咨询与建议

限定检索结果

文献类型

  • 22,320 篇 会议
  • 12,269 篇 期刊文献
  • 454 册 图书

馆藏范围

  • 35,043 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 21,891 篇 工学
    • 17,283 篇 计算机科学与技术...
    • 14,312 篇 软件工程
    • 5,117 篇 信息与通信工程
    • 3,161 篇 控制科学与工程
    • 2,870 篇 生物工程
    • 2,252 篇 电气工程
    • 1,967 篇 生物医学工程(可授...
    • 1,660 篇 光学工程
    • 1,608 篇 电子科学与技术(可...
    • 1,241 篇 机械工程
    • 1,089 篇 网络空间安全
    • 901 篇 安全科学与工程
    • 870 篇 动力工程及工程热...
    • 856 篇 化学工程与技术
    • 817 篇 仪器科学与技术
    • 794 篇 交通运输工程
  • 11,297 篇 理学
    • 6,186 篇 数学
    • 3,164 篇 生物学
    • 2,703 篇 物理学
    • 1,944 篇 统计学(可授理学、...
    • 1,201 篇 系统科学
    • 998 篇 化学
  • 6,536 篇 管理学
    • 3,773 篇 管理科学与工程(可...
    • 3,047 篇 图书情报与档案管...
    • 1,708 篇 工商管理
  • 2,062 篇 医学
    • 1,641 篇 临床医学
    • 1,478 篇 基础医学(可授医学...
    • 1,008 篇 公共卫生与预防医...
    • 882 篇 药学(可授医学、理...
  • 1,314 篇 法学
    • 1,101 篇 社会学
  • 598 篇 经济学
  • 490 篇 农学
  • 447 篇 教育学
  • 231 篇 文学
  • 65 篇 艺术学
  • 58 篇 军事学
  • 13 篇 哲学
  • 5 篇 历史学

主题

  • 1,096 篇 deep learning
  • 1,061 篇 accuracy
  • 885 篇 computer science
  • 793 篇 computational mo...
  • 749 篇 feature extracti...
  • 728 篇 machine learning
  • 718 篇 training
  • 539 篇 semantics
  • 516 篇 predictive model...
  • 464 篇 internet of thin...
  • 450 篇 data models
  • 423 篇 support vector m...
  • 394 篇 real-time system...
  • 392 篇 convolutional ne...
  • 352 篇 artificial intel...
  • 298 篇 optimization
  • 297 篇 scalability
  • 295 篇 computer archite...
  • 275 篇 data mining
  • 268 篇 reliability

机构

  • 579 篇 school of comput...
  • 216 篇 institute of com...
  • 190 篇 department of co...
  • 171 篇 school of comput...
  • 161 篇 department of co...
  • 152 篇 department of co...
  • 143 篇 department of co...
  • 132 篇 school of comput...
  • 132 篇 school of comput...
  • 129 篇 school of comput...
  • 123 篇 school of comput...
  • 119 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 school of comput...
  • 108 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 national enginee...
  • 102 篇 college of intel...
  • 99 篇 college of compu...
  • 99 篇 department of co...

作者

  • 136 篇 hai jin
  • 129 篇 jin hai
  • 122 篇 niyato dusit
  • 107 篇 zheng wei-shi
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 83 篇 díaz a.f.
  • 81 篇 anjali t.
  • 74 篇 boumaaza j.
  • 73 篇 kalekin o.
  • 65 篇 coleiro a.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 56 篇 gozzini s.r.
  • 55 篇 zhang lei
  • 53 篇 eddymaoui a.

