咨询与建议

限定检索结果

文献类型

  • 71,281 篇 会议
  • 49,895 篇 期刊文献
  • 822 册 图书

馆藏范围

  • 121,998 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 77,961 篇 工学
    • 46,441 篇 计算机科学与技术...
    • 37,954 篇 软件工程
    • 17,497 篇 信息与通信工程
    • 11,567 篇 控制科学与工程
    • 10,490 篇 电气工程
    • 10,033 篇 电子科学与技术(可...
    • 8,198 篇 生物工程
    • 7,270 篇 化学工程与技术
    • 6,479 篇 机械工程
    • 6,158 篇 光学工程
    • 5,731 篇 材料科学与工程(可...
    • 5,674 篇 生物医学工程(可授...
    • 4,977 篇 动力工程及工程热...
    • 4,314 篇 仪器科学与技术
    • 2,781 篇 交通运输工程
    • 2,684 篇 网络空间安全
    • 2,670 篇 安全科学与工程
    • 2,400 篇 土木工程
    • 2,355 篇 冶金工程
  • 43,913 篇 理学
    • 20,649 篇 数学
    • 14,874 篇 物理学
    • 9,318 篇 生物学
    • 6,807 篇 化学
    • 6,737 篇 统计学(可授理学、...
    • 4,102 篇 系统科学
  • 18,974 篇 管理学
    • 12,229 篇 管理科学与工程(可...
    • 7,408 篇 图书情报与档案管...
    • 4,797 篇 工商管理
  • 5,476 篇 医学
    • 4,398 篇 临床医学
    • 3,868 篇 基础医学(可授医学...
  • 2,880 篇 法学
  • 1,905 篇 经济学
  • 1,490 篇 农学
  • 1,043 篇 教育学
  • 456 篇 文学
  • 309 篇 军事学
  • 227 篇 艺术学
  • 13 篇 历史学
  • 10 篇 哲学

主题

  • 2,959 篇 feature extracti...
  • 2,831 篇 accuracy
  • 2,571 篇 training
  • 2,565 篇 deep learning
  • 2,314 篇 computational mo...
  • 2,153 篇 computer science
  • 1,897 篇 machine learning
  • 1,679 篇 optimization
  • 1,476 篇 semantics
  • 1,420 篇 predictive model...
  • 1,230 篇 data models
  • 1,211 篇 internet of thin...
  • 1,194 篇 support vector m...
  • 1,186 篇 data mining
  • 1,169 篇 neural networks
  • 1,164 篇 real-time system...
  • 1,153 篇 convolutional ne...
  • 1,060 篇 image segmentati...
  • 956 篇 artificial intel...
  • 906 篇 educational inst...

机构

  • 2,477 篇 school of comput...
  • 1,554 篇 school of comput...
  • 1,391 篇 school of comput...
  • 1,088 篇 cavendish labora...
  • 1,006 篇 department of ph...
  • 984 篇 school of comput...
  • 978 篇 university of ch...
  • 940 篇 physikalisches i...
  • 936 篇 oliver lodge lab...
  • 740 篇 school of comput...
  • 704 篇 school of comput...
  • 570 篇 school of comput...
  • 536 篇 horia hulubei na...
  • 531 篇 fakultät physik ...
  • 528 篇 chitkara univers...
  • 527 篇 school of physic...
  • 526 篇 school of physic...
  • 522 篇 department of ph...
  • 514 篇 imperial college...
  • 513 篇 school of optica...

作者

  • 276 篇 niyato dusit
  • 268 篇 a. gomes
  • 257 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 237 篇 g. bella
  • 236 篇 j. strandberg
  • 235 篇 c. amelung
  • 234 篇 d. calvet
  • 234 篇 s. chen
  • 231 篇 beiter a.
  • 229 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 223 篇 bellee v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 217 篇 brundu d.
  • 210 篇 bencivenni g.

