咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 59 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 113 篇 工学
    • 94 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 23 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 网络空间安全
    • 5 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 农业工程
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 machine learning
  • 9 篇 deep learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...
  • 4 篇 jordan universit...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 193 篇 英文
  • 13 篇 其他
检索条件"机构=Information Security and Applied Computing"
206 条 记 录,以下是101-110 订阅
排序:
On developing deep learning models with particle swarm optimization in the presence of poisoning attacks
On developing deep learning models with particle swarm optim...
收藏 引用
information Technology (ACIT)
作者: Majdi Maabreh Omar Darwish Ola Karajeh Yahya Tashtoush Department of Computer Information Systems The Hashemite University Zarqa Jordan Information Security and Applied Computing Department Eastern Michigan University MI USA Department of Computer Science Virginia Polytechnic Institute and State University VA USA Department of Computer Science Jordan University of Science and Technology Irbid Jordan
Deep learning (DL) has demonstrated several successes in a variety of fields, particularly in the era of big data. The process of training a deep learning model entails selecting the ideal learning parameters such as ... 详细信息
来源: 评论
Multi-Channel Hypergraph Convolution Group Recommendation with Member information Enhancement  25
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
25th IEEE International Conferences on High Performance computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Chen, Tianhao Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th... 详细信息
来源: 评论
Social-enhanced recommendation using graph-based contrastive learning  25
Social-enhanced recommendation using graph-based contrastive...
收藏 引用
25th IEEE International Conferences on High Performance computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Xue, Peng Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
The social network-based recommendation model use social network information to mitigate data sparsity issues and improve the accuracy of recommendation models. However, In most social network-based recommendation alg... 详细信息
来源: 评论
Deep Generative Network for Image Inpainting with Gradient Semantics and Spatial-Smooth Attention
SSRN
收藏 引用
SSRN 2023年
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510006 China
As a powerful means of tampering in image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, particularly in boundary... 详细信息
来源: 评论
IoT-based Smart Parking System using Android Application
IoT-based Smart Parking System using Android Application
收藏 引用
2020 International Conference on Emerging Technology in computing, Communication and Electronics, ETCCE 2020
作者: Warif, Nor Bakiah Abd Azman, Mohd Izzat Syahmi Saiful Ismail, Nor-Syahidatul N Remli, Muhammad Akmal Faculty of Computer Science Information Technology Universiti Tun Hussien Onn Malaysia Department of Information Security and Web Technology Batu Pahat Johor Malaysia Faculty of Computing College of Computing and Applied Sciences Universiti Malaysia Pahang Pekan Pahang Malaysia Kota Bharu Kelantan Malaysia
Since all people used vehicles as a necessity, the growing number of vehicles is increasing day by day. With the increasing number of vehicles on the road, the requirement of parking lot will also be restricted. Thus,... 详细信息
来源: 评论
Hierarchical certification of nonclassical network correlations
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Ming-Xing Yang, Xue Pozas-Kerstjens, Alejandro Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China CAS Center for Excellence in Quantum Information and Quantum Physics Hefei230026 China Group of Applied Physics University of Geneva Geneva 41211 Switzerland Constructor University Geneva Switzerland Instituto de Ciencias Matemáticas CSIC UAM UC3M UCM Madrid28049 Spain
With the increased availability of quantum technological devices, it becomes more important to have tools to guarantee their correct nonclassical behavior. This is especially important for quantum networks, which cons... 详细信息
来源: 评论
The differential spectrum and boomerang spectrum of a class of locally-APN functions
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Zhao Li, Nian Xu, Linjie Zeng, Xiangyong Tang, Xiaohu The Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 China The WuHan Marine Communication Research Institute Wuhan430000 China The Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China
In this paper, we study the boomerang spectrum of the power mapping F(x) = xk(q−1) over Fq2, where q = pm, p is a prime, m is a positive integer and gcd(k, q + 1) = 1. We first determine the differential spectrum of F... 详细信息
来源: 评论
A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics
A Classifier to Detect Stream Applications Based on Network ...
收藏 引用
information Technology (ACIT)
作者: Omar Darwish Sarah Herzallah Majdi Maabreh Shouroq Al-Eidi Mahmoud Al-Maani Yahya Tashtoush Information Security and Applied Computing Eastern Michigan University Ypsilanti Michigan Electrical and Computer Engineering Eastern Michigan University Ypsilanti Michigan Department of Information Technology The Hashemite University Zarqa Jordan Computer Science Department Tafila Technical University Tafila Jordan Department of Computer Science Jordan University of Science and Technology Irbid Jordan
One of the most crucial considerations, when considering security vulnerabilities, is network traffic. There is still potential for more research on the inter-arrival time side, even though some studies concentrate on... 详细信息
来源: 评论
Cutting-Edge Predictive Methods for Enhancing Short-Term Load Prediction
Cutting-Edge Predictive Methods for Enhancing Short-Term Loa...
收藏 引用
Electrical and Computer Engineering Researches (ICECER), International Conference on
作者: Taher M. Ghazal Jamshaid Iqbal Janjua Walid Abushiba Munir Ahmad Tahir Abbas Karamath Ateeq College of Arts & Science Applied Science University Manama Kingdom of Bahrain Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Selangor Malaysia Al-Khawarizimi Institute of Computer Science (KICS) University of Engineering & Technology (UET) Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul Republic of Korea Department of Computer Science TIMES Institute Multan Pakistan School of Computing Skyline University College University City Sharjah Sharjah UAE
Efficient management and cost-related factors in the power sector call for accurate short-term load forecasting as it enables better planning with the electric grid and achieving stability within it. This paper looks ... 详细信息
来源: 评论
FEST: Feature Enhancement Swin Transformer for Remote Sensing Image Semantic Segmentation
FEST: Feature Enhancement Swin Transformer for Remote Sensin...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Ronghuan Zhang Jing Zhao Ming Li Qingzhi Zou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
The global context is crucial for the precise segmentation of remote sensing images. However, the large volumes and high spatial resolutions of remote sensing images make efficient analysis of the entire scene challen... 详细信息
来源: 评论