咨询与建议

限定检索结果

文献类型

  • 1,740 篇 期刊文献
  • 766 篇 会议
  • 24 册 图书

馆藏范围

  • 2,530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,307 篇 工学
    • 771 篇 计算机科学与技术...
    • 621 篇 软件工程
    • 231 篇 信息与通信工程
    • 178 篇 生物工程
    • 157 篇 电气工程
    • 157 篇 生物医学工程(可授...
    • 156 篇 控制科学与工程
    • 132 篇 核科学与技术
    • 116 篇 光学工程
    • 109 篇 化学工程与技术
    • 102 篇 电子科学与技术(可...
    • 55 篇 机械工程
    • 47 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 39 篇 网络空间安全
  • 1,242 篇 理学
    • 664 篇 物理学
    • 370 篇 数学
    • 252 篇 生物学
    • 141 篇 统计学(可授理学、...
    • 140 篇 化学
    • 64 篇 系统科学
  • 314 篇 管理学
    • 173 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 97 篇 工商管理
  • 243 篇 医学
    • 196 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 79 篇 公共卫生与预防医...
    • 72 篇 药学(可授医学、理...
  • 70 篇 法学
    • 55 篇 社会学
  • 49 篇 农学
  • 40 篇 经济学
    • 40 篇 应用经济学
  • 30 篇 教育学
  • 5 篇 文学
  • 5 篇 艺术学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 155 篇 hadron colliders
  • 76 篇 hadrons
  • 61 篇 deep learning
  • 61 篇 machine learning
  • 51 篇 accuracy
  • 48 篇 semantics
  • 46 篇 hadronic decays
  • 44 篇 artificial intel...
  • 41 篇 bottom mesons
  • 38 篇 feature extracti...
  • 37 篇 branching fracti...
  • 35 篇 training
  • 34 篇 particle decays
  • 32 篇 data models
  • 31 篇 w & z bosons
  • 29 篇 computational mo...
  • 26 篇 leptonic, semile...
  • 26 篇 predictive model...
  • 26 篇 visualization
  • 25 篇 flavor changing ...

机构

  • 418 篇 department of ph...
  • 390 篇 iccub universita...
  • 371 篇 horia hulubei na...
  • 363 篇 h.h. wills physi...
  • 354 篇 van swinderen in...
  • 353 篇 university of ch...
  • 352 篇 cavendish labora...
  • 351 篇 school of physic...
  • 342 篇 department of ph...
  • 342 篇 imperial college...
  • 336 篇 center for high ...
  • 335 篇 stfc rutherford ...
  • 334 篇 yandex school of...
  • 331 篇 institute of par...
  • 326 篇 infn sezione di ...
  • 315 篇 henryk niewodnic...
  • 312 篇 infn sezione di ...
  • 309 篇 nikhef national ...
  • 297 篇 physik-institut ...
  • 297 篇 oliver lodge lab...

作者

  • 236 篇 beiter a.
  • 218 篇 barter w.
  • 214 篇 bellee v.
  • 199 篇 casse g.
  • 195 篇 bowcock t.j.v.
  • 193 篇 blake t.
  • 191 篇 borsato m.
  • 190 篇 betancourt c.
  • 190 篇 bediaga i.
  • 190 篇 amato s.
  • 190 篇 boettcher t.
  • 186 篇 braun s.
  • 185 篇 baryshnikov f.
  • 185 篇 borisyak m.
  • 183 篇 bizzeti a.
  • 180 篇 bencivenni g.
  • 179 篇 brundu d.
  • 176 篇 back j.j.
  • 176 篇 bay a.
  • 176 篇 bursche a.

