咨询与建议

限定检索结果

文献类型

  • 2,156 篇 期刊文献
  • 1,718 篇 会议
  • 17 册 图书

馆藏范围

  • 3,891 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,583 篇 工学
    • 1,907 篇 计算机科学与技术...
    • 1,597 篇 软件工程
    • 630 篇 信息与通信工程
    • 423 篇 电气工程
    • 383 篇 生物工程
    • 331 篇 控制科学与工程
    • 250 篇 电子科学与技术(可...
    • 241 篇 生物医学工程(可授...
    • 234 篇 光学工程
    • 159 篇 机械工程
    • 127 篇 交通运输工程
    • 126 篇 化学工程与技术
    • 113 篇 网络空间安全
    • 105 篇 动力工程及工程热...
    • 96 篇 仪器科学与技术
    • 96 篇 安全科学与工程
  • 1,425 篇 理学
    • 737 篇 数学
    • 434 篇 生物学
    • 349 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 134 篇 化学
    • 134 篇 系统科学
  • 750 篇 管理学
    • 471 篇 管理科学与工程(可...
    • 326 篇 图书情报与档案管...
    • 225 篇 工商管理
  • 256 篇 医学
    • 217 篇 临床医学
    • 192 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 119 篇 法学
    • 99 篇 社会学
  • 76 篇 经济学
  • 51 篇 农学
  • 38 篇 教育学
  • 8 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 127 篇 deep learning
  • 123 篇 accuracy
  • 110 篇 machine learning
  • 101 篇 feature extracti...
  • 93 篇 semantics
  • 91 篇 training
  • 90 篇 computational mo...
  • 75 篇 data models
  • 68 篇 internet of thin...
  • 66 篇 real-time system...
  • 65 篇 predictive model...
  • 62 篇 convolutional ne...
  • 54 篇 federated learni...
  • 53 篇 reinforcement le...
  • 46 篇 artificial intel...
  • 45 篇 graph neural net...
  • 44 篇 deep neural netw...
  • 44 篇 data mining
  • 41 篇 optimization
  • 39 篇 convolution

机构

  • 155 篇 college of compu...
  • 102 篇 national enginee...
  • 100 篇 beijing advanced...
  • 76 篇 nanyang technolo...
  • 67 篇 school of comput...
  • 55 篇 national enginee...
  • 48 篇 school of comput...
  • 47 篇 school of big da...
  • 44 篇 school of comput...
  • 41 篇 school of cyber ...
  • 36 篇 national enginee...
  • 34 篇 university of ch...
  • 32 篇 college of intel...
  • 32 篇 school of comput...
  • 30 篇 school of data a...
  • 30 篇 hubei engineerin...
  • 29 篇 college of compu...
  • 29 篇 school of data s...
  • 29 篇 services computi...
  • 29 篇 the college of c...

作者

  • 155 篇 niyato dusit
  • 108 篇 hai jin
  • 103 篇 jin hai
  • 31 篇 xiaofei liao
  • 31 篇 kang jiawen
  • 25 篇 li jianxin
  • 25 篇 shen linlin
  • 24 篇 rajeswari d.
  • 23 篇 tao dacheng
  • 23 篇 hu shengshan
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 20 篇 sun geng
  • 19 篇 li tianrui
  • 19 篇 haikun liu
  • 19 篇 xiwang dong
  • 19 篇 liao xiaofei
  • 19 篇 du hongyang
  • 18 篇 dusit niyato
  • 18 篇 wang jiacheng

