咨询与建议

限定检索结果

文献类型

  • 11,201 篇 会议
  • 5,227 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,236 篇 工学
    • 8,155 篇 计算机科学与技术...
    • 6,801 篇 软件工程
    • 2,015 篇 信息与通信工程
    • 1,326 篇 控制科学与工程
    • 1,091 篇 生物工程
    • 860 篇 电气工程
    • 726 篇 生物医学工程(可授...
    • 681 篇 机械工程
    • 607 篇 电子科学与技术(可...
    • 550 篇 光学工程
    • 418 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 339 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 317 篇 建筑学
  • 4,524 篇 理学
    • 2,648 篇 数学
    • 1,237 篇 生物学
    • 828 篇 物理学
    • 744 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 351 篇 化学
  • 3,153 篇 管理学
    • 1,915 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 944 篇 工商管理
  • 715 篇 医学
    • 622 篇 临床医学
    • 550 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 486 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 316 篇 教育学
  • 322 篇 经济学
    • 320 篇 应用经济学
  • 175 篇 农学
  • 74 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,014 篇 software enginee...
  • 304 篇 deep learning
  • 303 篇 application soft...
  • 290 篇 computational mo...
  • 268 篇 data mining
  • 248 篇 machine learning
  • 242 篇 computer archite...
  • 225 篇 software
  • 202 篇 software systems
  • 193 篇 accuracy
  • 191 篇 feature extracti...
  • 189 篇 internet of thin...
  • 185 篇 support vector m...
  • 185 篇 training
  • 180 篇 programming
  • 170 篇 educational inst...
  • 169 篇 laboratories
  • 169 篇 optimization
  • 168 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 154 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 107 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 82 篇 department of co...
  • 77 篇 school of inform...
  • 73 篇 department of co...
  • 71 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 school of comput...
  • 52 篇 department of co...
  • 50 篇 school of softwa...
  • 46 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 department of co...
  • 45 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 48 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 20 篇 wang lei
  • 20 篇 fattahi jaouhar

