咨询与建议

限定检索结果

文献类型

  • 1,791 篇 会议
  • 1,131 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,483 篇 计算机科学与技术...
    • 1,253 篇 软件工程
    • 346 篇 信息与通信工程
    • 283 篇 控制科学与工程
    • 215 篇 生物工程
    • 159 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 145 篇 机械工程
    • 115 篇 光学工程
    • 115 篇 电子科学与技术(可...
    • 70 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 64 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
  • 891 篇 理学
    • 493 篇 数学
    • 243 篇 生物学
    • 225 篇 物理学
    • 154 篇 统计学(可授理学、...
    • 127 篇 系统科学
    • 66 篇 化学
  • 603 篇 管理学
    • 364 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 177 篇 工商管理
  • 166 篇 医学
    • 135 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 71 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 95 篇 法学
    • 78 篇 社会学
  • 67 篇 经济学
    • 67 篇 应用经济学
  • 48 篇 教育学
  • 34 篇 农学
  • 20 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 109 篇 software enginee...
  • 102 篇 computer science
  • 77 篇 machine learning
  • 68 篇 deep learning
  • 63 篇 artificial intel...
  • 59 篇 software
  • 54 篇 computational mo...
  • 52 篇 accuracy
  • 50 篇 feature extracti...
  • 50 篇 training
  • 45 篇 semantics
  • 42 篇 information tech...
  • 40 篇 optimization
  • 40 篇 data mining
  • 39 篇 predictive model...
  • 37 篇 internet of thin...
  • 35 篇 software testing
  • 34 篇 support vector m...
  • 34 篇 security
  • 31 篇 software systems

机构

  • 47 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...
  • 13 篇 faculty of infor...

