咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,452 篇 计算机科学与技术...
    • 1,209 篇 软件工程
    • 358 篇 信息与通信工程
    • 261 篇 控制科学与工程
    • 215 篇 生物工程
    • 164 篇 电气工程
    • 149 篇 生物医学工程(可授...
    • 107 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 83 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 814 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 166 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 569 篇 管理学
    • 375 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 159 篇 医学
    • 142 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 70 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 73 篇 machine learning
  • 67 篇 computational mo...
  • 63 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 51 篇 feature extracti...
  • 50 篇 resource managem...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 39 篇 artificial intel...
  • 38 篇 optimization
  • 38 篇 data models

机构

  • 125 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 31 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 15 篇 department of co...
  • 15 篇 school of softwa...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 16 篇 muhammad adnan k...
  • 15 篇 wang xiaofei
  • 15 篇 jiannong cao
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,719 篇 英文
  • 157 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是551-560 订阅
排序:
A Rule-Based Intrusion Detection System for NDN-Based VANETs
A Rule-Based Intrusion Detection System for NDN-Based VANETs
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Sruthi Cheriyachan Veettili Muhammad Atif Ur Rehman Waqas Khalid Mohammed Al-Khalidi Byung Seo Kim Department of Computing and Mathematics Manchester Metropolitan University Manchester UK Institute of Industrial Technology Korea University Sejong South Korea Department of Communication and Software Engineering Hongik University Sejong South Korea
Vehicular Ad-Hoc Networks (VANETs), a specialized type of Mobile Ad-Hoc Networks, facilitate critical communications between vehicles such as vehicle-to-vehicle and vehicle-to-roadside infrastructures. Owing to the tr... 详细信息
来源: 评论
Deep learning-based multi-head self-attention model for human epilepsy identification from EEG signal for biomedical traits
收藏 引用
Multimedia Tools and Applications 2024年 第33期83卷 80201-80223页
作者: Dutta, Ashit Kumar Raparthi, Mohan Alsaadi, Mahmood Bhatt, Mohammed Wasim Dodda, Sarath Babu Prashant, G.C. Sandhu, Mukta Patni, Jagdish Chandra Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Ad Diriyah Riyadh13713 Saudi Arabia Alphabet Life Science DallasTX7506 United States Department of Computer Science Al-Maarif University College Al Anbar31001 Iraq Model Institute of Engineering and Technology J&K Jammu India Software Engineer Central Michigan University DallasTX75009 United States Department of Computer Science Texas Tech University Lubbock79409 United States Skill Faculty of Engineering & amp Technology Shri Vishwakarma Skill University Haryana Palwal India CSE School of advance Computing Alliance University Bengaluru India
The neurological condition epilepsy is demanding and even fatal. Electroencephalogram (EEG)-based epilepsy detection still faces various difficulties. EEG readings fluctuate, and different patients have various seizur... 详细信息
来源: 评论
DearLLM: Enhancing Personalized Healthcare via Large Language Models-Deduced Feature Correlations  39
DearLLM: Enhancing Personalized Healthcare via Large Languag...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Yongxin Jiang, Xinke Chu, Xu Qiu, Rihong Feng, Yujie Ding, Hongxin Zhao, Junfeng Wang, Yasha Xie, Bing School of Computer Science School of Software & Microelectronics Peking University Beijing China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing China National Engineering Research Center For Software Engineering Peking University Beijing China Center on Frontiers of Computing Studies Peking University Beijing China Peking University Information Technology Institute Binhai Tianjin China Nanhu Laboratory Jiaxing China Department of Computing The Hong Kong Polytechnic University Hong Kong
Exploring the correlations between medical features is essential for extracting patient health patterns from electronic health records (EHR) data, and strengthening medical predictions and decision-making. To constrai... 详细信息
来源: 评论
Ev-IDID: Enhancing Solutions to Interactive Dynamic Influence Diagrams through Evolutionary Algorithms  21
Ev-IDID: Enhancing Solutions to Interactive Dynamic Influenc...
