咨询与建议

限定检索结果

文献类型

  • 677 篇 期刊文献
  • 439 篇 会议
  • 13 册 图书

馆藏范围

  • 1,129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 636 篇 工学
    • 466 篇 计算机科学与技术...
    • 381 篇 软件工程
    • 132 篇 信息与通信工程
    • 102 篇 电气工程
    • 92 篇 生物工程
    • 83 篇 生物医学工程(可授...
    • 74 篇 控制科学与工程
    • 72 篇 光学工程
    • 62 篇 电子科学与技术(可...
    • 50 篇 机械工程
    • 30 篇 网络空间安全
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 25 篇 安全科学与工程
    • 23 篇 动力工程及工程热...
  • 453 篇 理学
    • 177 篇 物理学
    • 176 篇 数学
    • 122 篇 生物学
    • 79 篇 统计学(可授理学、...
    • 35 篇 地球物理学
    • 31 篇 系统科学
  • 188 篇 管理学
    • 115 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 110 篇 医学
    • 91 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
    • 33 篇 药学(可授医学、理...
  • 37 篇 法学
    • 31 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 教育学
  • 17 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 45 篇 accuracy
  • 43 篇 machine learning
  • 41 篇 deep learning
  • 31 篇 feature extracti...
  • 27 篇 computational mo...
  • 26 篇 semantics
  • 24 篇 artificial intel...
  • 23 篇 convolutional ne...
  • 22 篇 training
  • 20 篇 neural networks
  • 20 篇 real-time system...
  • 18 篇 predictive model...
  • 17 篇 data models
  • 16 篇 visualization
  • 16 篇 federated learni...
  • 15 篇 internet of thin...
  • 15 篇 contrastive lear...
  • 14 篇 optimization
  • 13 篇 data mining
  • 13 篇 security

机构

  • 60 篇 shandong provinc...
  • 49 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 20 篇 department of ph...
  • 20 篇 hiroshima astrop...
  • 19 篇 faculty of data ...
  • 19 篇 department of ph...
  • 16 篇 college of compu...
  • 15 篇 dipartimento di ...
  • 15 篇 shandong fundame...
  • 14 篇 dipartimento di ...
  • 14 篇 deutsches elektr...
  • 14 篇 w. w. hansen exp...
  • 14 篇 istituto naziona...
  • 14 篇 istituto naziona...
  • 14 篇 nasa goddard spa...
  • 13 篇 department of ph...
  • 13 篇 science institut...
  • 13 篇 max-planck-insti...
  • 13 篇 city university ...

作者

  • 15 篇 niyato dusit
  • 15 篇 gargano f.
  • 14 篇 bastieri d.
  • 14 篇 sgrò c.
  • 14 篇 lubrano p.
  • 14 篇 spinelli p.
  • 14 篇 kuss m.
  • 13 篇 ajello m.
  • 13 篇 green d.
  • 13 篇 orlando e.
  • 13 篇 nuss e.
  • 13 篇 torres d.f.
  • 13 篇 giroletti m.
  • 12 篇 monzani m.e.
  • 12 篇 cameron r.a.
  • 12 篇 siskind e.j.
  • 12 篇 morselli a.
  • 12 篇 reimer o.
  • 12 篇 mizuno t.
  • 12 篇 piron f.

