咨询与建议

限定检索结果

文献类型

  • 1,971 篇 会议
  • 1,256 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,077 篇 工学
    • 1,644 篇 计算机科学与技术...
    • 1,376 篇 软件工程
    • 401 篇 信息与通信工程
    • 327 篇 控制科学与工程
    • 226 篇 生物工程
    • 191 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 156 篇 机械工程
    • 132 篇 电子科学与技术(可...
    • 126 篇 光学工程
    • 87 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 82 篇 网络空间安全
    • 78 篇 仪器科学与技术
    • 75 篇 化学工程与技术
  • 965 篇 理学
    • 532 篇 数学
    • 251 篇 生物学
    • 241 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 73 篇 化学
  • 675 篇 管理学
    • 413 篇 管理科学与工程(可...
    • 286 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 186 篇 医学
    • 152 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 87 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 113 篇 法学
    • 88 篇 社会学
  • 77 篇 经济学
    • 76 篇 应用经济学
  • 54 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 97 篇 deep learning
  • 93 篇 machine learning
  • 73 篇 accuracy
  • 68 篇 artificial intel...
  • 67 篇 software
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 56 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 49 篇 predictive model...
  • 47 篇 security
  • 46 篇 semantics
  • 44 篇 data mining
  • 43 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 ghassan samara