语言

  • 3,525 篇 英文
  • 341 篇 其他
  • 33 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3891 条 记 录,以下是121-130 订阅
Machine Learning-Based Autonomous Optimization of Unattended Wireless Sensor Networks Through Multi-Cause Reinforcement Learning
收藏 引用
SN Computer Science 2025年 第2期6卷 1-11页
作者: Chaudhary, Jitendra Kumar Dudeja, Deepak Verma, Neeraj Kumar Saini, Arun Kumar Kapila, Dhiraj Mohapatra, Smaranika School of Computing Graphic Era Hill University Bhimtal Campus Uttrakhand Bhimtal India Department of Computer Science and Engineering M.M. Engineering College Maharishi Markandeshwar (Deemed to Be University) Mullana Haryana Ambala India Department of Data Science and Engineering Manipal University Jaipur Jaipur India Department of IcfaiTech The ICFAI University Jaipur India Department of Computer Science & Engineering Lovely Professional University Punjab Phagwara India Department of Computer Science and Engineering Manipal University Jaipur Rajasthan Jaipur India
Self-configuration refers to a node's ability to dynamically adjust resource allocation based on changing network conditions, either autonomously or with minimal human input. Alongside this, self-optimization is a... 详细信息
来源: 评论
Impulsive Control of Nonlinear Multi-Agent Systems: A Hybrid Fuzzy Adaptive and Event-Triggered Strategy
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年
作者: Han, Fang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Wuhan430074 China
This paper presents a hybrid control approach that integrates an adaptive fuzzy mechanism with an event-triggered impulse strategy to address consensus control challenges in nonlinear Multi-Agent Systems (MASs) with u... 详细信息
来源: 评论
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Deng, Zehang Sun, Ruoxi Xue, Minhui Wen, Sheng Camtepe, Seyit Nepal, Surya Xiang, Yang Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC Australia CSIRO's Data61 Cybersecurity and Quantum Systems Group Australia
AI-enabled critical infrastructures (ACIs) integrate artificial intelligence (AI) technologies into various essential systems and services that are vital to the functioning of society, offering significant implication... 详细信息
来源: 评论
SPViT: Accelerate Vision Transformer Inference on Mobile Devices via Adaptive Splitting and Offloading
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Zhao, Sifan Liu, Tongtong Jin, Hai Yao, Dezhong Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Vision Transformer (ViT), which benefits from utilizing self-attention mechanisms, has demonstrated superior accuracy compared to CNNs. However, due to the expensive computational costs, deploying and inferring Vi... 详细信息
来源: 评论
FIRE: combining multi-stage filtering with taint analysis for scalable recurring vulnerability detection  24
FIRE: combining multi-stage filtering with taint analysis fo...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Siyue Feng Yueming Wu Wenjie Xue Sikui Pan Deqing Zou Yang Liu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Cyber Science and Engineering Huazhong University of Science and Technology China and Jinyinhu Laboratory China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology China
With the continuous development of software open-sourcing, the reuse of open-source software has led to a significant increase in the occurrence of recurring vulnerabilities. These vulnerabilities often arise through ...
来源: 评论
Decision Systems in Cybersecurity: A Machine Learning Perspective  12th
Decision Systems in Cybersecurity: A Machine Learning Perspe...
收藏 引用
12th International Conference on Frontiers of Intelligent computing: Theory and Applications, FICTA 2024
作者: Dhablia, Anishkumar Ganesh, R. Senthil Rizvi, Nuzhat Arora, Himanshu Borade, Monali Ravindra Bhujbal, Pallavi Altimetrik India Pvt. Ltd Maharashtra Pune India Department of Electronics and Communication Engineering Sri Krishna College of Engineering and Technology Tamilnadu Coimbatore India Nagpur Campus Pune India Computer Science and Engineering Arya College of Engineering Jaipur India Artificial Intelligence and Data Science VIIT Pune India Department of Information Technology School of Computing MIT ADT University Loni Kalbhor Pune India
The evolving digital environment requires sophisticated decision systems to protect important information assets from the growing complexity and variety of cyber threats. This review paper examines the impact of machi... 详细信息
来源: 评论
Nonlinear Interference-Aware Routing,Wavelength and Power Allocation in C+L+S Multi-Band Optical Networks
收藏 引用
China Communications 2025年 第4期22卷 129-142页
作者: Zhang Xu Xie Wang Feng Chuan Zeng Hankun Zhou Shanshan Zhang Fan Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China
Multi-band optical networks are a potential technology for increasing network ***,the strong interference and non-uniformity between wavelengths in multi-band optical networks have become a bottleneck restricting the ... 详细信息
来源: 评论
FLARE: A New Federated Learning Framework with Adjustable Learning Rates over Resource-Constrained Wireless Networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Xiao, Bingnan Zhang, Jingjing Ni, Wei Wang, Xin Fudan University School of Information Science and Technology Department of Communication Science and Engineering Shanghai200433 China CSIRO Data61 MarsfieldNSW2122 Australia School of Computing Science and Engineering KenningtonNSW2052 Australia
Wireless federated learning (WFL) suffers from heterogeneity prevailing in the data distributions, computing powers, and channel conditions of participating devices. This paper presents a new Federated Learning with A... 详细信息
来源: 评论
FROM LAYERS TO STATES: A STATE SPACE MODEL PERSPECTIVE TO DEEP NEURAL NETWORK LAYER DYNAMICS
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Qinshuo Zhao, Weiqin Huang, Wei Fang, Yanwen Yu, Lequan Li, Guodong School of Computing and Data Science The University of Hong Kong Hong Kong Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong
The depth of neural networks is a critical factor for their capability, with deeper models often demonstrating superior performance. Motivated by this, significant efforts have been made to enhance layer aggregation -... 详细信息
来源: 评论
An Effective Docker Image Slimming Approach Based on Source Code data Dependency Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Han, Jiaxuan Huang, Cheng Liu, Jiayong Zhang, Tianwei School of Cyber Science and Engineering Sichuan University Sichuan Chengdu China College of Computing and Data Science Nanyang Technological University Singapore Singapore
Containerization is the mainstream of current software development, which enables software to be used across platforms without additional configuration of running environment. However, many images created by developer... 详细信息
来源: 评论