咨询与建议

限定检索结果

文献类型

  • 3,554 篇 会议
  • 2,746 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 6,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,942 篇 工学
    • 2,697 篇 计算机科学与技术...
    • 2,177 篇 软件工程
    • 745 篇 信息与通信工程
    • 713 篇 控制科学与工程
    • 492 篇 生物工程
    • 451 篇 电气工程
    • 397 篇 生物医学工程(可授...
    • 338 篇 电子科学与技术(可...
    • 294 篇 机械工程
    • 291 篇 光学工程
    • 207 篇 动力工程及工程热...
    • 174 篇 交通运输工程
    • 169 篇 仪器科学与技术
    • 167 篇 化学工程与技术
    • 151 篇 安全科学与工程
  • 2,222 篇 理学
    • 1,249 篇 数学
    • 566 篇 物理学
    • 545 篇 生物学
    • 408 篇 统计学(可授理学、...
    • 339 篇 系统科学
    • 195 篇 化学
  • 1,087 篇 管理学
    • 717 篇 管理科学与工程(可...
    • 417 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 412 篇 医学
    • 355 篇 临床医学
    • 314 篇 基础医学(可授医学...
    • 184 篇 药学(可授医学、理...
    • 167 篇 公共卫生与预防医...
  • 214 篇 法学
    • 181 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 108 篇 教育学
  • 68 篇 农学
  • 15 篇 军事学
  • 13 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 152 篇 computational mo...
  • 136 篇 feature extracti...
  • 127 篇 machine learning
  • 119 篇 training
  • 118 篇 deep learning
  • 111 篇 artificial intel...
  • 105 篇 accuracy
  • 93 篇 semantics
  • 90 篇 data models
  • 89 篇 predictive model...
  • 77 篇 cloud computing
  • 74 篇 optimization
  • 72 篇 computer archite...
  • 71 篇 educational inst...
  • 69 篇 neural networks
  • 68 篇 monitoring
  • 67 篇 data mining
  • 64 篇 visualization
  • 58 篇 internet of thin...
  • 57 篇 security

机构

  • 123 篇 school of comput...
  • 104 篇 school of comput...
  • 97 篇 school of comput...
  • 85 篇 school of mathem...
  • 53 篇 school of comput...
  • 46 篇 lsec institute o...
  • 42 篇 school of artifi...
  • 42 篇 school of comput...
  • 40 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 yunnan key labor...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 30 篇 school of inform...
  • 29 篇 center for compl...
  • 27 篇 school of system...
  • 25 篇 academy of mathe...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 school of engine...

作者

  • 41 篇 buyya rajkumar
  • 39 篇 niyato dusit
  • 36 篇 rajkumar buyya
  • 28 篇 wang yalin
  • 25 篇 xiong gang
  • 24 篇 lee joohyung
  • 23 篇 zhen shen
  • 22 篇 sonya coleman
  • 21 篇 rajeswari d.
  • 20 篇 kinshuk
  • 20 篇 liu ya-feng
  • 19 篇 filippo radicchi
  • 19 篇 yu haijun
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 liu yang
  • 18 篇 yinong chen

