咨询与建议

限定检索结果

文献类型

  • 2,556 篇 期刊文献
  • 1,673 篇 会议
  • 28 册 图书

馆藏范围

  • 4,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,746 篇 工学
    • 2,042 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 596 篇 信息与通信工程
    • 432 篇 生物工程
    • 407 篇 电气工程
    • 345 篇 生物医学工程(可授...
    • 329 篇 控制科学与工程
    • 277 篇 光学工程
    • 252 篇 电子科学与技术(可...
    • 142 篇 机械工程
    • 138 篇 化学工程与技术
    • 114 篇 仪器科学与技术
    • 113 篇 动力工程及工程热...
    • 111 篇 安全科学与工程
    • 106 篇 网络空间安全
  • 1,799 篇 理学
    • 876 篇 数学
    • 559 篇 物理学
    • 506 篇 生物学
    • 345 篇 统计学(可授理学、...
    • 165 篇 化学
    • 154 篇 系统科学
    • 116 篇 地球物理学
  • 754 篇 管理学
    • 467 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 272 篇 工商管理
  • 360 篇 医学
    • 311 篇 临床医学
    • 264 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 149 篇 药学(可授医学、理...
  • 137 篇 法学
    • 120 篇 社会学
  • 91 篇 经济学
  • 83 篇 农学
  • 51 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 153 篇 deep learning
  • 151 篇 accuracy
  • 136 篇 machine learning
  • 92 篇 training
  • 84 篇 computational mo...
  • 78 篇 feature extracti...
  • 77 篇 convolutional ne...
  • 70 篇 real-time system...
  • 69 篇 predictive model...
  • 64 篇 artificial intel...
  • 62 篇 internet of thin...
  • 60 篇 data models
  • 54 篇 reinforcement le...
  • 48 篇 federated learni...
  • 47 篇 optimization
  • 45 篇 image segmentati...
  • 45 篇 semantics
  • 43 篇 generative adver...
  • 41 篇 graph neural net...
  • 40 篇 adversarial mach...

机构

  • 152 篇 college of compu...
  • 59 篇 nanyang technolo...
  • 59 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 beijing advanced...
  • 42 篇 college of compu...
  • 41 篇 data science ins...
  • 35 篇 national enginee...
  • 34 篇 department of co...
  • 32 篇 university of ch...
  • 31 篇 school of data a...
  • 30 篇 the college of c...
  • 27 篇 dipartimento di ...
  • 26 篇 the oskar klein ...
  • 24 篇 college of intel...
  • 23 篇 center for scien...
  • 23 篇 department of br...
  • 22 篇 department of ph...
  • 22 篇 college of infor...
  • 22 篇 institut für ast...

作者

  • 158 篇 niyato dusit
  • 33 篇 sun geng
  • 31 篇 chen mingzhe
  • 30 篇 peng hao
  • 28 篇 du hongyang
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 25 篇 j. b. thayer
  • 25 篇 p. spinelli
  • 25 篇 m. kuss
  • 25 篇 wang jiacheng
  • 24 篇 s. guiriec
  • 24 篇 guo yike
  • 23 篇 p. a. caraveo
  • 23 篇 p. f. michelson
  • 23 篇 s. ciprini
  • 23 篇 r. rando
  • 23 篇 kang jiawen
  • 22 篇 m. ackermann
  • 21 篇 r. buehler

