咨询与建议

限定检索结果

文献类型

  • 3,008 篇 期刊文献
  • 2,537 篇 会议
  • 25 册 图书

馆藏范围

  • 5,570 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,557 篇 工学
    • 2,667 篇 计算机科学与技术...
    • 2,264 篇 软件工程
    • 790 篇 信息与通信工程
    • 525 篇 生物工程
    • 468 篇 电气工程
    • 421 篇 控制科学与工程
    • 352 篇 生物医学工程(可授...
    • 336 篇 光学工程
    • 300 篇 电子科学与技术(可...
    • 202 篇 机械工程
    • 154 篇 化学工程与技术
    • 150 篇 交通运输工程
    • 144 篇 安全科学与工程
    • 138 篇 网络空间安全
    • 129 篇 动力工程及工程热...
    • 117 篇 仪器科学与技术
  • 2,108 篇 理学
    • 1,121 篇 数学
    • 587 篇 生物学
    • 519 篇 物理学
    • 400 篇 统计学(可授理学、...
    • 190 篇 系统科学
    • 179 篇 化学
  • 1,037 篇 管理学
    • 619 篇 管理科学与工程(可...
    • 465 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 366 篇 医学
    • 312 篇 临床医学
    • 265 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
    • 152 篇 药学(可授医学、理...
  • 192 篇 法学
    • 163 篇 社会学
  • 110 篇 经济学
  • 76 篇 农学
  • 63 篇 教育学
  • 10 篇 文学
  • 6 篇 军事学
  • 5 篇 艺术学
  • 1 篇 历史学

主题

  • 178 篇 deep learning
  • 173 篇 accuracy
  • 146 篇 training
  • 143 篇 machine learning
  • 137 篇 feature extracti...
  • 112 篇 computational mo...
  • 108 篇 semantics
  • 100 篇 data models
  • 91 篇 predictive model...
  • 87 篇 real-time system...
  • 86 篇 convolutional ne...
  • 74 篇 federated learni...
  • 73 篇 graph neural net...
  • 70 篇 reinforcement le...
  • 64 篇 internet of thin...
  • 62 篇 deep neural netw...
  • 61 篇 optimization
  • 57 篇 contrastive lear...
  • 56 篇 task analysis
  • 56 篇 adaptation model...

机构

  • 249 篇 college of compu...
  • 120 篇 school of data a...
  • 119 篇 beijing advanced...
  • 100 篇 national enginee...
  • 89 篇 school of comput...
  • 81 篇 nanyang technolo...
  • 70 篇 school of comput...
  • 50 篇 school of comput...
  • 48 篇 college of intel...
  • 46 篇 university of ch...
  • 43 篇 school of comput...
  • 43 篇 national enginee...
  • 43 篇 key laboratory o...
  • 42 篇 peng cheng labor...
  • 40 篇 institute of dat...
  • 37 篇 the college of c...
  • 36 篇 national enginee...
  • 34 篇 school of comput...
  • 34 篇 school of comput...
  • 32 篇 school of comput...

作者

  • 166 篇 niyato dusit
  • 102 篇 hai jin
  • 73 篇 jin hai
  • 40 篇 cheng xueqi
  • 37 篇 zheng wei-shi
  • 36 篇 tao dacheng
  • 30 篇 xiaofei liao
  • 28 篇 peng hao
  • 28 篇 guo jiafeng
  • 26 篇 jin xiaolong
  • 25 篇 rajeswari d.
  • 24 篇 kang jiawen
  • 23 篇 hu shengshan
  • 23 篇 li jianxin
  • 23 篇 shen linlin
  • 21 篇 sun geng
  • 20 篇 yang yang
  • 19 篇 liu yang
  • 19 篇 xiwang dong
  • 19 篇 cha meeyoung

