咨询与建议

限定检索结果

文献类型

  • 787 篇 期刊文献
  • 679 篇 会议
  • 23 册 图书

馆藏范围

  • 1,489 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 963 篇 工学
    • 713 篇 计算机科学与技术...
    • 595 篇 软件工程
    • 217 篇 信息与通信工程
    • 135 篇 控制科学与工程
    • 126 篇 电气工程
    • 124 篇 生物工程
    • 98 篇 生物医学工程(可授...
    • 63 篇 电子科学与技术(可...
    • 59 篇 光学工程
    • 55 篇 机械工程
    • 49 篇 仪器科学与技术
    • 42 篇 交通运输工程
    • 41 篇 化学工程与技术
    • 38 篇 安全科学与工程
    • 34 篇 网络空间安全
    • 33 篇 动力工程及工程热...
  • 538 篇 理学
    • 272 篇 数学
    • 155 篇 生物学
    • 108 篇 统计学(可授理学、...
    • 105 篇 物理学
    • 66 篇 系统科学
    • 54 篇 化学
  • 326 篇 管理学
    • 183 篇 管理科学与工程(可...
    • 156 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 126 篇 医学
    • 105 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 49 篇 药学(可授医学、理...
    • 43 篇 公共卫生与预防医...
  • 51 篇 法学
    • 45 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 17 篇 教育学
  • 4 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 artificial intel...
  • 42 篇 deep learning
  • 40 篇 machine learning
  • 33 篇 training
  • 32 篇 data mining
  • 28 篇 semantics
  • 28 篇 accuracy
  • 25 篇 predictive model...
  • 23 篇 knowledge engine...
  • 21 篇 internet of thin...
  • 21 篇 feature extracti...
  • 19 篇 reinforcement le...
  • 19 篇 forecasting
  • 18 篇 computational mo...
  • 18 篇 convolutional ne...
  • 17 篇 decision making
  • 16 篇 security
  • 16 篇 data models
  • 15 篇 neural networks
  • 14 篇 information syst...

机构

  • 36 篇 school of comput...
  • 26 篇 school of inform...
  • 18 篇 department of ma...
  • 15 篇 university of ch...
  • 12 篇 college of compu...
  • 10 篇 sron netherlands...
  • 9 篇 department of da...
  • 9 篇 department of as...
  • 9 篇 school of scienc...
  • 9 篇 faculty of scien...
  • 9 篇 hiroshima astrop...
  • 9 篇 department of ph...
  • 9 篇 pillar of inform...
  • 9 篇 department of ph...
  • 9 篇 school of data s...
  • 9 篇 national institu...
  • 9 篇 key laboratory o...
  • 9 篇 faculty of educa...
  • 9 篇 graduate school ...
  • 9 篇 department of ph...

作者

  • 33 篇 niyato dusit
  • 24 篇 xiong zehui
  • 20 篇 liu hongyan
  • 20 篇 he jun
  • 18 篇 du xiaoyong
  • 18 篇 kang jiawen
  • 17 篇 du hongyang
  • 11 篇 uhler caroline
  • 11 篇 zhao zhang
  • 10 篇 meng wang
  • 10 篇 stumme gerd
  • 9 篇 uchida hiroyuki
  • 9 篇 kilbourne caroli...
  • 9 篇 tamura keisuke
  • 9 篇 okajima takashi
  • 9 篇 pottschmidt katj...
  • 9 篇 murakami hiroshi
  • 9 篇 sun geng
  • 9 篇 markevitch maxim
  • 9 篇 yamaguchi hiroya