语言

  • 6,123 篇 英文
  • 234 篇 其他
  • 51 篇 中文
  • 6 篇 西班牙文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 爱沙尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=School of Computing and Engineering Systems"
6412 条 记 录,以下是91-100 订阅
排序:
Quantum Direct Steganography Scheme Based on Modified Generator Projection Directions of Steane Code over a Single-Type Pauli Channel
arXiv
收藏 引用
arXiv 2025年
作者: Hao, Chaolong Ma, Quangong Qu, Dan Shi, Dawei School of Information Systems Engineering Information Engineering University 62 Science Avenue Zhengzhou450001 China Laboratory for Advanced Computing and Intelligence Engineering Jiangsu Wuxi214000 China
In quantum mechanics, measurements of a quantum state in various directions yield distinct outcomes, a principle that forms the foundation of quantum communication theory. This paper expands upon this concept by intro... 详细信息
来源: 评论
Optimization of 6G resource allocation using CyberTwin function-based service enhancement scheme
收藏 引用
Eurasip Journal on Wireless Communications and Networking 2025年 第1期2025卷 1-27页
作者: Aldrees, Asma Min, Hong Daradkeh, Yousef Ibrahim Dutta, Ashit Kumar Anjum, Mohd Department of Informatics and Computer Systems College of Computer Science King Khalid University Abha61421 Saudi Arabia School of Computing Gachon University Seongnam13120 Korea Republic of Department of Computer Engineering and Information College of Engineering in Wadi Alddawasir Prince Sattam Bin Abdulaziz University Al-Kharj16273 Saudi Arabia Department of Computer Science and Information Systems College of Applied Sciences Almaarefa University Ad Diriyah Riyadh13713 Saudi Arabia Department of Computer Engineering Aligarh Muslim University Aligarh202002 India
The most innovative Service-Optimized Logging for Resource Allocation (SOL-RA) is in situations that support 6G connection. The CyberTwin architecture optimizes the quality of service provided to end users in 6G commu... 详细信息
来源: 评论
Deep Learning Approaches for Anti-Money Laundering on Mobile Transactions: Review, Framework, and Directions
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Jiani Shar, Lwin Khin Zhang, Ruichen Liu, Ziyao Yang, Wenzhuo Niyato, Dusit Mao, Bomin Lam, Kwok-Yan School of Computer Science and Engineering Nanyang Technological University Singapore School of Computing and Information Systems Singapore Management University Singapore School of Cybersecurity Northwestern Polytechnical University China
Money laundering is a financial crime that obscures the origin of illicit funds, necessitating the development and enforcement of anti-money laundering (AML) policies by governments and organizations. The proliferatio... 详细信息
来源: 评论
Illusion Spaces in VR: The Interplay Between Size and Taper Angle Perception in Grasping  25
Illusion Spaces in VR: The Interplay Between Size and Taper ...
收藏 引用
Proceedings of the 2025 CHI Conference on Human Factors in computing systems
作者: Jian Zhang Wafa Johal Jarrod Knibbe School of Computing and Information Systems University of Melbourne Melbourne VIC Australia School of Electrical Engineering and Computer Science The University of Queensland St Lucia QLD Australia
来源: 评论
A machine learning predictive model for bushfire ignition and severity: The Study of Australian black summer bushfires
收藏 引用
Decision Analytics Journal 2025年 14卷
作者: Henderson, Kasinda Chakrabortty, Ripon K. School of Engineering & Technology UNSW Canberra ACT-2610 Australia School of Systems & Computing UNSW Canberra ACT-2610 Australia
Australian bushfires are catastrophic, and their impacts span social, economic, and environmental factors. To reduce the damages experienced by bushfires, predicting Australian bushfire ignition allows for an early wa... 详细信息
来源: 评论
A Survey on Privacy and Security in Distributed Cloud computing: Exploring Federated Learning and Beyond
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 3710-3744页
作者: Rahdari, Ahmad Keshavarz, Elham Nowroozi, Ehsan Taheri, Rahim Hajizadeh, Mehrdad Mohammadi, Mohammadreza Sinaei, Sima Bauschert, Thomas Shiraz University School of Electrical and Computer Engineering Shiraz71946-84636 Iran Pishtazan Institute of Higher Education Department of Computer Engineering Shiraz71957-93436 Iran University of Greenwich Centre for Sustainable Cyber Security LondonSE10 9LS United Kingdom University of Portsmouth PAIDS Reserach Centre School of Computing PortsmouthPO1 2UP United Kingdom Technische Universität Chemnitz Chair of Communication Networks Chemnitz09111 Germany Department Digital Systems Gothenburg412 58 Sweden
The increasing need to process large, high-dimensional datasets and the substantial computational power required have made the use of distributed cloud servers essential. These servers provide cost-effective solutions... 详细信息
来源: 评论
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Deng, Zehang Sun, Ruoxi Xue, Minhui Wen, Sheng Camtepe, Seyit Nepal, Surya Xiang, Yang Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC Australia CSIRO's Data61 Cybersecurity and Quantum Systems Group Australia
AI-enabled critical infrastructures (ACIs) integrate artificial intelligence (AI) technologies into various essential systems and services that are vital to the functioning of society, offering significant implication... 详细信息
来源: 评论
A Vertical Federated Multi-View Fuzzy Clustering Method for Incomplete Data
收藏 引用
IEEE Transactions on Fuzzy systems 2025年 第5期33卷 1510-1524页
作者: Li, Yan Hu, Xingchen Yu, Shengju Ding, Weiping Pedrycz, Witold Kiat, Yeo Chai Liu, Zhong National University of Defense Technology Laboratory for Big Data and Decision Hunan Changsha410073 China National University of Defense Technology School of Computer Hunan Changsha410073 China Nantong University School of Artificial Intelligence and Computer Science Nantong226019 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Polish Academy of Sciences Systems Research Institute Warsaw00-901 Poland Istinye University Faculty of Engineering and Natural Sciences Department of Computer Engineering Turkey Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore
Multi-view fuzzy clustering (MVFC) has gained widespread adoption owing to its inherent flexibility in handling ambiguous data. The proliferation of privatization devices has driven the emergence of new challenge in M... 详细信息
来源: 评论
Runtime Backdoor Detection for Federated Learning via Representational Dissimilarity Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Xiyue Xue, Xiaoyong Du, Xiaoning Xie, Xiaofei Liu, Yang Sun, Meng School of Computer Science University of Bristol United Kingdom Department of Information and Computing Science School of Mathematical Science Peking University China Department of Software Systems and Cybersecurity Monash University Australia School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Engineering Nanyang Technological University Singapore
Federated learning (FL), as a powerful learning paradigm, trains a shared model by aggregating model updates from distributed clients. However, the decoupling of model learning from local data makes FL highly vulnerab... 详细信息
来源: 评论
IvyCross: a Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Li, Ming Weng, Jian Weng, Jiasi Li, Yi Wu, Yongdong Li, Dingcheng Xu, Guowen Deng, Robert Singapore Management University School of Computing and Information Systems 178902 Singapore Jinan University College of Cyber Security Guangzhou510632 China Nanyang Technological University School of Computer Science and Engineering Singapore
Interoperability is a fundamental challenge for longenvisioned blockchain applications. A mainstream approach is using Trusted Execution Environment (TEE) to support interoperable off-chain execution. However, this in... 详细信息
来源: 评论