咨询与建议

限定检索结果

文献类型

  • 1,194 篇 会议
  • 786 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,988 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,238 篇 工学
    • 884 篇 计算机科学与技术...
    • 718 篇 软件工程
    • 341 篇 信息与通信工程
    • 202 篇 控制科学与工程
    • 189 篇 生物工程
    • 150 篇 电气工程
    • 139 篇 生物医学工程(可授...
    • 121 篇 光学工程
    • 117 篇 电子科学与技术(可...
    • 90 篇 网络空间安全
    • 82 篇 机械工程
    • 79 篇 化学工程与技术
    • 60 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 46 篇 材料科学与工程(可...
  • 709 篇 理学
    • 325 篇 数学
    • 235 篇 物理学
    • 206 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 86 篇 化学
    • 51 篇 系统科学
  • 363 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 151 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 121 篇 医学
    • 85 篇 基础医学(可授医学...
    • 78 篇 临床医学
    • 59 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 69 篇 法学
    • 58 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 83 篇 accuracy
  • 75 篇 deep learning
  • 55 篇 feature extracti...
  • 54 篇 training
  • 50 篇 convolutional ne...
  • 44 篇 machine learning
  • 42 篇 real-time system...
  • 38 篇 computational mo...
  • 38 篇 predictive model...
  • 30 篇 optimization
  • 30 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 27 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 21 篇 medical services
  • 20 篇 scalability
  • 20 篇 cloud computing

