咨询与建议

限定检索结果

文献类型

  • 518 篇 期刊文献
  • 462 篇 会议
  • 12 册 图书

馆藏范围

  • 992 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 692 篇 工学
    • 527 篇 计算机科学与技术...
    • 452 篇 软件工程
    • 158 篇 信息与通信工程
    • 109 篇 生物工程
    • 82 篇 控制科学与工程
    • 79 篇 电气工程
    • 69 篇 生物医学工程(可授...
    • 64 篇 化学工程与技术
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 39 篇 电子科学与技术(可...
    • 31 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 20 篇 网络空间安全
  • 352 篇 理学
    • 188 篇 数学
    • 120 篇 生物学
    • 73 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 31 篇 化学
    • 31 篇 系统科学
  • 208 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 89 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 73 篇 医学
    • 61 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 39 篇 公共卫生与预防医...
    • 30 篇 药学(可授医学、理...
  • 36 篇 法学
    • 27 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 13 篇 农学
  • 10 篇 教育学
  • 7 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 44 篇 deep learning
  • 37 篇 accuracy
  • 32 篇 machine learning
  • 27 篇 feature extracti...
  • 27 篇 training
  • 24 篇 data models
  • 23 篇 federated learni...
  • 22 篇 convolutional ne...
  • 21 篇 computational mo...
  • 21 篇 predictive model...
  • 20 篇 internet of thin...
  • 19 篇 artificial intel...
  • 15 篇 machine learning...
  • 14 篇 image segmentati...
  • 14 篇 decision making
  • 13 篇 optimization
  • 13 篇 real-time system...
  • 13 篇 measurement
  • 12 篇 reinforcement le...
  • 12 篇 convolution

机构

  • 49 篇 college of compu...
  • 35 篇 school of big da...
  • 31 篇 national enginee...
  • 18 篇 school of big da...
  • 17 篇 state key labora...
  • 16 篇 school of inform...
  • 16 篇 college of compu...
  • 13 篇 school of comput...
  • 11 篇 peng cheng labor...
  • 10 篇 department of co...
  • 10 篇 shenzhen univers...
  • 10 篇 school of softwa...
  • 10 篇 college of compu...
  • 9 篇 department of co...
  • 9 篇 contribution: da...
  • 9 篇 department of co...
  • 9 篇 university of ch...
  • 9 篇 artificial intel...
  • 9 篇 department of el...
  • 9 篇 department of au...

作者

  • 15 篇 mahmood khalid
  • 13 篇 shen linlin
  • 12 篇 niyato dusit
  • 11 篇 victor c. m. leu...
  • 11 篇 leung victor c.m...
  • 11 篇 shamshad salman
  • 9 篇 xiuhua li
  • 9 篇 gao yang
  • 9 篇 leung victor c. ...
  • 9 篇 xiaofei wang
  • 8 篇 sun geng
  • 8 篇 seifedine kadry
  • 8 篇 das ashok kumar
  • 8 篇 li xiuhua
  • 8 篇 jungeun kim
  • 8 篇 tian chunwei
  • 8 篇 li jianqiang
  • 7 篇 shi qingjiang
  • 7 篇 qilin fan
  • 7 篇 gao can

