咨询与建议

限定检索结果

文献类型

  • 1,057 篇 期刊文献
  • 957 篇 会议
  • 20 册 图书

馆藏范围

  • 2,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,171 篇 工学
    • 829 篇 计算机科学与技术...
    • 664 篇 软件工程
    • 263 篇 信息与通信工程
    • 173 篇 电气工程
    • 170 篇 控制科学与工程
    • 161 篇 生物工程
    • 129 篇 生物医学工程(可授...
    • 112 篇 光学工程
    • 87 篇 电子科学与技术(可...
    • 72 篇 机械工程
    • 70 篇 网络空间安全
    • 65 篇 仪器科学与技术
    • 56 篇 动力工程及工程热...
    • 52 篇 化学工程与技术
    • 52 篇 安全科学与工程
  • 754 篇 理学
    • 347 篇 数学
    • 227 篇 物理学
    • 198 篇 生物学
    • 128 篇 统计学(可授理学、...
    • 87 篇 化学
    • 53 篇 系统科学
  • 364 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 164 篇 图书情报与档案管...
    • 113 篇 工商管理
  • 174 篇 医学
    • 130 篇 临床医学
    • 102 篇 基础医学(可授医学...
    • 75 篇 公共卫生与预防医...
    • 55 篇 药学(可授医学、理...
  • 70 篇 法学
    • 58 篇 社会学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 41 篇 农学
  • 24 篇 教育学
  • 9 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 85 篇 machine learning
  • 84 篇 accuracy
  • 78 篇 deep learning
  • 78 篇 feature extracti...
  • 70 篇 training
  • 42 篇 artificial intel...
  • 42 篇 data models
  • 42 篇 convolutional ne...
  • 41 篇 semantics
  • 40 篇 computational mo...
  • 39 篇 predictive model...
  • 38 篇 data mining
  • 37 篇 optimization
  • 30 篇 visualization
  • 28 篇 real-time system...
  • 28 篇 security
  • 27 篇 federated learni...
  • 26 篇 measurement
  • 23 篇 support vector m...
  • 23 篇 forecasting

机构

  • 60 篇 shandong provinc...
  • 47 篇 maharishi school...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 43 篇 centre of interd...
  • 31 篇 faculty of data ...
  • 31 篇 department of ar...
  • 28 篇 vishwakarma inst...
  • 28 篇 faculty of infor...
  • 26 篇 graduate school ...
  • 20 篇 faculty of data ...
  • 19 篇 university of ch...
  • 18 篇 faculty of infor...
  • 18 篇 city university ...
  • 17 篇 department of co...
  • 14 篇 hokkaido univers...
  • 14 篇 department of da...
  • 13 篇 education and re...
  • 13 篇 data-driven inte...
  • 13 篇 vivekananda glob...

作者

  • 30 篇 wang hao
  • 24 篇 haseyama miki
  • 23 篇 ogawa takahiro
  • 22 篇 togo ren
  • 21 篇 zhou xiaokang
  • 20 篇 takahiro ogawa
  • 19 篇 miki haseyama
  • 18 篇 ren togo
  • 16 篇 raed alazaidah
  • 14 篇 alazaidah raed
  • 14 篇 mustakim
  • 13 篇 li yuan-fang
  • 13 篇 pan shirui
  • 13 篇 merhof dorit
  • 13 篇 azad reza
  • 12 篇 xiaokang zhou
  • 11 篇 ghassan samara
  • 11 篇 jing zhao
  • 11 篇 maeda keisuke
  • 11 篇 samara ghassan

