咨询与建议

限定检索结果

文献类型

  • 1,813 篇 会议
  • 1,541 篇 期刊文献
  • 51 册 图书

馆藏范围

  • 3,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,185 篇 工学
    • 1,676 篇 计算机科学与技术...
    • 1,369 篇 软件工程
    • 459 篇 信息与通信工程
    • 314 篇 控制科学与工程
    • 265 篇 生物工程
    • 254 篇 电气工程
    • 210 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 149 篇 电子科学与技术(可...
    • 138 篇 光学工程
    • 113 篇 动力工程及工程热...
    • 99 篇 安全科学与工程
    • 86 篇 交通运输工程
    • 82 篇 网络空间安全
    • 80 篇 化学工程与技术
  • 1,038 篇 理学
    • 577 篇 数学
    • 306 篇 生物学
    • 217 篇 物理学
    • 183 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 88 篇 化学
  • 681 篇 管理学
    • 451 篇 管理科学与工程(可...
    • 239 篇 图书情报与档案管...
    • 208 篇 工商管理
  • 240 篇 医学
    • 209 篇 临床医学
    • 179 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
    • 96 篇 药学(可授医学、理...
  • 94 篇 法学
    • 72 篇 社会学
  • 74 篇 经济学
    • 74 篇 应用经济学
  • 50 篇 教育学
  • 43 篇 农学
  • 9 篇 文学
  • 7 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 117 篇 deep learning
  • 112 篇 machine learning
  • 86 篇 accuracy
  • 86 篇 training
  • 82 篇 feature extracti...
  • 74 篇 computational mo...
  • 71 篇 internet of thin...
  • 69 篇 software enginee...
  • 68 篇 computer science
  • 64 篇 educational inst...
  • 57 篇 optimization
  • 54 篇 artificial intel...
  • 52 篇 predictive model...
  • 49 篇 security
  • 48 篇 cloud computing
  • 48 篇 convolutional ne...
  • 44 篇 blockchain
  • 43 篇 semantics
  • 43 篇 data models
  • 41 篇 data mining

机构

  • 355 篇 college of compu...
  • 69 篇 shenzhen univers...
  • 46 篇 state key labora...
  • 41 篇 college of compu...
  • 35 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 college of compu...
  • 32 篇 the college of c...
  • 30 篇 department of co...
  • 29 篇 national enginee...
  • 23 篇 software college...
  • 23 篇 college of compu...
  • 22 篇 college of intel...
  • 22 篇 department of co...
  • 22 篇 department of so...
  • 19 篇 school of inform...
  • 19 篇 college of compu...
  • 18 篇 department of co...
  • 17 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 52 篇 leung victor c.m...
  • 29 篇 ismail leila
  • 26 篇 shen linlin
  • 23 篇 leung victor c. ...
  • 22 篇 lin qiuzhen
  • 20 篇 li jianqiang
  • 19 篇 pan haoyuan
  • 19 篇 materwala huned
  • 17 篇 niyato dusit
  • 17 篇 muhammad waseem ...
  • 17 篇 yazeed yasin gha...
  • 16 篇 victor c. m. leu...
  • 15 篇 chan tse-tin
  • 15 篇 wang xiaofei
  • 15 篇 jiacun wang
  • 15 篇 tan kay chen
  • 15 篇 guo ping
  • 14 篇 carmi paz
  • 13 篇 huang ziyun
  • 13 篇 r. saravanakumar

