咨询与建议

限定检索结果

文献类型

  • 861 篇 期刊文献
  • 512 篇 会议
  • 12 册 图书

馆藏范围

  • 1,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 943 篇 工学
    • 708 篇 计算机科学与技术...
    • 589 篇 软件工程
    • 225 篇 信息与通信工程
    • 146 篇 生物工程
    • 137 篇 电气工程
    • 103 篇 控制科学与工程
    • 102 篇 生物医学工程(可授...
    • 98 篇 光学工程
    • 74 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 43 篇 化学工程与技术
    • 33 篇 交通运输工程
    • 32 篇 动力工程及工程热...
    • 32 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 28 篇 安全科学与工程
  • 527 篇 理学
    • 268 篇 数学
    • 163 篇 生物学
    • 133 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 39 篇 化学
    • 39 篇 系统科学
  • 266 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 108 篇 医学
    • 86 篇 临床医学
    • 74 篇 基础医学(可授医学...
    • 48 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 45 篇 法学
    • 38 篇 社会学
  • 25 篇 经济学
  • 15 篇 农学
  • 10 篇 教育学
  • 4 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 44 篇 feature extracti...
  • 38 篇 deep learning
  • 37 篇 machine learning
  • 30 篇 semantics
  • 30 篇 accuracy
  • 30 篇 training
  • 24 篇 artificial intel...
  • 22 篇 computational mo...
  • 21 篇 reinforcement le...
  • 21 篇 data models
  • 21 篇 convolutional ne...
  • 20 篇 deep neural netw...
  • 20 篇 predictive model...
  • 19 篇 federated learni...
  • 17 篇 convolution
  • 17 篇 contrastive lear...
  • 15 篇 image segmentati...
  • 14 篇 neural networks
  • 14 篇 graph neural net...
  • 14 篇 privacy

机构

  • 51 篇 college of compu...
  • 43 篇 school of data a...
  • 36 篇 college of compu...
  • 28 篇 national enginee...
  • 26 篇 nanyang technolo...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 23 篇 key laboratory o...
  • 21 篇 school of electr...
  • 21 篇 key laboratory o...
  • 20 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 shandong provinc...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 beijing advanced...
  • 16 篇 school of inform...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...

作者

  • 71 篇 niyato dusit
  • 23 篇 kang jiawen
  • 22 篇 huang qingming
  • 21 篇 jin hai
  • 20 篇 xiong zehui
  • 20 篇 chen mingzhe
  • 20 篇 xu qianqian
  • 18 篇 yang yang
  • 16 篇 shen linlin
  • 15 篇 yang zhiyong
  • 14 篇 zheng wei-shi
  • 13 篇 ezugwu absalom e...
  • 13 篇 hu shengshan
  • 13 篇 li tianrui
  • 13 篇 zhang leo yu
  • 13 篇 ai bo
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 13 篇 zhang ruichen
  • 12 篇 han zhu

