咨询与建议

限定检索结果

文献类型

  • 778 篇 期刊文献
  • 679 篇 会议
  • 23 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 955 篇 工学
    • 706 篇 计算机科学与技术...
    • 596 篇 软件工程
    • 215 篇 信息与通信工程
    • 132 篇 控制科学与工程
    • 124 篇 电气工程
    • 124 篇 生物工程
    • 98 篇 生物医学工程(可授...
    • 64 篇 电子科学与技术(可...
    • 59 篇 光学工程
    • 54 篇 机械工程
    • 49 篇 仪器科学与技术
    • 40 篇 化学工程与技术
    • 39 篇 交通运输工程
    • 38 篇 安全科学与工程
    • 35 篇 网络空间安全
    • 32 篇 动力工程及工程热...
  • 533 篇 理学
    • 270 篇 数学
    • 154 篇 生物学
    • 108 篇 统计学(可授理学、...
    • 104 篇 物理学
    • 67 篇 系统科学
    • 53 篇 化学
  • 325 篇 管理学
    • 183 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 125 篇 医学
    • 104 篇 临床医学
    • 81 篇 基础医学(可授医学...
    • 49 篇 药学(可授医学、理...
    • 43 篇 公共卫生与预防医...
  • 50 篇 法学
    • 44 篇 社会学
  • 30 篇 经济学
  • 22 篇 农学
  • 18 篇 教育学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 41 篇 deep learning
  • 41 篇 artificial intel...
  • 40 篇 machine learning
  • 33 篇 training
  • 32 篇 data mining
  • 28 篇 semantics
  • 28 篇 accuracy
  • 25 篇 predictive model...
  • 23 篇 knowledge engine...
  • 21 篇 feature extracti...
  • 20 篇 internet of thin...
  • 20 篇 reinforcement le...
  • 19 篇 forecasting
  • 18 篇 computational mo...
  • 18 篇 convolutional ne...
  • 17 篇 decision making
  • 16 篇 security
  • 16 篇 data models
  • 15 篇 neural networks
  • 14 篇 information syst...

机构

  • 36 篇 school of comput...
  • 26 篇 school of inform...
  • 18 篇 department of ma...
  • 15 篇 university of ch...
  • 13 篇 college of compu...
  • 10 篇 sron netherlands...
  • 9 篇 department of da...
  • 9 篇 department of as...
  • 9 篇 school of scienc...
  • 9 篇 faculty of scien...
  • 9 篇 hiroshima astrop...
  • 9 篇 department of ph...
  • 9 篇 pillar of inform...
  • 9 篇 department of ph...
  • 9 篇 school of data s...
  • 9 篇 national institu...
  • 9 篇 key laboratory o...
  • 9 篇 faculty of educa...
  • 9 篇 graduate school ...
  • 9 篇 department of ph...

作者

  • 33 篇 niyato dusit
  • 24 篇 xiong zehui
  • 20 篇 liu hongyan
  • 20 篇 he jun
  • 18 篇 du xiaoyong
  • 18 篇 kang jiawen
  • 17 篇 du hongyang
  • 11 篇 uhler caroline
  • 10 篇 meng wang
  • 10 篇 zhao zhang
  • 10 篇 stumme gerd
  • 9 篇 uchida hiroyuki
  • 9 篇 kilbourne caroli...
  • 9 篇 tamura keisuke
  • 9 篇 okajima takashi
  • 9 篇 pottschmidt katj...
  • 9 篇 murakami hiroshi
  • 9 篇 sun geng
  • 9 篇 markevitch maxim
  • 9 篇 yamaguchi hiroya

