咨询与建议

限定检索结果

文献类型

  • 1,887 篇 期刊文献
  • 686 篇 会议
  • 9 册 图书

馆藏范围

  • 2,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,496 篇 工学
    • 890 篇 计算机科学与技术...
    • 756 篇 软件工程
    • 263 篇 生物工程
    • 255 篇 信息与通信工程
    • 251 篇 生物医学工程(可授...
    • 189 篇 电气工程
    • 177 篇 光学工程
    • 150 篇 控制科学与工程
    • 146 篇 核科学与技术
    • 132 篇 电子科学与技术(可...
    • 122 篇 化学工程与技术
    • 66 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 动力工程及工程热...
    • 48 篇 交通运输工程
  • 1,389 篇 理学
    • 776 篇 物理学
    • 361 篇 数学
    • 337 篇 生物学
    • 175 篇 统计学(可授理学、...
    • 153 篇 化学
    • 69 篇 系统科学
    • 48 篇 地球物理学
  • 334 篇 管理学
    • 186 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 247 篇 医学
    • 206 篇 临床医学
    • 154 篇 基础医学(可授医学...
    • 99 篇 药学(可授医学、理...
    • 76 篇 公共卫生与预防医...
  • 61 篇 法学
    • 45 篇 社会学
  • 56 篇 农学
  • 29 篇 经济学
  • 24 篇 教育学
  • 7 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 150 篇 hadron colliders
  • 80 篇 deep learning
  • 76 篇 hadrons
  • 57 篇 machine learning
  • 47 篇 hadronic decays
  • 42 篇 bottom mesons
  • 38 篇 branching fracti...
  • 37 篇 accuracy
  • 36 篇 particle decays
  • 33 篇 training
  • 32 篇 w & z bosons
  • 29 篇 feature extracti...
  • 29 篇 artificial intel...
  • 28 篇 higgs bosons
  • 28 篇 flavor changing ...
  • 27 篇 leptonic, semile...
  • 25 篇 computational mo...
  • 24 篇 charmed mesons
  • 23 篇 predictive model...
  • 22 篇 semantics

机构

  • 456 篇 department of ph...
  • 389 篇 iccub universita...
  • 386 篇 cavendish labora...
  • 376 篇 university of ch...
  • 373 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 360 篇 van swinderen in...
  • 356 篇 school of physic...
  • 339 篇 department of ph...
  • 334 篇 imperial college...
  • 333 篇 yandex school of...
  • 333 篇 center for high ...
  • 330 篇 oliver lodge lab...
  • 329 篇 stfc rutherford ...
  • 326 篇 institute of par...
  • 321 篇 infn sezione di ...
  • 320 篇 physikalisches i...
  • 314 篇 nikhef national ...
  • 313 篇 henryk niewodnic...
  • 310 篇 infn sezione di ...

作者

  • 233 篇 beiter a.
  • 217 篇 barter w.
  • 212 篇 bellee v.
  • 196 篇 casse g.
  • 194 篇 bowcock t.j.v.
  • 189 篇 blake t.
  • 187 篇 borsato m.
  • 187 篇 betancourt c.
  • 187 篇 bediaga i.
  • 187 篇 amato s.
  • 185 篇 boettcher t.
  • 185 篇 braun s.
  • 184 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 183 篇 baryshnikov f.
  • 180 篇 bencivenni g.
  • 175 篇 brundu d.
  • 173 篇 back j.j.
  • 173 篇 bay a.
  • 170 篇 bursche a.

