咨询与建议

限定检索结果

文献类型

  • 665 篇 会议
  • 287 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 363 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 133 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 77 篇 电气工程
    • 63 篇 电子科学与技术(可...
    • 54 篇 机械工程
    • 51 篇 生物工程
    • 42 篇 生物医学工程(可授...
    • 35 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 32 篇 光学工程
    • 29 篇 动力工程及工程热...
    • 28 篇 土木工程
    • 21 篇 航空宇航科学与技...
    • 19 篇 建筑学
    • 18 篇 化学工程与技术
  • 263 篇 理学
    • 128 篇 数学
    • 62 篇 物理学
    • 62 篇 系统科学
    • 55 篇 生物学
    • 41 篇 统计学(可授理学、...
  • 137 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 36 篇 医学
    • 36 篇 临床医学
    • 27 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 23 篇 法学
  • 21 篇 经济学
    • 21 篇 应用经济学
  • 19 篇 教育学
    • 19 篇 教育学
  • 5 篇 农学
  • 4 篇 军事学
  • 2 篇 文学

主题

  • 27 篇 software systems
  • 25 篇 wireless sensor ...
  • 23 篇 application soft...
  • 23 篇 computational mo...
  • 20 篇 software enginee...
  • 18 篇 laboratories
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 15 篇 computer science
  • 15 篇 mathematical mod...
  • 15 篇 computer network...
  • 14 篇 control systems
  • 14 篇 topology
  • 14 篇 software
  • 14 篇 artificial intel...
  • 13 篇 computer archite...
  • 13 篇 quality of servi...
  • 13 篇 training
  • 12 篇 sensor systems
  • 12 篇 educational inst...

机构

  • 22 篇 beijing key labo...
  • 22 篇 school of electr...
  • 16 篇 seventh research...
  • 13 篇 college of compu...
  • 12 篇 institute for so...
  • 12 篇 department of el...
  • 11 篇 department of so...
  • 10 篇 department of el...
  • 9 篇 department of el...
  • 9 篇 department of co...
  • 9 篇 institute for so...
  • 8 篇 electrical compu...
  • 8 篇 the applied soft...
  • 7 篇 gamf faculty of ...
  • 6 篇 the college of c...
  • 6 篇 state key labora...
  • 6 篇 department of ap...
  • 6 篇 institute of ele...
  • 5 篇 software systems...
  • 5 篇 department of el...

作者

  • 24 篇 junping du
  • 24 篇 fashan yu
  • 24 篇 yingmin jia
  • 20 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 biswas gautam
  • 13 篇 gautam biswas
  • 13 篇 william c. barot...
  • 11 篇 parashar manish
  • 11 篇 leung victor c.m...
  • 11 篇 thanapong suwana...
  • 10 篇 cattareeya suwan...
  • 9 篇 abhishek dubey
  • 9 篇 ahmed bestoun s.
  • 9 篇 zamli kamal z.
  • 8 篇 ashraf tantawy
  • 7 篇 babiceanu radu f...
  • 7 篇 ilteris demirkir...

