咨询与建议

限定检索结果

文献类型

  • 598 篇 会议
  • 378 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 984 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 587 篇 工学
    • 456 篇 计算机科学与技术...
    • 370 篇 软件工程
    • 152 篇 信息与通信工程
    • 110 篇 控制科学与工程
    • 77 篇 电气工程
    • 62 篇 生物工程
    • 53 篇 网络空间安全
    • 48 篇 机械工程
    • 48 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 39 篇 安全科学与工程
    • 28 篇 仪器科学与技术
    • 26 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 235 篇 理学
    • 112 篇 数学
    • 68 篇 生物学
    • 62 篇 物理学
    • 42 篇 系统科学
    • 33 篇 统计学(可授理学、...
    • 20 篇 化学
  • 173 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 55 篇 医学
    • 46 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 26 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 40 篇 法学
    • 28 篇 社会学
  • 17 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 58 篇 deep learning
  • 55 篇 feature extracti...
  • 55 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 30 篇 security
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 artificial intel...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 measurement
  • 17 篇 reliability
  • 17 篇 real-time system...
  • 16 篇 information tech...
  • 16 篇 optimization
  • 16 篇 data mining

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 zarqa university...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 25 篇 ghazal taher m.
  • 24 篇 taher m. ghazal
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 11 篇 ahmad munir
  • 10 篇 sagheer abbas
  • 10 篇 muhammad adnan k...

语言

  • 760 篇 英文
  • 217 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
984 条 记 录,以下是201-210 订阅
排序:
Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction
Prompt Based Tri-Channel Graph Convolution Neural Network fo...
收藏 引用
2024 SIAM International Conference on Data Mining, SDM 2024
作者: Peng, Kun Jiang, Lei Peng, Hao Liu, Rui Yu, Zhengtao Ren, Jiaqian Hao, Zhifeng Philip, S.Yu. Institute of Information Engineering Chinese Academy of Sciences China School of Cyberspace Security University of Chinese Academy of Sciences China School of Cyber Science and Technology Beihang University China Faculty of Information Engineering and Automation Kunming University of Science and Technology China College of Science University of Shantou China University of Illinois at Chicago Department of Computer Science United States
Aspect Sentiment Triplet Extraction (ASTE) is an emerging task to extract a given sentence's triplets, which consist of aspects, opinions, and sentiments. Recent studies tend to address this task with a table-fill... 详细信息
来源: 评论
Comparative Evaluation of Machine Learning-Based Controller Area Network Intrusion Detection Systems  14
Comparative Evaluation of Machine Learning-Based Controller ...
收藏 引用
14th International Conference on information and Communication Systems, ICICS 2023
作者: Al-Jarrah, Omar Y. Ramadan, Omar A. Alsaify, Baha Alkhushayni, Suboh Jordan University of Science and Technology Faculty of Computer and Information Technology Dept. Network Engineering and Security P.O. Box 3030 Irbid22110 Jordan Jordan University of Science and Technology Faculty of Engineering Dept. Mechanical Engineering P.O. Box 3030 Irbid22110 Jordan Yarmouk University Dept. Information Systems Irbid Jordan
The controller area network (CAN) protocol is widely used in vehicle networks. However, it lacks essential security features like confidentiality and authentication. To enhance vehicle security, researchers have propo... 详细信息
来源: 评论
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5551-5568页
作者: Mamoon M.Saeed Mohammad Kamrul Hasan Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta Electrical Engineering Department Faculty of EngineeringAlzaiem Alazahri UniversityKhartoumSudan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti KebangsaanMalaysia(UKM)43600BangiMalaysia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityPO Box 11099Taif21944Saudi Arabia Department of Electronics Engineering College of EngineeringSudan University of Science and TechnologyKhartoumSudan Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia
The fifth generation(5G)system is the forthcoming generation of the mobile communication *** has numerous additional features and offers an extensively high data rate,more capacity,and low ***,these features and appli... 详细信息
来源: 评论
Image Captioning with Reinforcement Learning  2
Image Captioning with Reinforcement Learning
收藏 引用
2nd IEEE International Conference on computer Vision and Machine Intelligence, CVMI 2023
作者: Verma, Anand Agarwal, Saurabh Arya, K.V. Petrlik, Ivan Esparza, Roberto Rodriguez, Ciro ABV-IIITM Gwalior Department of Information Technology Madhya Pradesh 474015 India ABV-Indian Institute of Information Technology and Management Multimedia and Information Security Research Group Department of Computer Science and Engineering Gwalior474015 India National University Federico Villarreal Faculty of Industrial and Systems Engineering Lima Peru National University Mayor de San Marcos Faculty of Systems Engineering and Informatics Peru
Image captioning involves generating a natural language description that accurately represents the content and context of an image. To achieve this, image captioning utilises various machine learning techniques and fi... 详细信息
来源: 评论
Lightweight Deep Learning-Based Network Traffic Classification Using Explainable Artificial Intelligence
Lightweight Deep Learning-Based Network Traffic Classificati...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Afif Haziq Haris Azizi Ariffin Faiz Zaki Nor Badrul Anuar Centre of Research for Cyber Security and Network (CSNET) Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia
To address the growing demand for internet usage and connected devices, it is essential to implement robust Network Traffic Classification (NTC) methods that guarantee network security and optimised resource utilisati... 详细信息
来源: 评论
FERI: Feature Enhancement and Relational Interaction for Image-text Matching  30
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Yu Zhang, Jianqiang Song, Gongpeng Lu, Qin Zhao, Shuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论
High-quality Arabidopsis thaliana Genome Assembly with Nanopore and HiFi Long Reads
收藏 引用
Genomics, Proteomics & Bioinformatics 2022年 第1期20卷 4-13页
作者: Bo Wang Xiaofei Yang Yanyan Jia Yu Xu Peng Jia Ningxin Dang Songbo Wang Tun Xu Xixi Zhao Shenghan Gao Quanbin Dong Kai Ye MOE Key Laboratory for Intelligent Networks&Network Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China
Arabidopsis thaliana is an important and long-established model species for plant molecular biology,genetics,epigenetics,and ***,the latest version of reference genome still contains a significant number of missing **... 详细信息
来源: 评论
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Shuo Gu, Qiliang Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 929-955页
作者: Lamiaa A.Abou Elazm Walid El-Shafai Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie Department of Microelectronics Electronics Research InstituteAlnozhaEgypt Department of Electronics and Electrical Communications Engineering Ain Shams UniversityCairoEgypt Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh 11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh 11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric *** of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of... 详细信息
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique  2
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Na'amneh, Qais Almomani, Ammar Nasayreh, Ahmad Nahar, Khalid M.O. Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Alauthman, Mohammad Applied Science Private University Department Of Cyber Security Amman Jordan School Of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I. T. Department Irbid Jordan Yarmouk University Department Of Computer Sciences Irbid211633 Jordan Yarmouk University Faculty Of Information Technology Computer Sciences Irbid211633 Jordan Trine University Dep. Of Business Administration IN United States University Of Zawia Dep.of Mechanical And Industrial Engineering Tripoli Libya University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论