咨询与建议

限定检索结果

文献类型

  • 1,116 篇 期刊文献
  • 1,106 篇 会议
  • 26 册 图书

馆藏范围

  • 2,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,378 篇 工学
    • 977 篇 计算机科学与技术...
    • 743 篇 软件工程
    • 267 篇 信息与通信工程
    • 200 篇 控制科学与工程
    • 167 篇 电气工程
    • 152 篇 生物工程
    • 145 篇 电子科学与技术(可...
    • 140 篇 光学工程
    • 126 篇 生物医学工程(可授...
    • 93 篇 仪器科学与技术
    • 74 篇 化学工程与技术
    • 71 篇 机械工程
    • 66 篇 材料科学与工程(可...
    • 51 篇 网络空间安全
    • 47 篇 动力工程及工程热...
  • 986 篇 理学
    • 488 篇 数学
    • 384 篇 物理学
    • 183 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 134 篇 化学
    • 106 篇 系统科学
    • 51 篇 地球物理学
  • 347 篇 管理学
    • 223 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 155 篇 医学
    • 126 篇 临床医学
    • 113 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 55 篇 药学(可授医学、理...
  • 51 篇 法学
    • 47 篇 社会学
  • 41 篇 农学
  • 32 篇 经济学
  • 32 篇 教育学
  • 7 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 89 篇 deep learning
  • 76 篇 machine learning
  • 63 篇 computer science
  • 47 篇 artificial intel...
  • 45 篇 accuracy
  • 38 篇 computational mo...
  • 36 篇 convolutional ne...
  • 34 篇 internet of thin...
  • 34 篇 training
  • 30 篇 predictive model...
  • 30 篇 feature extracti...
  • 29 篇 neural networks
  • 28 篇 covid-19
  • 25 篇 computer archite...
  • 24 篇 laboratories
  • 24 篇 data mining
  • 24 篇 mathematics
  • 22 篇 data models
  • 21 篇 educational inst...
  • 21 篇 visualization

机构

  • 58 篇 infn sezione di ...
  • 58 篇 north-west unive...
  • 58 篇 université de st...
  • 57 篇 institut univers...
  • 56 篇 tno technical sc...
  • 55 篇 national centre ...
  • 51 篇 nikhef national ...
  • 50 篇 university of jo...
  • 49 篇 ncsr demokritos ...
  • 49 篇 infn sezione di ...
  • 48 篇 infn sezione di ...
  • 47 篇 university moham...
  • 47 篇 comenius univers...
  • 46 篇 lpc caen normand...
  • 46 篇 university of am...
  • 45 篇 infn sezione di ...
  • 43 篇 université de ha...
  • 42 篇 infn sezione di ...
  • 42 篇 western sydney u...
  • 42 篇 università la sa...

作者

  • 58 篇 chen a.
  • 58 篇 ferrara g.
  • 58 篇 ardid m.
  • 58 篇 calvo d.
  • 56 篇 benoit d.m.
  • 56 篇 eddymaoui a.
  • 52 篇 gagliardini s.
  • 52 篇 gal t.
  • 52 篇 bozza c.
  • 52 篇 díaz a.f.
  • 52 篇 boumaaza j.
  • 51 篇 coleiro a.
  • 51 篇 gozzini s.r.
  • 51 篇 dallier r.
  • 51 篇 boettcher m.
  • 50 篇 benhassi m.
  • 50 篇 enzenhöfer a.
  • 50 篇 celli s.
  • 50 篇 carretero v.
  • 50 篇 ardid s.