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 43 篇 zhang yanning
  • 41 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,781 篇 英文
  • 184 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1988 条 记 录,以下是301-310 订阅
排序:
Responsible AI Framework For Large Language Models (LLMs)
Responsible AI Framework For Large Language Models (LLMs)
收藏 引用
International Conference on Advanced computer Control, ICACC
作者: Naman Kandhari Bharat Tripathi Sheetesh Kumar Kulvinder Singh Narendra Pal Singh Department of Computer Science & Engineering Chandigarh University Punjab India Department of Computer Application Allenhouse Business School UP India Department of Computer Science & Engineering Invertis University Bareilly UP India
Large language models (LLMs) have become quite popular in recent years due to their remarkable capacity to produce language that is human-like. The creation and use of LLMs, however, also bring up serious ethical ques... 详细信息
来源: 评论
GCFuzz: An Intelligent Method for Generating IoT Protocols Test Cases Using GAN with CVAE  7th
GCFuzz: An Intelligent Method for Generating IoT Protocols ...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Zhong, Ming Zeng, Zisheng Guo, Yijia Zhao, Dandan Zhang, Bo Li, Shenghong Peng, Hao Ding, Zhiguo School of Computer Science and Technology Zhejiang Normal University Zhejiang Jinhua China Key Laboratory of Intelligent Educational Technology and Application in Zhejiang Normal University Jinhua321004 China School of Cyber Science and Engineering Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China
The importance of Internet of Things (IoT) systems security cannot be ignored, particularly in the realm of communication. IoT protocols serve as standards for communication and interaction among devices in IoT enviro... 详细信息
来源: 评论
Multi-view Transformer-Based Network for Prerequisite Learning in Concept Graphs  23rd
Multi-view Transformer-Based Network for Prerequisite Learn...
收藏 引用
23rd International Semantic Web Conference, ISWC 2024
作者: Wang, Zhichun Shao, Yifeng Peng, Boci Li, Bangui Li, Yun Wang, Qianren Li, Nijun School of Artificial Intelligence Beijing Normal University Beijing China Engineering Research Center of Intelligent Technology and Educational Application Ministry of Education Beijing China School of Intelligence Science and Technology Peking University Beijing China School of Computer Science and Engineering Beihang University Beijing China Advanced Cognitive AI Lab Shanghai Huawei Technologies Shanghai China
Prerequisite learning is the task of identifying prerequisite relations among concepts, which is important for many AI-based educational applications. Previous approaches explore different kinds of learning resources ... 详细信息
来源: 评论
DataJudge: Cross-Chain Data Consistency Verification Based on Extended Merkle Hash Tree  24th
DataJudge: Cross-Chain Data Consistency Verification Based o...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Zeng, Junyu Cao, Jie Dai, Shengjiang Xiang, Qiao Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Department of Electrical and Computer Engineering Queen’s University Kingston Canada School of Informatics Xiamen University Xiamen China
Consortium blockchains, with their decentralized characteristics, have found widespread applications across various industries. However, this also forms isolated data islands. These data islands have become obstacles ... 详细信息
来源: 评论
ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization  24th
ChainSafari: A General and Efficient Blockchain Verifiable ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Dai, Shengjiang Zeng, Junyu Cao, Jie He, Ran Xiang, Qiao School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Department of Electrical and Computer Engineering Queen’s University Kingston Canada School of Informatics Xiamen University Xiamen China
With the rapid advancement of blockchain technology, its utilization has become widespread across various domains, resulting in the accumulation of significant volumes of valuable data. This trend has created an incre... 详细信息
来源: 评论
Domain Transfer Learning for Medical Image Segmentation Tasks  5th
Domain Transfer Learning for Medical Image Segmentation Task...
收藏 引用
5th International Conference on Data science, Machine Learning and applications, ICDSMLA 2023
作者: Kharbas, Vikas Kumar Srivastava, Pulkit Bargavi, Manju Pandeya, Megha Department of Computer Science and Application Vivekananda Global University Jaipur India Department of Mechanical Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Domain transfer learning is a powerful device for clinical image Segmentation duties. It involves transferring information from a source domain to a goal area so that related tasks on those domains can be advantageous... 详细信息
来源: 评论
RGB-guided hyperspectral image super-resolution with deep progressive learning
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第3期9卷 679-694页
作者: Tao Zhang Ying Fu Liwei Huang Siyuan Li Shaodi You Chenggang Yan School of Computer Science and Technology Beijing Institute of TechnologyBeijingChina Satellite Information Intelligent Processing and Application Research Laboratory Beijing Institute of Remote SensingBeijingChina Key Laboratory of Spectral Imaging Technology Xi'an Institute of Optics and Precision Mechanics of Chinese Academy of SciencesXi'anChina Institute of Informatics University of AmsterdamAmsterdamNetherlands School of Communication Engineering Hangzhou Dianzi UniversityHangzhouChina
Due to hardware limitations,existing hyperspectral(HS)camera often suffer from low spatial/temporal ***,it has been prevalent to super-resolve a low reso-lution(LR)HS image into a high resolution(HR)HS image with a HR... 详细信息
来源: 评论
PISketch: Finding Persistent and Infrequent Flows  3
PISketch: Finding Persistent and Infrequent Flows
收藏 引用
3rd ACM SIGCOMM 2022 Workshop on Formal Foundations and Security of Programmable Network Infrastructures, FFSPIN 2022
作者: Fan, Zhuochen Hu, Zhoujing Wu, Yuhan Guo, Jiarui Liu, Wenrui Yang, Tong Wang, Hengrui Xu, Yifei Uhlig, Steve Tu, Yaofeng School of Computer Science National Engineering Laboratory for Big Data Analysis Technology and Application Peking University China Computer Science Department University of California Los Angeles United States School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom ZTE Corporation China
Finding persistent and inactive activity periods is very helpful in practice, for example to detect intrusion activities. Most of the literature focuses on finding persistent flows or frequent flows. No previous work ... 详细信息
来源: 评论
Analyzing the Efficiency of Key Management Techniques Used in Information Security Models for Networked applications  5th
Analyzing the Efficiency of Key Management Techniques Used i...
收藏 引用
5th International Conference on Data science, Machine Learning and applications, ICDSMLA 2023
作者: Beemkumar, N. Singh, Vaishali Shree, Ritu Batra, Raman Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Mechanical Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India
This study aims to investigate the performance of numerous key manipulation strategies utilized in modern statistics protection models. Especially, this painting examines the use of public key infrastructures (PKI), s... 详细信息
来源: 评论
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection  24th
BlockWhisper: A Blockchain-Based Hybrid Covert Communication...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Zehui Xu, Yuwei Huang, Ranfeng Fan, Xinhe Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Software College Northeastern University Shenyang China College of Computer Science Nankai University Tianjin China
In light of the pervasive significance of privacy protection in contemporary society, the exploration of covert communication technology has been extensive, which is designed to safeguard communication behaviors and c... 详细信息
来源: 评论