, Zizhuo Ke, Tianjun Zhou, Feng Center for Applied Statistics School of Statistics Renmin University of China China Data Science Institute University of Technology Sydney Australia Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing China
Score matching estimators have gained widespread attention in recent years partly because they are free from calculating the integral of normalizing constant, thereby addressing the computational challenges in maximum...
来源: 评论
Gloss-Free Sign Language Translation using Sign2gpt-Next Technique
Gloss-Free Sign Language Translation using Sign2gpt-Next Tec...
收藏 引用
2024 International Conference on computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Babisha, A. Umarani Srikanth, G. Angel Kiruba, D.R. Sundar, R. Department of Artificial Intelligence and Data Science Panimalar Engineering College Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering DMI College of Engineering Chennai India Department of Computer Science and Engineering School of Computing Sathyabama Institute of Science and Technology Chennai India
This work proposes a new approach to convert the data from sign language to spoken language without exposing the data to a gloss layer. Whenever gloss annotations are used which frequently are incomplete and act as an... 详细信息
来源: 评论
A recurrent neural network architecture for android mobile data analysis for detecting malware infected data
收藏 引用
Soft computing 2024年 第21期28卷 12917-12928页
作者: Murugan, Prabhu Manimaran, A. Sundar, Ramesh Dakshinamoorthy, Prabakar Rajaram, Gnanajeyaraman Garg, Shruti Department of ECE Saveetha School of Engineering Simats Chennai602105 India Department of Artificial Intelligence and Machine Learning Saveetha School of Engineering Simats Chennai602105 India Department of Netwoking and Communication School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur India Department of Data Science and Business System School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur India Department of Applied Machine Learning Saveetha School of Engineering Saveetha Institute of Medical and Technological Sciences Tamilnadu Chennai India Birla Institute of Technology Mesra Ranchi India
One of the latest modern communication devices is a mobile device seriously affected by multiple malware. Malware is a virus software installed automatically by hackers on various computing devices. Malware corrupts t... 详细信息
来源: 评论