语言

  • 2,767 篇 英文
  • 492 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3285 条 记 录,以下是1101-1110 订阅
排序:
Neurocomputational Modelling of EEG Connectivity: Links Between Depression, Inflammation, and Gut-Microbiome  17th
Neurocomputational Modelling of EEG Connectivity: Links Betw...
收藏 引用
17th International Conference on Brain Informatics, BI 2024
作者: Doborjeh, Zohreh lavin, Daniel Hunter, Kirsty Heym, Nadja Heasman, Bryony Doborjeh, Maryam Kasabov, Nikola Gibson, Glen Sumich, Alexander School of Engineering Computer and Mathematical Sciences Knowledge Engineering and Discovery Research Institute Auckland University of Technology Auckland New Zealand School of Population Health Faculty of Medical and Health Sciences The University of Auckland Auckland New Zealand Department of Sport Science School of Science and Technology Nottingham Trent University Nottingham United Kingdom NTU Psychology School of Social Sciences Nottingham Trent University Nottingham United Kingdom School of Software Engineering Dalian University Dalian China Institute for Information and Communication Technologies Bulgarian Academy of Sciences Sofia Bulgaria Department of Food and Nutritional Sciences The University of Reading Whiteknights Reading United Kingdom Department of Psychology and Neuroscience Auckland University of Technology Auckland New Zealand
The immune and enteric systems have been implicated in psychopathology, including depressive disorders. However, the precise neurocognitive mechanisms remain unclear. The present study uses Brain-Inspired Spiking Neur... 详细信息
来源: 评论
DeepRicci: Self-supervised Graph Structure-Feature Co-Refinement for Alleviating Over-squashing
DeepRicci: Self-supervised Graph Structure-Feature Co-Refine...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Li Sun Zhenhao Huang Hua Wu Junda Ye Hao Peng Zhengtao Yu Philip S. Yu School of Control and Computer Engineering North China Electric Power University Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China Department of Computer Science University of Illinois at Chicago IL USA
Graph Neural Networks (GNNs) have shown great power for learning and mining on graphs, and Graph Structure Learning (GSL) plays an important role in boosting GNNs with a refined graph. In the literature, most GSL solu...
来源: 评论
Using Orthogonal Signals to Hide Information in Images  4
Using Orthogonal Signals to Hide Information in Images
收藏 引用
4th IEEE International Conference on Advanced Information and Communication Technologies, AICT 2021
作者: Kuznetsov, Alexandr Lokotkova, Iryna Smirnov, Oleksii Kuznetsova, Tetiana Florov, Serhii Lebid, Oksana Vn Karazin Kharkiv National University Department of Information Systems and Technologies Security Kharkiv Ukraine Central Ukrainian National Technical University Cybersecurity and Software Academic Department Kropivnitskiy Ukraine Dnipro University of Technology Department of Information Security and Telecommunications Dnipro Ukraine University of Customs and Finance Department of Computer Science and Software Engineering Dnipro Ukraine
Spread-Spectrum Steganography (SSS) technology is used to hide information messages in image containers. For this purpose, propagating discrete signals are used, in specially formed pseudo-random sequences (PRS) with ... 详细信息
来源: 评论
PUBLICLY VERIFIABLE SECRET SHARING: GENERIC CONSTRUCTIONS AND LATTICE-BASED INSTANTIATIONS IN THE STANDARD MODEL
arXiv
收藏 引用
arXiv 2025年
作者: Minh, Pham Nhat Nguyen, Khoa Susilo, Willy Nguyen-An, Khuong Department of Computer Science Faculty of Computer Science and Engineering 268 Ly Thuong Kiet Street District 10 Ho Chi Minh City740500 Viet Nam Vietnam National University Ho Chi Minh City Linh Trung Ward Thu Duc City Ho Chi Minh City721400 Viet Nam Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2500 Australia
Publicly verifiable secret sharing (PVSS) allows a dealer to share a secret among a set of shareholders so that the secret can be reconstructed later from any set of qualified participants. In addition, any public ver... 详细信息
来源: 评论
Dual-View Pyramid Pooling in Deep Neural Networks for Improved Medical Image Classification and Confidence Calibration
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiaoqing Nie, Qiushi Xiao, Zunjie Zhao, Jilu Wu, Xiao Guo, Pengxin Li, Runzhi Liu, Jin Wei, Yanjie Pan, Yi Center for High Performance Computing Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen518055 China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China Department of Statistics and Actuarial Science The University of Hong Kong 999077 Hong Kong Cooperative Innovation Center of Internet Healthcare Zhengzhou University Zhengzhou450001 China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha410083 China Xinjiang Engineering Research Center of Big Data and Intelligent Software School of software Xinjiang University Wulumuqi830046 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen China
Spatial pooling (SP) and cross-channel pooling (CCP) operators have been applied to aggregate spatial features and pixel-wise features from feature maps in deep neural networks (DNNs), respectively. Their main goal is... 详细信息
来源: 评论
Access Control Based on Self-Sovereign Identity
Access Control Based on Self-Sovereign Identity
收藏 引用
International Conference on Electronics, computers and Artificial Intelligence (ECAI)
作者: Stefania Loredana Nita Marius Iulian Mihailescu Valentina Marascu Marius Rogobete Department of Computers and Cybersecurity Faculty of Information Systems and Cyber Security Military Technical Academy “Ferdinand I” Bucharest Romania Scientific Research Center in Mathematics and Informatics Faculty of Engineering and Computer Science “Spiru Haret” University Bucharest Romania Low Temperature Plasma Department National Institute for Laser Plasma and Radiation Physics Bucharest Romania Telematics Harman International Bucharest Romania
In the rapidly growing interest in digital identity management, there is an important shift toward adopting verifiable credentials, often based on blockchain technology. This transition highlights a growing interest i... 详细信息
来源: 评论
The applications of machine learning techniques in medical data processing based on distributed computing and the Internet of Things
收藏 引用
computer Methods and Programs in Biomedicine 2023年 第1期241卷 107745-107745页
作者: Aminizadeh, Sarina Heidari, Arash Toumaj, Shiva Darbandi, Mehdi Navimipour, Nima Jafari Rezaei, Mahsa Talebi, Samira Azad, Poupak Unal, Mehmet Medical Faculty of Islamic Azad University of Tabriz Tabriz Iran Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Software Engineering Haliç University Istanbul Turkey Urmia University of Medical Sciences Urmia Iran Department of Electrical and Electronic Engineering Eastern Mediterranean University Gazimagusa99628 Turkey Department of Computer Engineering Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Yunlin Douliou64002 Taiwan Tabriz University of Medical Sciences Faculty of Surgery Tabriz Iran Department of Computer Science University of Texas at San Antonio TX United States Department of Computer Science University of Manitoba Winnipeg Canada Department of Computer Engineering Nisantasi University Istanbul Turkey
Medical data processing has grown into a prominent topic in the latest decades with the primary goal of maintaining patient data via new information technologies, including the Internet of Things (IoT) and sensor tech... 详细信息
来源: 评论
Conventional/Phase Shift Dual Drive Mach-Zehnder Modulation Measured Type Based Radio over Fiber Systems
收藏 引用
Journal of Optical Communications 2024年 第s1期45卷 s123-s131页
作者: Amiri, I.S. Rashed, Ahmed Nabih Zaki Rahman, Ziaur Paul, Bikash Kumar Ahmed, Kawsar Computational Optics Research Group Advanced Institute of Materials Science Ton Duc Thang University Ho Chi Minh City Viet Nam Faculty of Applied Sciences Ton Duc Thang University Ho Chi Minh City Viet Nam Electronics and Electrical Communications Engineering Department Faculty of Electronic Engineering Menoufia University Menouf32951 Egypt School of Computer Science and Software Engineering RMIT University 414-418 Swanston Street MelbourneVIC3000 Australia Department of Information and Communication Technology Mawlana Bhashani Science and Technology University Santosh Tangail1902 Bangladesh Group of Bio-photomatiχ Mawlana Bhashani Science and Technology University Santosh Tangail1902 Bangladesh Department of Software Engineering Daffodil International University Sukrabad Dhanmondi Dhaka1207 Bangladesh
This work clarified the conventional/phase shift dual Mach-Zehnder modulation measured technique for upgrading radio over fiber (ROF) systems. Four levels of pulse amplitude modulation and non-return to zero code sche... 详细信息
来源: 评论
Machine learning for Autopsy reports Forensic using Text Classification Techniques  2
Machine learning for Autopsy reports Forensic using Text Cla...
收藏 引用
2nd International Conference on Computing and Information Technology, ICCIT 2022
作者: Shahid, Muhammad Rehman Munir, Asim Ifraheem, Layeba Aldabbas, Hamza Wadood, Abdul Alwada'n, Tariq University of Faisalabad Departmental of Computational Sciences Faislabad Pakistan International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Al-Balqa Applied University Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology Al-Salt Jordan School of Computing Engineering Digital Technologies Teesside University Middlesbrough United Kingdom
A forensic autopsy is a surgical process in which experts collect a deceased body's internal and external information. These death certificates are the source of timely warnings of an increase in disease activity.... 详细信息
来源: 评论
Heterogeneous Multi-commodity Network Flows over Time  1
收藏 引用
17th International computer science Symposium in Russia, CSR 2022
作者: Li, Yifen Bei, Xiaohui Qiao, Youming Tao, Dacheng Chen, Zhiya School of Traffic and Transportation Engineering Central South University Changsha China School of Physical and Mathematical Sciences Nanyang Technological University Singapore Singapore Centre for Quantum Software and Information University of Technology Sydney Ultimo Australia UBTECH Sydney AI Centre School of Computer Science Faculty of Engineering The University of Sydney DarlingtonNSW2008 Australia
In the 1950’s, Ford and Fulkerson introduced dynamic flows by incorporating the notion of time into the network flow model (Oper. Res., 1958). In this paper, motivated by real-world applications including route plann... 详细信息
来源: 评论