语言

  • 3,810 篇 英文
  • 436 篇 其他
  • 14 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Computing and Data Science"
4257 条 记 录,以下是61-70 订阅
排序:
IDS: Robust Network Intrusion Detection via Temporal Contrastive Graph Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 1475-1486页
作者: Wu, Cong Sun, Jianfei Chen, Jing Alazab, Mamoun Liu, Yang Xiang, Yang Wuhan University School of Cyber Science and Engineering Wuhan430072 China Singapore Management University School of Computing and Information Systems Bras Basah Singapore188065 Singapore Charles Darwin University College of Engineering IT and Environment DarwinNT0810 Australia Nanyang Technological University College of Computing and Data Science Jurong West Singapore639798 Singapore Swinburne University of Technology Department of Digital Research MelbourneVIC3122 Australia
In the era of zero trust security models and next-generation networks (NGN), the primary challenge is that network nodes may be untrusted, even if they have been verified, necessitating continuous validation and scrut... 详细信息
来源: 评论
Mapping the changing structure of science through diachronic periodical embeddings
arXiv
收藏 引用
arXiv 2025年
作者: Lyu, Zhuoqi Ke, Qing Department of Data Science College of Computing City University of Hong Kong Hong Kong
Understanding the changing structure of science over time is essential to elucidating how science evolves. We develop diachronic embeddings of scholarly periodicals to quantify "semantic changes" of periodic...
来源: 评论
Network intrusion detection based on feature fusion of attack dimension
收藏 引用
Journal of Supercomputing 2025年 第6期81卷 1-33页
作者: Sun, Xiaolong Gu, Zhengyao Zhang, Hao Gu, Jason Liu, Yanhua Dong, Chen Ye, Junwei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou350116 China Department of Electrical and Computer Engineering Dalhousie University HalifaxNSB3J 1Z1 Canada
Network traffic anomaly detection involves the rapid identification of intrusions within a network through the detection, analysis, and classification of network traffic data. The variety of cyberattacks encompasses d... 详细信息
来源: 评论
Deep learning at the service of metaheuristics for solving numerical optimization problems
收藏 引用
Neural computing and Applications 2025年 1-36页
作者: Oyelade, Olaide N. Ezugwu, Absalom E. Saha, Apu K. Thieu, Nguyen V. Gandomi, Amir H. School of Electronics Electrical Engineering and Computer Science Queen’s University Belfast Bangladesh Unit for Data Science and Computing North-West University 11 Hoffman Street Potchefstroom2520 United States Department of Mathematics National Institute of Technology Agartala Tripura Agartala799046 India Faculty of Computer Science Phenikaa University Yen Nghia Hanoi Ha Dong12116 Viet Nam Department of Engineering and Information Technology University of Technology Sydney UltimoNSW2007 Australia
Integrating deep learning methods into metaheuristic algorithms has gained attention for addressing design-related issues and enhancing performance. The primary objective is to improve solution quality and convergence... 详细信息
来源: 评论
Sustainable Diffusion-Based Incentive Mechanism for Generative AI-Driven Digital Twins in Industrial Cyber-Physical Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 139-149页
作者: Wen, Jinbo Kang, Jiawen Niyato, Dusit Zhang, Yang Mao, Shiwen Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China Guangdong University of Technology School of Automation Guangzhou510006 China Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore Auburn University Department of Electrical and Computer Engineering AuburnAL36849 United States
Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries. By digitizing data throughout product life cycles, Digital Twins (DTs) in ICPSs enable a shift from current i... 详细信息
来源: 评论
On Error-Based Step Size Control for Discontinuous Galerkin Methods for Compressible Fluid Dynamics
收藏 引用
应用数学与计算数学学报 2025年 第1期7卷 3-39页
作者: Hendrik Ranocha Andrew R.Winters Hugo Guillermo Castro Lisandro Dalcin Michael Schlottke-Lakemper Gregor J.Gassner Matteo Parsani Applied Mathematics University of HamburgBundesstr.5520146 HamburgGermany Department of Mathematics Applied Mathematics Linköping UniversityLinköpingSweden Extreme Computing Research Center(ECRC) Computer Electrical and Mathematical Science and Engineering Division(CEMSE)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Applied and Computational Mathematics RWTH Aachen UniversityAachenGermany High-Performance Computing Center Stuttgart University of StuttgartStuttgartGermany Department of Mathematics and Computer Science University of CologneCologneGermany Center for Data and Simulation Science University of CologneCologneGermany Extreme Computing Research Center(ECRC) Computer Electrical and Mathematical Science and Engineering Division(CEMSE)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Physical Science and Engineering Division(PSE) King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia
We study a temporal step size control of explicit Runge-Kutta(RK)methods for com-pressible computational fluid dynamics(CFD),including the Navier-Stokes equations and hyperbolic systems of conservation laws such as th... 详细信息
来源: 评论
Recognition of American sign language using modified deep residual CNN with modified canny edge segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Hariharan, U. Devarajan, Devikanniga Kumar, P. Santhosh Rajkumar, K. Meena, M. Akilan, T. Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab Mohali140413 India Department of Computer Science and Engineering GITAM University Karnataka Bengaluru561203 India Department of Information Technology Faculty of Engineering and technology SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu Tambaram602109 India Research Coordinator Dept. of IQAC Amity University Kolkata West Bengal 700135 India
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering Changsha410012 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450001 China Zhengzhou University International College Zhengzhou450001 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350007 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science Macau China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论
Augmenting the Proficiencies of GANs Through Modernizing Agriculture and Healthcare
Augmenting the Proficiencies of GANs Through Modernizing Agr...
收藏 引用
International Conference on Trends in Electronics and Informatics (ICEI)
作者: M. Jothi T. Veeramakali Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur Tamilnadu India
Nowadays, generative models with deep learning have a focus and give enormous success in various real-time experience domains. Deep learning (DL) is a subdivision of machine learning that is inspired by the structure ... 详细信息
来源: 评论
MatrikalinDiabetes: User-Centered Design of a mHealth App for Gestational Diabetes Mellitus Management and Education Among Bangladeshi Women  26th
MatrikalinDiabetes: User-Centered Design of a mHealth App ...
收藏 引用
26th International Conference on Human-Computer Interaction, HCII 2024
作者: Ratul, Mohammad Arshad Hossain Yanoor Bristy, Tunisha Sayeed, Noorjahan Islam, Ashraful Chaudhry, Beenish Moalla Center for Computational and Data Sciences Independent University Bangladesh Dhaka Bangladesh Department of Computer Science and Engineering Independent University Bangladesh Dhaka Bangladesh School of Computing and Informatics University of Louisiana at Lafayette Louisiana United States
This study employs the User-Centered Design (UCD) methodology to develop a mobile health (mHealth) application (app) specifically tailored for Bangladeshi women with Gestational Diabetes Mellitus (GDM). GDM affects ap... 详细信息
来源: 评论