咨询与建议

限定检索结果

文献类型

  • 509 篇 期刊文献
  • 453 篇 会议
  • 12 册 图书

馆藏范围

  • 974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 515 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 156 篇 信息与通信工程
    • 108 篇 生物工程
    • 77 篇 控制科学与工程
    • 76 篇 电气工程
    • 66 篇 生物医学工程(可授...
    • 65 篇 化学工程与技术
    • 49 篇 机械工程
    • 48 篇 光学工程
    • 37 篇 电子科学与技术(可...
    • 28 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 19 篇 网络空间安全
  • 350 篇 理学
    • 187 篇 数学
    • 118 篇 生物学
    • 74 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 31 篇 化学
    • 31 篇 系统科学
  • 202 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 69 篇 医学
    • 59 篇 临床医学
    • 52 篇 基础医学(可授医学...
    • 36 篇 公共卫生与预防医...
    • 28 篇 药学(可授医学、理...
  • 36 篇 法学
    • 27 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 13 篇 农学
  • 10 篇 教育学
  • 7 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 39 篇 deep learning
  • 35 篇 accuracy
  • 29 篇 machine learning
  • 28 篇 training
  • 27 篇 feature extracti...
  • 23 篇 data models
  • 23 篇 convolutional ne...
  • 21 篇 computational mo...
  • 21 篇 predictive model...
  • 21 篇 federated learni...
  • 19 篇 internet of thin...
  • 18 篇 artificial intel...
  • 15 篇 machine learning...
  • 14 篇 image segmentati...
  • 14 篇 optimization
  • 14 篇 decision making
  • 13 篇 measurement
  • 12 篇 convolution
  • 12 篇 real-time system...
  • 12 篇 semantics

机构

  • 49 篇 college of compu...
  • 34 篇 school of big da...
  • 32 篇 national enginee...
  • 18 篇 school of big da...
  • 17 篇 state key labora...
  • 15 篇 college of compu...
  • 14 篇 school of inform...
  • 13 篇 school of comput...
  • 11 篇 peng cheng labor...
  • 10 篇 department of co...
  • 10 篇 shenzhen univers...
  • 10 篇 school of softwa...
  • 10 篇 college of compu...
  • 9 篇 contribution: da...
  • 9 篇 department of co...
  • 9 篇 university of ch...
  • 9 篇 artificial intel...
  • 9 篇 department of el...
  • 9 篇 department of au...
  • 9 篇 guangdong provin...

作者

  • 16 篇 mahmood khalid
  • 13 篇 shen linlin
  • 12 篇 niyato dusit
  • 12 篇 shamshad salman
  • 11 篇 victor c. m. leu...
  • 11 篇 leung victor c.m...
  • 10 篇 das ashok kumar
  • 9 篇 xiuhua li
  • 9 篇 gao yang
  • 9 篇 leung victor c. ...
  • 9 篇 xiaofei wang
  • 8 篇 sun geng
  • 8 篇 seifedine kadry
  • 8 篇 li xiuhua
  • 8 篇 jungeun kim
  • 8 篇 tian chunwei
  • 8 篇 li jianqiang
  • 7 篇 shi qingjiang
  • 7 篇 qilin fan
  • 7 篇 gao can

