咨询与建议

限定检索结果

文献类型

  • 12,729 篇 期刊文献
  • 10,665 篇 会议
  • 101 册 图书

馆藏范围

  • 23,494 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,827 篇 工学
    • 8,527 篇 计算机科学与技术...
    • 6,901 篇 软件工程
    • 3,047 篇 信息与通信工程
    • 2,330 篇 电子科学与技术(可...
    • 2,262 篇 电气工程
    • 1,966 篇 生物工程
    • 1,862 篇 光学工程
    • 1,780 篇 控制科学与工程
    • 1,690 篇 生物医学工程(可授...
    • 1,189 篇 化学工程与技术
    • 996 篇 机械工程
    • 898 篇 材料科学与工程(可...
    • 890 篇 仪器科学与技术
    • 687 篇 动力工程及工程热...
    • 431 篇 力学(可授工学、理...
    • 398 篇 土木工程
  • 10,274 篇 理学
    • 4,791 篇 物理学
    • 3,703 篇 数学
    • 2,360 篇 生物学
    • 1,399 篇 化学
    • 1,324 篇 统计学(可授理学、...
    • 681 篇 系统科学
  • 3,279 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,348 篇 图书情报与档案管...
    • 828 篇 工商管理
  • 1,744 篇 医学
    • 1,444 篇 临床医学
    • 1,189 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 517 篇 公共卫生与预防医...
  • 536 篇 法学
    • 420 篇 社会学
  • 353 篇 农学
  • 312 篇 经济学
  • 248 篇 教育学
  • 97 篇 文学
  • 56 篇 军事学
  • 35 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 475 篇 deep learning
  • 303 篇 machine learning
  • 292 篇 computer science
  • 281 篇 feature extracti...
  • 255 篇 training
  • 217 篇 image segmentati...
  • 209 篇 computational mo...
  • 196 篇 accuracy
  • 193 篇 semantics
  • 183 篇 optimization
  • 160 篇 data mining
  • 159 篇 neural networks
  • 151 篇 internet of thin...
  • 149 篇 reinforcement le...
  • 128 篇 support vector m...
  • 128 篇 magnetic resonan...
  • 127 篇 deep neural netw...
  • 124 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 218 篇 r. ströhmer
  • 216 篇 m. rijssenbeek
  • 212 篇 s. jin

语言

  • 21,656 篇 英文
  • 1,438 篇 其他
  • 384 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23495 条 记 录,以下是181-190 订阅
排序:
Homomorphic Encryption Based Full Flow Privacy Protection Scheme for Federated Learning  7
Homomorphic Encryption Based Full Flow Privacy Protection Sc...
收藏 引用
7th International Conference on computer Information science and Application Technology, CISAT 2024
作者: Zhou, Jinzhong Jiang, Rui Chen, Gangyong Wang, Lile Southeast University School of Cyber Science and Engineering Nanjing210096 China Natl. Eng. Research Center of Classified Protection and Safeguard Technology for Cybersecurity Shanghai200031 China
With the development of machine learning, artificial intelligence (AI) technology has reshaped our life in many aspects. Federated learning is a typical machine learning training architecture, which aims to train the ... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Towards Energy-efficient Resource Allocation for Federated Learning in Mobile Edge Computing
Towards Energy-efficient Resource Allocation for Federated L...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Ma, Wenqiang Zhao, Yong Sun, Wen Liu, Yuan Guo, Bin Niyato, Dusit Northwestern Polytechnical University School of Cybersecurity Xi'an China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou China Northwestern Polytechnical University School of Computer Science Xi'an China Nanyang Technological University School of Computer Science and Engineering Singapore Singapore
Federated learning has become a promising technology that enables edge devices to participate intelligent modeling without sharing data, and thus realizing edge intelligence in mobile edge computing (MEC). In this pap... 详细信息
来源: 评论
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论
SLARD: A Chinese Superior Legal Article Retrieval Dataset  31
SLARD: A Chinese Superior Legal Article Retrieval Dataset
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Chen, Zhe Ren, Pengjie Sun, Fuhui Wang, Xiaoyan Li, Yunjun Zhao, Siwen Yang, Tengyi School of Information Science and Engineering Shandong University China School of Computer Science and Technology Shandong University China Information Technology Service Center of People's Court
Retrieving superior legal articles involves identifying relevant legal articles that hold higher legal effectiveness. This process is crucial in legislative work because superior legal articles form the legal basis fo...
来源: 评论
Auto Insurance Fraud Detection with Multimodal Learning
收藏 引用
Data Intelligence 2023年 第2期5卷 388-412页
作者: Jiaxi Yang Kui Chen Kai Ding Chongning Na Meng Wang Financial Technological Research Center Zhejiang LabHangzhou 361005China School of Computer Science and Engineering Southeast UniversityNanjing 211189China
In recent years,feature engineering-based machine learning models have made significant progress in auto insurance fraud ***,most models or systems focused only on structural data and did not utilize multi-modal data ... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Machine Learning Stroke Prediction in Smart Healthcare:Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5115-5134页
作者: Abdul Ahad Ira Puspitasari Jiangbin Zheng Shamsher Ullah Farhan Ullah Sheikh Tahir Bakhsh Ivan Miguel Pires Department Information System Study Program Faculty of Science and TechnologyUniversitas AirlanggaSurabaya60286Indonesia School of Software Northwestern Polytechnical UniversityXi’an710072China Research Center for Quantum Engineering Design Faculty of Science and TechnologyUniversitas AirlanggaSurabaya60286Indonesia School of Computer Science and Software Engineering Shenzhen UniversityShenzhen518061China Cybersecurity Center Prince Mohammad Bin Fahd University617Al JawharahKhobarDhahran34754Saudi Arabia Cardiff School of Technologies Cardiff Metropolitan UniversityWestern AvenueCardiffCF52YBUK Instituto de Telecomunicacoes Escola Superior de Tecnologia e Gestao de AguedaUniversidade de Aveiroágueda3750-127Portugal
This research explores the use of Fuzzy K-Nearest Neighbor(F-KNN)and Artificial Neural Networks(ANN)for predicting heart stroke incidents,focusing on the impact of feature selection methods,specifically Chi-Square and... 详细信息
来源: 评论
Metaheuristic Optimization of Trajectory and Dynamic Time Splitting for UAV Communication Systems
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1200-1204页
作者: Chien, Trinh Van Quan, Nguyen Minh Shin, Oh-Soon Nguyen, Van-Dinh Hanoi University of Science and Technology School of Information and Communications Technology Hanoi100000 Viet Nam Soongsil University School of Electronic Engineering Seoul06978 Korea Republic of Center for Environmental Intelligence VinUniversity College of Engineering and Computer Science Vinhomes Ocean Park Hanoi100000 Viet Nam
The integration of unmanned aerial vehicles (UAVs) into wireless communication systems has emerged as a transformative approach, promising cost-efficient connectivity. This paper addresses the optimization of the dyna... 详细信息
来源: 评论
CAKG: A Framework for cybersecurity Threat Detection of Automotive via Knowledge Graph  8
CAKG: A Framework for Cybersecurity Threat Detection of Auto...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Yang, Peng Lijie, Wang Yun, Li Xuedong, Song Yaxin, Wang Biheng, Guo School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Cybersecurity Research Institute Guangdong Weichen Information Technology Co. Ltd Dongguan China
With the increasing complexity and connectivity of vehicles, ensuring their security has become a critical concern. In this study, we propose CAKG: A Framework For cybersecurity Threat Detection Of Automotive Via Know... 详细信息
来源: 评论