咨询与建议

限定检索结果

文献类型

  • 1,783 篇 会议
  • 1,285 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 3,083 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,942 篇 工学
    • 1,318 篇 计算机科学与技术...
    • 1,059 篇 软件工程
    • 418 篇 信息与通信工程
    • 335 篇 控制科学与工程
    • 208 篇 电子科学与技术(可...
    • 200 篇 电气工程
    • 182 篇 生物工程
    • 169 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 119 篇 光学工程
    • 89 篇 动力工程及工程热...
    • 82 篇 化学工程与技术
    • 67 篇 交通运输工程
    • 66 篇 材料科学与工程(可...
    • 63 篇 网络空间安全
  • 1,024 篇 理学
    • 506 篇 数学
    • 298 篇 物理学
    • 206 篇 生物学
    • 168 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 85 篇 化学
  • 564 篇 管理学
    • 364 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 148 篇 工商管理
  • 170 篇 医学
    • 145 篇 临床医学
    • 105 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 93 篇 法学
    • 75 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 43 篇 教育学
  • 38 篇 农学
  • 15 篇 文学
  • 11 篇 军事学
  • 7 篇 艺术学

主题

  • 90 篇 deep learning
  • 64 篇 computer science
  • 59 篇 machine learning
  • 50 篇 accuracy
  • 45 篇 computational mo...
  • 45 篇 feature extracti...
  • 41 篇 internet of thin...
  • 41 篇 optimization
  • 37 篇 data mining
  • 37 篇 artificial intel...
  • 36 篇 training
  • 32 篇 information syst...
  • 31 篇 security
  • 29 篇 information tech...
  • 29 篇 cloud computing
  • 28 篇 routing
  • 28 篇 hardware
  • 27 篇 support vector m...
  • 27 篇 computer archite...
  • 27 篇 algorithm design...

机构

  • 99 篇 department of co...
  • 50 篇 school of softwa...
  • 40 篇 tsinghua nationa...
  • 37 篇 department of co...
  • 23 篇 key laboratory f...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of in...
  • 17 篇 hubei province k...
  • 16 篇 department of co...
  • 16 篇 national enginee...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 national key lab...
  • 13 篇 department of co...
  • 13 篇 ieee
  • 13 篇 key laboratory f...
  • 13 篇 institute of sys...
  • 12 篇 department of me...
  • 12 篇 department of ap...

作者

  • 21 篇 abdelwahed motwa...
  • 20 篇 mesfer al duhayy...
  • 19 篇 ishfaq yaseen
  • 18 篇 mohamed k.nour
  • 17 篇 manar ahmed hamz...
  • 15 篇 gaol ford lumban
  • 15 篇 han zhu
  • 14 篇 robbi rahim
  • 14 篇 yang jing
  • 14 篇 paramartha dutta
  • 14 篇 zhao junqiao
  • 13 篇 yunhao liu
  • 12 篇 abu sarwar zaman...
  • 12 篇 shamshirband sha...
  • 12 篇 hayashi eiji
  • 12 篇 hala j.alshahran...
  • 11 篇 chen yen-lin
  • 11 篇 ye chen
  • 11 篇 wang jianmin
  • 11 篇 shahaboddin sham...