语言

  • 3,136 篇 英文
  • 246 篇 其他
  • 26 篇 中文
  • 2 篇 日文
检索条件"机构=Department of College of Computer Science& Software Engineering"
3405 条 记 录,以下是571-580 订阅
排序:
Special Issue: Cybersecurity in Manufacturing
收藏 引用
Journal of Computing and Information science in engineering 2024年 第7期24卷 070201页
作者: Ameta, Gaurav Bukkapatnam, Satish Li, Dan Tian, Wenmeng Yampolskiy, Mark Zhang, Fan Siemens Corporate Research PrincetonNJ08540 United States Department of Industrial and Systems Engineering Texas A&M University College StationTX77843 United States Department of Industrial Engineering Clemson University ClemsonSC29634 United States Department of Industrial and Systems Engineering Mississippi State University Mississippi StateMS39762 United States Department of Computer Science and Software Engineering Auburn University AuburnAL36849 United States School of Mechanical Engineering Georgia Institute of Technology AtlantaGA30318 United States
The landscape of cybersecurity in manufacturing exhibits a dynamic interplay between evolving threats and vulnerabilities against innovative defense mechanisms. With the increasing adoption of smart and cloud-controll... 详细信息
来源: 评论
DeNC: Unleash Neural Codecs in Video Streaming with Diffusion Enhancement  39
DeNC: Unleash Neural Codecs in Video Streaming with Diffusio...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Qihua Li, Ruibin Guo, Jingcai Huang, Yaodong Xu, Zhenda Cui, Laizhong Guo, Song College of Computer Science and Software Engineering Shenzhen University China Department of Computing The Hong Kong Polytechnic University Hong Kong Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Recent years have witnessed the rise of Neural-enhanced Video Streaming (NeVS), which integrates neural restoration models into video codecs for higher compression-restoration performance. Despite its benefit, existin... 详细信息
来源: 评论
Digital Forensics Across Multiple Android Versions Using the MOBILEdit Forensic Tool
Digital Forensics Across Multiple Android Versions Using the...
收藏 引用
IEEE International Conference on Multi Topic
作者: Kohal Deep Maheshwari Pardeep Kumar Najma Imtiaz Ali Imtiaz Ali Brohi Dua Agha Department of Computer Science & IT NED University Karachi Pakistan Department of Software Engineering QUEST Univesity Nawabshah Pakistan Institute of Mathematics and Computer Science University of Sindh Jamshoro Pakistan Department of Computer Science Government College University Hyderabad Pakistan Department of Software Engineering Mehran University of Engineering and Technology Jamshoro Pakistan
Open-source Android smartphones present both opportunities and difficulties for forensic investigators as they become more widely used. Advancements in Android security, encryption, and storage features necessitate ne... 详细信息
来源: 评论
Virtual and Augmented Reality for Mechatronics based Applications  4
Virtual and Augmented Reality for Mechatronics based Applica...
收藏 引用
4th International Conference on Applied Automation and Industrial Diagnostics, ICAAID 2022
作者: Alharbi, Hadeel Fahad Reddy, Nikunj Patel, Akshet Tsaramirsis, Kostandinos Randhawa, Princy University of ha'Il Hail College of Computer Science and Engineering Department of Computer Science and Software Engineering 1234 Saudi Arabia Manipal University Jaipur Mechatronics Department Jaipur India Infosuccess3d Athens Greece
Virtual reality (VR) is a rapidly growing medium of technology in its initial stages. Innumerable applications of its use are yet to be explored or properly implemented. One such forum is in the field of education. At... 详细信息
来源: 评论
Influence of Key Nodes in Industrial Control Malicious Code Modeling  3
Influence of Key Nodes in Industrial Control Malicious Code ...
收藏 引用
3rd International Conference on Electronic Information engineering and computer science, EIECS 2023
作者: Yang, Wei Yan, Hongwei Xu, Chao Yao, Yu Zhou, Jinlei Wang, Baile Wang, Danni Northeastem University Software College Shenyang China Northeastem University School of Computer Science and Engineering Shenyang China State Grid Liaoning Information and Communication Company Department of Cybersecurity Monitoring Shenyang China
Key nodes in complex networks play an important role in the structure of the entire network. Different nodes in the network often have different degrees, and the node with the highest degree in the network is usually ... 详细信息
来源: 评论
Attention-guided CenterNet deep learning approach for lung cancer detection
收藏 引用
computers in Biology and Medicine 2025年 186卷 109613-109613页
作者: Dawood, Hussain Nawaz, Marriam Ilyas, Muhammad U. Nazir, Tahira Javed, Ali School of Computing Skyline University College Sharjah United Arab Emirates Department of Software Engineering University of Engineering and Technology-Taxila Punjab 47050 Pakistan School of Computer Science University of Birmingham Dubai United Arab Emirates Department of Software Engineering and Computer Science Riphah International University Gulberg Green Campus Islamabad Pakistan
Lung cancer remains a significant health concern worldwide, prompting ongoing research efforts to enhance early detection and diagnosis. Prior studies have identified key challenges in existing approaches, including l... 详细信息
来源: 评论
Efficient Models for Detecting Monkeypox using Skin Lesion Images  3
Efficient Models for Detecting Monkeypox using Skin Lesion I...
收藏 引用
3rd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2023
作者: Sunda, Neelam Sharma, Divya Battu, Sujith Banoth, Rewanth Nayak Rahul Monika Kanoria PG Mahila Mahavidyalaya Department of Computer Science Jaipur India Kanoria PG Mahila Mahavidhyalaya Department of Computer Science jaipur India Delhi Technological University Dept. of Software Engineering New Delhi India Delhi Technological University Department of Applied Physics New Delhi India University of Delhi Shaheed Rajguru College of Applied Sciences for Women Department of Computer Science India
Monkeypox is predicted to be the next pandemic and is spreading over African countries like water under a mat. The study basically investigates three deep learning imaging models for the identification of monkeypox fr... 详细信息
来源: 评论
A Survey on Anomaly Detection with Few-Shot Learning  8th
A Survey on Anomaly Detection with Few-Shot Learning
收藏 引用
8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Chen, Junyang Wang, Changbo Hong, Yifan Mi, Rui Zhang, Liang-Jie Wu, Yirui Wang, Huan Zhou, Yue College of Computer Science and Software Engineering Shenzhen University Shenzhen China Center of Health Administration and Development Studies Hubei University of Medicine Shiyan China College of Informatics Huazhong Agricultural University Wuhan China Hohai University Nanjing China Department of Obstetrics and Gynecology Tianyou Hospital Affiliated to Wuhan University of Science and Technology Wuhan China
The primary objective of anomaly detection is to identify abnormal or unusual patterns within a dataset, where the number of normal samples typically exceeds that of abnormal samples. Due to the scarcity of labeled ab... 详细信息
来源: 评论
Development of Classification Model based on Arabic Textual Analysis to Detect Fake News: Case Studies
Development of Classification Model based on Arabic Textual ...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: Hanen Tarik Himdi Fatmah Yousef Assiri Computer Science and Artificial Intelligence Department College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Software Engineering Department College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The ease of communication that has been made possible by chat messaging platforms, such as WhatsApp and Line, and their increased use and ubiquity in society, have motivated purveyors of fake news to create and presen... 详细信息
来源: 评论
Detection and Replay of Distributed Denial of Service Attacks in Smart Cities Using a Hybrid Deep Learning Approach  2
Detection and Replay of Distributed Denial of Service Attack...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Iqbal, Muhammad Waseem Issa, Ghassan F. Yousif, Muhammad Atif, Muhammad Superior University Department of Software Engineering Lahore Pakistan Skyline University College School of Information Technology Sharjah United Arab Emirates Department of Computer Science NCBAE Lahore Pakistan Applied Science Research Center Applied Science Private University Amman11937 Jordan
Infrastructure for smart cities is presently being built, mostly because of the (IoT) platform, which connects a wide variety of things by using the website's underlying infrastructure. As a result, it is possible... 详细信息
来源: 评论