咨询与建议

限定检索结果

文献类型

  • 9,947 篇 会议
  • 6,783 篇 期刊文献
  • 177 册 图书

馆藏范围

  • 16,907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,640 篇 工学
    • 7,822 篇 计算机科学与技术...
    • 6,395 篇 软件工程
    • 2,539 篇 信息与通信工程
    • 1,525 篇 控制科学与工程
    • 1,260 篇 生物工程
    • 1,204 篇 电气工程
    • 970 篇 电子科学与技术(可...
    • 854 篇 生物医学工程(可授...
    • 796 篇 光学工程
    • 754 篇 机械工程
    • 497 篇 仪器科学与技术
    • 483 篇 化学工程与技术
    • 441 篇 动力工程及工程热...
    • 418 篇 网络空间安全
    • 379 篇 交通运输工程
    • 353 篇 安全科学与工程
  • 5,738 篇 理学
    • 2,911 篇 数学
    • 1,784 篇 物理学
    • 1,415 篇 生物学
    • 969 篇 统计学(可授理学、...
    • 595 篇 系统科学
    • 532 篇 化学
  • 3,101 篇 管理学
    • 1,794 篇 管理科学与工程(可...
    • 1,457 篇 图书情报与档案管...
    • 899 篇 工商管理
  • 862 篇 医学
    • 745 篇 临床医学
    • 654 篇 基础医学(可授医学...
    • 393 篇 公共卫生与预防医...
    • 379 篇 药学(可授医学、理...
  • 577 篇 法学
    • 470 篇 社会学
  • 328 篇 经济学
  • 257 篇 教育学
  • 221 篇 农学
  • 63 篇 文学
  • 49 篇 艺术学
  • 44 篇 军事学
  • 12 篇 哲学
  • 7 篇 历史学

主题

  • 360 篇 deep learning
  • 302 篇 computational mo...
  • 292 篇 machine learning
  • 283 篇 information tech...
  • 274 篇 feature extracti...
  • 233 篇 accuracy
  • 228 篇 internet of thin...
  • 228 篇 training
  • 199 篇 predictive model...
  • 182 篇 support vector m...
  • 177 篇 semantics
  • 176 篇 neural networks
  • 173 篇 data mining
  • 161 篇 optimization
  • 151 篇 real-time system...
  • 148 篇 image segmentati...
  • 138 篇 educational inst...
  • 128 篇 computer archite...
  • 126 篇 visualization
  • 124 篇 computer science

机构

  • 185 篇 university of ch...
  • 172 篇 key laboratory o...
  • 130 篇 school of comput...
  • 112 篇 university of sc...
  • 105 篇 institute of com...
  • 96 篇 tianfu cosmic ra...
  • 89 篇 hebei normal uni...
  • 86 篇 department of ph...
  • 86 篇 state key labora...
  • 81 篇 yunnan observato...
  • 77 篇 school of comput...
  • 73 篇 school of comput...
  • 72 篇 college of intel...
  • 70 篇 key laboratory f...
  • 60 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 department of co...
  • 56 篇 department of co...
  • 50 篇 school of comput...
  • 50 篇 school of inform...

作者

  • 89 篇 niyato dusit
  • 79 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 74 篇 bastieri d.
  • 72 篇 jiang k.
  • 70 篇 kuleshov d.
  • 70 篇 li cheng
  • 69 篇 liu d.
  • 68 篇 li xin
  • 68 篇 chen m.j.
  • 66 篇 liu s.m.
  • 64 篇 huang d.h.
  • 62 篇 min z.
  • 62 篇 dai h.l.
  • 56 篇 heller m.
  • 56 篇 guo y.q.
  • 54 篇 bao y.w.
  • 52 篇 pang b.y.
  • 52 篇 shen jun