语言

  • 872 篇 英文
  • 97 篇 其他
  • 6 篇 中文
检索条件"机构=Department of Software Engineering and Data Science"
974 条 记 录,以下是501-510 订阅
排序:
Systematic Analysis of Deep Learning Model for Vulnerable Code Detection
Systematic Analysis of Deep Learning Model for Vulnerable Co...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Mohammad Taneem Bin Nazim Md Jobair Hossain Faruk Hossain Shahriar Md Abdullah Khan Mohammad Masum Nazmus Sakib Fan Wu Department Computer Science Kennesaw State University USA Department of Software Engineering and Game Development Kennesaw State University USA Department of Information Technology Kennesaw State University USA School of Data Science Kennesaw State University USA Department of Computer Science Tuskegee University USA
software vulnerabilities have become a serious problem with the emergence of new applications that contain potentially vulnerable or malicious code that can compromise the system. The growing volume and complexity of ... 详细信息
来源: 评论
Detection of ARP Spoofing Attack in Healthcare Networks Using a LSTM Model
Detection of ARP Spoofing Attack in Healthcare Networks Usin...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Salam Al-E'mari Yousef Sanjalawe Ghader Kurdi Budoor Allehyani Information Security Department Faculty of Information Technology University of Petra (UoP) Amman Jordan Information Technology Department King Abdullah II School for Information Technology The University of Jordan (UJ) Amman Jordan Department of Data Science College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia
Healthcare networks face significant cybersecurity threats due to their extensive interconnectivity, with Address Resolution Protocol (ARP) spoofing posing a major risk to the confidentiality and integrity of medical ... 详细信息
来源: 评论
Gradient Saliency-aware CutMix for Semi-Supervised Medical Image Segmentation
Gradient Saliency-aware CutMix for Semi-Supervised Medical I...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuxuan Jiang Guobin Zhu Yi Ding Zhen Qin Minghui Pang Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Yibin GREAT Technology Co. Ltd. Yibin China Department of Geriatric General Surgery Sichuan Provincial People’s Hospital Chengdu China
In semi-supervised medical image segmentation, the use of CutMix in the Mean Teacher architecture is considered an effective strong data augmentation strategy. However, we believe that randomly selecting patches from ... 详细信息
来源: 评论
Empowering software Startups with Agile Methods and Practices: A Design science Approach
SSRN
收藏 引用
SSRN 2022年
作者: Gandomani, Taghi Javdani Nafchi, Mina Ziaei Parizi, Reza M. Department of Computer Science Shahrekord University Shahrekord Iran CHB Science and Technology Park Shahrekord Iran Data Science Research Group Department of Computer Science Shahrekord University Shahrekord Iran Department of Software Engineering and Game Development Kennesaw State University MariettaGA30060 United States
In recent years, the number of software startups is increasing rapidly and employing a proper software development methodology in these startups is a concern. Recently, these startups have been using agile software de... 详细信息
来源: 评论
Improved lattice-based CCA2-secure PKE in the standard model
收藏 引用
science China(Information sciences) 2020年 第8期63卷 147-168页
作者: Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Based on the identity-based encryption(IBE) from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12) presented a CCA1-secure public-key encryption(PKE), which has the best known efficiency ... 详细信息
来源: 评论
A Cooperative Co-Evolution Algorithm with Variable-Importance Grouping for Large-Scale Optimization
A Cooperative Co-Evolution Algorithm with Variable-Importanc...
收藏 引用
Congress on Evolutionary Computation
作者: Yongfeng Li Yuze Zhang Lijia Ma Junkai Ji Dugang Liu Victor C. M. Leung Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Laboratory of Artificial Intelligence and Digital Economy Shenzhen China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Cooperative co-evolution (CC) is a promising direction in solving large-scale multiobjective optimization problems (LMOPs). However, most existing methods of grouping decision variables face some difficulties when sea... 详细信息
来源: 评论
Transfer learning architectures with fine-tuning for brain tumor classification using magnetic resonance imaging
收藏 引用
Healthcare Analytics 2023年 4卷 100270-100270页
作者: Islam, Md. Monirul Barua, Prema Rahman, Moshiur Ahammed, Tanvir Akter, Laboni Uddin, Jia Department of Software Engineering Daffodil International University Daffodil Smart City (DSC) Birulia Savar Dhaka 1216 Bangladesh Department of Computer Science and Engineering University of Information Technology and Sciences (UITS) Dhaka 1212 Bangladesh AI and Big Data Department Endicott College Woosong University South Korea
Deep learning methods in artificial intelligence are used for brain tumor diagnosis as they handle a huge amount of data. Compared to computerized tomography (CT), Ultrasound, and X-ray imaging, Magnetic Resonance Ima... 详细信息
来源: 评论
TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xia, Yuanjun Liu, Yining Chen, Jingxue Liang, Yangfan Khan, Fazlullah Alturki, Ryan Wang, Xiaopei Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software School of Computer and Information Security Guilin541004 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325027 China University of Technology School of Mathematical and Physical Sciences SydneyNSW2007 Australia Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems The Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing314001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China Umm AI-Qura University Makkah Department of Software Engineering College of Computing Saudi Arabia Riverside Department of Computer Science and Engineering University of California CA92521 United States
Federated learning (FL) has been widely used for privacy-preserving model updates in Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it remains vulnerable to attacks where adv... 详细信息
来源: 评论
QoE Maximization for Multiple-UAV-Assisted Multi-Access Edge Computing: An Online Joint Optimization Approach
arXiv
收藏 引用
arXiv 2024年
作者: He, Long Sun, Geng Sun, Zemin Wu, Qingqing Kang, Jiawen Niyato, Dusit Han, Zhu Leung, Victor C.M. The College of Computer Science and Technology Jilin University Changchun130012 China The College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore The Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China The School of Automation Guangdong University of Technology Guangzhou510006 China The University of Houston HoustonTX77004 United States The Department of Computer Science and Engineering Kyung Hee University Seoul446701 Korea Republic of The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
In disaster scenarios, conventional terrestrial multi-access edge computing (MEC) paradigms, which rely on fixed infrastructure, may become unavailable due to infrastructure damage. With high-probability line-of-sight... 详细信息
来源: 评论
PEFN: A Patches Enhancement and Hierarchical Fusion Network for Robust Vehicle Re-Identification
收藏 引用
IEEE Internet of Things Journal 2025年
作者: He, Wenying Wang, Feiyu Bai, Yude Xiong, Neal N. Xu, Guangquan Guo, Fei Hebei University of Technology School of Artificial Intelligence Tianjin300401 China Hebei University of Technology Hebei Province Key Laboratory of Big Data Calculation Tianjin300130 China Tiangong University School of Software Tianjin300387 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK74464 United States Tianjin300350 China Central South University School of Computer Science and Engineering Changsha410083 China
Vehicle Re-Identification (Re-ID), which is a significant application in the Internet of Things, aims to accurately retrieve the remaining images of a given vehicle across different cameras views. The improvement in v... 详细信息
来源: 评论