语言

  • 926 篇 英文
  • 21 篇 其他
  • 12 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Electrical Computer Software and Systems Engineering"
960 条 记 录,以下是1-10 订阅
排序:
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
Guest Editorial: Special Issue on Human-Machine Fusion Decision-Making for Emergency Handling
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年 22卷 4427-4433页
作者: Wu, Edmond Q. Li, Jianqiang Chen, Guimin Yuce, Mehmet R. Islam, Shafiqul Ser, Javier Del Yu, Hui Liu, Peter Xiaoping Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China College of Computer and Software Engineering Shenzhen University Shenzhen518060 China State Key Laboratory for Manufacturing Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Systems Engineering Monash University MelbourneVIC3800 Australia Xavier University of Louisiana New OrleansLA70125 United States Tecnalia Institute Bizkaia48160 Spain School of Creative Technologies University of Portsmouth PortsmouthPO1 2UP United Kingdom Department of Systems and Computer Engineering Carleton University OttawaONKIS 5B6 Canada
来源: 评论
Deep Learning Model for Analyzing EEG Signal Analysis
收藏 引用
IEEE Access 2025年 13卷 91034-91045页
作者: Gupta, Varun Kumar, Vivek Prince Singh, Saurabh Lee, Young-Seok Ra, In-Ho Department of Electronics and Communication National Institute of Technology Sikkim India National Institute of Technology Department of Electrical and Electronics Engineering Sikkim India Dongguk University Department of Industrial & Systems Engineering Seoul04620 Korea Republic of Woosong University Department of AI and Bigdata Daejeon34606 Korea Republic of Kunsan National University School of Computer & Software Gunsan Korea Republic of Kunsan National University School of Software Gunsan54150 Korea Republic of
To analyze the physiological information within the acquired EEG signal is very cumbersome due to the possibility of several factors, viz. noise and artifacts, complexity of brain dynamics, and inter-subject variabili... 详细信息
来源: 评论
Lightweight and Roubust Key Agreement for Securing IIoT-Driven Flexible Manufacturing systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17197-17209页
作者: Hammad, Muhammad Badshah, Akhtar Almeer, Mohammed A. Waqas, Muhammad Song, Houbing Chen, Sheng Han, Zhu GIK Institute of Engineering Sciences and Technology Faculty of Mechanical Engineering Topi23640 Pakistan University of Malakand Department of Software Engineering Dir Lower18800 Pakistan University of Bahrain Computer Engineering Department College of Information Technology 32038 Bahrain University of Greenwich Faculty of Engineering and Science Centre for Sustainable Cybersecurity United Kingdom Edith Cowan University School of Engineering PerthWA6027 Australia Department of Information Systems BaltimoreMD United States University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of t... 详细信息
来源: 评论
CPDZ: A Credibility-Aware and Privacy-Preserving Data Collection Scheme with Zero-Trust in Next-Generation Crowdsensing Networks
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2183-2199页
作者: Tang, Jianheng Fan, Kejia Yang, Shihao Liu, Anfeng Xiong, Neal N. Song, Houbing Herbert Leung, Victor C. M. Central South University School of Computer Science and Engineering Changsha410083 China Peking University School of Computer Science Beijing100871 China Sul Ross State University Department of Computer Mathematical and Physical Sciences AlpineTX79830 United States Department of Information Systems BaltimoreMD21250 United States Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Next-Generation Crowdsensing Networks (NGCNs) have become increasingly critical for smart cities, where data privacy and quality are pivotal concerns. Traditional trust mechanisms in crowdsensing mainly rely on static... 详细信息
来源: 评论
Toward Understanding Federated Learning over Unreliable Networks
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2025年 3卷 80-97页
作者: Feng, Chenyuan Arafa, Ahmed Chen, Zihan Zhao, Mingxiong Quek, Tony Q. S. Yang, Howard H. EURECOM Department of Communication Biot06410 France University of North Carolina at Charlotte Department of Electrical and Computer Engineering CharlotteNC28223 United States Singapore University of Technology and Design Information Systems Technology and Design Pillar Tampines487372 Singapore Yunnan University Engineering Research Center of Cyberspace National Pilot School of Software Kunming650106 China Zhejiang University ZJU-UIUC Institute Haining314400 China Zhejiang University College of Information Science and Electronic Engineering Hangzhou310007 China University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering ChampaignIL61820 United States
This paper studies the efficiency of training a statistical model among an edge server and multiple clients via Federated Learning (FL) - a machine learning method that preserves data privacy in the training process -... 详细信息
来源: 评论
Adaptive Deep Reinforcement Learning-based Resource Management for Complex Decision Making in Industry Internet of Things Applications  4
Adaptive Deep Reinforcement Learning-based Resource Manageme...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Karne, Niharika Ramagundam, Chandra Shekar Patnala, Ranga Rao Ramagundam, Shashishekhar Tadiboina, Sai Nitisha Sr. Principal Systems Engineer in C&RS Platform Services University of South Alabama Department of Electrical Engineering Masters in Electrical Engineering Amtrak DT United States Software Engineer in Cloud Platform Services City of Philadelphia Pennsylvania United States Vice President Neuberger Berman United States Software Development & Engineering in Content Discovery & AI Troy University Department of Computer Science Masters in Computer Science AL Comcast Montgomery Campus United States Department of Information Technology GEICO - Chevy Chase Chevy ChaseMD20815 United States
An independent industrial system may transform into a connected network through the assistance of Industrial Internet of Things (IIoT). The deployed sensors in the IIoT maintain surveillance of the industrial machiner... 详细信息
来源: 评论
Exploiting the Potential of Self-Supervised Monocular Depth Estimation via Patch-Based Self-Distillation
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18042-18055页
作者: Yu, Ting Pan, Shan Chen, Wei Tian, Zijian Wang, Zehua Yu, F. Richard Leung, Victor C. M. Postdoctoral Research Station China RongTong Academy of Sciences Group Corporation Limited Beijing100022 China China RongTong Artificial Intelligence Research Center Beijing100022 China China University of Mining and Technology School of Artificial Intelligence Beijing100083 China China University of Mining and Technology School of Computer Science and Technology Xuzhou221116 China School of Artificial Intelligence Beijing100083 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada Carleton University Department of Systems and Computer Engineering OttawaONK1S 5B6 Canada Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
Perceiving scene depth and 3D structure is one of the key tasks for Internet of Video Things (IoVT) devices to understand and interact with the environment. Self-supervised monocular depth estimation has demonstrated ... 详细信息
来源: 评论
Design, Modeling and Simulation of Cybercriminal Personality-Based Cyberattack Campaigns  24
Design, Modeling and Simulation of Cybercriminal Personality...
收藏 引用
Proceedings of the Winter Simulation Conference
作者: Jeongkeun Shin Geoffrey B. Dobson L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA and Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA USA
Cybersecurity challenges are inherently complex, characterized by both advanced technical elements and complex aspects of human cognition. Although extensive research has explored how victims' human factors affect...
来源: 评论