咨询与建议

限定检索结果

文献类型

  • 6,062 篇 会议
  • 5,136 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,323 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,286 篇 工学
    • 5,245 篇 计算机科学与技术...
    • 4,334 篇 软件工程
    • 1,734 篇 信息与通信工程
    • 1,039 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 668 篇 电子科学与技术(可...
    • 590 篇 生物医学工程(可授...
    • 571 篇 光学工程
    • 538 篇 机械工程
    • 360 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 312 篇 网络空间安全
    • 266 篇 交通运输工程
    • 244 篇 安全科学与工程
  • 4,080 篇 理学
    • 2,014 篇 数学
    • 1,296 篇 物理学
    • 1,007 篇 生物学
    • 674 篇 统计学(可授理学、...
    • 413 篇 系统科学
    • 374 篇 化学
  • 2,046 篇 管理学
    • 1,208 篇 管理科学与工程(可...
    • 917 篇 图书情报与档案管...
    • 563 篇 工商管理
  • 603 篇 医学
    • 518 篇 临床医学
    • 457 篇 基础医学(可授医学...
    • 283 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 394 篇 法学
    • 307 篇 社会学
  • 187 篇 经济学
  • 149 篇 教育学
  • 139 篇 农学
  • 37 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 292 篇 deep learning
  • 268 篇 machine learning
  • 259 篇 feature extracti...
  • 216 篇 computational mo...
  • 192 篇 accuracy
  • 184 篇 semantics
  • 168 篇 internet of thin...
  • 167 篇 predictive model...
  • 163 篇 training
  • 142 篇 real-time system...
  • 116 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 neural networks
  • 110 篇 artificial intel...
  • 108 篇 optimization
  • 107 篇 computer science
  • 107 篇 security
  • 96 篇 visualization
  • 89 篇 cloud computing
  • 87 篇 data models

机构

  • 172 篇 university of ch...
  • 121 篇 key laboratory o...
  • 112 篇 university of sc...
  • 96 篇 tianfu cosmic ra...
  • 90 篇 hebei normal uni...
  • 88 篇 state key labora...
  • 88 篇 school of comput...
  • 88 篇 school of comput...
  • 86 篇 department of ph...
  • 85 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 53 篇 school of inform...
  • 53 篇 school of comput...
  • 52 篇 school of comput...
  • 52 篇 college of intel...
  • 48 篇 school of physic...
  • 47 篇 institute for nu...
  • 46 篇 department of co...

作者

  • 89 篇 niyato dusit
  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 70 篇 kuleshov d.
  • 70 篇 li cheng
  • 69 篇 li xin
  • 69 篇 liu d.
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 66 篇 dai h.l.
  • 62 篇 min z.
  • 60 篇 guo y.q.
  • 57 篇 liu b.
  • 56 篇 heller m.
  • 56 篇 bao y.w.
  • 55 篇 hu h.b.

