咨询与建议

限定检索结果

文献类型

  • 837 篇 期刊文献
  • 480 篇 会议
  • 12 册 图书

馆藏范围

  • 1,329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 673 篇 计算机科学与技术...
    • 568 篇 软件工程
    • 213 篇 信息与通信工程
    • 144 篇 生物工程
    • 140 篇 电气工程
    • 95 篇 生物医学工程(可授...
    • 94 篇 控制科学与工程
    • 92 篇 光学工程
    • 74 篇 电子科学与技术(可...
    • 62 篇 机械工程
    • 43 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 33 篇 网络空间安全
    • 30 篇 动力工程及工程热...
    • 30 篇 安全科学与工程
    • 28 篇 仪器科学与技术
  • 509 篇 理学
    • 255 篇 数学
    • 159 篇 生物学
    • 128 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 39 篇 化学
    • 37 篇 系统科学
  • 259 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 46 篇 法学
    • 39 篇 社会学
  • 23 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 42 篇 feature extracti...
  • 37 篇 deep learning
  • 37 篇 machine learning
  • 29 篇 semantics
  • 29 篇 training
  • 26 篇 computational mo...
  • 26 篇 accuracy
  • 23 篇 artificial intel...
  • 22 篇 predictive model...
  • 21 篇 reinforcement le...
  • 21 篇 data models
  • 20 篇 deep neural netw...
  • 19 篇 convolutional ne...
  • 17 篇 contrastive lear...
  • 17 篇 federated learni...
  • 16 篇 convolution
  • 15 篇 graph neural net...
  • 13 篇 data mining
  • 13 篇 forecasting
  • 13 篇 robustness

机构

  • 42 篇 school of data a...
  • 41 篇 college of compu...
  • 33 篇 college of compu...
  • 27 篇 nanyang technolo...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 22 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 school of electr...
  • 19 篇 school of cyber ...
  • 17 篇 shandong provinc...
  • 17 篇 school of cyber ...
  • 16 篇 beijing advanced...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of inform...
  • 14 篇 hubei key labora...
  • 14 篇 services computi...

作者

  • 68 篇 niyato dusit
  • 22 篇 kang jiawen
  • 20 篇 huang qingming
  • 20 篇 xiong zehui
  • 20 篇 chen mingzhe
  • 20 篇 jin hai
  • 18 篇 yang yang
  • 18 篇 xu qianqian
  • 14 篇 zheng wei-shi
  • 14 篇 shen linlin
  • 13 篇 ezugwu absalom e...
  • 13 篇 yang zhiyong
  • 13 篇 han zhu
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 13 篇 zhang ruichen
  • 12 篇 hu shengshan
  • 12 篇 mahmood khalid
  • 12 篇 zhang leo yu
  • 12 篇 ai bo