语言

  • 2,359 篇 英文
  • 156 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Science and Research Network Data Science"
2530 条 记 录,以下是71-80 订阅
排序:
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Privacy-Preserving Responsible Gaming Systems  2
Privacy-Preserving Responsible Gaming Systems
收藏 引用
2nd International Conference on Big data and Privacy Computing, BDPC 2024
作者: Zhu, Yizhao Chen, Lanxiang City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Responsible gaming aims at maintaining the integrity and sustainability of the gaming industry. However, The exchange of sensitive data, such as player and gaming related information, among different parties raises si... 详细信息
来源: 评论
A Novel Hybrid Approach-Based on Heartbeat and Accelerometer Signals for Enhanced Security in WBSNs
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10295-10308页
作者: Yan, Guixiang Zhang, Guanghe Liu, Fanghua Williams Samuel, Oluwarotimi Aborokbah, Majed Guo, Jiquan Zhu, Liqing Wei, Sikang Jiangxi Normal University School of Computer and Information Engineering Nanchang330022 China University of Derby School of Computing and Data Science Research Centre DerbyDE22 3AW United Kingdom INTI International University Faculty of Data Science and Information Technology Nilai71800 Malaysia University of Tabuk Faculty of Computers and Information Technology Tabuk71491 Saudi Arabia Jiangxi Normal University School of Digital Industry Shangrao334000 China
In wireless body sensor networks (WBSNs), ensuring secure and efficient key distribution is critical, particularly given the limited computational and energy resources of the sensors. Existing methods often struggle t... 详细信息
来源: 评论
Crossfire: An Elastic Defense Framework for Graph Neural networks under Bit Flip Attacks
arXiv
收藏 引用
arXiv 2025年
作者: Kummer, Lorenz Moustafa, Samir Gansterer, Wilfried N. Kriege, Nils Faculty of Computer Science University of Vienna Vienna Austria Doctoral School Computer Science University of Vienna Vienna Austria Research Network Data Science University of Vienna Vienna Austria
Bit Flip Attacks (BFAs) are a well-established class of adversarial attacks, originally developed for Convolutional Neural networks within the computer vision domain. Most recently, these attacks have been extended to... 详细信息
来源: 评论
IMGTP: A Unified Framework for Improving and Measuring the Generalizability of Trajectory Prediction Models
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-15页
作者: Ye, Luyao Zhou, Zikang Wang, Jianping Li, Yung-Hui Jan, Nien-Yi Lin, Yi-Rong Lin, Yen-Cheng National Engineering Research Center of Educational Big Data and the Faculty of Artificial Intelligence in Education Central China Normal University China Department of Computer Science City University of Hong Kong and City University of Hong Kong Shenzhen Research Institute China AI Research Center of Hon Hai Research Institute China
Accurately predicting nearby agents' future trajectories is fundamental for ensuring the safety and efficiency of autonomous driving. However, existing learning-based trajectory prediction models struggle with poo... 详细信息
来源: 评论
Crossfire: An Elastic Defense Framework for Graph Neural networks Under Bit Flip Attacks  39
Crossfire: An Elastic Defense Framework for Graph Neural Net...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Kummer, Lorenz Moustafa, Samir Gansterer, Wilfried Kriege, Nils Faculty of Computer Science University of Vienna Vienna Austria Doctoral School Computer Science University of Vienna Vienna Austria Research Network Data Science University of Vienna Vienna Austria
Bit Flip Attacks (BFAs) are a well-established class of adversarial attacks, originally developed for Convolutional Neural networks within the computer vision domain. Most recently, these attacks have been extended to... 详细信息
来源: 评论
Implementation of Face Patterns and Smile Recognition for Intelligent Class Attendance Systems  6
Implementation of Face Patterns and Smile Recognition for In...
收藏 引用
6th International Conference on computer and Informatics Engineering, IC2IE 2023
作者: Miftakhurrokhmat Suparyanto, Teddy Elwirehardja, Gregorius Natanael Karimah, Shofiyati Nur Pardamean, Bens Bina Nusantara University Bioinformatics and Data Science Research Center Jakarta Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia Universitas Amikom Yogyakarta Faculty of Computer Science Department of Informatics Yogyakarta Indonesia Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia
Students 'attendance in class is one important success parameter in face-to-face learning processes. Conventional attendance systems, such as paper-based attendance sheets or identity card systems, require a long ... 详细信息
来源: 评论
Uncovering the Hidden Insights of the Government AI Readiness Index: Application of Fuzzy LMAW and Schweizer-Sklar Weighted Framework
Decision Making: Applications in Management and Engineering
收藏 引用
Decision Making: Applications in Management and Engineering 2024年 第2期7卷 443-468页
作者: Nasution, Mahyuddin K. M. Elveny, Marischa Pamucar, Dragan Popovic, Milena Gušavac, Bisera Andric Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan20155 Indonesia Data Science & Artificial Intelligence Fasilkom-TI Universitas Sumatera Utara Medan20155 Indonesia University of Belgrade Faculty of Organizational Science Department of Operations Research and Statistics Jove Ilica 154 Belgrade Serbia Department of Mechanics and Mathematics Western Caspian University Baku Azerbaijan School of Engineering and Technology Sunway University Selangor Malaysia
There is considerable promising in artificial intelligence (AI) and algorithms, with governments worldwide increasingly investing in this transformative technology. The potential benefits include improved performance,... 详细信息
来源: 评论
A Review on the Role of Blockchain Technology for Decentralized Identity Management: A Future Without Passwords  4
A Review on the Role of Blockchain Technology for Decentrali...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Raut, Rohini Gourshettiwar, Palash Thakre, Gayatri Datta Meghe Institute of Higher Education and Research Faculty of Engineering and Technology Department of Artificial Intelligence and Data Science Maharashtra Wardha442001 India Datta Meghe Institute of Higher Education and Research Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India
Advanced identity mechanisms are essential for secure client-identifiable proof in the unambiguously computerized world. Because the board frameworks rely on aggregated databases, fraud, data breaches, and unauthorize... 详细信息
来源: 评论
The role of data governance in a high-level approach of data migration to open data
收藏 引用
Business Information Review 2024年 第3期41卷 94-103页
作者: Yulfitri, Alivia Sensuse, Dana Indra Sumirat Hidayat, Deden Suryono, Ryan Randy Kautsarina Purwaningsih, Erisva Hakiki Prabuwono, Anton Satria Faculty of Computer Science Universitas Indonesia Depok Indonesia Faculty of Computer Science Universitas Esa Unggul West Jakarta Indonesia Research Center for Data and Information Sciences National Research and Innovation Agency (BRIN) Central Jakarta and Bandung Indonesia Faculty of Engineering and Computer Science Universitas Teknokrat Indonesia Lampung Indonesia Information and Communications Technology Human Resources Development Agency Ministry of Communication and Information Technology of the Republic of Indonesia Jakarta Central Jakarta Indonesia Faculty of Computing and Information Technology in Rabigh King Abdulaziz University Jeddah Saudi Arabia
data quality issues are still a challenge in data migration. Existing methods mainly focus on technical issues. However, the problem of data quality is not only a technical problem, but the main one is the non-technic... 详细信息
来源: 评论