语言

  • 10,577 篇 英文
  • 617 篇 其他
  • 122 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11323 条 记 录,以下是111-120 订阅
排序:
A prompt-based approach to adversarial example generation and robustness enhancement
收藏 引用
Frontiers of Computer science 2024年 第4期18卷 85-96页
作者: Yuting YANG Pei HUANG Juan CAO Jintao LI Yun LIN Feifei MA Key Lab of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing TechnologyCASBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China Department of Computer Science Stanford UniversityCA 94305USA School of Computing National University of SingaporeSingapore 119077Singapore Laboratory of Parallel Software and Computational Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
Recent years have seen the wide application of natural language processing(NLP)models in crucial areas such as finance,medical treatment,and news media,raising concerns about the model robustness and *** find that pro... 详细信息
来源: 评论
Demystifying Ethereum account diversity:observations,models and analysis
收藏 引用
Frontiers of Computer science 2022年 第4期16卷 119-130页
作者: Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin Clusters and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Centre for Distributed and High Performance Computing School of Information TechnologiesThe University of SydneyCamperdownNew South Wales2006Australia
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,toke... 详细信息
来源: 评论
Dynamic Prediction of Intraoperative Hypotension Based on Hemodynamic Monitoring Data With a Transformer-Based Deep Learning Model
Dynamic Prediction of Intraoperative Hypotension Based on He...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Yang, Kai Ren, Mucheng Xu, Jun Zeng, Xian Nanjing University of Information Science and Technology Jiangsu Key Laboratory of Intelligent Medical Image Computing School of Future Technology Nanjing China
Timely prediction and intervention for Intraoperative Hypotension (IOH), a prevalent complication associated with general anesthesia, is crucial to prevent severe postoperative outcomes. While existing machine learnin... 详细信息
来源: 评论
Blockchain Security Using Q-Pragmatic-Sensitive Feature Analysis to Preserve Privacy  3
Blockchain Security Using Q-Pragmatic-Sensitive Feature Anal...
收藏 引用
3rd IEEE International Conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Punithavathi, S. Jeyalaksshmi, S. Vels Institute Of Science Technology & Advanced Studies Department Of Computer Science Chennai India School Of Computing Science Vels Institute Of Science Technology & Advanced Studies Department Of Information Technology Chennai India
Healthcare data contains large amounts of personal information and is privacy sensitive. The healthcare sector needs privacy protection to keep private and sensitive information safe from unauthorized access. Security... 详细信息
来源: 评论
QoS-Aware Cloud Service Optimization Algorithm in Cloud Manufacturing Environment
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 1499-1512页
作者: Wenlong Ma Youhong Xu Jianwei Zheng Sadaqat ur Rehman School of Information Engineering Quzhou College of TechnologyQuzhou324000China School of Computer Science and Technology Zhejiang University of TechnologyHangzhou310023China Department of Natural and Computing Science University of AberdeenScotlandAberdeenAB243FXUK
In a cloud manufacturing environment with abundant functionally equivalent cloud services,users naturally desire the highest-quality service(s).Thus,a comprehensive measurement of quality of service(QoS)is ***-mizing ... 详细信息
来源: 评论
Post-Quantum Cryptography: Securing Critical Infrastructure Against Emerging Quantum Threats  4
Post-Quantum Cryptography: Securing Critical Infrastructure ...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Chandre, Pankaj Hingoliwala, Hyderali Uttarkar, Amit Shendkar, Bhagyashree D Lokare, Deepali Sontakke, Palash Mit Art Design and Technology University Mit School of Computing Department of Computer Science and Engineering Pune India Mit Art Design and Technology University Mit School of Computing Department of Information Technology Pune India
The rapid advancements in quantum computing pose significant threats to traditional cryptographic systems, which are foundational to securing modern digital infrastructure. Cryptosystems like RSA and ECC, currently re... 详细信息
来源: 评论
Secure Block Chain-Based Healthcare Sensitive Data Prediction Using Pragmatic Quasi-Identifiers in a Decentralized Cloud Environment
收藏 引用
SN Computer science 2024年 第1期5卷 41页
作者: Punithavathi, S. Jeyalaksshmi, S. Department of Computer Science Vels Institute of Science Technology and Advanced Studies Chennai India Hindustan College of Arts and Science Chennai India Department of Information Technology School of Computing Science Vels Institute of Science Technology and Advanced Studies Chennai India
Security is essential for all facts, information sharing around the internet and maintaining personalized information. In recent days, the healthcare industry needs privacy-preserving to keep personalized data from ot... 详细信息
来源: 评论
Adaptive Random Evolution Whale Optimization Algorithm (AREWOA) Based Workflow Scheduling in a Virtualized Cloud Environment  15
Adaptive Random Evolution Whale Optimization Algorithm (AREW...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Nathiya, R. Preethika, S.K. Piramu VEL'S Institute of Science Technology and Advanced Studies School of Computing Sciences Department of Information Technology Tamil Nadu Chennai India
Cloud workflow task scheduling refers to assigning workflow tasks submitted by users to appropriate computer resources for execution. The workflow scheduler assigns the user request to the available Virtual Machine (V... 详细信息
来源: 评论
Gauze:enabling communication-friendly block synchronization with cuckoo filter
收藏 引用
Frontiers of Computer science 2023年 第3期17卷 113-123页
作者: Xiaoqiang DING Liushun ZHAO Lailong LUO Junjie XIE Deke GUO Jinxi LI College of Intelligence and Computing Tianjin UniversityTianjin 300350China School of Computer Science and Technology Xidian UniversityXi’an 710071China Science and Technology on Information Systems Engineering Laboratory National University of Defense TechnologyChangsha 410073China Institute of Systems Engineering AMSPLABeijing 100141China
Block synchronization is an essential component of blockchain ***,blockchain systems tend to send all the transactions from one node to another for ***,such a method may lead to an extremely high network bandwidth ove... 详细信息
来源: 评论
Optimized Deep Learning Mechanism for Intrusion Detection: Leveraging RFE-Based Feature Selection and PCA for Improved Accuracy  5
Optimized Deep Learning Mechanism for Intrusion Detection: L...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Rajkumar, M. Vs, Lakshi Karthik, R. Pavithra, S. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Smart Computing Tamil Nadu India B. Tech-Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu India
With the growing demand for wireless networks, network traffic has surged, particularly involving large-scale data transmission. This results in an increased number of network security threats and the emergence of var... 详细信息
来源: 评论