收藏 引用
21st International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2022
作者: Ma, Biyang Pan, Yinghui Zeng, Yifeng Ming, Zhong School of Computer Science and Engineering Minnan Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University United Kingdom College of Computer Science and Software Engineering Shenzhen University China
Interactive dynamic influence diagrams (I-DIDs) are a general framework for multiagent sequential decision making under uncertainty. Due to the model complexity, a significant amount of research has been invested into... 详细信息
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing System  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
Detecting Poisoning Attacks in Collaborative IDSs of Vehicular Networks Using XAI and Shapley Value
收藏 引用
ACM Journal on Autonomous Transportation Systems 2024年 第3期2卷 1-21页
作者: Ahmed Saleh Bataineh Mohammad Zulkernine Adel Abusitta Talal Halabi School of Computing Queen's University Kingston Canada and Computer Science Al Hussein Technical University Amman Jordan Queen's University Kingston Canada Department of Computer Engineering and Software Engineering Polytechnique Montréal Montreal Canada Laval University Quebec Canada
Machine learning-based Intrusion Detection Systems (IDSs) for vehicle networks can collaborate to enhance their performance by sharing crucial decisions when individual datasets lack diversity, which hinders effective... 详细信息
来源: 评论
Secure software Development in Google Colab
Secure Software Development in Google Colab
收藏 引用
AI IoT Congress (AIIoT), World
作者: Tarun Potluri Yong Shi Hossain Shahriar Dan Lo Reza Parizi Hongmei Chi Kai Qian College of Computing and Software Engineering Kennesaw State University USA Department of Computer and Information Sciences Florida A&M University Tallahassee FL
software is said to be secure if it has been developed and designed with security as its top priority. This entails implementing secure coding practices, performing vulnerability testing and repair, as well as continu...
来源: 评论
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity  22
Dynamic Searchable Scheme with Forward Privacy for Encrypted...
收藏 引用
22nd IEEE International Conference on Trust, Security and Privacy in computing and Communications, TrustCom 2023
作者: Al Sibahee, Mustafa A. Luo, Chengwen Zhang, Jin Huang, Yijing Abduljabbar, Zaid Ameen Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Iraq University College Computer Technology Engineering Department Basrah61004 Iraq University of Basrah College of Education for Pure Sciences Department of Computer Science Basrah61004 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518000 China
Document retrieval plays an essential role in many real-world applications especially when the data storage is outsourced. Due to the great advantages offered by cloud computing, clients tend to outsource their person... 详细信息
来源: 评论
Hierarchical Crowdsourcing for Data Labeling with Heterogeneous Crowd  39
Hierarchical Crowdsourcing for Data Labeling with Heterogene...
收藏 引用
39th IEEE International Conference on Data engineering, ICDE 2023
作者: Zhang, Haodi Huang, Wenxi Su, Zhenhan Chen, Junyang Jiang, Di Fan, Lixin Zhang, Chen Lian, Defu Wu, Kaishun Shenzhen University College of Computer Science and Software Engineering China Shenzhen University WeBank Institute of Financial Technology China Webank Co. Ltd. China Hong Kong Polytechnic University Department of Computing Hong Kong University of Science and Technology of China School of Data Science China
With the rapid and continuous development of data-driven technologies such as supervised learning, high-quality labeled data sets are commonly required by many applications. Due to the easiness of crowdsourcing small ... 详细信息
来源: 评论
Split Learning without Local Weight Sharing To Enhance Client-side Data Privacy
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Pham, Ngoc Duy Phan, Tran Khoa Abuadbba, Alsharif Gao, Yansong Nguyen, Van-Doan Chilamkurti, Naveen La Trobe University School of Computing Engineering and Mathematical Sciences VIC Australia CSIRO's Data61 Cybersecurity CRC Australia The University of Western Australia Department of Computer Science and Software Computing Australia
Split learning (SL) aims to protect user data privacy by distributing deep models between the client-server and keeping private data locally. In SL training with multiple clients, the local model weights are shared am... 详细信息
来源: 评论