咨询与建议

限定检索结果

文献类型

  • 2,166 篇 期刊文献
  • 1,791 篇 会议
  • 17 册 图书

馆藏范围

  • 3,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,630 篇 工学
    • 1,949 篇 计算机科学与技术...
    • 1,608 篇 软件工程
    • 632 篇 信息与通信工程
    • 398 篇 电气工程
    • 385 篇 生物工程
    • 362 篇 控制科学与工程
    • 254 篇 电子科学与技术(可...
    • 246 篇 生物医学工程(可授...
    • 239 篇 光学工程
    • 152 篇 机械工程
    • 122 篇 化学工程与技术
    • 118 篇 交通运输工程
    • 106 篇 网络空间安全
    • 104 篇 动力工程及工程热...
    • 99 篇 仪器科学与技术
    • 90 篇 安全科学与工程
  • 1,424 篇 理学
    • 730 篇 数学
    • 434 篇 生物学
    • 353 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 135 篇 化学
  • 747 篇 管理学
    • 468 篇 管理科学与工程(可...
    • 320 篇 图书情报与档案管...
    • 225 篇 工商管理
  • 258 篇 医学
    • 221 篇 临床医学
    • 192 篇 基础医学(可授医学...
    • 121 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 122 篇 法学
    • 101 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 38 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学
  • 3 篇 艺术学

主题

  • 135 篇 deep learning
  • 123 篇 accuracy
  • 107 篇 machine learning
  • 104 篇 feature extracti...
  • 93 篇 semantics
  • 93 篇 training
  • 91 篇 computational mo...
  • 77 篇 data models
  • 71 篇 real-time system...
  • 69 篇 internet of thin...
  • 68 篇 predictive model...
  • 61 篇 convolutional ne...
  • 57 篇 federated learni...
  • 55 篇 reinforcement le...
  • 51 篇 graph neural net...
  • 47 篇 deep neural netw...
  • 46 篇 artificial intel...
  • 45 篇 data mining
  • 43 篇 optimization
  • 40 篇 convolution

机构

  • 177 篇 college of compu...
  • 103 篇 national enginee...
  • 101 篇 beijing advanced...
  • 77 篇 nanyang technolo...
  • 69 篇 school of comput...
  • 61 篇 national enginee...
  • 50 篇 school of big da...
  • 50 篇 school of comput...
  • 46 篇 school of comput...
  • 45 篇 school of cyber ...
  • 39 篇 national enginee...
  • 35 篇 university of ch...
  • 33 篇 college of compu...
  • 33 篇 college of intel...
  • 32 篇 services computi...
  • 32 篇 school of comput...
  • 32 篇 hubei engineerin...
  • 31 篇 school of comput...
  • 30 篇 school of data a...
  • 28 篇 hubei key labora...

作者

  • 161 篇 niyato dusit
  • 104 篇 hai jin
  • 99 篇 jin hai
  • 32 篇 kang jiawen
  • 31 篇 xiaofei liao
  • 27 篇 tao dacheng
  • 27 篇 shen linlin
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 sun geng
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 li tianrui
  • 20 篇 wang jiacheng
  • 20 篇 du hongyang
  • 19 篇 haikun liu
  • 19 篇 dusit niyato
  • 19 篇 xiwang dong
  • 18 篇 yang yang