语言

  • 1,047 篇 英文
  • 77 篇 其他
  • 4 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Faculty of Data Science and Computing"
1129 条 记 录,以下是81-90 订阅
Privacy-Aware Edge Computation Offloading With Federated Learning in Healthcare Consumer Electronics System
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Fei, Yiming Fang, Hao Yan, Zheng Qi, Lianyong Bilal, Muhammad Li, Yang Xu, Xiaolong Zhou, Xiaokang Nanjing University of Information Science and Technology School of Software Nanjing210044 China NanJing University of Information Science and Technology Reading Academy Nanjing210044 China Xidian University School of Cyber Engineering Shaanxi Xi'an710026 China College of computer science and technology Qingdao China Lancaster University School of Computing and Communications United Kingdom Shihezi University College of Mechanical and Electrical Engineering Shihezi832003 China Kansai University Faculty of Business and Data Science Japan
The continuous iteration of consumer electronics has significantly promoted the development of medical devices, which has enabled the collection of large amounts of heterogeneous medical data. These data are offloaded... 详细信息
来源: 评论
PrivBox: Privacy-Preserving Deep Packet Inspection with Dual Double-masking Obfuscated Rule Generation
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Wu, Pengfei Ning, Jianting Huang, Xinyi Chen, Rongmao Zhang, Kai Liang, Kaitai Wuhan University School of Cyber Science and Engineering Wuhan China Singapore Management University School of Computing and Information Systems Singapore City University of Macau Faculty of Data Science Macau China Fujian Normal University College of Computer and Cyber Security Fuzhou China Jinan University College of Cyber Security Guangzhou China National University of Defense Technology College of Computer Changsha China Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Netherlands
Many network middleboxes have been deployed to perform deep packet inspection (DPI) over packet payloads. However, such middleboxes cannot accomplish their tasks when the traffic is encrypted. BlindBox (SIGCOMM 2015) ... 详细信息
来源: 评论
Enhancing CNN-based network intrusion detection through hyperparameter optimization
Intelligent Systems with Applications
收藏 引用
Intelligent Systems with Applications 2025年 26卷
作者: Kaissar, Antanios Nassif, Ali Bou Soudan, Bassel Injadat, MohammadNoor College of Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of Data Science & AI Faculty of Information Technology Zarqa University Zarqa Jordan
This research investigates the optimization of hyperparameters in Convolutional Neural Networks (CNNs) to enhance the performance of Network Intrusion Detection Systems (NIDS). Four distinct optimization techniques, i... 详细信息
来源: 评论
Hyperbolic Variational Graph Auto-Encoder for Next POI Recommendation  34
Hyperbolic Variational Graph Auto-Encoder for Next POI Recom...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Liu, Yuwen Qi, Lianyong Mao, Xingyuan Liu, Weiming Wang, Fan Xu, Xiaolong Zhang, Xuyun Dou, Wanchun Zhou, Xiaokang Beheshti, Amin Shandong Key Laboratory of Intelligent Oil and Gas Industrial Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao China College of Computer Science and Technology Zhejiang University Hangzhou China School of Software Nanjing University of Information Science and Technology Nanjing China School of Computing Macquarie University Sydney Australia Department of Computer Science and Technology Nanjing University Nanjing China Faculty of Business and Data Science Kansai University Osaka Japan
Next Point-of-Interest (POI) recommendation has become a crucial task in Location-Based Social Networks (LBSNs), which provide personalized recommendations by predicting the user’s next check-in locations. Commonly u... 详细信息
来源: 评论
Detection of ARP Spoofing Attack in Healthcare Networks Using a LSTM Model
Detection of ARP Spoofing Attack in Healthcare Networks Usin...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Salam Al-E'mari Yousef Sanjalawe Ghader Kurdi Budoor Allehyani Information Security Department Faculty of Information Technology University of Petra (UoP) Amman Jordan Information Technology Department King Abdullah II School for Information Technology The University of Jordan (UJ) Amman Jordan Department of Data Science College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia
Healthcare networks face significant cybersecurity threats due to their extensive interconnectivity, with Address Resolution Protocol (ARP) spoofing posing a major risk to the confidentiality and integrity of medical ... 详细信息
来源: 评论
U1 snRNP regulates alternative promoter activity by inhibiting premature polyadenylation
收藏 引用
Molecular Cell 2025年 第10期85卷 1968-1981.e7页
作者: Kim, GyeungYun Carroll, Christine L. Wakefield, Zachary Peters Tuncay, Mustafa Fiszbein, Ana Biology Department Boston University Boston 02215 United States Graduate Program in Molecular Biology Cell Biology & Biochemistry Boston University Boston 02215 United States Graduate Program in Cell and Molecular Biology Boston University Boston 02215 United States Bioinformatics Program Faculty of Computing and Data Science Boston University Boston 02215 United States Center for Computing & Data Sciences Boston University Boston 02215 United States
Emerging evidence indicates that splicing factors mediate the close link between transcription and splicing. However, the mechanisms underlying this coupling remain unclear. U1 small nuclear ribonucleoprotein particle... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
Mobility-aware Seamless Service Migration and Resource Allocation in Multi-edge IoV Systems
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Chen, Zheyi Huang, Sijin Min, Geyong Ning, Zhaolong Li, Jie Zhang, Yan Fuzhou University College of Computer and Data Science Fuzhou350116 China Ministry of Education Engineering Research Center of Big Data Intelligence Fuzhou350002 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China University of Exeter Department of Computer Science Faculty of Environment Science and Economy ExeterEX4 4QF United Kingdom Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China University of Oslo Department of Informatics Oslo0316 Norway
Mobile Edge computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
BFGTP: A BERT-Guided Two-Stage Molecular Representation Learning Framework for Toxicity Prediction
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Hu, Kaimiao He, Yuan Wei, Jianguo Sun, Changming Geng, Jie Wei, Leyi Su, Ran Tianjin University College of Intelligence and Computing Tianjin30000 China CSIRO Data61 SydneyNSW1710 Australia Tianjin University Tianjin Key Laboratory of Cardiovascular Emergency and Critical Care Tianjin Municipal Science and Technology Bureau Department of Cardiology Chest Hospital Tianjin China Macao Polytechnic University Centre for Artificial Intelligence driven Drug Discovery Faculty of Applied Science China Xiamen University School of Informatics Xiamen China
Accurate prediction of molecular toxicity is vital for drug development. Most mainstream methods rely on fingerprints or graph-based feature extraction, the emergence of large language models (LLMs) offers new prospec... 详细信息
来源: 评论