语言

  • 5,035 篇 英文
  • 502 篇 其他
  • 47 篇 中文
检索条件"机构=School Of Computing And Data Science"
5570 条 记 录,以下是31-40 订阅
排序:
Generative Adversarial Network Art Generator for Sculpture Analysis
Generative Adversarial Network Art Generator for Sculpture A...
收藏 引用
2024 International Conference on Communication, computing and Internet of Things, IC3IoT 2024
作者: Kalita, Swagat Subhash Mahajan, Parag Sharanya, S. Srm Institute Of Science And Technology Data Science And Business System School Of Computing Chennai India
This study examines computer-generated sculpture using a hybrid architecture of Generative Adversarial Networks (GANs) and Convolutional Neural Networks (CNNs). CNNs are essential for visual data analysis and processi... 详细信息
来源: 评论
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 265-272页
作者: Yuling Chen Xiong Yang Tao Li Yi Ren Yangyang Long State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Computing Science University of East AngliaNorwichNR57TJUK
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa... 详细信息
来源: 评论
Diabetic Retinopathy Detection  4
Diabetic Retinopathy Detection
收藏 引用
4th IEEE International Conference on data Engineering and Communication Systems, ICDECS 2024
作者: Sharanya, S. Rai, Arnav Vinod Vedanth, Sai Srm Institute of Science and Technology School of Computing Department of Data Science and Business Systems India
In this pivotal study, we delve into the imperative realm of Diabetic Retinopathy (DR), a sight-threatening eye disease, introducing a nuanced and comprehensive approach to its detection through cutting-edge deep lear... 详细信息
来源: 评论
Patterns Recognition of Sentimental Patterns from the X-dataset using Deep Learning Algorithm  4
Patterns Recognition of Sentimental Patterns from the X-Data...
收藏 引用
4th International Conference on Soft computing for Security Applications, ICSCSA 2024
作者: Konduri, Praveen S R Department of Data Science School of Computing Mohan Babu University Tirupati India
This research investigates the application of deep learning techniques to sentiment analysis, a field focused on mining online platforms for subjective assessments. By combining deep neural networks (DNNs) with partic... 详细信息
来源: 评论
Cube Attacks on Round-Reduced Grain-128AEAD  6th
Cube Attacks on Round-Reduced Grain-128AEAD
收藏 引用
6th International Conference on Emerging Technologies in computing, iCETiC 2023
作者: Teng, Wil Liam Salam, Iftekhar Yau, Wei-Chuen Teh, Jia Yew School of Computing and Data Science Xiamen University Malaysia Sepang43900 Malaysia
Lightweight cryptography aims to design secure and efficient cryptographic algorithms for resource-constrained devices. Traditional cryptographic algorithms may not be readily usable in resource-constrained environmen... 详细信息
来源: 评论
A Survey on Deep Learning Techniques for Secure and Accurate Mobile Sink Position Prediction in Vehicular Pattern WSN  8
A Survey on Deep Learning Techniques for Secure and Accurate...
收藏 引用
8th International Conference on Inventive Systems and Control, ICISC 202
作者: Shareef, D.K. Jyothsna, V. School of Computing Department of Computer Science and Engineering Andhra Pradesh Tirupati India School of Computing Department of Data Science Andhra Pradesh Tirupati India
This research study presents a comprehensive survey of deep learning methods applied in order to improve the security along with accuracy of the mobile sink position prediction in Vehicular Pattern Wireless Sensor Net... 详细信息
来源: 评论
Analysis of the characteristics and causes of city gas explosion accidents based on DT-AR algorithm
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9057-9068页
作者: Qu, Ying Wang, Xuming Data Science and Intelligent Computing Research Center Hebei University of Science and Technology Hebei Shijiazhuang China School of Economics and Management Hebei University of Science and Technology Hebei Shijiazhuang China
In order to effectively prevent and control accidents, it is essential to trace back the causes of gas explosions in cities. The DT-AR(decision tree-association rule) algorithm is proposed as a quantitative analysis o... 详细信息
来源: 评论
P3DC:Reducing DRAM Cache Hit Latency by Hybrid Mappings
收藏 引用
Journal of Computer science & Technology 2024年 第6期39卷 1341-1360页
作者: Ye Chi Ren-Tong Guo Xiao-Fei Liao Hai-Kun Liu Jianhui Yue National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Laboratory Wuhan 430074China Cluster and Grid Computing Laboratory Wuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Big Data and Internet Shenzhen Technology UniversityShenzhen 518118China Department of Computer Science Michigan Technological UniversityHoughton 49931-1295U.S.A.
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca... 详细信息
来源: 评论
Bayesian Inverse Transfer in Evolutionary Multiobjective Optimization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-27页
作者: Liu, Jiao Gupta, Abhishek Ong, Yew-Soon College of Computing and Data Science Nanyang Technological University Singapore Singapore School of Mechanical Sciences Indian Institute of Technology Goa Goa India
Transfer optimization enables data-efficient optimization of a target task by leveraging experiential priors from related source tasks. This is especially useful in multiobjective optimization settings where a set of ... 详细信息
来源: 评论
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1169-1179页
作者: Guangquan Xu Wenyu Dong Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu Big Data School Qingdao Huanghai UniversityQingdao266427China College of Intelligence and Computing Tianjin UniversityTianjin300350China School of Computing Macquarie UniversityNSW2109Australia Graduate School of Advanced Science and Engineering Hiroshima UniversityJapan
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain *** has been common since 2017,and in fact,it once became the ... 详细信息
来源: 评论