语言

  • 2,928 篇 英文
  • 88 篇 其他
  • 64 篇 中文
  • 5 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer System and Information Technology"
3083 条 记 录,以下是151-160 订阅
排序:
A systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Temporal modeling of node mobility in mobile ad-hoc network
收藏 引用
Journal of Computing and information technology 2010年 第1期18卷 19-29页
作者: Singh, Jyoti Prakash Dutta, Paramartha Department of Information Technology Academy of Technology Aedconagar West Bengal India Department of Computer and System Sciences Visva-Bharati University West Bengal India
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infras... 详细信息
来源: 评论
Real-time Privacy Preserving Framework for Covid-19 Contact Tracing
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1017-1032页
作者: Akashdeep Bhardwaj Ahmed A.Mohamed Manoj Kumar Mohammed Alshehri Ahed Abugabah School of Computer Science University of Petroleum&Energy Studies(UPES)Dehradun248007India Department of Computer Science College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Technology Faculty of Computer and InformationAssiut UniversityAssiut71515Egypt Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Information System College of Technological InnovationZayed UniversityAbu DhabiUnited Arab Emirates
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple *** have shut their borders,and their nationals have been advised to *** variety... 详细信息
来源: 评论
Generative AI-driven Cross-layer Covert Communication: Fundamentals, Framework and Case Study
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Tianhao Liu, Jiqiang Zhang, Tao Wang, Jian Wang, Jiacheng Kang, Jiawen Niyato, Dusit Mao, Shiwen School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100045 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
Ensuring end-to-end cross-layer communication security in military networks by selecting covert schemes between nodes is a key solution for military communication security. With the development of communication techno... 详细信息
来源: 评论
Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2639-2653页
作者: V.Praveena A.Vijayaraj P.Chinnasamy Ihsan Ali Roobaea Alroobaea Saleh Yahya Alyahyan Muhammad Ahsan Raza Department of Computer Science and Engineering Dr.N.G.P Institute of TechnologyCoimbatore641048India Department of Information Technology Vignan’s Foundation for ScienceTechnology&ResearchGuntur522213India Department of Information Technology Sri Shakthi Institute of Engineering and TechnologyCoimbatore641062India Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala Lumpur50603Malaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science Community College in DwadmiShaqra University11961Saudi Arabia Department of Information Technology Bahauddin Zakariya UniversityMultan60000Pakistan
In recent years,progressive developments have been observed in recent technologies and the production cost has been continuously *** such scenario,Internet of Things(IoT)network which is comprised of a set of Unmanned... 详细信息
来源: 评论
A new approach of conditions on δ2s(Φ) for s-sparse recovery
收藏 引用
Science China(information Sciences) 2014年 第4期57卷 107-113页
作者: CEN YiGang ZHAO RuiZhen MIAO ZhenJiang CEN LiHui CUI LiHong School of Computer & Information Technology Beijing Jiaotong University School of Information Science and Engineering Central South University Key Laboratory of System Control and Information Processing Ministry of Education Department of Mathematics Beijing University of Chemical Technology
In this paper,we provide a unified expression to obtain the conditions on the restricted isometry constantδ2s(Φ).These conditions cover the important results proposed by Candes et *** each of them is a sufficient co... 详细信息
来源: 评论
Adaptive Parallel Model Combination for Reduced Environmental Mismatch in Noisy Speech Recognition
Adaptive Parallel Model Combination for Reduced Environmenta...
收藏 引用
International Conference on Electronic Design
作者: Tan, S. S. Ahmad, Abdul Manan Software Engineering Department Faculty of Computer Science and Information System University of Technology Malaysia Malaysia Speech Laboratory Faculty of Computer Science and Information System University of Technology Malaysia Malaysia
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC... 详细信息
来源: 评论
Congestion Control Mechanisms and Techniques in computer Network: A Review
Congestion Control Mechanisms and Techniques in Computer Net...
收藏 引用
2022 International Conference on Data Science and Intelligent Computing, ICDSIC 2022
作者: Altameemi, Ahmed Malik Nassar, Khulood A. College of Computer Science and Information Technology University of Basrah Department of Computer Information System Basrah Iraq
One of the most important and most pioneering topics in the field of networks is congestion and how to control it or avoid its occurrence because this topic has a huge impact on the network and the quality of service ... 详细信息
来源: 评论
Deep Optimal VGG16 Based COVID-19 Diagnosis Model
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 43-58页
作者: M.Buvana K.Muthumayil S.Senthil kumar Jamel Nebhen Sultan S.Alshamrani Ihsan Ali Department of Computer Science and Engineering PSNA College of Engineering and TechnologyDindigul624622India Department of Information Technology PSNA College of Engineering and TechnologyDindigul624622India Department of Electrical and Electronics Engineering New Prince Shri Bhavani College of Engineering and TechnologyChennai600073India Prince Sattam Bin Abdulaziz University College of Computer Engineering and SciencesAlkharj11942Saudi Arabia Department of Information Technology College of Computer and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala Lumpur50603Malaysia
Coronavirus(COVID-19)outbreak was first identified in Wuhan,China in December *** was tagged as a pandemic soon by the WHO being a serious public medical *** spite of the fact that the virus can be diagnosed by qRT-PC... 详细信息
来源: 评论
Social Media-Based Surveillance systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第5期139卷 1167-1202页
作者: Samina Amin Muhammad Ali Zeb Hani Alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh Institute of Computing Kohat University of Science and TechnologyKohat26000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information System College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv... 详细信息
来源: 评论