咨询与建议

限定检索结果

文献类型

  • 6,271 篇 期刊文献
  • 6,193 篇 会议
  • 85 册 图书

馆藏范围

  • 12,549 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,821 篇 工学
    • 5,113 篇 计算机科学与技术...
    • 3,994 篇 软件工程
    • 1,915 篇 信息与通信工程
    • 1,086 篇 电气工程
    • 1,002 篇 电子科学与技术(可...
    • 987 篇 生物工程
    • 981 篇 控制科学与工程
    • 789 篇 光学工程
    • 765 篇 生物医学工程(可授...
    • 512 篇 机械工程
    • 416 篇 仪器科学与技术
    • 364 篇 化学工程与技术
    • 331 篇 动力工程及工程热...
    • 298 篇 材料科学与工程(可...
    • 236 篇 网络空间安全
    • 225 篇 安全科学与工程
  • 4,956 篇 理学
    • 2,158 篇 物理学
    • 2,024 篇 数学
    • 1,168 篇 生物学
    • 692 篇 统计学(可授理学、...
    • 466 篇 化学
    • 377 篇 系统科学
  • 1,909 篇 管理学
    • 1,162 篇 管理科学与工程(可...
    • 773 篇 图书情报与档案管...
    • 520 篇 工商管理
  • 872 篇 医学
    • 732 篇 临床医学
    • 601 篇 基础医学(可授医学...
    • 343 篇 药学(可授医学、理...
    • 310 篇 公共卫生与预防医...
  • 362 篇 法学
    • 284 篇 社会学
  • 191 篇 农学
  • 187 篇 教育学
  • 179 篇 经济学
  • 56 篇 军事学
  • 54 篇 文学
  • 20 篇 艺术学

主题

  • 348 篇 computer science
  • 260 篇 deep learning
  • 206 篇 machine learning
  • 173 篇 computational mo...
  • 163 篇 feature extracti...
  • 156 篇 data mining
  • 138 篇 semantics
  • 124 篇 optimization
  • 121 篇 hadron colliders
  • 116 篇 educational inst...
  • 112 篇 bandwidth
  • 109 篇 servers
  • 108 篇 internet
  • 107 篇 predictive model...
  • 104 篇 wireless sensor ...
  • 102 篇 internet of thin...
  • 100 篇 image segmentati...
  • 98 篇 wireless communi...
  • 98 篇 accuracy
  • 97 篇 quality of servi...

机构

  • 376 篇 yerevan physics ...
  • 279 篇 faculty of scien...
  • 276 篇 department for p...
  • 274 篇 department of ph...
  • 273 篇 departamento de ...
  • 268 篇 department of ph...
  • 261 篇 department of ph...
  • 259 篇 department of ph...
  • 251 篇 faculté des scie...
  • 244 篇 kirchhoff-instit...
  • 218 篇 department of ph...
  • 217 篇 institute of phy...
  • 216 篇 department of ph...
  • 216 篇 fakultät für phy...
  • 211 篇 physics division...
  • 204 篇 department of ph...
  • 193 篇 institut für ast...
  • 191 篇 department of ph...
  • 187 篇 department of ph...
  • 185 篇 institute of phy...

作者

  • 264 篇 c. alexa
  • 263 篇 j. m. izen
  • 254 篇 g. bella
  • 254 篇 d. calvet
  • 253 篇 j. strandberg
  • 252 篇 c. amelung
  • 233 篇 g. spigo
  • 230 篇 f. siegert
  • 230 篇 a. c. könig
  • 230 篇 m. klein
  • 229 篇 r. ströhmer
  • 227 篇 h. a. gordon
  • 227 篇 m. rijssenbeek
  • 225 篇 h. sakamoto
  • 225 篇 s. jin
  • 225 篇 g. gaudio
  • 225 篇 s. mohapatra
  • 222 篇 y. nagasaka
  • 220 篇 s. guindon
  • 213 篇 y. tayalati

