咨询与建议

限定检索结果

文献类型

  • 2,334 篇 会议
  • 1,971 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,708 篇 工学
    • 1,954 篇 计算机科学与技术...
    • 1,573 篇 软件工程
    • 510 篇 信息与通信工程
    • 434 篇 生物工程
    • 405 篇 控制科学与工程
    • 346 篇 生物医学工程(可授...
    • 261 篇 电气工程
    • 243 篇 光学工程
    • 210 篇 电子科学与技术(可...
    • 192 篇 机械工程
    • 112 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 107 篇 交通运输工程
    • 106 篇 动力工程及工程热...
    • 99 篇 仪器科学与技术
  • 1,584 篇 理学
    • 816 篇 数学
    • 487 篇 生物学
    • 437 篇 物理学
    • 295 篇 统计学(可授理学、...
    • 177 篇 系统科学
    • 111 篇 化学
  • 746 篇 管理学
    • 432 篇 管理科学与工程(可...
    • 338 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 331 篇 医学
    • 288 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 125 篇 公共卫生与预防医...
  • 155 篇 法学
    • 139 篇 社会学
  • 94 篇 经济学
    • 93 篇 应用经济学
  • 75 篇 教育学
  • 64 篇 农学
  • 12 篇 军事学
  • 5 篇 艺术学
  • 4 篇 文学

主题

  • 102 篇 machine learning
  • 92 篇 computational mo...
  • 83 篇 semantics
  • 74 篇 deep learning
  • 69 篇 feature extracti...
  • 65 篇 artificial intel...
  • 65 篇 training
  • 62 篇 accuracy
  • 59 篇 data models
  • 58 篇 visualization
  • 57 篇 computer archite...
  • 53 篇 cloud computing
  • 47 篇 informatics
  • 47 篇 predictive model...
  • 47 篇 forecasting
  • 45 篇 internet of thin...
  • 45 篇 software
  • 44 篇 real-time system...
  • 43 篇 educational inst...
  • 42 篇 optimization