语言

  • 2,438 篇 英文
  • 123 篇 其他
  • 22 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering & AI and Data Science Application and Research Center"
2582 条 记 录,以下是341-350 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Evaluation of Chest CT-Scan Anomaly Detection Models Using Principal Component Analysis
Evaluation of Chest CT-Scan Anomaly Detection Models Using P...
收藏 引用
Information Technology (ACIT)
作者: Ala’ Alyabrodi Shrouq Al-Daja MohammadNoor Injadat Abdallah Moubayed Ali Elrashidi Cyber Security Department Zarqa University Zarqa Jordan Data Science & AI Department Zarqa University Zarqa Jordan Computer Engineering Department and Interdisciplinary Research Center for Intelligent Secure Systems King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
Machine learning-based improvements in anomaly detection, visualization, and segmentation are made possible by the growing digitization of medical imaging, which reduces the workload for medical specialists. Neverthel... 详细信息
来源: 评论
Criteria-based Unsupervised Feature Selection Techniques: A Comparative Study Over Chest CT Scan
Criteria-based Unsupervised Feature Selection Techniques: A ...
收藏 引用
Information Technology (ACIT)
作者: Shrouq Al-Daja Ala’ Alyabrodi Abdallah Moubayed MohammadNoor Injadat Ali Elrashidi Data Science & AI Department Zarqa University Zarqa Jordan Cyber Security Department Zarqa University Zarqa Jordan Computer Engineering Department Interdisciplinary Research Center for Intelligent Secure Systems King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
research on classifying chest CT scans as normal or abnormal using machine learning and deep learning has garnered significant attention. To address this, various feature selection (FS) methods are employed to reduce ... 详细信息
来源: 评论
Enhancing Encrypted Internet Traffic Classification Through Advanced data Augmentation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Zion, Yehonatan Aharon, Porat Dubin, Ran Dvir, Amit Hajaj, Chen Department of Computer Science Ariel Cyber Innovation Center Ariel University Israel Dept. of Computer and Software Eng. Ariel Cyber Innovation Center Ariel University Israel Department of Industrial Engineering and Management Data Science Artificial Intelligence Research Center Ariel University Israel
The increasing popularity of online services has made Internet Traffic Classification a critical field of study. However, the rapid development of internet protocols and encryption limits usable data availability. Thi... 详细信息
来源: 评论
Mobile edge fog, Blockchain Networking and Computing-A survey
Mobile edge fog, Blockchain Networking and Computing-A surve...
收藏 引用
Computational Intelligence, Communication Technology and Networking (CICTN), International Conference on
作者: Ramiz Salama Fadi Al-Turjman Shruti Bhatla Divya Mishra Department of Computer Engineering AI and Robotics Institute Research Center for AI and IoT Near East University Nicosia Mersin Turkey Artificial Intelligence Engineering Dept. AI and Robotics Institute Near East University Nicosia Mersin Turkey Research Center for AI and IoT Faculty of Engineering University of Kyrenia Kyrenia Mersin Turkey Department of Computer Science and Engineering Graphic Era Hill University Dehradun ABES Engineering College Ghaziabad
Mobile edge computing (MEC) and blockchain technology are two rapidly evolving areas in computer science that have the potential to significantly impact the design and operation of distributed systems. MEC involves th...
来源: 评论
Correction of Read Biases Induced by Complex Reference Genome Regions for Improving Copy Number Variation Detection Using a Gaussian Mixture Model
Correction of Read Biases Induced by Complex Reference Genom...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Xuwen Chang, Zhili Wang, Shenjie Liu, Ruoyu Liu, Yuqian Zhu, Xiaoyan Shao, Yang Lai, Xin Yang, Shuanying Wang, Jiayin Second Affiliated Hospital Xi'an Jiaotong University Department of Respiratory Medicine Xi'an710003 China Xi'an Jiaotong University School of Computer Science and Technology Xi'an710049 China Xi'an Jiaotong University Shaanxi Engineering Research Center of Medical and Health Big Data Xi'an710049 China Nanjing Geneseeq Technology INC. China
Copy number variations are crucial in cancer research, but their detection through next-generation sequencing is often hindered by read biases, particularly in complex genomic regions. Existing bias-correction methods... 详细信息
来源: 评论
Compact Visual data Representation for Green Multimedia - A Human Visual System Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Peilin Fang, Xiaohan Wang, Meng Wang, Shiqi Ma, Siwei Department of Computer Science City University of Hong Kong Hong Kong The School of Data Science Lingnan University Hong Kong National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing100871 China
The Human Visual System (HVS), with its intricate sophistication, is capable of achieving ultra-compact information compression for visual signals. This remarkable ability is coupled with high generalization capabilit... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation Systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation Systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Distributed private preserving learning based chaotic encryption framework for cognitive healthcare IoT systems
收藏 引用
Informatics in Medicine Unlocked 2024年 49卷
作者: Nabi, Shaik Abdul Kalpana, Ponugoti Chandra, N. Subhash Smitha, L. Naresh, K. Ezugwu, Absalom E. Abualigah, Laith Department of Computer Science and Engineering AVN Institute of Engineering and Technology Department of Computer Science and Engineering CVR College of Engineering Department of Information Technology G Narayanamma Institute of Technology and Science Department of Computer Science and Engineering TKR College of Engineering & Technology Unit for Data Science and Computing North-West University Computer Science Department Al Al-Bayt University MEU Research Unit Middle East University Applied Science Research Center Applied Science Private University Jadara Research Center Jadara University Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk School of Engineering and Technology Sunway University Malaysia
In the field of cognitive healthcare Internet of Things (CH-IoT), there is a strong demand for reliable and minimally intrusive smart gadgets that consistently acquire, analyse, and obtain the confidential health deta... 详细信息
来源: 评论
Exploration of Efficient Neural Network for Path Optimization Method  39
Exploration of Efficient Neural Network for Path Optimizatio...
收藏 引用
39th International Symposium on Lattice Field Theory, LATTICE 2022
作者: Namekawa, Yusuke Kashiwa, Kouji Matsuda, Hidefumi Ohnishi, Akira Takase, Hayato Education and Research Center for Artificial Intelligence and Data Innovation Hiroshima University Hiroshima730-0053 Japan Department of Physics Faculty of Science Kyoto University Kyoto606-8502 Japan Department of Computer Science and Engineering Faculty of Information Engineering Fukuoka Institute of Technology Fukuoka811-0295 Japan Department of Physics Center for Field Theory and Particle Physics Fudan University Shanghai200433 China Yukawa Institute for Theoretical Physics Kyoto University Kyoto606-8502 Japan
We present our attempts to control the sign problem by the path optimization method with an emphasis on the efficiency of the neural network. We found a gauge invariant neural network is successful in the 2-dimensiona... 详细信息
来源: 评论