语言

  • 1,348 篇 英文
  • 125 篇 其他
  • 16 篇 中文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Department of Information Systems Data and Knowledge Engineering"
1489 条 记 录,以下是221-230 订阅
排序:
Federated Causally Invariant Feature Learning  39
Federated Causally Invariant Feature Learning
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Guo, Xianjie Yu, Kui Cui, Lizhen Yu, Han Li, Xiaoxiao School of Computer Science and Information Engineering Hefei University of Technology China Key Laboratory of Knowledge Engineering with Big Data of Ministry of Education China School of Software Shandong University China College of Computing and Data Science Nanyang Technological University Singapore Department of Electrical and Computer Engineering The University of British Columbia Canada Vector Institute Canada
Federated feature selection (FFS) is a promising field for selecting informative features while preserving data privacy in federated learning (FL) settings. Existing FFS methods focus on capturing the correlations bet... 详细信息
来源: 评论
Personalized Federated Learning with Collaborative Aggregation Networks for Multi-Site Brain Disorder Diagnosis  4
Personalized Federated Learning with Collaborative Aggregati...
收藏 引用
4th International Conference on Industrial Automation, Robotics and Control engineering, IARCE 2024
作者: Si, Qian Li, Yang School of Cyber Science and Technology Beihang University Beijing China Department of Automation Science and Electrical Engineering The Beijing Advanced Innovation Center for Big Data and Brain Computing State Key Laboratory of Virtual Reality Technology and Systems Beijing China Advanced Institute of Information Technology Peking University Beijing China Beihang University Beijing China
In multi-site brain disease diagnosis studies, traditional centralized training methods necessitate sharing medical data, posing significant privacy risks. Federated learning (FL) offers a privacy-preserving solution ... 详细信息
来源: 评论
Integrating Attribute information into Relational data: A Latent Structure Approach
Integrating Attribute Information into Relational Data: A La...
收藏 引用
Consumer Technology (ICCT-Pacific), International Conference on
作者: Kenta Mikawa Manabu Kobayashi Tomoyuki Sasaki Akiko Manada Department of Information Systems Tokyo City University Kanagawa Japan Center for Data Science Waseda University Tokyo Japan Department of Computer Science Tokyo City University Tokyo Japan Department of Electrical Electronics and Information Engineering Nagaoka University of Technology Niigata Japan
Various analytical methods for diverse data have been proposed with the evolution of information technology. This study focuses on relational data, comprising information on relationships between objects. Although sev... 详细信息
来源: 评论
Adversarial Attacks on Featureless Deep Learning Malicious URLs Detection
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 921-939页
作者: Bader Rasheed Adil Khan S.M.Ahsan Kazmi Rasheed Hussain Md.Jalil Piran Doug Young Suh Institute of Data Science and Articial Intelligence Innopolis UniversityInnopolis420500Russia Institute of Information Security and Cyberphysical Systems Innopolis UniversityInnopolis420500Russia Department of Computer Science and Engineering Sejong UniversitySeoulKorea Department of Electronics Engineering Kyung Hee UniversityYonginKorea
Detecting malicious Uniform Resource Locators(URLs)is crucially important to prevent attackers from committing *** researches have investigated the role of machine learning(ML)models to detect malicious *** using ML a... 详细信息
来源: 评论
Softsign Gaussian Deep Belief Neural Network (SGDBNN): A Novel Technique for Improving Pedestrian Detection Accuracy and Processing Efficiency  7
Softsign Gaussian Deep Belief Neural Network (SGDBNN): A Nov...
收藏 引用
7th International Conference on Image information Processing, ICIIP 2023
作者: Bhavani, N.P.G. Sudha, R.V. Priya, K.Shanmuga Arun Raj, S.R. Yadav, Vinay Kumar Balaram, Allam Saveetha School of Engineering Saveetha Institute of Medical And Technical Sciences Department of Electronics And Communication Engineering Tamilnadu India Knowledge Institute of Technology Department of Computer Science And Business Systems Selliampalayam Tamil Nadu Kakapalayam India KSR Institute For Engineering And Technology Department of Information Technology TamilNadu Tiruchengode637215 India U.B.D.T College of Engineering Department of Electronics & Communication Engineering Karnataka Davanagere577004 India Glocal University Glocal School of Science And Technology Uttar Pradesh India Mlr Institute of Technology Department of Computer Science And Engineering Hyderabad500043 India