语言

  • 1,335 篇 英文
  • 128 篇 其他
  • 16 篇 中文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Department of Information Systems Data and Knowledge Engineering"
1480 条 记 录,以下是601-610 订阅
排序:
Optimization for Amortized Inverse Problems
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Tianci Yang, Tong Zhang, Quan Lei, Qi School of Electrical and Computer Engineering Purdue University United States Center of Data Science Peking University China Department of Accounting and Information Systems Michigan State University United States Courant Institute of Mathematical Sciences Center for Data Science New York University United States
Incorporating a deep generative model as the prior distribution in inverse problems has established substantial success in reconstructing images from corrupted observations. Notwithstanding, the existing optimization ... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Forecasting COVID-19 Infections in Gulf Cooperation Council (GCC) Countries using Machine Learning
arXiv
收藏 引用
arXiv 2023年
作者: Ismail, Leila Materwala, Huned Hennebelle, Alain Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates Independent Data Scientist and Engineer Al Ain Abu Dhabi United Arab Emirates
COVID-19 has infected more than 68 million people worldwide since it was first detected about a year ago. Machine learning time series models have been implemented to forecast COVID-19 infections. In this paper, we de... 详细信息
来源: 评论
Enhancement of Security in IoT using Secure Hash Cryptography Algorithm with Double Encryption (SHCA-DE)
Enhancement of Security in IoT using Secure Hash Cryptograph...
收藏 引用
International Conference on Communication and Electronics systems (ICCES)
作者: G. Uganya D. Rajalakshmi Ramarao Vangapandu M. Dinesh Jayant Giri Mahmoud Odeh Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Chennai Department of Computer Science and Engineering Vignan's Institute of Engineering for Women Vishakhapatnam Department of VLSI Microelectronics Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences (SIMATS) Saveetha University Chennai Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur Division of Research and Development Lovely Professional University Phagwara India Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah Saudi Arabia
The “Internet of things” is the developing technology to transfer the world into smart innovation. “IoT” security is the most problematic issue in recent applications due to its properties including ‘centralized ... 详细信息
来源: 评论
Proceedings of the 2nd International Workshop on Explainable and Interpretable Machine Learning (XI-ML) – PREFACE
收藏 引用
CEUR Workshop Proceedings 2022年 3457卷
作者: Atzmueller, Martin Kliegr, Tomáš Schmid, Ute Institute of Computer Science Osnabrück University Osnabrück Germany Osnabrück Germany Department of Information and Knowledge Engineering Faculty of Informatics and Statistics Prague University of Economics and Business Czech Republic Cognitive Systems University of Bamberg Bamberg Germany
来源: 评论
从信号到知识——基于人工智能的医学影像裸数据诊断价值初探
收藏 引用
engineering 2024年 第3期34卷 60-69页
作者: Bingxi He Yu Guo Yongbei Zhu Lixia Tong Boyu Kong Kun Wang Caixia Sun Hailin Li Feng Huang Liwei Wu Meng Wang Fanyang Meng Le Dou Kai Sun Tong Tong Zhenyu Liu Ziqi Wei Wei Mu Shuo Wang Zhenchao Tang Shuaitong Zhang Jingwei Wei Lizhi Shao Mengjie Fang Juntao Li Shouping Zhu Lili Zhou Shuo Wang Di Dong Huimao Zhang Jie Tian Beijing Advanced Innovation Center for Big Data-Based Precision Medicine School of Engineering MedicineBeihang UniversityBeijing 100191China Key Laboratory of Big Data-Based Precision Medicine Beihang UniversityMinistry of Industry and Information TechnologyBeijing 100191China CAS Key Laboratory of Molecular Imaging Institute of AutomationChinese Academy of SciencesBeijing 100190China Department of Radiology The First Hospital of Jilin UniversityChangchun 130021China Neusoft Medical Systems Co.Ltd. Shenyang 110167China Neusoft Research of Intelligent Healthcare Technology Co.Ltd. Shenyang 110167China School of Life Science and Technology Xidian UniversityXi’an 710126China Engineering Research Center of Molecular and Neuro Imaging Ministry of EducationXi’an 710126China School of Artificial Intelligence University of Chinese Academy of SciencesBeijing 100049China
Encouraging and astonishing developments have recently been achieved in image-based diagnostic *** medical care and imaging technology are becoming increasingly ***,the current diagnosis pattern of signal to image to ... 详细信息
来源: 评论
Optimizing Generative AI Networking: A Dual Perspective with Multi-Agent systems and Mixture of Experts
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Ruichen Du, Hongyang Niyato, Dusit Kang, Jiawen Xiong, Zehui Zhang, Ping Kim, Dong In The College of Computing and Data Science Nanyang Technological University Singapore The School of Automation Guangdong University of Technology China The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of
In the continued development of next-generation networking and artificial intelligence content generation (AIGC) services, the integration of multi-agent systems (MAS) and the mixture of experts (MoE) frameworks is be... 详细信息
来源: 评论
Trends, Opportunities, and Challenges in Detecting Depressive Disorders Through Mobile Devices: A Review
Trends, Opportunities, and Challenges in Detecting Depressiv...
收藏 引用
Computer System, information Technology, and Electrical engineering (COSITE), International Conference on
作者: Gregorius Natanael Elwirehardja Mahmud Isnan Anzaludin Samsinga Perbangsa Kahlil Muchtar Bens Pardamean Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta Indonesia Information System Department School of Information Systems Bina Nusantara University Jakarta Indonesia Department of Electrical and Computer Engineering Universitas Syiah Kuala Banda Aceh Indonesia Computer Science Department BINUS Graduate Program -Master of Computer Science Bina Nusantara University Jakarta Indonesia
Depressive Disorders (DD) is one of the most prevalent mental disorders in the world that may lead to suicide cases. To prevent the latter, ubiquitous early detection systems may be effective. Recent studies have sinc...
来源: 评论
Joint Learning of Deep Texture and High-Frequency Features for Computer-Generated Image Detection
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Qiang Jia, Shan Jiang, Xinghao Sun, Tanfeng Wang, Zhe Yan, Hong Department of Electrical Engineering Centre for Intelligent Multidimensional Data Analysis City University of Hong Kong Kowloon Hong Kong State University of New York NY United States School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Department of Advanced Design and Systems Engineering Centre for Intelligent Multidimensional Data Analysis City University of Hong Kong Hong Kong
Distinguishing between computer-generated (CG) and natural photographic (PG) images is of great importance to verify the authenticity and originality of digital images. However, the recent cutting-edge generation meth... 详细信息
来源: 评论
Overview Of Vanet Network Security
Overview Of Vanet Network Security
收藏 引用
International Conference on information Science and Communications Technologies (ICISCT)
作者: Halimjon Khujamatov Amir Lazarev Nurshod Akhmedov Nurbek Asenbaev Aybek Bekturdiev faculty “Computer engineering” Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Data communication networks and systems department Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Information security department Nukus branch of the Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Nukus Uzbekistan
This article provides an overview of the security of VANET, which is a vehicle network. When reviewing this topic, publications of various researchers were considered. The article provides information security require...
来源: 评论