作者

  • 38 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 18 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 du bo
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,867 篇 英文
  • 88 篇 其他
  • 23 篇 中文
  • 3 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2980 条 记 录,以下是81-90 订阅
排序:
A Blockchain-Based Distributed Collaborative Sensing and Spectrum Access Approach for Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Peng, Yuhuai Li, Yuan Guo, Yu Zhang, Dawei Khan, Fazlullah Alturki, Ryan Alshawi, Bandar Northeastern University College of Computer Science and Engineering Shenyang110819 China Zhiyuan Research Institute Xihu District Hangzhou China Zhengzhou University School of Computer and Artificial Intelligence Henan Zhengzhou450001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China KKR and KSR Institute of Technology and Sciences Department of Computer Science and Engineering Andhra Pradesh Guntur India Division of Research and Development Lovely Professional University Phagwara India University Centre of Research and Development Chandigarh University Mohali India Umm Al-Qura University Department of Software Engineering College of Computing Makkah Saudi Arabia Umm Al-Qura University College of Computing Department of Computer and Network Engineering Makkah Saudi Arabia
Cognitive radio (CR) provides key technical support for the seamless communication of consumer electronic (CE) devices through distributed cooperative sensing and spectrum access. However, its openness and dynamic nat... 详细信息
来源: 评论
Tensor-Based Factorial Hidden Markov Model for Cyber-Physical-Social Services
收藏 引用
IEEE Transactions on Services Computing 2025年
作者: Lu, Zhixing Yang, Laurence T. Azman, Azreen Zhang, Shunli Zhou, Fang Hainan University School of Computer Science and Technology Hainan China Universiti Putra Malaysia Faculty of Computer Science and Information Technology Serdang Malaysia Zhengzhou University School of Computer and Artificial Intelligence School of Software Engineering Zhengzhou China Huazhong University of Science and Technology School of Computer Science and Technology Huazhong China St. Francis Xavier University Department of Computer Science Canada
With the rapid development and widespread application of information, computer, and communication technologies, Cyber-Physical-Social Systems (CPSS) have gained increasing importance and attention. To enable intellige... 详细信息
来源: 评论
Partially Hidden Policy Attribute-Based Multi-Keyword Searchable Encryption with Verification and Revocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Chen, Liqing Xu, Shiguo Jin, Chunhua Zhang, Hao Weng, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Jiangsu Huai'an223003 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE). However, most... 详细信息
来源: 评论
Modelling distillate output of a solar distiller with eco-friendly wood-based steam generation basin using machine learning model and starling murmuration optimizer
收藏 引用
International Journal of Thermofluids 2025年 27卷
作者: Al-Betar, Mohammed Azmi Muskens, Otto L. Hammoodi, Karrar A. Abd Elaziz, Mohamed Shambour, Qusai Yousef Fraihat, Salam Elsheikh, Ammar H. College of Engineering and Information Technology Ajman University Ajman United Arab Emirates Faculty of Engineering and Physical Sciences University of Southampton Southampton SO17 1BJ United Kingdom College of Engineering University of Al Maarif Al Anbar31001 Iraq Department of Mathematics Faculty of Science Zagazig University Zagazig44519 Egypt Faculty of Computer Science and Engineering Galala University Suez435611 Egypt Software Engineering Department Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman Jordan Department of Production Engineering and Mechanical Design Faculty of Engineering Tanta University Tanta31527 Egypt Faculty of Engineering Pharos University in Alexandria Egypt
Yield augmentation of solar distiller (SD) using low-cost modifications with minimum environmental impacts is highly desirable. In this study, we developed an eco-friendly steam generation device made of carbonized Fi... 详细信息
来源: 评论
Benchmarking Cryptographic Protocols for (IoT) Malware Defence
Benchmarking Cryptographic Protocols for (IoT) Malware Defen...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Khalil Ben Khaled Dönìz Borsos Jozsef Katona Kandó Kalmán Faculty of Electrical Engineering Institute of Microelectronics and Technology Obuda University Budapest Hungary Kándó Kálmán Faculty of Electrical Engineering Institute of Electronics and Communication Systems Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE... 详细信息
来源: 评论
Fused Fuzzy Deep Learning and Information Steganography for Privacy Preservation in Medical Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Chen, Jingxue Zhao, Pengbiao Deng, Erqiang Khan, Fazlullah Alturki, Ryan Alshawi, Bandar Xiong, Hu School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China the School of Computer Science Faculty of Science and Engineering University of Nottingham Ningbo China Zhejiang Ningbo315104 China the KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India the Division of Research and Development Lovely Professional University Phagwara India the University Centre of Research and Development Chandigarh University Mohali India the Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia the Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia
—Medical Consumer Electronics (MCE) have greatly facilitated people’s lives, allowing patients to obtain personal medical information including medical images. These medical images obtained from MCE need to be proce... 详细信息
来源: 评论
Data-Filtered Prediction with Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Hong Kong999077 Hong Kong Beijing University of Technology School of Software Engineering The Faculty of Information Technology Beijing100124 China Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing China CSSC Systems Engineering Research Institute Beijing China Southern Methodist University Department of Computer Science The Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
收藏 引用
Artificial Intelligence Review 2025年 第8期58卷 1-39页
作者: Uddin, Mueen Irshad, Muhammad Saad Kandhro, Irfan Ali Alanazi, Fuhid Ahmed, Fahad Maaz, Muhammad Hussain, Saddam Ullah, Syed Sajid College of Computing and IT University of Doha for Science and Technology Doha24449 Qatar Department of Software Engineering Sindh Madressatul Islam University Karachi Pakistan Department of Computer Science Sindh Madressatul Islam University Karachi Pakistan Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351 Saudi Arabia School of Digital Science Universiti Brunei Darussalam Jalan Tungku LinkBE1410 Brunei GrimstadN-4898 Norway
Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) tec... 详细信息
来源: 评论
Searching for an Accurate Robot Calibration via Improved Levenberg–Marquardt and Radial Basis Function System
收藏 引用
Journal of Field Robotics 2025年 第0期
作者: Li, Zhibin Deng, Xun Chen, Tinghui Yang, Yuhang Chen, Linlin Yang, Xiwen Hu, Zhenzhen Hu, Lun Hu, Pengwei Li, Shuai Luo, Xin Xinjiang Technical Institute of Physics & Chemistry Chinese Academy of Sciences Urumqi China School of Software Engineering Chengdu University of Information Technology Chengdu China Dazhou Key Laboratory of Government Data Security Sichuan University of Arts and Science Dazhou China School of Software Engineering Xinjiang University Urumqi China Faculty of Information Technology and Electrical Engineering University of Oulu Oulu Finland VTT-Technical Research Centre of Finland Oulu Finland College of Computer and Information Science Southwest University Chongqing China
Robots are frequently utilized in manufacturing, aviation, and other industries, which enhance industrial production efficiency and quality. Specifically, robots perform high-precision tasks like welding, assembly and... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论