语言

  • 15,934 篇 英文
  • 798 篇 其他
  • 171 篇 中文
  • 15 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=School of Computing and Information and Technology"
16907 条 记 录,以下是61-70 订阅
排序:
In This Special Issue: Data Breaches in the Cloud—Business Security and Risk Management
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on technology and Society 2025年 第1期6卷 2-14页
作者: Kolevski, David Michael, Katina Freeman, Mark University of Wollongong School of Computing and Information Technology WollongongNSW2500 Australia Newcastle University School of Business Newcastle upon TyneNE1 4SE United Kingdom Arizona State University School for the Future of Innovation in Society School of Computing and Augmented Intelligence TempeAZ85281 United States The University of Sydney Business School Business Information Systems Discipline NSW Sydney2006 Australia
来源: 评论
Latency- and Privacy-Aware Convolutional Neural Network Distributed Inference for Reliable Artificial Intelligence Systems
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 365-377页
作者: Hu, Yuhao Xu, Xiaolong Qi, Lianyong Zhou, Xiaokang Xia, Xiaoyu Nanjing University of Information Science and Technology School of Software Nanjing210044 China College of computer science and technology Qingdao266850 China Shiga University Faculty of Data Science Hikone522-8522 Japan RMIT University School of Computing Technologies MelbourneVIC3000 Australia
Reliable artificial intelligence (AI) systems not only propose a challenge on providing intelligent services with high quality for customers but also require customers' privacy to be protected as much as possible ... 详细信息
来源: 评论
Big Data-Driven Charging Network Optimization: Forecasting Electric Vehicle Distribution in Malaysia to Enhance Infrastructure Planning
收藏 引用
International Journal of Advanced Computer Science and Applications 2025年 第4期16卷 1020-1028页
作者: Mutian, Ouyang Maobo, Guo Tianzhou, Yu Haotian, Liu Hanlin, Yang Department of Computing UOW Malaysia KDU Penang University College Malaysia School of Business University of Wollongong Malaysia Malaysia Sydney Australia School of Information Technology Monash University Malaysia Malaysia Department of Business UOW Malaysia Selangor Malaysia
The rapid growth of electric vehicles (EVs) globally and in Malaysia has raised significant concerns regarding the adequacy and spatial imbalance of charging infrastructure. Despite government incentives and policy su... 详细信息
来源: 评论
Heterogeneous Parallel Key-Insulated Multi-Receiver Signcryption Scheme for IoV
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 5123-5137页
作者: Hou, Yingzhe Cao, Yue Xiong, Hu He, Debiao Chi, Chi-Hung Lam, Kwok-Yan Wuhan University School of Cyber Science and Engineering Wuhan430000 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
The rapid growth of electric vehicle and autonomous vehicle populations has led to explosive expansion of IoV data being transmitted in the wireless communication infrastructure. Advances in IoV technologies also resu... 详细信息
来源: 评论
Route Privacy-Preserving Authentication Scheme Based on PUF in VANETs  6th
Route Privacy-Preserving Authentication Scheme Based on PUF...
收藏 引用
6th International Conference on Security and Privacy in New computing Environments, SPNCE 2023
作者: Deng, Hanwen Liu, Yining Wang, Dong School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China
Due to the exposure of transmitted messages in public channels within Vehicular Ad-Hoc Network (VANET), many authentication schemes have been proposed to safeguard security and privacy. And in existing schemes, to exp... 详细信息
来源: 评论
Privacy Inference Attack and Defense in Centralized and Federated Learning: A Comprehensive Survey
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 333-353页
作者: Rao, Bosen Zhang, Jiale Wu, Di Zhu, Chengcheng Sun, Xiaobing Chen, Bing Yangzhou University School of Information Engineering Yangzhou225127 China University of Southern Queensland School of Mathematics Physics and Computing ToowoombaQLD4350 Australia Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China
The emergence of new machine learning methods has led to their widespread application across various domains, significantly advancing the field of artificial intelligence. However, the process of training and inferrin... 详细信息
来源: 评论
Blockchain-Based Trust Model for Inter-Domain Routing
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4821-4839页
作者: Qiong Yang Li Ma Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science Shaheed Benazir Bhutto UniversitySheringal18050Pakistan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia School of Computing andMathematical Sciences Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerthWA 6027Australia
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... 详细信息
来源: 评论
Pedestrian-Based Adaptive Traffic Light Control Using YOLOv8  24
Pedestrian-Based Adaptive Traffic Light Control Using YOLOv8
收藏 引用
7th International Conference on information Science and Systems, ICISS 2024
作者: Ortega, Gerson Itliong Ordas, Amiel Mir Odiamar Villaverde, Jocelyn Flores Juanatas, Roben Antalan Juanatas, Irish Castrojeres School of Electrical Electronics and Computer Engineering Mapua University Philippines College of Computing in Information Technologies National University Philippines Department of Information Technology FEU Diliman Philippines
The advancement of YOLO and similar computer vision models represents a technological era that could revolutionize numerous aspects of day-to-day life, including traffic management. This study explores the feasibility... 详细信息
来源: 评论
A Novel Hybrid Approach-Based on Heartbeat and Accelerometer Signals for Enhanced Security in WBSNs
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10295-10308页
作者: Yan, Guixiang Zhang, Guanghe Liu, Fanghua Williams Samuel, Oluwarotimi Aborokbah, Majed Guo, Jiquan Zhu, Liqing Wei, Sikang Jiangxi Normal University School of Computer and Information Engineering Nanchang330022 China University of Derby School of Computing and Data Science Research Centre DerbyDE22 3AW United Kingdom INTI International University Faculty of Data Science and Information Technology Nilai71800 Malaysia University of Tabuk Faculty of Computers and Information Technology Tabuk71491 Saudi Arabia Jiangxi Normal University School of Digital Industry Shangrao334000 China
In wireless body sensor networks (WBSNs), ensuring secure and efficient key distribution is critical, particularly given the limited computational and energy resources of the sensors. Existing methods often struggle t... 详细信息
来源: 评论
A Secure Protocol for Computer-Based Assessments in Disrupted Environments  5
A Secure Protocol for Computer-Based Assessments in Disrupte...
收藏 引用
5th International Conference on Advanced Research in computing, ICARC 2025
作者: Navin, Danishka De Zoysa, Kasun Karunaratna, D.D. Harshanath, Buddika University of Colombo School of Computing Colombo Sri Lanka Sri Institute of Information Technology Colombo Sri Lanka
Examinations are fundamental to education, yet conducting secure computer-based exams in disrupted environments presents significant challenges. This research introduces a Secure by Design protocol leveraging Delay To... 详细信息
来源: 评论