咨询与建议

限定检索结果

文献类型

  • 6,177 篇 会议
  • 5,196 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,400 篇 工学
    • 5,327 篇 计算机科学与技术...
    • 4,386 篇 软件工程
    • 1,746 篇 信息与通信工程
    • 1,064 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 676 篇 电子科学与技术(可...
    • 600 篇 生物医学工程(可授...
    • 556 篇 光学工程
    • 538 篇 机械工程
    • 366 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 318 篇 动力工程及工程热...
    • 316 篇 网络空间安全
    • 264 篇 交通运输工程
    • 249 篇 安全科学与工程
  • 4,100 篇 理学
    • 2,036 篇 数学
    • 1,294 篇 物理学
    • 1,009 篇 生物学
    • 681 篇 统计学(可授理学、...
    • 415 篇 系统科学
    • 375 篇 化学
  • 2,056 篇 管理学
    • 1,214 篇 管理科学与工程(可...
    • 920 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 612 篇 医学
    • 527 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 393 篇 法学
    • 306 篇 社会学
  • 188 篇 经济学
  • 155 篇 教育学
  • 141 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 304 篇 deep learning
  • 260 篇 feature extracti...
  • 260 篇 machine learning
  • 224 篇 computational mo...
  • 208 篇 accuracy
  • 187 篇 semantics
  • 175 篇 internet of thin...
  • 175 篇 predictive model...
  • 167 篇 training
  • 149 篇 real-time system...
  • 118 篇 data mining
  • 114 篇 neural networks
  • 113 篇 support vector m...
  • 113 篇 optimization
  • 112 篇 artificial intel...
  • 111 篇 security
  • 106 篇 computer science
  • 95 篇 visualization
  • 92 篇 data models
  • 90 篇 cloud computing

机构

  • 175 篇 university of ch...
  • 123 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 95 篇 hebei normal uni...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 88 篇 school of comput...
  • 87 篇 department of ph...
  • 78 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 57 篇 school of inform...
  • 57 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 school of comput...
  • 53 篇 college of compu...
  • 53 篇 college of intel...
  • 52 篇 institute for nu...
  • 52 篇 school of physic...