语言

  • 1,194 篇 英文
  • 125 篇 其他
  • 13 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1329 条 记 录,以下是211-220 订阅
排序:
MeHyper: Accelerating Hypergraph Neural Networks by Exploring Implicit dataflows
MeHyper: Accelerating Hypergraph Neural Networks by Explorin...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Wenju Zhao Pengcheng Yao Dan Chen Long Zheng Xiaofei Liao Qinggang Wang Shaobo Ma Yu Li Haifeng Liu Wenjing Xiao Yufei Sun Bing Zhu Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computing National University of Singapore Singapore School of Computer Electronics and Information Guangxi University NanNing China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task... 详细信息
来源: 评论
Color Space Search Algorithm (CSSA): A Novel Optimization Approach
Color Space Search Algorithm (CSSA): A Novel Optimization Ap...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Hossam M. J. Mustafa Nedal Nwasra Ahmad Khasawneh Department of Data Science and Artificial Intelligence Faculty of Information Technology University of Petra Amman Jordan Computer Science Department Faculty of Information Technology University of Petra Amman Jordan School of Computing Skyline University College Sharjah UAE
This paper presents a novel CSSA (Color Space Search Algorithm), introducing a metaheuristic optimization algorithm that addresses critical limitations in existing optimization methods. While current algorithms demons... 详细信息
来源: 评论
Ev-IDID: Enhancing Solutions to Interactive Dynamic Influence Diagrams through Evolutionary Algorithms  21
Ev-IDID: Enhancing Solutions to Interactive Dynamic Influenc...
收藏 引用
21st International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2022
作者: Ma, Biyang Pan, Yinghui Zeng, Yifeng Ming, Zhong School of Computer Science and Engineering Minnan Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University United Kingdom College of Computer Science and Software Engineering Shenzhen University China
Interactive dynamic influence diagrams (I-DIDs) are a general framework for multiagent sequential decision making under uncertainty. Due to the model complexity, a significant amount of research has been invested into... 详细信息
来源: 评论
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
Evaluation of Wireless Sensor Networks Module using IoT Approach  3
Evaluation of Wireless Sensor Networks Module using IoT Appr...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Anand, L. Padmalal, S. Seetha, J. Juliana, R. Naveen Kumar, P.S. Parasa, Gayatri Srm Institute of Science and Technology School of Computing Department of Networking and Communications Kattanguluthur India Mangalam College of Engg Department of Computer Science and Engineering Kerala India Panimalar Engineering College Department of Computer Science and Business Systems Chennai India Loyola-ICAM College of Engineering and Technology Department of Information Technology Chennai India St. Ann's College of Engineering and Technology Department of CSE-DATA Science AP Chirala India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Guntur India
Microcomputers and medical devices with signal transceivers that operate on a specific radio display constitute the backbone of wireless sensor networks (WS Ns) that monitor environmental conditions (temperature, pres... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Reinforcement Learning Based Control Domain Division in LEO Satellite Networks  25
Reinforcement Learning Based Control Domain Division in LEO ...
收藏 引用
25th IEEE International Conferences on High Performance computing and Communications, 9th International Conference on data science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Tang, Feilong Li, Xue Chen, Long Liu, Jiacheng Gao, Ming Yang, Yanqin Xu, Wenchao Zhang, Heteng School of Data Science and Engineering East China Normal University Shanghai China School of Computing Science Simon Fraser University Vancouver Canada The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong Hong Kong School of Communication and Electric Engineering East China Normal University Shanghai China Suzhou All-Space-Time Information Technology Co. Ltd. Suzhou China
The performance of SDN-based LEO satellite networks significantly depends on the control domain division approaches. The dynamical topology in LEO networks results in the time-varying delay for network management. The... 详细信息
来源: 评论
Joint Sparsification and Quantization for Wireless Federated Learning under Communication Constraints  24
Joint Sparsification and Quantization for Wireless Federated...
收藏 引用
24th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2023
作者: Su, Junshen Wang, Xijun Chen, Xiang Cheng, Ray-Guang Sun Yat-Sen University School of Electronics and Information Technology Guangzhou China The Chinese University of HongKong Guangdong Provincial Key Laboratory of Big Data Computing Shenzhen China National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei Taiwan
Communication efficiency is one of the key bottlenecks in Federated Learning (FL). Compression techniques, such as sparsification and quantization, are used to reduce communication overhead. However, joint designs of ... 详细信息
来源: 评论
Analytical Study for Cyber Threat Intelligence (CTI)  7
Analytical Study for Cyber Threat Intelligence (CTI)
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Alkhateeb, Ibrahim R. Al-Haija, Qasem Abu Abu-Soud, Saleh Dept. of Cybersecurity/ Data Science King Hussein School of Computing Sciences Prince Sumaya University for Technology P.O. Box 1438 Amman11941 Jordan Dept. of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology P.O. Box 3030 Irbid22110 Jordan
Cyber Threat Intelligence (CTI) involves collecting and analyzing cyber security data using advanced algorithms and rigorous techniques to identify and address potential threats, harmful incidents, and existing vulner... 详细信息
来源: 评论
Decision Systems in Cybersecurity: A Machine Learning Perspective  12th
Decision Systems in Cybersecurity: A Machine Learning Perspe...
收藏 引用
12th International Conference on Frontiers of Intelligent computing: Theory and Applications, FICTA 2024
作者: Dhablia, Anishkumar Ganesh, R. Senthil Rizvi, Nuzhat Arora, Himanshu Borade, Monali Ravindra Bhujbal, Pallavi Altimetrik India Pvt. Ltd Maharashtra Pune India Department of Electronics and Communication Engineering Sri Krishna College of Engineering and Technology Tamilnadu Coimbatore India Nagpur Campus Pune India Computer Science and Engineering Arya College of Engineering Jaipur India Artificial Intelligence and Data Science VIIT Pune India Department of Information Technology School of Computing MIT ADT University Loni Kalbhor Pune India
The evolving digital environment requires sophisticated decision systems to protect important information assets from the growing complexity and variety of cyber threats. This review paper examines the impact of machi... 详细信息
来源: 评论