语言

  • 3,416 篇 英文
  • 530 篇 其他
  • 35 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3974 条 记 录,以下是531-540 订阅
排序:
Explainable AI for Intrusion Prevention: A Review of Techniques and Applications  7th
Explainable AI for Intrusion Prevention: A Review of Techniq...
收藏 引用
7th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2023
作者: Chandre, Pankaj R. Vanarote, Viresh Patil, Rajkumar Mahalle, Parikshit N. Shinde, Gitanjali R. Nimbalkar, Madhukar Barot, Janki Department of Computer Science and Engineering MIT School of Computing MIT ADT University Loni Kalbhor India Department of Information Technology MIT School of Computing MIT ADT University Loni Kalbhor India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology Kondhawa India Department of Computer Science and Engineering Vishwakarma Institute of Information Technology Kondhawa India Silver Oak University Ahmedabad India
Intrusion prevention has become a critical concern in today's increasingly complex and interconnected digital systems. Traditional intrusion prevention methods often rely on rule-based approaches that can be infle... 详细信息
来源: 评论
SAC-ViT: Semantic-Aware Clustering Vision Transformer with Early Exit
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Youbing Cheng, Yun Lu, Anqi Wei, Dawei Li, Zhijun Faculty of Computing Harbin Institute of Technology China Swiss Data Science Center Zurich Switzerland School of Cyber Engineering Xidian University China
The Vision Transformer (ViT) excels in global modeling but faces deployment challenges on resource-constrained devices due to the quadratic computational complexity of its attention mechanism. To address this, we prop... 详细信息
来源: 评论
Unveiling the Digital Shadows: A Comprehensive Exploration of Network Forensics Methodologies
Unveiling the Digital Shadows: A Comprehensive Exploration o...
收藏 引用
Emerging Research in Computational Science (ICERCS), International Conference on
作者: Dhanalakota Sai Jyothika Nandini B. Lanitha H. Azath Ganeshan R Sajjad Ahmed School of Computing Science and Engineering VIT Bhopal University Kothrikalan Sehore India Department of Artificial Intelligence and Data Science Karpagam Academy of Higher Education Coimbatore India School of Computing Science and Engineering VIT Bhopal University Sehore India
The Internet has experienced significant growth in attacks that affect network security features such as confidentiality, integrity, and availability. Network security and network forensics work together to ensure sys... 详细信息
来源: 评论
EEG Sleep Stages Classification using Transformer-based Models: A Review
EEG Sleep Stages Classification using Transformer-based Mode...
收藏 引用
computing Innovation, Intelligence, Technologies and Education (CIITE), International Conference on
作者: Yuin Torng Yew Jia Hong Puah Chow Khuen Chan Norita Mohd Zain Chean Khim Toa Sim Kuan Goh Department of Biomedical Engineering Faculty of Engineering Universiti Malaya School of Energy and Chemical Engineering Xiamen University Malaysia School of Electrical Engineering and Artificial Intelligence Xiamen University Malaysia School of Computing and Data Science Xiamen University Malaysia
Sleep research is vital for understanding the complexities of human physiology and promoting overall health and well-being. Despite its importance, sleep disorders are widespread and can significantly impact daily fun... 详细信息
来源: 评论
Implementing Multi-factor Authentication in Cloud Services for Enhanced Security
Implementing Multi-factor Authentication in Cloud Services f...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Rekha, K. Sashi Sivagami, V.M. Usharani, R. Amutha, T. Pushparani, S. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Sri Venkateswara College of Engineering Department of Information Technology Tamil Nadu Chennai India Srm Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Computational Intelligence Kattankulathur Chennai India Care College of Engineering Department of Artificial Intelligence & Data Science Tamil Nadu Trichy India Meenakshi College of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
The cloud services which are now the most common data transmission and endanger organizations' confidential information, it's more and more visible that security of any data should be a main priority for compa... 详细信息
来源: 评论
Deep Learning-Driven Smart Signal Systems for Advanced Image and Video Processing in Urban Infrastructure
Deep Learning-Driven Smart Signal Systems for Advanced Image...
收藏 引用
Smart Technologies, Communication and Robotics (STCR)
作者: K. S. Bharaty Praveen SR Konduri Department of EEE School of Engineering Mohan Babu University Tirupati Andhra Pradesh Department of Data Science School of Computing Mohan Babu University Tirupati Andhra Pradesh
The increasing integration of intelligent systems in metropolitan environments emphasizes the important role effective image and video processing performs in applications including the traffic management, the monitori... 详细信息
来源: 评论
BP-DDI: Drug-drug interaction prediction based on biological information and pharmacological text
BP-DDI: Drug-drug interaction prediction based on biological...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Dou, Mingliang Han, Han Chen, Genlang Guo, Fei Tang, Jijun Tianjin University College of Intelligence and Computing Tianjin China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China NingboTech University School of Computer and Data Engineering Ningbo China Central South University School of Computer Science and Engineering Changsha China University of South Carolina College of Engineering and Computing United States
In the treatment of many diseases, combination drug therapy has been widely used and achieved good clinical efficacy. However, drug-drug interaction (DDI) may occur between multiple drugs and pose a huge threat to the... 详细信息
来源: 评论
Generative AI: A Review on Models and Applications  2
Generative AI: A Review on Models and Applications
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Kaswan, Kuldeep Singh Dhatterwal, Jagjit Singh Malik, Kiran Baliyan, Anupam School of Computing Science and Engineering Galgotias University UP Greater Noida India Koneru Lakshmaiah Education Foundation Artificial Intelligence and Data Science AP Guntur India Matu Ram Institute of Engineering and Management Computer Science and Engineering Haryana Rohtak India Chandigarh University Department of Computer Science and Engineering Chandigarh India
Generative Artificial Intelligence (AI) stands as a transformative paradigm in machine learning, enabling the creation of complex and realistic data from latent representations. This review paper comprehensively surve... 详细信息
来源: 评论
Impact of Application Choice on iTracker Model Performance Evaluation: A Perspective  2
Impact of Application Choice on iTracker Model Performance E...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Moghlebey, Adam Bou Haydar, Hady Moubayed, Abdallah Injadat, MohammadNoor School of Computing and Augmented Intelligence Arizona State University GilbertAZ United States Lebanese American University Electrical and Computer Engineering Department Byblos Lebanon Zarqa University Data Science and Artificial Intelligence Department Zarqa Jordan
Eye tracking is underpinned by the eye-mind hypothesis, which posits that individuals tend to direct their gaze toward the information they are currently cognitively engaged with. This aspect has garnered significant ... 详细信息
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论