语言

  • 1,898 篇 英文
  • 127 篇 其他
  • 11 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty Data Science and Information Technology"
2034 条 记 录,以下是131-140 订阅
排序:
PrivBox: Privacy-Preserving Deep Packet Inspection with Dual Double-masking Obfuscated Rule Generation
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Pengfei Ning, Jianting Huang, Xinyi Chen, Rongmao Zhang, Kai Liang, Kaitai Wuhan University School of Cyber Science and Engineering Wuhan China Singapore Management University School of Computing and Information Systems Singapore City University of Macau Faculty of Data Science Macau China Fujian Normal University College of Computer and Cyber Security Fuzhou China Jinan University College of Cyber Security Guangzhou China National University of Defense Technology College of Computer Changsha China Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Netherlands
Many network middleboxes have been deployed to perform deep packet inspection (DPI) over packet payloads. However, such middleboxes cannot accomplish their tasks when the traffic is encrypted. BlindBox (SIGCOMM 2015) ... 详细信息
来源: 评论
Implementation of the OQDS Method for Principal Component Analysis  30th
Implementation of the OQDS Method for Principal Component...
收藏 引用
30th International Conference on Parallel and Distributed Processing Techniques, PDPTA 2024, held as part of the World Congress in Computer science, Computer Engineering and Applied Computing, CSCE 2024
作者: Chiyonobu, Miho Takata, Masami Kimura, Kinji Nakamura, Yoshimasa Graduate School of Humanities and Sciences Nara Women’s University Nara Japan Research Group of Information and Communication Technology for Life Nara Women’s University Nara Japan Faculty of Engineering University of Fukui Fukui Japan Faculty of Data Science Osaka Seikei University Osaka Japan
In this paper, we propose a method for computing partial singular values and the corresponding singular vectors. PCA (Principal Component Analysis) requires only larger singular values and the corresponding singular v... 详细信息
来源: 评论
Fast Computation Method for Stopping Condition of Range Restricted GMRES Method  30th
Fast Computation Method for Stopping Condition of Range Re...
收藏 引用
30th International Conference on Parallel and Distributed Processing Techniques, PDPTA 2024, held as part of the World Congress in Computer science, Computer Engineering and Applied Computing, CSCE 2024
作者: Chiyonobu, Miho Takata, Masami Kimura, Kinji Nakamura, Yoshimasa Graduate School of Humanities and Sciences Nara Women’s University Nara Japan Research Group of Information and Communication Technology for Life Nara Women’s University Nara Japan Faculty of Engineering University of Fukui Fukui Japan Faculty of Data Science Osaka Seikei University Osaka Japan
In this paper, we propose a method for fast computation of the stopping condition of the Range Restricted General Minimum Residual (RRGMRES) method. The RRGMRES method is iterative. As the number of iterations increas... 详细信息
来源: 评论
Broad learning systems: An overview of recent advances, applications, challenges and future directions
收藏 引用
Neurocomputing 2025年 641卷
作者: Chu, Yonghe Guo, Yanlong Ding, Weiping Cao, Heling Ping, Peng School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong226019 China College of Information Science and Engineering Henan University of Technology Zhengzhou450001 China Faculty of Data Science City University of Macau 999078 China School of Transportation and Civil Engineering Nantong University Jiangsu Nantong226001 China
Broad learning system (BLS) as a novel training framework derived from the random vector functional link neural network (RVFLNN). Unlike RVFLNN, which directly applies raw data to network learning, BLS first transform... 详细信息
来源: 评论
Reversible data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Analyzing Students’ Emerging Roles Based on Quantity and Heterogeneity of Individual Contributions in Small Group Online Collaborative Learning Using Bipartite Network Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Feng, Shihui Gibson, David Gašević, Dragan Faculty of Education University of Hong Kong Pok Fu Lam Road Hong Kong Institute of Data Science University of Hong Kong Pok Fu Lam Road Hong Kong Curtin University Perth Australia UNESCO France Faculty of Information Technology Monash University ClaytonVIC Australia
Understanding students’ emerging roles in computer-supported collaborative learning (CSCL) is critical for promoting regulated learning processes and supporting learning at both individual and group levels. However, ... 详细信息
来源: 评论
A Near-Optimal Category information Sampling in RFID Systems
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Wang, Xiujun Liu, Zhi Zhou, Xiaokang Liao, Yong Hu, Han Zheng, Xiao Li, Jie Anhui University of Technology School of Computer Science Ma'anshan243032 China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Ma'anshan243032 China University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182- 8585 Japan Shiga University Faculty of Data Science Hikone522-8522 Japan RIKEN Center for Advanced Intelligence Project Tokyo103-0027 Japan University of Science and Technology of China School of Cyber Science and Technology Hefei China Beijing Institute of Technology School of Information and Electronics Beijing China School of Electronic Information and Electrical Engineering Shanghai200240 China
In many RFID-enabled applications, objects are classified into different categories, and the information associated with each object's category (called category information) is written into the attached tag, allow... 详细信息
来源: 评论
A Study of Deep Learning Models for Identifying and Estimating Psychological Stress and Disorders Using Electroencephalogram Signals
A Study of Deep Learning Models for Identifying and Estimati...
收藏 引用
International Electrical Engineering Congress (iEECON)
作者: R. S. Lakshmi Balaji M. Batumalay Thaweesak Yingthawornsuk Avanthika Swamy Sirimonpak Suwannakhun Department of Advanced Computing Sciences Academy of Maritime Education and Training University (AMET) Chennai India Faculty of Data Science and Information Technology INTI International University Nilai Malaysia Department of Media Technology King Mongkut’s University of Technology Thonburi Bangkok Thailand Compliance Administrator Birmingham City Council United Kingdom Faculty of Industrial Education and Technology King Mongkut’s University of Technology Thonburi Bangkok Thailand
The identification of psychological stress and disorders like panic attacks and anxiety is vital for improving mental health care. This study investigates the use of electroencephalogram (EEG) signals to predict these... 详细信息
来源: 评论
Dynamic Pricing for On-Demand DNN Inference in the Edge-AI Market
arXiv
收藏 引用
arXiv 2025年
作者: Li, Songyuan Hu, Jia Min, Geyong Huang, Haojun Huang, Jiwei Department of Computer Science Faculty of Environment Science and Economy University of Exeter ExeterEX4 4PY United Kingdom School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China Beijing Key Laboratory of Petroleum Data Mining China University of Petroleum Beijing102249 China
The convergence of edge computing and Artificial Intelligence (AI) gives rise to Edge-AI, which enables the deployment of real-time AI applications and services at the network edge. One of the fundamental research iss... 详细信息
来源: 评论
Path optimization method for the sign problem caused by the fermion determinant
收藏 引用
Physical Review D 2025年 第9期111卷 094503-094503页
作者: Kazuki Hisayoshi Kouji Kashiwa Yusuke Namekawa Hayato Takase Department of Computer Science and Engineering Faculty of Information Engineering Fukuoka Institute of Technology Fukuoka 811-0295 Japan Education and Research Center for Artificial Intelligence and Data Innovation Hiroshima University Hiroshima 730-0053 Japan
The path optimization method with machine learning is applied to the one-dimensional massive lattice Thirring model, which has the sign problem caused by the fermion determinant. This study aims to investigate how the...
来源: 评论