语言

  • 111,839 篇 英文
  • 7,390 篇 其他
  • 2,684 篇 中文
  • 78 篇 日文
  • 25 篇 德文
  • 25 篇 法文
  • 8 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Engineering Xi’an University of Technology"
121998 条 记 录,以下是331-340 订阅
排序:
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2675-2719页
作者: Singamaneni Krishnapriya Sukhvinder Singh Department of Computer Science School of Engineering and TechnologyPondicherry UniversityKalapet605014India
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att... 详细信息
来源: 评论
VKFQ:A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4205-4223页
作者: Youlin Ji Bo Yin Ke Gu School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao xia, xiaofang Dong, Runze Cheng, Tianhao Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an China Air Traffic Control and Navigation College Air Force Engineering University Xi'an China Information and Navigation College Air Force Engineering University Xi'an China School of Electrical and Electronic Engineering Nanyang Technological University Singapore School of Computer Science and Technology Xidian University Xi'an China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
Android Dynamic Malware Detection Method Based on System Call Sequences  9
Android Dynamic Malware Detection Method Based on System Cal...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Liu, xiaojian Zhang, Yifei Duan, Yaoyao Hou, Beibei School of Computer Science and Technology Xi'an University of Science and Technology Shaanxi Xi'an China
With the continuous evolution of the types and attack strategies of Android malware, the methods for detecting them must also innovate and evolve. Although existing dynamic detection methods mostly rely on machine lea... 详细信息
来源: 评论
Slender loris optimization algorithm for solving optimization problems
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 8799-8810页
作者: Lakshmi, A. Vijaya Vaitheki, K. Joseph, K. Suresh Department of Computer Science School of Engineering and Technology Pondicherry University India
Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a nov... 详细信息
来源: 评论
Inductive Lottery Ticket Learning for Graph Neural Networks
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1223-1237页
作者: Yong-Duo Sui xiang Wang Tianlong Chen Meng Wang xiang-Nan He Tat-Seng Chua School of Data Science University of Science and Technology of ChinaHefei 230027China Department of Electrical and Computer Engineering The University of Texas at AustinAustin 78712U.S.A School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China School of Computing National University of SingaporeSingapore
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor... 详细信息
来源: 评论
On the mechanism of Si-promoted destabilization of TiC_(x)particles in Al alloys
收藏 引用
Journal of Materials science & technology 2023年 第34期165卷 17-26页
作者: H.Dong Y.C.Guo Y.Z.Chen F.xia Q.Q.Guo Q.Chen G.L.Li J.Y.Zhao Y.Zhong J.P.Li School of Materials and Chemical Engineering Xi’an Technological UniversityXi’an 710021China State Key Lab.of Solidification Processing Northwestern Polytechnical UniversityXi’an 710072China School of Science Xi’an University of Science and TechnologyXi’an 710054China
TiC_(x)is an excellent composite strengthening particle and grain refiner for Al ***,the stability of TiC_(x)is poor when solute Si exists in Al alloy melts,which significantly depresses its strengthening and grain re... 详细信息
来源: 评论
Dual-channel graph contrastive learning for multi-label classification with label-specific features and label correlations
收藏 引用
Neural Computing and Applications 2024年 第23期36卷 14483-14502页
作者: Zhu, xiaoyan Zhu, Tong Li, Jiaxuan Wang, Jiayin School of Computer Science and Technology Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
In multi-label classification scenarios, the labels have both interactive correlations and their own respective characteristics. It is a meaningful but challenging task that learning the discriminative features specif... 详细信息
来源: 评论
circ2CBA: prediction of circRNA-RBP binding sites combining deep learning and attention mechanism
收藏 引用
Frontiers of computer science 2023年 第5期17卷 217-225页
作者: Yajing GUO xiujuan LEI Lian LIU Yi PAN School of Computer Science Shaanxi Normal UniversityXi’an 710119China Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China
Circular RNAs(circRNAs)are RNAs with closed circular structure involved in many biological processes by key interactions with RNA binding proteins(RBPs).Existing methods for predicting these interactions have limitati... 详细信息
来源: 评论