咨询与建议

限定检索结果

文献类型

  • 22,443 篇 会议
  • 12,320 篇 期刊文献
  • 443 册 图书

馆藏范围

  • 35,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,005 篇 工学
    • 17,351 篇 计算机科学与技术...
    • 14,360 篇 软件工程
    • 5,134 篇 信息与通信工程
    • 3,203 篇 控制科学与工程
    • 2,870 篇 生物工程
    • 2,258 篇 电气工程
    • 1,975 篇 生物医学工程(可授...
    • 1,656 篇 光学工程
    • 1,626 篇 电子科学与技术(可...
    • 1,250 篇 机械工程
    • 1,088 篇 网络空间安全
    • 906 篇 安全科学与工程
    • 869 篇 动力工程及工程热...
    • 858 篇 化学工程与技术
    • 815 篇 仪器科学与技术
    • 806 篇 交通运输工程
  • 11,339 篇 理学
    • 6,237 篇 数学
    • 3,161 篇 生物学
    • 2,728 篇 物理学
    • 1,974 篇 统计学(可授理学、...
    • 1,201 篇 系统科学
    • 1,000 篇 化学
  • 6,563 篇 管理学
    • 3,790 篇 管理科学与工程(可...
    • 3,068 篇 图书情报与档案管...
    • 1,727 篇 工商管理
  • 2,059 篇 医学
    • 1,645 篇 临床医学
    • 1,483 篇 基础医学(可授医学...
    • 1,014 篇 公共卫生与预防医...
    • 884 篇 药学(可授医学、理...
  • 1,324 篇 法学
    • 1,103 篇 社会学
  • 598 篇 经济学
  • 492 篇 农学
  • 454 篇 教育学
  • 234 篇 文学
  • 65 篇 艺术学
  • 57 篇 军事学
  • 14 篇 哲学
  • 5 篇 历史学

主题

  • 1,128 篇 deep learning
  • 1,085 篇 accuracy
  • 882 篇 computer science
  • 803 篇 computational mo...
  • 757 篇 feature extracti...
  • 727 篇 machine learning
  • 713 篇 training
  • 552 篇 semantics
  • 520 篇 predictive model...
  • 458 篇 data models
  • 457 篇 internet of thin...
  • 426 篇 support vector m...
  • 406 篇 convolutional ne...
  • 405 篇 real-time system...
  • 339 篇 artificial intel...
  • 304 篇 optimization
  • 300 篇 scalability
  • 300 篇 computer archite...
  • 273 篇 reliability
  • 272 篇 data mining

机构

  • 584 篇 school of comput...
  • 216 篇 institute of com...
  • 183 篇 department of co...
  • 170 篇 school of comput...
  • 158 篇 department of co...
  • 146 篇 department of co...
  • 138 篇 department of co...
  • 133 篇 school of comput...
  • 130 篇 school of comput...
  • 127 篇 school of comput...
  • 125 篇 school of comput...
  • 124 篇 school of comput...
  • 115 篇 school of comput...
  • 110 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 school of comput...
  • 107 篇 department of co...
  • 102 篇 college of intel...
  • 98 篇 college of compu...
  • 98 篇 key laboratory o...

作者

  • 137 篇 hai jin
  • 124 篇 niyato dusit
  • 123 篇 jin hai
  • 106 篇 zheng wei-shi
  • 98 篇 ferrara g.
  • 98 篇 ardid m.
  • 97 篇 calvo d.
  • 94 篇 chen a.
  • 90 篇 gal t.
  • 90 篇 bozza c.
  • 87 篇 anjali t.
  • 84 篇 díaz a.f.
  • 76 篇 boumaaza j.
  • 71 篇 kalekin o.
  • 63 篇 coleiro a.
  • 62 篇 kulikovskiy v.
  • 62 篇 huang f.
  • 56 篇 eddymaoui a.
  • 55 篇 benoit d.m.
  • 54 篇 zhang lei