语言

  • 11,705 篇 英文
  • 673 篇 其他
  • 170 篇 中文
  • 8 篇 日文
  • 4 篇 德文
  • 2 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Information Engineering/Computer and Network Center"
12549 条 记 录,以下是581-590 订阅
排序:
RecMon: A Deep Learning-based Data Recovery System for network Monitoring  42
RecMon: A Deep Learning-based Data Recovery System for Netwo...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Zhao, Huaiyi Zhang, Xinyi Xie, Kun Tian, Dong Xie, Gaogang Chinese Academy of Sciences Institute of Computing Technology Beijing China University of Chinese Academy of Sciences China Chinese Academy of Sciences Computer Network Information Center Beijing China Hunan University College of Computer Science and Electronics Engineering Changsha China
network monitoring systems struggle with the issue that the measurement data is incomplete, with only a subset of origin-destination (OD) pairs or time slots observed, due to the high deployment and measurement cost. ... 详细信息
来源: 评论
Decentralized Federated Graph Learning with Lightweight Zero Trust Architecture for Next-Generation networking Security
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 1908-1922页
作者: Zhou, Xiaokang Liang, Wei Wang, Kevin I-Kai Yada, Katsutoshi Yang, Laurence T. Ma, Jianhua Jin, Qun Kansai University Faculty of Business Data Science Osaka565-0823 Japan RIKEN Center for Advanced Intelligence Project RIKEN Tokyo103-0027 Japan Hunan University of Technology and Business School of Computer Science Changsha410205 China Xiangjiang Laboratory Changsha410205 China The University of Auckland Department of Electrical Computer and Software Engineering Auckland1010 New Zealand St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada Hosei University Faculty of Computer and Information Sciences Chiyoda-ku102-8160 Japan Waseda University Faculty of Human Sciences Tokorozawa359-1192 Japan
The rapid development and usage of digital technologies in modern intelligent systems and applications bring critical challenges on data security and privacy. It is essential to allow cross-organizational data sharing... 详细信息
来源: 评论
KSKV:Key-Strategy for Key-Value Data Collection with Local Differential Privacy
收藏 引用
computer Modeling in engineering & sciences 2024年 第6期139卷 3063-3083页
作者: Dan Zhao Yang You Chuanwen Luo Ting Chen Yang Liu Artificial Intelligence Development Research Center Institute of Scientific and Technical Information of ChinaBeijing100038China Industry Development Department NSFOCUS Inc.BeijingChina School of Information Science and Technology Beijing Forestry UniversityBeijing100083China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu610054China Institute of Computing Technology China Academy of Railway Sciences Corporation LimitedBeijing10081China
In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph ***,our co... 详细信息
来源: 评论
Preventing Cloud network from Spamming Attacks Using Cloudflare and KNN
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2641-2659页
作者: Muhammad Nadeem Ali Arshad Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaSlovakia
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i... 详细信息
来源: 评论
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine
收藏 引用
Digital Communications and networks 2023年 第2期9卷 296-305页
作者: Jing Zhang Qichen Yan Xiaogang Zhu Keping Yu Department of Computer Science and Technology Xi'an University of Science and TechnologyXi'an710054China Department of Information Science and Technology Northwest UniversityXi’an 710127China School of Public Policy and Administration Nanchang UniversityNanchangJiangxi330031China Graduate School of Science and Engineering Hosei UniversityTokyo184-8584Japan RIKEN Center for Advanced Intelligence Project RIKENTokyo103-0027Japan
The crowd sensing technology can realize the sensing and computing of people,machines,and environment in smart industrial IoT-based coal mine,which provides a solution for safety monitoring through distributed intelli... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise
Multimedia Fingerprinting Codes Resistant to Linear Attacks ...
收藏 引用
2023 International Symposium on networks, computers and Communications, ISNCC 2023
作者: Fernandez, Marcel Kabatiansky, Grigory Kamel, Ibrahim Miao, Ying Rabie, Tamer Farouk The Technical University of Catalonia Department of Network Engineering Spain Center for Next Generation Wireless and IoT Skolkovo Institute of Science and Technology Russia University of Sharjah Electrical and Computer Engineering United Arab Emirates Institute of Engineering Information and Systems University of Tsukuba Japan
It has recently been shown that there are no multimedia fingerprinting codes that can find all malicious users when they use arbitrary linear attacks plus adversarial noise. It is shown that such codes exist if the co...
来源: 评论
Impact of Cloud Computing on Agricultural Advancement using Data Mining Algorithms  2
Impact of Cloud Computing on Agricultural Advancement using ...
收藏 引用
2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023
作者: Saravanan, S.K. Nisha, F. Robin Rohit, V. Lenin, J. Selvam, P.D. Rajmohan, M. Department of BigData and Network Security Saveetha School of Engineering SIMATS Tamil Nadu Chennai India School of Engineering and Technology Computer Science & Engineering CMR University Karnataka Bengaluru India Computer Science & Engineering School of Computer Science & Engineering and Information Science Presidency University Karnataka Bengaluru India Department: Computer Science & Engineering Alliance College of Engineering and Design Alliance University Karnataka Bengaluru India Department of Electronics and Communication Engineering Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Tamil Nadu Chennai India Department of Electronics and Communication Engineering Hindustan Institute of Technology and Science Tamil Nadu Chennai India
Incorporating Internet of Things (IoT) algorithms, Ensemble Learning, and Explainable AI (XAI) into the Reinforcement Learning framework provides a comprehensive solution. The framework's dynamic paradigm for prec... 详细信息
来源: 评论
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 评论
On a novel tracking differentiator design based on iterative learning in a moving window
收藏 引用
Control Theory and Technology 2023年 第1期21卷 46-55页
作者: Xiangyang Li Rafal Madonski Zhiqiang Gao Senping Tian Key Laboratory of Autonomous Systems and Network Control Ministry of EducationSchool of Automation Science and EngineeringSouth China University of TechnologyGuangzhou 510641China Energy and Electricity Research Center Jinan UniversityZhuhai 519070China Department of Electrical and Computer Science Cleveland State UniversityClevelandOH 44115USA
Differential signals are key in control engineering as they anticipate future behavior of process variables and therefore are critical in formulating control laws such as proportional-integral-derivative(PID).The prac... 详细信息
来源: 评论