咨询与建议

限定检索结果

文献类型

  • 677 篇 期刊文献
  • 439 篇 会议
  • 13 册 图书

馆藏范围

  • 1,129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 636 篇 工学
    • 466 篇 计算机科学与技术...
    • 381 篇 软件工程
    • 132 篇 信息与通信工程
    • 102 篇 电气工程
    • 92 篇 生物工程
    • 83 篇 生物医学工程(可授...
    • 74 篇 控制科学与工程
    • 72 篇 光学工程
    • 62 篇 电子科学与技术(可...
    • 50 篇 机械工程
    • 30 篇 网络空间安全
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 25 篇 安全科学与工程
    • 23 篇 动力工程及工程热...
  • 453 篇 理学
    • 177 篇 物理学
    • 176 篇 数学
    • 122 篇 生物学
    • 79 篇 统计学(可授理学、...
    • 35 篇 地球物理学
    • 31 篇 系统科学
  • 188 篇 管理学
    • 115 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 110 篇 医学
    • 91 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
    • 33 篇 药学(可授医学、理...
  • 37 篇 法学
    • 31 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 教育学
  • 17 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 45 篇 accuracy
  • 43 篇 machine learning
  • 41 篇 deep learning
  • 31 篇 feature extracti...
  • 27 篇 computational mo...
  • 26 篇 semantics
  • 24 篇 artificial intel...
  • 23 篇 convolutional ne...
  • 22 篇 training
  • 20 篇 neural networks
  • 20 篇 real-time system...
  • 18 篇 predictive model...
  • 17 篇 data models
  • 16 篇 visualization
  • 16 篇 federated learni...
  • 15 篇 internet of thin...
  • 15 篇 contrastive lear...
  • 14 篇 optimization
  • 13 篇 data mining
  • 13 篇 security

机构

  • 60 篇 shandong provinc...
  • 49 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 20 篇 department of ph...
  • 20 篇 hiroshima astrop...
  • 19 篇 faculty of data ...
  • 19 篇 department of ph...
  • 16 篇 college of compu...
  • 15 篇 dipartimento di ...
  • 15 篇 shandong fundame...
  • 14 篇 dipartimento di ...
  • 14 篇 deutsches elektr...
  • 14 篇 w. w. hansen exp...
  • 14 篇 istituto naziona...
  • 14 篇 istituto naziona...
  • 14 篇 nasa goddard spa...
  • 13 篇 department of ph...
  • 13 篇 science institut...
  • 13 篇 max-planck-insti...
  • 13 篇 city university ...

作者

  • 15 篇 niyato dusit
  • 15 篇 gargano f.
  • 14 篇 bastieri d.
  • 14 篇 sgrò c.
  • 14 篇 lubrano p.
  • 14 篇 spinelli p.
  • 14 篇 kuss m.
  • 13 篇 ajello m.
  • 13 篇 green d.
  • 13 篇 orlando e.
  • 13 篇 nuss e.
  • 13 篇 torres d.f.
  • 13 篇 giroletti m.
  • 12 篇 monzani m.e.
  • 12 篇 cameron r.a.
  • 12 篇 siskind e.j.
  • 12 篇 morselli a.
  • 12 篇 reimer o.
  • 12 篇 mizuno t.
  • 12 篇 piron f.