语言

  • 744 篇 英文
  • 243 篇 其他
  • 8 篇 中文
检索条件"机构=Department of Software Engineering and Data Science"
992 条 记 录,以下是541-550 订阅
排序:
How Deep is Love in LLMs’ Hearts? Exploring Semantic Size in Human-like Cognition
arXiv
收藏 引用
arXiv 2025年
作者: Yao, Yao Yang, Yifei Ma, Xinbei Yang, Dongjie Zhang, Zhuosheng Li, Zuchao Zhao, Hai Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Trusted Data Circulation and Governance in Web3 Shanghai China Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan University Wuhan430072 China
How human cognitive abilities are formed has long captivated researchers. However, a significant challenge lies in developing meaningful methods to measure these complex processes. With the advent of large language mo... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems science & engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Self-Adaptive Visual Background Extraction with Ghost Regions Elimination  6
Self-Adaptive Visual Background Extraction with Ghost Region...
收藏 引用
6th International Conference on Signal and Image Processing, ICSIP 2021
作者: Liu, Ling Liu, Shuai Qu, Zhong Zhou, Dongyang University of Posts and Telecommunications School of Big Data and Software Engineering College of Mobile Telecommunications of Chongqing Chongqing China Chongqing University of Posts and Telecommunications College of Computer Science and Technology Chongqing China University of Posts and Telecommunications College of Mobile Telecommunications of Chongqing Department of Management Engineering Chongqing China
The ViBe (Visual Background Extraction) algorithm uses the first frame to initialize the pixel background model for each pixel, which may introduce the ghost regions in the following video frames. Although ViBe can us... 详细信息
来源: 评论
GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment  5
GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks i...
收藏 引用
5th International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN 2020
作者: Taha, Mohammad Bany Chowdhury, Rasel American University of Madaba Data Science and Artificial Intelligence Department Madaba Jordan University of Quebec Software Engineering and Information Technology Department Montreal Canada
Security of personal data in the e-healthcare has always been challenging issue. The embedded and wearable devices used to collect these personal and critical data of the patients and users are sensitive in nature. At... 详细信息
来源: 评论
software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Software Supply Chain Vulnerabilities Detection in Source Co...
收藏 引用
IEEE International Conference on Big data
作者: Mst Shapna Akter Md Jobair Hossain Faruk Nafisa Anjum Mohammad Masum Hossain Shahriar Nazmus Sakib Akond Rahman Fan Wu Alfredo Cuzzocrea Department of Computer Science Kennesaw State University USA Department of Information Technology Kennesaw State University USA Department of Applied Data Science San Jose State University USA Department of Computer Science and Software Engineering Auburn University USA Department of Computer Science Tuskegee University USA iDEA Lab University of Calabria Rende Italy
The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software... 详细信息
来源: 评论
Multi-objective Aerial IRS-assisted ISAC Optimization via Generative AI-enhanced Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Xie, Wenwen Sun, Geng Wang, Jiacheng Du, Hongyang Kang, Jiawen Huang, Kaibin Leung, Victor C.M. College of Computer Science and Technology Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Department of Electrical and Electronic Engineering The University of Hong Kong 999077 Hong Kong School of Automation Guangdong University of Technology Guangzhou510006 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518115 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical and Computer Engineering The University of British Columbia VancouverV6T 1Z4 Canada
Integrated sensing and communication (ISAC) has garnered substantial research interest owing to its pivotal role in advancing the development of next-generation (6G) wireless networks. However, achieving a performance... 详细信息
来源: 评论
PointCG: Self-supervised Point Cloud Learning via Joint Completion and Generation
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yun Li, Peng Yan, Xuefeng Nan, Liangliang Wang, Bing Chen, Honghua Gong, Lina Zhao, Wei Wei, Mingqiang The School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China The Shenzhen Institute of Research Nanjing University of Aeronautics and Astronautics Shenzhen China The Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Urban Data Science section Delft University of Technology Delft Netherlands The Department of Aeronautical and Aviation Engineering The Hong Kong Polytechnic University Hong Kong
The core of self-supervised point cloud learning lies in setting up appropriate pretext tasks, to construct a pre-training framework that enables the encoder to perceive 3D objects effectively. In this paper, we integ... 详细信息
来源: 评论
Cybersecurity Enhancement in IoT-Enabled Public Health Information Systems Using Deep Learning Techniques
Cybersecurity Enhancement in IoT-Enabled Public Health Infor...
收藏 引用
AI-Driven Smart Healthcare for Society 5.0
作者: Mahesh Kumar Mishra Lalit Mohan Trivedi Mansoor Farooq Divya Nimma Malik Bader Alazzam B Kiran Bala Sr SAP Consultant Delta System and Software Inc Texas USA Department of ASH Moradabad Institute of Technology Moradabad UP India Department of Cybersecurity American University of Bahrain Bahrain PhD in Computational Science University of Southern Mississippi Data Analyst in UMMC USA Faculty of Information Technology Jadara University Irbid Jordan Department of AI & DS K.Ramakrishnan College of Engineering Trichy India
The rising use of IoT devices in Public Health Information Systems (PHIS) has revolutionized the way patient surveillance and record keeping is being done in real-time, but this has exposed systems to serious cybersec... 详细信息
来源: 评论
An Autonomous Mobile Robot Path Planner using Spline Curves and Differential Evolution
An Autonomous Mobile Robot Path Planner using Spline Curves ...
收藏 引用
Latin America Congress on Computational Intelligence (LA-CCI)
作者: Elias José de Rezende Freitas Miri Weiss Cohen Frederico Gadelha Guimarães Graduate Program in Electrical Engineering Universidade Federal de Minas Gerais Av. Antônio Carlos 6627 Belo Horizonte MG Brazil Federal Institute of Minas Gerais IFMG Department of Software Engineering Braude College of Engineering Karmiel Israel Department of Electrical Engineering Machine Intelligence and Data Science Laboratory (MINDS) Universidade Federal de Minas Gerais UFMG Belo Horizonte MG Brazil
Robots that operate autonomously require a path planner that ensures the robot reaches the desired position in a safe manner. The robot will be able to achieve greater speeds along the path if the path is smooth, mini...
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series  19
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Xiong, Zhiying Fan, Qilin Wang, Kai Li, Xiuhua Zhang, Xu Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing China Chongqing University Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing China Harbin Institute of Technology School of Computer Science and Technology Weihai China Harbin Institute of Technology Research Institute of Cyberspace Security Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China University of Exeter Department of Computer Science Exeter United Kingdom
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ... 详细信息
来源: 评论