语言

  • 2,118 篇 英文
  • 127 篇 其他
  • 4 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computer Science and Applied Computing"
2248 条 记 录,以下是361-370 订阅
排序:
Ensuring Zero Trust IoT Data Privacy: Differential Privacy in Blockchain using Federated Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 1-1页
作者: Hussain, Altaf Akbar, Wajahat Hussain, Tariq Bashir, Ali Kashif Dabel, Maryam M. Al Ali, Farman Yang, Bailin School of Electronic and Control Engineering Chang’an University Xi’an China School of Computer Science and Technology and School of Mathematics and Statistics Zhejiang Gongshang University Hangzhou China Department of Computing and Mathematics Manchester Metropolitan University UK Department of Computer Science and Engineering College of Computer Science and Engineering University of Hafr Al Batin Saudi Arabia Department of Applied AI School of Convergence College of Computing and Informatics Sungkyunkwan University Seoul South Korea
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to... 详细信息
来源: 评论
Malware analysis and multi-label category detection issues: Ensemble-based approaches  3
Malware analysis and multi-label category detection issues: ...
收藏 引用
3rd International Conference on Intelligent Data science Technologies and Applications, IDSTA 2022
作者: Alsmadi, Izzat Al-Ahmad, Bilal Alsmadi, Mohammad Department of Computing and Cyber Security Texas A&m San Antonio United States The University of Jordan Computer Information Systems Department Aqaba Jordan Applied Science University Information Technology Amman Jordan
Detection of malware and security attacks is a complex process that can vary in its details and analysis activities. As part of the detection process, malware scanners try to categorize a malware once it is detected u... 详细信息
来源: 评论
Permutation Superposition Oracles for Quantum Query Lower Bounds
arXiv
收藏 引用
arXiv 2024年
作者: Majenz, Christian Malavolta, Giulio Walter, Michael Department of Applied Mathematics and Computer Science Technical University of Denmark Denmark Department of Computing Sciences Bocconi University Italy Max Planck Institute for Security and Privacy Germany Faculty of Computer Science Ruhr-Universität Bochum Germany
We propose a generalization of Zhandry's compressed oracle method to random permutations, where an algorithm can query both the permutation and its inverse. We show how to use the resulting oracle simulation to bo... 详细信息
来源: 评论
From Black Boxes to Transparent Insights: Enhancing Industrial Control Systems Anomaly Detection with Deep Autoencoder Models
From Black Boxes to Transparent Insights: Enhancing Industri...
收藏 引用
Mobile, Intelligent, and Ubiquitous computing Conference (MIUCC), International
作者: Eslam Amer Bander Ail Saleh Al-rimy Shaker El-Sappagh Sultan Almalki Tami Alghamdi School of Computing University of Portsmouth Portsmouth UK Department of Computer Science Galala University Suez Egypt Computer Department Applied College Najran University Najran Saudi Arabia Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia
In the realm of securing Industrial Control Systems (ICS), time-series anomaly detection is pivotal, particularly for identifying unknown or zero-day attacks by detecting deviations from established normal behavior. D... 详细信息
来源: 评论
Zeroth-Order Methods for Constrained Nonconvex Nonsmooth Stochastic Optimization  41
Zeroth-Order Methods for Constrained Nonconvex Nonsmooth Sto...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Liu, Zhuanghua Chen, Cheng Luo, Luo Low, Bryan Kian Hsiang Department of Computer Science National University of Singapore Singapore Singapore CNRS@CREATE LTD 1 Create Way #08-01 CREATE Tower 138602 Singapore Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China School of Data Science Fudan University Shanghai China Shanghai Key Laboratory for Contemporary Applied Mathematics China
This paper studies the problem of solving nonconvex nonsmooth optimization over a closed convex set. Most previous works tackle such problems by transforming the constrained problem into an unconstrained problem. Howe... 详细信息
来源: 评论
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
收藏 引用
Journal of Information Security 2023年 第4期14卷 422-436页
作者: Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure Department of Information Systems and Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Navrongo Ghana Department of Computer Science School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Navrongo Ghana
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
OLBR: Optimization of Location-Based Routing Protocols in Vehicular Ad Hoc Networks
OLBR: Optimization of Location-Based Routing Protocols in Ve...
收藏 引用
Recent Innovation in Smart and Sustainable Technology (ICRISST), International Conference on
作者: Thangam S M Vivek Srikar Reddy Karthik Ullas N Abdul Khadar Jilani K Venkatesh J Jesy Janet Kumari A Saleem Raja Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India IT Department College of Computing and Information Sciences University of Technology and Applied Sciences-Shinas Sultanate of Oman
The proposed work employs ns-3, SUMO, and NetAnim to create geographical routing in vehicular ad hoc networks (VANETs). The research attempts to assess the performance of three well-known protocols AODV, DSDV, and OLS... 详细信息
来源: 评论
Enhancement of Quality of Service in Mobile Ad-Hoc Networks using Hybrid Load Balanced Simulator: Annealing Simulated  11
Enhancement of Quality of Service in Mobile Ad-Hoc Networks ...
收藏 引用
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022
作者: Kumar, Anil Shukla, R.K. Shukla, R.S. Pal, Shelendra Invertis University Depatment of Computer Applications Bareilly India Invertis University Department of Applied Sciences and Humanities Bareilly India College of Computing and Informatics Electronic University Department of Computer Science Saudi Arabia Tmu U.P. Moradabad India
Wireless topologies can change rapidly and unexpectedly. Hybrid networks are connected by gateways, which act as entry points for all traffic. Some gateways may be subject to high traffic loads and therefore may be ov... 详细信息
来源: 评论
Virtual Network Embedding: Literature Assessment, Recent Advancements, Opportunities, and Challenges
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Satpathy, Anurag Sahoo, Manmath Narayan Swain, Chittaranjan Bellavista, Paolo Guizani, Mohsen Muhammad, Khan Bakshi, Sambit Missouri University of Science and Technology Department of Computer Science RollaMO United States National Institute of Technology Visual Surveillance Laboratory Department of Computer Science and Engineering Odisha Rourkela769008 India Atal Bihari Vajpayee Indian Institute of Information Technology and Management Department of Computer Science and Engineering Gwalior India Department of Computer Science and Engineering Italy Machine Learning Department Abu Dhabi United Arab Emirates Department of Applied Artificial Intelligence School of Convergence College of Computing and Informatics Seoul03063 Korea Republic of
Network virtualization (NV) allows service providers (SPs) to instantiate logically isolated entities called virtual networks (VNs) on top of a substrate network (SN). Though VNs bring about multiple benefits, particu... 详细信息
来源: 评论