语言

  • 1,047 篇 英文
  • 77 篇 其他
  • 4 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computing and Data Science"
1129 条 记 录,以下是111-120 订阅
排序:
Lightweight Authenticated Task Offloading in 6G-Cloud Vehicular Twin Networks
Lightweight Authenticated Task Offloading in 6G-Cloud Vehicu...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Sarah Al–Shareeda Fusun Ozguner Keith Redmill Trung Q. Duong Berk Canberk Electrical and Computer Engineering Department Center for Automotive Research (CAR) The Ohio State University USA BTS Group Turkey Department of AI and Data Engineering Istanbul Technical University Turkey School of Electronics Electrical Engineering and Computer Science Queen's University Belfast UK Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John's NL Canada School of Computing Engineering and The Built Environment Edinburgh Napier University UK
Task offloading management in 6G vehicular net-works is crucial for maintaining network efficiency, particularly as vehicles generate substantial data. Integrating secure communication through authentication introduce... 详细信息
来源: 评论
Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第8期11卷 1757-1776页
作者: Minfeng Qi Ziyuan Wang Qing-Long Han Jun Zhang Shiping Chen Yang Xiang School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyHawthorn3122VictoriaAustralia Faculty of Data Science City University of MacaoMacaoChina CSIRO Data61 SydneyNew South WalesAustralia
To enable precision medicine and remote patient monitoring,internet of healthcare things(IoHT)has gained significant interest as a promising *** the widespread use of IoHT,nonetheless,privacy infringements such as IoH... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Reducing the clustering challenge in the IoT using two disjoint convex hulls
收藏 引用
Scientific Reports 2025年 第1期15卷 1-10页
作者: Li, Huxiong Sadeghi Bigham, Bahram Gheisari, Mehdi Karamoozian, Aminreza Sun, Panjun Wan, Yi Institute of Artificial Intelligence Shaoxing University Zhejiang China Department of Computer Science Faculty of Mathematical Sciences Alzahra University Tehran Iran Department of computer science and Engineering Saveetha School of engineering Saveetha Institute of Medical and Technical Science Tamil Nadu India Department of Computer Engineering Shiraz Branch Islamic Azad University Shiraz Iran Department of R & D Shenzhen BKD Co LTD Shenzhen China Centre for Augmented Intelligence and Data Science School of Computing University of South Africa Johannesburg South Africa
Accurate clustering of IoT devices is a promising challenge. We have observed that a few studies have been performed to address this challenge. However, they are expensive or do not shape accurate clustering. To fill ... 详细信息
来源: 评论
Subspace learning using low-rank latent representation learning and perturbation theorem: Unsupervised gene selection
收藏 引用
Computers in Biology and Medicine 2025年 185卷 109567-109567页
作者: Moslemi, Amir Naeini, Fariborz Baghaei Department of Physics Toronto Metropolitan University ON Canada School of Software Design & Data Science Seneca Polytechnic TorontoONM4N 3M5 Canada Physical Sciences Sunnybrook Health Sciences Centre TorontoONM4N 3M5 Canada Faculty of Engineering Computing and the Environment Kingston University Penrhyn Road Campus Kingston Upon Thames LondonKT1 2EE United Kingdom
In recent years, gene expression data analysis has gained growing significance in the fields of machine learning and computational biology. Typically, microarray gene datasets exhibit a scenario where the number of fe... 详细信息
来源: 评论
Deep Graph Reinforcement Learning for UAV-Enabled Multi-User Secure Communications
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Tang, Xiao Zhao, Kexin Shen, Chao Du, Qinghe Wang, Yichen Niyato, Dusit Han, Zhu Research & Development Institute Northwestern Polytechnical University Shenzhen518063 China National Key Laboratory of Wireless Communications Chengdu611731 China State Key Laboratory of Intelligent Game Taicang215400 China Northwestern Polytechinical University School of Electronics and Information Xi'an710072 China Xi'an Jiaotong University Faculty of Electronics and Information Engineering Xi'an710049 China Nanyang Technological University College of Computing and Data Science Singapore University of Houston Department of Electrical and Computer Engineering Houston77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
While unmanned aerial vehicles (UAVs) with flexible mobility are envisioned to enhance physical layer security in wireless communications, the efficient security design that adapts to such high network dynamics is rat... 详细信息
来源: 评论
Harnessing optimization with deep learning approach on intelligent transportation system for anomaly detection in pedestrian walkways
收藏 引用
Scientific Reports 2025年 第1期15卷 1-28页
作者: Alotaibi, Sultan Refa Alrayes, Fatma S. Maashi, Mashael Maray, Mohammed Alliheedi, Mohammed A. Badawood, Donia Alotaibi, Moneerah Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University PO Box 84428 Riyadh 11671 Saudi Arabia Department of Software Engineering College of Computer and Information Sciences King Saud University PO Box 103786 Riyadh 11543 Saudi Arabia Department of Information Systems College of Computer Science King Khalid University Abha Saudi Arabia Department of Computing Faculty of Computing and Information Al-Baha University Al Baha Saudi Arabia Department of Data Science School of Computers Umm Al-Qura University Makkah Saudi Arabia
Anomaly Detection (AD) in pedestrian walkways is significant in urban safety and security methods. It is generally employed for perceiving unusual or abnormal situations, behaviours, or actions in regions devoted to p... 详细信息
来源: 评论
A hybrid TwinSVM-HHO model for multilingual spam review detection using sentiment features and pre-trained embeddings
收藏 引用
Expert Systems with Applications 2025年 287卷
作者: Al-Zoubi, Ala’ M. Mora, Antonio M. Faris, Hossam Qaddoura, Raneem Department of Artificial Intelligence and Data Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Signal Theory Telematics and Communications ETSIIT and CITIC University of Granada Granada Spain King Abdullah II School for Information Technology The University of Jordan Amman Jordan Research Centre for Information and Communications Technologies of the University of Granada (CITIC-UGR) University of Granada Granada 18010 Spain School of Computing and Informatics Al Hussein Technical University Amman Jordan
The detection of spam reviews in multilingual environments remains a challenging task due to linguistic diversity, data imbalance, and semantic complexity. This paper proposes a novel hybrid model that integrates Twin... 详细信息
来源: 评论
RAKG:Document-level Retrieval Augmented Knowledge Graph Construction
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Hairong Si, Jiaheng Yan, Guohang Qi, Boyuan Cai, Pinlong Mao, Song Wang, Ding Shi, Botian Shanghai Artificial Intelligence Laboratory China School of Statistics and Data Science Nankai University Tianjin China Faculty of Computing Harbin Institute of Technology China Computer School Beijing Information Science and Technology University China
With the rise of knowledge graph based retrieval-augmented generation (RAG) techniques such as GraphRAG and Pike-RAG, the role of knowledge graphs in enhancing the reasoning capabilities of large language models (LLMs... 详细信息
来源: 评论