语言

  • 33,105 篇 英文
  • 1,720 篇 其他
  • 261 篇 中文
  • 9 篇 法文
  • 8 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Computing Science"
35043 条 记 录,以下是1-10 订阅
排序:
When Software Security Meets Large Language Models:A Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 317-334页
作者: Xiaogang Zhu Wei Zhou Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang IEEE the School of Computer and Mathematical Sciences the University of Adelaide the School of Science Computing and Engineering Technologies Swinburne University of Technology
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... 详细信息
来源: 评论
Robust federated contrastive recommender system against targeted model poisoning attack
收藏 引用
science China(Information sciences) 2025年 第4期68卷 50-65页
作者: Wei YUAN Chaoqun YANG Liang QU Guanhua YE Quoc Viet Hung NGUYEN Hongzhi YIN School of Electrical Engineering and Computer Science The University of Queensland School of Information and Communication Technology Griffith University Deep Neural Computing Company Limited
Federated recommender systems(FedRecs) have garnered increasing attention recently, thanks to their privacypreserving benefits. However, the decentralized and open characteristics of current FedRecs present at least t... 详细信息
来源: 评论
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
science China(Information sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
FedHSP: A robust federated learning framework coherently addressing Heterogeneity, Security and Performance challenges
收藏 引用
IEEE Access 2025年 13卷 77049-77063页
作者: Nair, Divya G. Aswartha Narayana, C.V. Jaideep Reddy, K. Nair, Jyothisha J. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
Federated Learning (FL) is a machine learning training method that leverages local model gradients instead of accessing private data from individual clients, ensuring privacy. However, the practical implementation of ... 详细信息
来源: 评论
Federated learning for Healthcare 5.0: a comprehensive survey, taxonomy, challenges, and solutions
收藏 引用
Soft computing 2025年 第2期29卷 673-700页
作者: Amin, Muhammad Sadiq Ahmad, Shabir Loh, Woong-Kee School of Electrical and Computer Science National University of Science and Technology Islamabad Pakistan School of Computing Gachon University Seongnam13120 Korea Republic of
The advent of Healthcare 5.0 heralds a groundbreaking revolution in digital healthcare, superseding the achievements of its predecessor, Healthcare 4.0. Integrating cutting-edge technologies such as the Internet of Me... 详细信息
来源: 评论
HDeFC: Hierarchical Secure Fuzzy Deduplication Based on Fog computing
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12658-12668页
作者: Tang, Zehui Zeng, Shengke Han, Song Liu, Jun He, Mingxing Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China
Secure deduplication not only optimizes cloud storage but also prevents data leakage. However, traditional schemes are with high computation and communication costs to deal with large-scale multimedia data. To address... 详细信息
来源: 评论
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-30页
作者: Karunanayake, Naveen Silva, Bhanuka Ginige, Yasod Seneviratne, Suranga Chawla, Sanjay The University of Sydney School of Computer Science Sydney Australia Qatar Computing Research Institute Doha Qatar
We investigate the vulnerability of inputs in an adversarial setting and demonstrate that certain samples are more susceptible to adversarial perturbations compared to others. Specifically, we employ a simple yet effe... 详细信息
来源: 评论
Attenuation Modeling Using Physics Guided Deep Reinforcement Learning: A Channel Estimation Use Case
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 3696-3709页
作者: Mithillesh Kumar, P. Supriya, M. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru560035 India
Along the path of propagation, the radio waves are subjected to a number of losses such as attenuation, refraction, obstruction etc., which can affect the signal strength and quality. Attenuation can be caused even du... 详细信息
来源: 评论
Geometric-like imaginarity:Quantification and state conversion
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第2期68卷 13-22页
作者: Meng-Li Guo Bo Li Shao-Ming Fei School of Science East China University of TechnologyNanchang 330006China School of Computer and Computing Science Hangzhou City University Hangzhou 310015China School of Mathematical Sciences Capital Normal UniversityBeijing 100048China
From the perspective of resource-theoretic approach,this study explores the quantification of imaginary in quantum *** propose a well defined measure of imaginarity,the geometric-like measure of *** with the usual geo... 详细信息
来源: 评论
The Security of Using Large Language Models:A Survey With Emphasis on ChatGPT
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 1-26页
作者: Wei Zhou Xiaogang Zhu Qing-Long Han Lin Li Xiao Chen Sheng Wen Yang Xiang the School of Science Computing and Engineering Technologies Swinburne University of Technology IEEE the School of Computer and Mathematical Sciences the University of Adelaide Adelaide the Faculty of Science and Engineering Southern Cross University the School of Information and Physical Sciences the University of Newcastle
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec... 详细信息
来源: 评论