语言

  • 16,058 篇 英文
  • 489 篇 其他
  • 119 篇 中文
  • 7 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16657 条 记 录,以下是161-170 订阅
排序:
Privacy protection and data security in intelligent recommendation systems
收藏 引用
Neural Computing and Applications 2025年 1-18页
作者: Zheng, Donghua Alkawaz, Mohammed Hazim Johar, Md Gapar Md School of Information Technology and Engineering Guangzhou College of Commerce Guangdong Guangzhou511363 China School of Graduate Studies Management and Science University Selangor Shah Alam40100 Malaysia Department of Computer Science College of Education for Pure Science University of Mosul Nineveh Mosul41002 Iraq Software Engineering and Digital Innovation Centre Management and Science University Selangor Shah Alam40100 Malaysia
Data security and privacy have emerged as major areas of study for recommendation systems. This is crucial for enhancing system security given the quick advancement of Internet technology and its increased use. Howeve... 详细信息
来源: 评论
Evaluating Feature Prioritization in a Reduced Feature Set Using Explainable AI for Intracranial Aneurysm Classification
Evaluating Feature Prioritization in a Reduced Feature Set U...
收藏 引用
International Conference on Advancements in Computational sciences (ICACS)
作者: Iram Abdullah Ali Javed Department of Computer Science Air University Kamra Pakistan Department of Software Engineering University of Engineering & Technology Taxila Pakistan
The timely management of an unruptured aneurysm can prevent hemorrhage. Multiple anatomical, morphological, and hemodynamic features associated with an aneurysm can predict the risk of rupture and classify the nature ... 详细信息
来源: 评论
"i look like a gorilla, but don't move like one!": Impact of Avatar-Locomotion Congruence in Virtual Reality
"i look like a gorilla, but don't move like one!": Impact of...
收藏 引用
2025 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VRW 2025
作者: Khan, Omar Nam, Hyeongil Kim, Kangsoo University of Calgary Department of Computer Science Canada University of Calgary Department of Electrical and Software Engineering Canada
As virtual reality (VR) continues to expand, particularly in social VR platforms and immersive gaming, understanding the factors that shape user experience is becoming increasingly important. Avatars and locomotion me... 详细信息
来源: 评论
Ownership Verification for Federated Recommendation
收藏 引用
ACM Transactions on Information Systems 2025年 第3期43卷 1-27页
作者: Enyue Yang Weike Pan Lixin Fan Hanlin Gu Zhitao Li Qiang Yang Zhong Ming College of Computer Science and Software Engineering Shenzhen University Shenzhen China AI Department WeBank Shenzhen China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China and AI Department WeBank Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Technology University Shenzhen China and Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ) Shenzhen China
Most federated learning-based recommender systems allow clients to access a well-trained high-quality model locally, which provides adversaries with the opportunity to infringe the legitimate copyright of the model. I... 详细信息
来源: 评论
A Novel Approach Using Machine Learning for Accurate Detection of DDoS Attack in software Defined Network  2nd
A Novel Approach Using Machine Learning for Accurate Detecti...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Sharma, Hitesh Kumar Choudhury, Tanupriya Kotecha, Ketan Mahdi, Hussain Falih Dutta, Soumi Bhattacharya, Abhishek Sar, Ayan Energy Acres Bidholi Uttarakhand Bidholi India School of Computer Science University of Petroleum and Energy Studies Uttarakhand Dehradun India Pune India Pune India Department of Computer and Software Engineering University of Diyala Baquba Iraq Sister Nivedita University Chakpachuria India
A denial Of Service (DoS) attack is termed an attack when the request-receiving server or network shuts down or becomes inaccessible for service. This kind of attack is caused by flooding the target server or network ... 详细信息
来源: 评论
Decentralized Authentication Scheme Incorporating Reputation and Attribute Signature for Cross-Web3 Applications
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14526-14537页
作者: Song, Xiaoling Xu, Guangxia Huang, Yongfei Liu, Yong Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou510006 China Peng Cheng Laboratory Department of New Networks Shenzhen518000 China Chongqing University of Posts and Telecommunications School of Software Engineering Chongqing400065 China
Driven by Web 3.0, the number of decentralized applications (DAPPs) continues to increase, and the need for decentralized authentication across applications becomes more and more significant. In addition, multi-dimens... 详细信息
来源: 评论
Medical Image Classification with KAN-Integrated Transformers and Dilated Neighborhood Attention
arXiv
收藏 引用
arXiv 2025年
作者: Manzari, Omid Nejati Asgariandehkordi, Hojat Koleilat, Taha Xiao, Yiming Rivaz, Hassan Tehran Iran Department of Electrical and Computer Engineering Concordia University Montreal Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Convolutional networks, transformers, hybrid models, and Mamba-based architectures have demonstrated strong performance across various medical image classification tasks. However, these methods were primarily designed... 详细信息
来源: 评论
A Red/Blue Video Game for Hide&Seek Analysis for Hardware Trojans and the Seeker's Dilemma
A Red/Blue Video Game for Hide&Seek Analysis for Hardware Tr...
收藏 引用
Annual IEEE Systems Conference
作者: Peter Jamieson Obed Amaning-Yeboah Jared Butler Deniz Misirlioglu Riley Taylor Suman Bhunia Department of Electrical and Computer Engineering Miami University Oxford Ohio USA Department of Computer Science and Software Engineering Miami University Oxford Ohio USA
This paper describes our work in creating a video game to analyze the human dynamics of a Hide&Seek game. By harnessing human computation, we use this approach to get insights into how humans in a game Hide&Se... 详细信息
来源: 评论
Tropical Cyclone Intensity Prediction Using Spatio-Temporal Data Fusion
收藏 引用
IEEE Access 2025年 13卷 70095-70104页
作者: Sattar, Kalim Muhammad Saad Missen, Malik Saher, Najia Nawaz Bashir, Rab Zoupash Zahra, Syeda Faheem, Muhammad Rehman Khan, Amjad Department of Information Technology Islamia University of Bahawalpur Bahawalpur63100 Pakistan Department of Software Engineering Islamia University of Bahawalpur Bahawalpur63100 Pakistan Department of Artificial Intelligence Islamia University of Bahawalpur Bahawalpur63100 Pakistan COMSATS University Islamabad Department of Computer Science Vehari Campus Vehari61100 Pakistan Riyadh12435 Saudi Arabia VTT Technical Research Centre of Finland Espoo02150 Finland
Tropical cyclone is a sea storm that causes important life and economic losses in the coastal regions in the tropical zone around the equator of the earth. Tropical cyclone intensity is an important characteristic use... 详细信息
来源: 评论
Breaking the Vault: A Case Study of the 2022 LastPass Data Breach
arXiv
收藏 引用
arXiv 2025年
作者: Gentles, Jessica Fields, Mason Goodman, Garrett Bhunia, Suman Department of Computer Science and Software Engineering Miami University OxfordOH45056 United States
Managing the security of employee work computers has become increasingly important as today’s work model shifts to remote and hybrid work plans. In this paper, we explore the recent 2022 LastPass data breach, in whic... 详细信息
来源: 评论