语言

  • 33,121 篇 英文
  • 1,860 篇 其他
  • 262 篇 中文
  • 5 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 荷兰文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer & Computing Science"
35206 条 记 录,以下是1-10 订阅
排序:
When Software Security Meets Large Language Models:A Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 317-334页
作者: Xiaogang Zhu Wei Zhou Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang IEEE the School of Computer and Mathematical Sciences the University of Adelaide the School of Science Computing and Engineering Technologies Swinburne University of Technology
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... 详细信息
来源: 评论
Robust federated contrastive recommender system against targeted model poisoning attack
收藏 引用
science China(Information sciences) 2025年 第4期68卷 50-65页
作者: Wei YUAN Chaoqun YANG Liang QU Guanhua YE Quoc Viet Hung NGUYEN Hongzhi YIN School of Electrical Engineering and Computer Science The University of Queensland School of Information and Communication Technology Griffith University Deep Neural Computing Company Limited
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t... 详细信息
来源: 评论
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
science China(Information sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
Exploring the Effectiveness of OKRs in Enhancing Company Objectives: A Comparative Study
收藏 引用
IEEE Engineering Management Review 2025年 第2期53卷 110-121页
作者: Criado, Juan M. Gutierrez, Gema Garzas, Javier Cano, Emilio L. De Lena, M. Teresa Gonzalez Moguerza, Javier M. School of Engineering and Computer Science Statistic and Computing Department Mostoles Madrid28933 Spain
The use of management by objectives (MBOs) methodologies, particularly the objectives and key results (OKRs) framework, has gained widespread attention in recent years as a means of improving organizational performanc... 详细信息
来源: 评论
Algorithms for online fault tolerance server consolidation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 514-523页
作者: Boyu Li Bin Wu Meng Shen Hao Peng Weisheng Li Hong Zhang Jie Gan Zhihong Tian Guangquan Xu College of Intelligence and Computing Tianjin University School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer Science and Technology Zhejiang Normal University School of Computer Science and Technology Chongqing University of Posts and Telecommunications School of Astronautics Beihang University School of Computer Science University of Sydney Cyberspace Institute of Advanced Technology Guangzhou University
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server failures. In this mechanism, each item represents a computing task and is replicated into ξ + 1 servers for som... 详细信息
来源: 评论
Federated learning for Healthcare 5.0: a comprehensive survey, taxonomy, challenges, and solutions
收藏 引用
Soft computing 2025年 第2期29卷 673-700页
作者: Amin, Muhammad Sadiq Ahmad, Shabir Loh, Woong-Kee School of Electrical and Computer Science National University of Science and Technology Islamabad Pakistan School of Computing Gachon University Seongnam13120 Korea Republic of
The advent of Healthcare 5.0 heralds a groundbreaking revolution in digital healthcare, superseding the achievements of its predecessor, Healthcare 4.0. Integrating cutting-edge technologies such as the Internet of Me... 详细信息
来源: 评论
HDeFC: Hierarchical Secure Fuzzy Deduplication Based on Fog computing
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12658-12668页
作者: Tang, Zehui Zeng, Shengke Han, Song Liu, Jun He, Mingxing Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China
Secure deduplication not only optimizes cloud storage but also prevents data leakage. However, traditional schemes are with high computation and communication costs to deal with large-scale multimedia data. To address... 详细信息
来源: 评论
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-30页
作者: Karunanayake, Naveen Silva, Bhanuka Ginige, Yasod Seneviratne, Suranga Chawla, Sanjay The University of Sydney School of Computer Science Sydney Australia Qatar Computing Research Institute Doha Qatar
We investigate the vulnerability of inputs in an adversarial setting and demonstrate that certain samples are more susceptible to adversarial perturbations compared to others. Specifically, we employ a simple yet effe... 详细信息
来源: 评论
Geometric-like imaginarity:Quantification and state conversion
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第2期68卷 13-22页
作者: Meng-Li Guo Bo Li Shao-Ming Fei School of Science East China University of TechnologyNanchang 330006China School of Computer and Computing Science Hangzhou City University Hangzhou 310015China School of Mathematical Sciences Capital Normal UniversityBeijing 100048China
From the perspective of resource-theoretic approach,this study explores the quantification of imaginary in quantum *** propose a well defined measure of imaginarity,the geometric-like measure of *** with the usual geo... 详细信息
来源: 评论
The Security of Using Large Language Models:A Survey With Emphasis on ChatGPT
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 1-26页
作者: Wei Zhou Xiaogang Zhu Qing-Long Han Lin Li Xiao Chen Sheng Wen Yang Xiang the School of Science Computing and Engineering Technologies Swinburne University of Technology IEEE the School of Computer and Mathematical Sciences the University of Adelaide Adelaide the Faculty of Science and Engineering Southern Cross University the School of Information and Physical Sciences the University of Newcastle
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec... 详细信息
来源: 评论