机构

  • 104 篇 school of comput...
  • 94 篇 school of comput...
  • 51 篇 school of comput...
  • 49 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 40 篇 luddy school of ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,728 篇 英文
  • 632 篇 其他
  • 43 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4401 条 记 录,以下是291-300 订阅
Healthcare Security Breaches in the United States: Insights and their Socio-Technical Implications
arXiv
收藏 引用
arXiv 2023年
作者: Moncy, Megha Afreen, Sadia Purkayastha, Saptarshi Department of BioHealth Informatics Luddy School of Informatics Computing and Engineering Indiana University IndianapolisIN United States
This research examines the pivotal role of human behavior in the realm of healthcare data management, situated at the confluence of technological advancements and human conduct. An in-depth analysis spanning of securi... 详细信息
来源: 评论
Deep reinforcement learning with time-scale invariant memory
arXiv
收藏 引用
arXiv 2024年
作者: Kabir, Md Rysul Mochizuki-Freeman, James Tiganj, Zoran Department of Computer Science Luddy School of Informatics Computing and Engineering Indiana University Bloomington United States
The ability to estimate temporal relationships is critical for both animals and artificial agents. Cognitive science and neuroscience provide remarkable insights into behavioral and neural aspects of temporal credit a... 详细信息
来源: 评论
Cross-Modality Perturbation Synergy Attack for Person Re-identification  38
Cross-Modality Perturbation Synergy Attack for Person Re-ide...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Gong, Yunpeng Zhong, Zhun Qu, Yansong Luo, Zhiming Ji, Rongrong Jiang, Min School of Informatics Xiamen University China School of Computer Science and Information Engineering Hefei University of Technology China The Department of Artificial Intelligence Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Key Laboratory of Digital Protection and Intelligent Processing of Intangible CulturalHeritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University Fujian Xiamen361005 China
In recent years, there has been significant research focusing on addressing security concerns in single-modal person re-identification (ReID) systems that are based on RGB images. However, the safety of cross-modality...
来源: 评论
Knowledge Base Processing Method Based on Text Classification Algorithm  5
Knowledge Base Processing Method Based on Text Classificatio...
收藏 引用
5th IEEE International Conference on Artificial Intelligence in engineering and Technology, IICAIET 2023
作者: Zhong, Baisheng Sainin, Mohd Shamrie Fun, Tan Soo Universiti Malaysia Sabah Faculty of Computing and Informatics Sabah Kota Kinabalu Malaysia School of Engineering Guangzhou College of Technology and Businces Guangzhou China Research Centre Sabah Kota Kinabalu Malaysia
The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. In practical application, the... 详细信息
来源: 评论
Password Manager with Multi-Factor Authentication  1
Password Manager with Multi-Factor Authentication
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Vijayaraghavan, N. Narasimhan, S. Basha, Saleem Vellore Institute of Technology School of Computer Science and Engineering Chennai India KCG College of Technology Department of Mathematics Chennai India Mazoon University College Computing and Informatics Department muscat Oman
Data breach is a serious issue as it leaks the personal information of more than billions of users and their privacy is compromised. More than 77% of organizations do not have a Cyber Security Incident Response plan. ... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论
MultiSFL: Towards Accurate Split Federated Learning via Multi-Model Aggregation and Knowledge Replay  39
MultiSFL: Towards Accurate Split Federated Learning via Mult...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xia, Zeke Hu, Ming Yan, Dengke Liu, Ruixuan Li, Anran Xie, Xiaofei Chen, Mingsong MoE Engineering Research Center of SW/HW Co-Design Tech. and App. East China Normal University China School of Computing and Information Systems Singapore Management University Singapore Department of Biomedical Informatics & Data Science School of Medicine Yale University United States
Although Split Federated Learning (SFL) effectively enables knowledge sharing among resource-constrained clients, it suffers from low training performance due to the neglect of data heterogeneity and catastrophic forg... 详细信息
来源: 评论
A Logical Investigation of Stock Market Prediction and Analysis using Supervised Machine Learning Algorithm  1
A Logical Investigation of Stock Market Prediction and Analy...
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Kumar, V. Vasantha Basha, Saleem Vijayaraghavan, N. Vellore Institute of Technology School of Computer Science and Engineering Chennai India Mazoon University College Computing and Informatics Department Muscat Oman KCG College of Technology Department of CSE Chennai India
In the Field of computer science, artificial intelligence (AI) is a broad field, which is concerned with structuring smart products and machines able to perform tasks which require the intellectual capability of human... 详细信息
来源: 评论
Multi-agent Traffic Light Controls with SUMO  8
Multi-agent Traffic Light Controls with SUMO
收藏 引用
8th International Conference on Business and Industrial Research, ICBIR 2023
作者: Phon-Amnuaisuk, Somnuk Tan, Soon-Jiann Yap, Yok-Hoe Choong, Florence Chiao-Mei Vejjanugraha, Pikul Khor, Kok-Chin Ng, Keng-Hoong School of Computing and Informatics Universiti Teknologi Brunei Gadong Brunei Universiti Teknologi Brunei Faculty of Engineering Gadong Brunei School of Engineering and Physical Sciences Heriot-Watt University Malaysia Campus Malaysia Thai-Nichi Institute of Technology Department of International College Thailand Universiti Tunku Abdul Rahman Lkc Faculty of Engineering and Science Malaysia School of Computing Asia Pacific University of Technology and Innovation Malaysia
This study focuses on the optimization of Traffic Light System (TLS) control through the use of adaptive agents. The performance of adaptive cycle TLS was compared with fixed cycle TLS. Two different adaptive cycle TL... 详细信息
来源: 评论
Advanced Persistent Threat Identification with Boosting and Explainable AI
收藏 引用
SN Computer Science 2023年 第3期4卷 271页
作者: Hasan, Md. Mahadi Islam, Muhammad Usama Uddin, Jasim Department of Computer Science and Engineering Asian University of Bangladesh Ashulia Dhaka 1341 Bangladesh School of Computing and Informatics University of Louisiana at Lafayette 104 E University Ave Lafayette 70503 LA United States Department of Applied Computing and Engineering Cardiff School of Technologies Cardiff Metropolitan University Western Avenue Wales Cardiff CF5 2YB United Kingdom
Advanced persistent threat (APT) is a serious concern in cyber-security that has matured and grown over the years with the advent of technology. The main aim of this study is to establish an effective identification m... 详细信息
来源: 评论