Pedestrian detection is a critical task in computer vision with the aim of accurately identifying pedestrians in images or video frames. In this work, we tackle the issue of enhancing pedestrian detection precision wh... 详细信息
来源: 评论
Testing of Emerging Wireless Sensor Networks Using Radar Signals With Machine Learning Algorithms
IEEE Journal of Selected Areas in Sensors
收藏 引用
IEEE Journal of Selected Areas in Sensors 2024年 1卷 49-59页
作者: Shitharth Selvarajan Hariprasath Manoharan Adil O. Khadidos Alaa O. Khadidos School of Built Environment Engineering and Computing Leeds Beckett University Leeds U.K. Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Center of Research Excellence in Artificial Intelligence and Data Science King Abdulaziz University Jeddah Saudi Arabia
In this article, machine learning methods are used to assess how well wireless sensor networks transmit and receive radar signals. Measurements are done with labeled and unlabeled datasets where output functions are m... 详细信息
来源: 评论
Enhancement of Security in IoT using Secure Hash Cryptography Algorithm with Double Encryption (SHCA-DE)  9
Enhancement of Security in IoT using Secure Hash Cryptograph...
收藏 引用
9th International Conference on Communication and Electronics systems, ICCES 2024
作者: Uganya, G. Rajalakshmi, D. Vangapandu, Ramarao Dinesh, M. Giri, Jayant Odeh, Mahmoud Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Ece Chennai India Srm Institute of Science and Technology Department of Data Science and Business Systems Kattankulathur Chennai India Vignan's Institute of Engineering for Women Department of Computer Science and Engineering Vishakhapatnam India Saveetha University Department of Vlsi Microelectronics Saveetha School of Engineering Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah Saudi Arabia
The 'Internet of things' is the developing technology to transfer the world into smart innovation. 'IoT' security is the most problematic issue in recent applications due to its properties including &#... 详细信息
来源: 评论
IKGN: Intention-aware knowledge Graph Network for POI Recommendation
IKGN: Intention-aware Knowledge Graph Network for POI Recomm...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Xiaoyu Zhu Chenyang Bu Bingbing Dong Shengwei Ji Yi He Xindong Wu Key Laboratory of Knowledge Engineering with Big Data (the Ministry of Education of China) Hefei University of Technology School of Computer Science and Information Engineering Hefei University of Technology China School of Artificial Intelligence and Big Data Hefei University China Department of Computer Science Old Dominion University USA Research Center for Knowledge Engineering Zhejiang Lab China
Point-of-Interest (POI) recommendation, pivotal for guiding users to their next interested locale, grapples with the persistent challenge of data sparsity. Whereas knowledge graphs (KGs) have emerged as a favored tool...
来源: 评论
Co-training partial domain adaptation networks for industrial Fault Diagnosis
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Gecheng Luo, Chengwen Li, Jianqiang Chen, Xinkai The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China The Department of Electronic Information Systems Shibaura Institute of Technology Saitama337-8570 Japan
The partial domain adaptation (PDA) challenge is a prevalent issue in industrial fault diagnosis. Current PDA approaches primarily rely on adversarial learning for domain adaptation and use reweighting strategies to e... 详细信息
来源: 评论
The Smart Application of data Mining in the Detection of Fraudulent Transactions  3
The Smart Application of Data Mining in the Detection of Fra...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Bodhankar, Aniruddha Aswal, Upendra Singh Arivazhagn, D. Pund, Sachin S. Kulkarni, Nandini Chaturvedi, Sudhir Kumar Dr. Ambedkar Institute of Management Studies and Research- Nagpur Department of Data Science & Information Systems Nagpur India Shri Ramdeobaba College of Engineering and Management Department of Industrial Engineering Maharashtra Nagpur India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India Symbiosis International University Department of Symbiosis School of Planning Architecture and Design Nagpur Nagpur India Business School Academy of Maritime Education and Training Deemed to Be University Department of Amet Chennai India Upes Department of School of Engineering Dehradun India
Records mining is a powerful analytical device used to find out styles, correlations, and traits in large facts sets. Smart application of data mining methods within the detection of fraudulent transactions has finish... 详细信息
来源: 评论