语言

  • 963 篇 英文
  • 413 篇 其他
  • 14 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1385 条 记 录,以下是221-230 订阅
排序:
Contrastive Graph Auto-Encoder for Graph Embedding
SSRN
收藏 引用
SSRN 2023年
作者: Zu, Shuaishuai Li, Li Shen, Jun Tang, Weitao School of Computer and Information Science Southwest University China School of Computing and Information Technology University of Wollongong Australia Department of Data Science & Artificial Intelligence Monash University Australia
Graph embedding aims to embed the information of graph data into low-dimensional representation space. Prior methods generally suffer from an imbalance of preserving structural information and node features due to the... 详细信息
来源: 评论
Previs-Real:Interactive virtual previsualization system for news shooting rehearsal and evaluation
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第6期6卷 527-549页
作者: Che QU Shaocong WANG Chao ZHOU Tongchen ZHAO Rui GUO Cheng Wa WONG Chi DENG Bin JI Yuhui WEN Yuanchun SHI Yong-Jin LIU Department of Film and Television Technology Beijing Film AcademyBeijing 100088China Department of Computer Science and Technology MOE-Key Laboratory of Pervasive ComputingTsinghua UniversityBeijing 100084China School of Social Sciences Tsinghua UniversityBeijing 100084China News Production and Broadcasting First Division China Media GroupBeijing 100038China School of Computer and Information Technology Bejing Jiaotong UniversityBejing 100044China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong UniversityBeijing 100044China
Background In the demanding field of live news broadcasting,the intricate studio production procedures and tight schedules pose significant challenges for physical rehearsals by *** paper explores the design and imple... 详细信息
来源: 评论
High Quality Global Routing Algorithm Based on Multi-Stage Optimization
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2024年 第4期36卷 607-614页
作者: Genggeng, Liu Zhenyu, Pei Ning, Xu College of Computer and Data Science Fuzhou University Fuzhou350116 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China School of Information Engineering Wuhan University of Technology Wuhan430070 China
Global routing is a crucial step in VLSI physical design. To address the problems that the low utilization rate of capacity and easy to fall into local optimum in the existing global routing algorithms, a high-quality... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
information retrieval:a view from the Chinese IR community
收藏 引用
Frontiers of computer science 2021年 第1期15卷 197-211页
作者: Zhumin CHEN Xueqi CHENG Shoubin DONG Zhicheng DOU Jiafeng GUO Xuanjing HUANG Yanyan LAN Chenliang LI Ru LI Tie-Yan LIU Yiqun LIU Jun MA Bing QIN Mingwen WANG Jirong WEN Jun XU Min ZHANG Peng ZHANG Qi ZHANG School of Computer Science and Technology Shandong UniversityJinan 250100China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China School of Computer Science and Engineering South China University of TechnologyGuangzhou 510006China School of Information Renmin University of ChinaBeijing 100872China School of Computer Science Fudan UniversityShanghai 200433China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China School of Big Data Shanxi UniversityTaiyuan 200433China Microsoft Research Asia Beijing 100080China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China School of Computer Science and Technology Harbin Institute of TechnologyHarbin 150001China School of Computer Information and Engineering Jiangxi Normal UniversityNanchang 330022China School of Computer Science and Technology Tianjin UniversityTianjin 300072China
During a two day strategic workshop in February 2018,22 information retrieval researchers met to discuss the future challenges and opportunities within the *** outcome is a list of potential research directions,projec... 详细信息
来源: 评论
Intrusion Detection System in Industrial Cyber-Physical System Using Clustered Federated Learning
收藏 引用
SN computer science 2023年 第5期4卷 452页
作者: Jayagopal, Vellingiri Elangovan, Mohanraj Singaram, Saranya Sathasivam Shanmugam, Kavitha Bharathi Subramaniam, Balu Bhukya, Srinivasarao School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore 632014 India Department of Artificial Intelligence and Data Science K.S.Rangasamy College of Technology Tamil Nadu Tiruchengode 637215 India Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Campus Tamil Nadu Chennai 603203 India Department of Computer Technology Kongu Engineering College Tamil Nadu Perundurai Erode 638060 India Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Tamil Nadu Tiruchengode Namakkal 637205 India Department of Computer Science and Engineering Koneru Lakshmayya Education Foundation Andhra Pradesh Vaddeswaram 520002 India
The quick convergence in the industrial infrastructure with computing and networking has proliferated the attacks of industry-based Cyber-Physical Systems (CPS). Protecting such massive, sophisticated, and varied indu... 详细信息
来源: 评论
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
Black Box Watermarking for DNN Model Integrity Detection Using Label Loss
收藏 引用
Journal of computers (Taiwan) 2024年 第4期35卷 277-290页
作者: Song, Yunfei Zhu, Yujia Yang, Liu Xia, Daoxun School of Big Data and Computer Science Guizhou Normal University Guiyang550000 China Guizhou Key Laboratory of Information and Computing Science Guizhou Normal University Guiyang550000 China Engineering Laboratory for Applied Technology of Big Data in Education Guizhou Normal University Guiyang550000 China
After significant investments of time and resources, the accuracy of deep neural network (DNN) models has reached commercially viable levels, leading to their increasing deployment on cloud platforms for commercial se... 详细信息
来源: 评论
Accountable Policy-Based Sanitizable Signature for Medical data Sharing  22
Accountable Policy-Based Sanitizable Signature for Medical D...
收藏 引用
Proceedings of the 2022 12th International Conference on Communication and Network Security
作者: Yang Yang Zengtao Wei Minming Huang College of Computer and Data Science Fuzhou University China School of Computing and Information Systems Singapore Management University Singapore
With the Internet and cloud computing development, signed electronic medical data can be stored on the cloud server for flexible data sharing. However, the signed medical data contains much private information, and di... 详细信息
来源: 评论
Enhancing the Felsenstein Method to Reinvigorate Phylogenetic Starting in the Big data  6
Enhancing the Felsenstein Method to Reinvigorate Phylogeneti...
收藏 引用
6th International Conference on Contemporary computing and Informatics, IC3I 2023
作者: Saxena, Ashendra Kumar Vishwkarma, Priyanka Kumar, Sandeep Thangarasu, N. Bhuvaneshwari, K.S. Ashok, Bhandari Mahesh College of Computing Science and Information Technology Teerthankar Magaveer University Uttar Pradesh Moradabad India Invertis University Department of Computer Science & Engineering Uttar Pradesh Bareilly India School of Commerce and Management IIMT University Uttar Pradesh Meerut India Karpagam Academy of Higher Education Department of Computer Science Tamil Nadu Coimbatore India Karpagam College of Engineering Department of Artificial Intelligence and Data Science Tamilnadu Coimbatore India Vishwakarma Institute of Information Technology Maharashtra Pune India
The present research examines how the Felsenstein approach might be improved in light of huge data and evolutionary inference. The Felsenstein approach, phylogeny starting points, huge data, statistical techniques, an... 详细信息
来源: 评论