咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 3,046 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,675 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,890 篇 工学
    • 3,765 篇 计算机科学与技术...
    • 3,055 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,275 篇 理学
    • 1,328 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 91 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,000 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7675 条 记 录,以下是611-620 订阅
排序:
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
收藏 引用
IEEE Internet of Things Journal 2024年 第13期11卷 23977-23984页
作者: Mahmood, Khalid Obaidat, Mohammad S. Shamshad, Salman Alenazi, Mohammed J. F. Kumar, Gulshan Anisi, Mohammad Hossein Conti, Mauro National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Jordan King Abdullah II School of Information Technology Amman11942 Jordan University of Science and Technology Beijing School of Communication and Computing Engineering Beijing100083 China Amity University Amity School of Engineering and Technology Noida201301 India University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia University of Padua Department of Mathematics Padua35131 Italy Lovely Professional University Department of Computer Science and Engineering Phagwara144411 India University of Essex School of Computer Science and Electronic Engineering ColchesterCO4 3SQ United Kingdom
The Internet of Things (IoT) is a network of interconnected objects, which congregate and exchange gigantic amounts of data. Usually, predeployed embedded sensors sense this massive data. Soon, several applications of... 详细信息
来源: 评论
Arithmetic Expression Evaluations with Membranes
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 55-60页
作者: Ping Guo Haizhu Chen Hui Zheng College of Computer Science Chongqing University Chongqing China Chongqing Key Laboratory of Software Theory and Technology Chongqing China Department of Software Engineering Chongqing College of Electronic Engineering Chongqing China
Arithmetic operations and expression evaluations are fundamental in computing models. This paper firstly designs arithmetic membranes without priority rules for basic arithmetic operations, and then proposes an algori... 详细信息
来源: 评论
Human Emotions Classification Using EEG via Audiovisual Stimuli and AI
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5075-5089页
作者: Abdullah A Asiri Akhtar Badshah Fazal Muhammad Hassan A Alshamrani Khalil Ullah Khalaf A Alshamrani Samar Alqhtani Muhammad Irfan Hanan Talal Halawani Khlood M Mehdar Radiological Sciences Department College of Applied Medical SciencesNajran UniversityNajranSaudi Arabia Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Electrical Engineering University of Engineering and TechnologyMardan23200Pakistan Department of Software Engineering University of MalakandDir LowerPakistan Department of Computer Science and Information Systems College of EngineeringNajran University Saudi ArabiaNajran61441Saudi Arabia Electrical Engineering Department College of EngineeringNajran University Saudi ArabiaNajran61441Saudi Arabia Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Anatomy Department Medicine CollegeNajran UniversityNajranSaudi Arabia
Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the *** recorded... 详细信息
来源: 评论
Optimizing Weighted Ensemble ML IDS Using Parallelization and Batch Learning in Healthcare Networks
Optimizing Weighted Ensemble ML IDS Using Parallelization an...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Ward, Blake Gonzalez, Daniel Alt, Jake Fang, Dongfeng Xu, Shengjie The Department of Computer Science and Software Engineering College of Engineering California Polytechnic State University San Luis ObispoCA93407 United States The Department of Cyber Intelligence and Information Operations College of Applied Science and Technology University of Arizona TucsonAZ85721 United States
The increasing adoption of IoT devices in healthcare necessitates the development of lightweight and fast intrusion detection systems (IDS). This paper proposes a weighted ensemble ML IDS with parallelized batch learn... 详细信息
来源: 评论
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Zero Trust+: A Trusted-based Zero Trust architecture for IoT...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Brennan Huber Farah Kandah Computer Science and Software Engineering Samuel Ginn College of Engineering Auburn University
The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a...
来源: 评论
Robust Federated Semi-Supervised Learning for Medical Image Classification via Pseudo-Label Filtering
Robust Federated Semi-Supervised Learning for Medical Image ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Ziwei Guo, Shuyu Zhu, Mingzhu Bai, Tian Jilin University College of Software Changchun China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China Jilin University College of Computer Science and Technology Changchun China
Federated learning (FL) enables collaborative model training across multiple medical institutions to ensure data security. However, due to the variations in medical imaging equipment and regions at different medical i... 详细信息
来源: 评论
Visualizing the Path of a Photo Taker from Image Metadata  4
Visualizing the Path of a Photo Taker from Image Metadata
收藏 引用
4th International Informatics and software engineering Conference, IISEC 2023
作者: Majid, Rasty Shakhawan Varol, Cihan Varol, Asaf Nasab, Ahad Firat University Department of Software Engineering Erbil Iraq Sam Houston State University Computer Science Department HuntsvilleTX United States College of Engineering and Computer Science Dept. of Engineering Management and Technology ChattanoogaTN United States
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ... 详细信息
来源: 评论
DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management
DECAY: Dynamic Evaluation and Component Analysis for Enhanci...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Brennan Huber Farah Kandah Computer Science and Software Engineering Samuel Ginn College of Engineering Auburn University
The Internet of Things (IoT) has gained widespread use across various domains, necessitating robust trust management for safeguarding data integrity and device reliability. Existing trust management algorithms often o...
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论