作者

  • 97 篇 niyato dusit
  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 9,626 篇 英文
  • 1,742 篇 其他
  • 130 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11498 条 记 录,以下是941-950 订阅
排序:
Privacy-preserving data aggregation achieving completeness of data queries in smart grid
Privacy-preserving data aggregation achieving completeness o...
收藏 引用
作者: Li, Xinyang Zhao, Meng Ding, Yong Yang, Changsong Wang, Huiyong Liang, Hai Wang, Yujue Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While tra... 详细信息
来源: 评论
Boosting cationic and anionic redox activity of Li-rich layered oxide cathodes via Li/Ni disordered regulation
收藏 引用
Journal of Energy Chemistry 2025年 第1期100卷 533-543页
作者: Zewen Liu Zhen Wu Hao Wang Xudong Zhang Yuanzhen Chen Yongning Liu Shengwu Guo Shenghua Chen Yanli Nan Yan Liu State Key Laboratory for Mechanical Behavior of Materials Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina School of Materials Science and Engineering Xi’an University of Architecture and TechnologyXi’an 710055ShaanxiChina Hefei Advanced Computing Center Operation Management Corp Ltd Hefei 230088AnhuiChina Network Information Center Xi’an Jiaotong UniversityXi’an 710049ShaanxiChina
Lithium-rich layered oxides (LLOs) are increasingly recognized as promising cathode materials for nextgeneration high-energy-density lithium-ion batteries (LIBs).However,they suffer from voltage decay and low initial ... 详细信息
来源: 评论
Importance-Awareness Masking Network for Robust Document Retrieval
Importance-Awareness Masking Network for Robust Document Ret...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Junping He, Jiaqi Hu, Xinrong Yang, Wangli Yang, Jie Guo, Yi School of Computer Science and Artificial Intelligence Wuhan Textile University Wuhan China School of Computing and Information Technology University of Wollongong Wollongong Australia School of Computer Data and Mathematical Sciences Western Sydney University Australia
In this paper, we introduce the IMPortance-awaReness maskIng NeTwork (IMPRINT), a novel approach to enhance the robustness of document retrieval systems against query variations, particularly those containing misspell... 详细信息
来源: 评论
Model for Recognition of Sign Language and Hand Gesture by Hard Hearing People
Model for Recognition of Sign Language and Hand Gesture by H...
收藏 引用
2023 International Conference on Sustainable Communication Networks and Application, ICSCNA 2023
作者: Manjula, R. Jagadeesan, S. Ramalingam, Venkadeshan Vetriselvi, T. Johnpeter, T. Srm Institute of Science and Technology College of Engineering and Technology Department of Computing Technologies Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Tamilnadu Vellore India Information Technology Department University of Technology and Applied Sciences-Shinas Branch Sultanate of Oman Oman Vellore Institute of Technology School of Computer Science and Engineering Department of Iot Tamilnadu Vellore India K.Ramakrishnan College of Engineering Department of Computer Science and Engineering Trichy India
Hard hearing and deaf people are communicating with other people using the sign language. This is the only way of communication of such people to convey Since this is the only means by which these individuals can comm... 详细信息
来源: 评论
Optimal Logistics Activities Based Deep Learning Enabled Traffic Flow Prediction Model
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5269-5282页
作者: Basim Aljabhan Mahmoud Ragab Sultanah M.Alshammari Abdullah S.Al-Malaise Al-Ghamdi Ports and Maritime Transportation Department Faculty of Maritime StudiesKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Center of Excellence in Smart Environment Research King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia S 7Information Systems Department HECI SchoolDar Alhekma UniversityJeddahSaudi Arabia
Traffic flow prediction becomes an essential process for intelligent transportation systems(ITS).Though traffic sensor devices are manually controllable,traffic flow data with distinct length,uneven sampling,and missi... 详细信息
来源: 评论
SNCA:Semi-Supervised Node Classification for Evolving Large Attributed Graphs
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 794-808页
作者: Faima Abbasi Muhammad Muzammal Qiang Qu Farhan Riaz Jawad Ashraf Luxembourg Institute of Science and Technology and University of Luxembourg Esch-Sur-Alzette L-4362Luxembourg Department of Computer and Information Sciences Northumbria UniversityNewcastle NE18STUK Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China School of Computer Science University of LincolnLincoln LN67TSUK Faculty of Computing Engineering and MediaDe Montfort UniversityLeicesterLE19BHUK
Attributed graphs have an additional sign vector for each ***,edge signs represent like or dislike relationship between the node *** has applications in domains,such as recommender systems,personalised search,***,limi... 详细信息
来源: 评论
Enabling Fuzzy Matching in Privacy-preserving Bilateral Task Recommendation  9
Enabling Fuzzy Matching in Privacy-preserving Bilateral Task...
收藏 引用
9th International Conference on Big Data computing and Communications, BigCom 2023
作者: Zhang, Chuan Luo, Xingqi Zhang, Weiting Zhao, Mingyang Liang, Jinwen Wu, Tong Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Beijing Jiaotong University School of Electronic and Information Engineering Beijing China Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
Privacy-preserving bilateral task recommendation is an emerging functionality in mobile crowdsensing, enabling two-sided matching for both task publishers and workers while ensuring the confidentiality of both partici... 详细信息
来源: 评论
Fed-SC: One-Shot Federated Subspace Clustering over High-Dimensional Data  39
Fed-SC: One-Shot Federated Subspace Clustering over High-Dim...
收藏 引用
39th IEEE International Conference on Data Engineering, ICDE 2023
作者: Xie, Songjie Wu, Youlong Liao, Kewen Chen, Lu Liu, Chengfei Shen, Haifeng Tang, MingJian Sun, Lu ShanghaiTech University School of Information Science and Technology Shanghai China Australian Catholic University HilstLab Peter Faber Business School Sydney Australia Swinburne University of Technology Department of Computing Technologies Melbourne Australia Atlassian Australia
Recent work has explored federated clustering and developed an efficient k-means based method. However, it is well known that k-means clustering underperforms in high-dimensional space due to the so-called "curse... 详细信息
来源: 评论
Streamlining Task Planning Systems for Improved Enactment in Contemporary computing Surroundings
收藏 引用
SN Computer science 2024年 第8期5卷 1-9页
作者: Menon, Sindhu Addula, Santosh Reddy Parkavi, A. Subbalakshmi, Ch. Dhandayuthapani, V. Bala Pokkuluri, Kiran Sree Soni, Anita School of Computing and Information Technology REVA University Karnataka Bangalore India Department of Information Technology University of the Cumberlands Williamsburg KY United States Dept of CSE M S Ramaiah Institute of Technology Bangalore India Department of Computer Science and Engineering Guru Nanak Institution Technical Campus (Autonomous) Ibrahimpatnam Ranga Reddy District Telagana State Hyderabad 501506 India Department of IT College of Computing and Information Sciences University of Technology and Applied Sciences Shinas Campus Oman Department of Computer Science and Engineering Shri Vishnu Engineering College for Women Bhimavaram India CSE Department IES University Bhopal Madhya Pradesh Bhopal India
Task planning algorithms are essential for maximizing efficiency and enhancing performance in modern computing systems, given the escalating demand for computational resources. This paper delves into the effectiveness... 详细信息
来源: 评论
Health Care DNS Tunnelling Detection Method via Spiking Neural Network  3rd
Health Care DNS Tunnelling Detection Method via Spiking Neur...
收藏 引用
3rd International Conference on Emergent Converging Technologies and Biomedical Systems, ETBS 2023
作者: Kumar, Narendra Surendiran, R. Samuel, G. K. Jabash Bhavana, N. Shirgire, Anil Malar, A. Jasmine Gnana Qalid, Aznul Faculty of Science and Technology NIET NIMS University Rajasthan Jaipur303121 India School of Information Science Annai College of Arts and Science Tamilnadu Kumbakonam612503 India Department of Electrical and Electronics Engineering Rohini College of Engineering and Technology Kanyakumari India School of Computing and Information Technology REVA University Karnataka Bengaluru560064 India Department of Civil Engineering Dr D Y Patil Institute of Technology Maharashtra Pimpri Pune411018 India Department of Electrical and Electronics Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli627152 India Department of Artificial Intelligence Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
A common DNS exploit that has been used for several decades to steal data is DNS tunneling. To avoid being detected as an intrusion from healthcare domain, the stolen health information is encoded and contained within... 详细信息
来源: 评论