咨询与建议

限定检索结果

文献类型

  • 861 篇 期刊文献
  • 512 篇 会议
  • 12 册 图书

馆藏范围

  • 1,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 943 篇 工学
    • 708 篇 计算机科学与技术...
    • 589 篇 软件工程
    • 225 篇 信息与通信工程
    • 146 篇 生物工程
    • 137 篇 电气工程
    • 103 篇 控制科学与工程
    • 102 篇 生物医学工程(可授...
    • 98 篇 光学工程
    • 74 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 43 篇 化学工程与技术
    • 33 篇 交通运输工程
    • 32 篇 动力工程及工程热...
    • 32 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 28 篇 安全科学与工程
  • 527 篇 理学
    • 268 篇 数学
    • 163 篇 生物学
    • 133 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 39 篇 化学
    • 39 篇 系统科学
  • 266 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 108 篇 医学
    • 86 篇 临床医学
    • 74 篇 基础医学(可授医学...
    • 48 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 45 篇 法学
    • 38 篇 社会学
  • 25 篇 经济学
  • 15 篇 农学
  • 10 篇 教育学
  • 4 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 44 篇 feature extracti...
  • 38 篇 deep learning
  • 37 篇 machine learning
  • 30 篇 semantics
  • 30 篇 accuracy
  • 30 篇 training
  • 24 篇 artificial intel...
  • 22 篇 computational mo...
  • 21 篇 reinforcement le...
  • 21 篇 data models
  • 21 篇 convolutional ne...
  • 20 篇 deep neural netw...
  • 20 篇 predictive model...
  • 19 篇 federated learni...
  • 17 篇 convolution
  • 17 篇 contrastive lear...
  • 15 篇 image segmentati...
  • 14 篇 neural networks
  • 14 篇 graph neural net...
  • 14 篇 privacy

机构

  • 51 篇 college of compu...
  • 43 篇 school of data a...
  • 36 篇 college of compu...
  • 28 篇 national enginee...
  • 26 篇 nanyang technolo...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 23 篇 key laboratory o...
  • 21 篇 school of electr...
  • 21 篇 key laboratory o...
  • 20 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of cyber ...
  • 16 篇 shandong provinc...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 beijing advanced...
  • 16 篇 school of inform...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...

作者

  • 71 篇 niyato dusit
  • 23 篇 kang jiawen
  • 22 篇 huang qingming
  • 21 篇 jin hai
  • 20 篇 xiong zehui
  • 20 篇 chen mingzhe
  • 20 篇 xu qianqian
  • 18 篇 yang yang
  • 16 篇 shen linlin
  • 15 篇 yang zhiyong
  • 14 篇 zheng wei-shi
  • 13 篇 ezugwu absalom e...
  • 13 篇 hu shengshan
  • 13 篇 li tianrui
  • 13 篇 zhang leo yu
  • 13 篇 ai bo
  • 13 篇 hai jin
  • 13 篇 du hongyang
  • 13 篇 zhang ruichen
  • 12 篇 han zhu

语言

  • 963 篇 英文
  • 413 篇 其他
  • 14 篇 中文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information"
1385 条 记 录,以下是241-250 订阅
A Precoding Perturbation Method in Geometric Optimization: Exploring Manifold Structure for Privacy and Efficiency
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 6220-6235页
作者: Azadeh Pourkabirian Wei Ni Xiaolin Zhou Kai Li Mohammad Hossein Anisi Real-Time and Embedded Computing Systems Research Centre (CISTER) Porto Portugal Data61 CSIRO Sydney NSW Australia School of Information Science and Technology Fudan University Shanghai China School of Computer Science and Electronic Engineering University of Essex Colchester U.K.
Inherent broadcast characteristics can raise privacy risks of wireless networks. The specifics of antenna ports, antenna types, orientation, and beamforming configurations of a transmitter can be susceptible to manipu... 详细信息
来源: 评论
An Encoder-Decoder Model Based On Spiking Neural Networks For Address Event Representation Object Recognition
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2025年
作者: Du, Sichun Zhu, Haodi Zhang, Yang Hong, Qinghui Hunan University College of Computer Science and Electronic Engineering Changsha418002 China Shenzhen University Computer Vision Institute School of Computer Science and Software Engineering National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China
Address event representation (AER) object recognition task has attracted extensive attention in neuromorphic vision processing. The spike-based and event-driven computation inherent in the spiking neural network (SNN)... 详细信息
来源: 评论
Evaluation of Wireless Sensor Networks Module using IoT Approach  3
Evaluation of Wireless Sensor Networks Module using IoT Appr...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Anand, L. Padmalal, S. Seetha, J. Juliana, R. Naveen Kumar, P.S. Parasa, Gayatri Srm Institute of Science and Technology School of Computing Department of Networking and Communications Kattanguluthur India Mangalam College of Engg Department of Computer Science and Engineering Kerala India Panimalar Engineering College Department of Computer Science and Business Systems Chennai India Loyola-ICAM College of Engineering and Technology Department of Information Technology Chennai India St. Ann's College of Engineering and Technology Department of CSE-DATA Science AP Chirala India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Guntur India
Microcomputers and medical devices with signal transceivers that operate on a specific radio display constitute the backbone of wireless sensor networks (WS Ns) that monitor environmental conditions (temperature, pres... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Reinforcement Learning Based Control Domain Division in LEO Satellite Networks  25
Reinforcement Learning Based Control Domain Division in LEO ...
收藏 引用
25th IEEE International Conferences on High Performance computing and Communications, 9th International Conference on data science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Tang, Feilong Li, Xue Chen, Long Liu, Jiacheng Gao, Ming Yang, Yanqin Xu, Wenchao Zhang, Heteng School of Data Science and Engineering East China Normal University Shanghai China School of Computing Science Simon Fraser University Vancouver Canada The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong Hong Kong School of Communication and Electric Engineering East China Normal University Shanghai China Suzhou All-Space-Time Information Technology Co. Ltd. Suzhou China
The performance of SDN-based LEO satellite networks significantly depends on the control domain division approaches. The dynamical topology in LEO networks results in the time-varying delay for network management. The... 详细信息
来源: 评论
Joint Sparsification and Quantization for Wireless Federated Learning under Communication Constraints  24
Joint Sparsification and Quantization for Wireless Federated...
收藏 引用
24th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2023
作者: Su, Junshen Wang, Xijun Chen, Xiang Cheng, Ray-Guang Sun Yat-Sen University School of Electronics and Information Technology Guangzhou China The Chinese University of HongKong Guangdong Provincial Key Laboratory of Big Data Computing Shenzhen China National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei Taiwan
Communication efficiency is one of the key bottlenecks in Federated Learning (FL). Compression techniques, such as sparsification and quantization, are used to reduce communication overhead. However, joint designs of ... 详细信息
来源: 评论
Analytical Study for Cyber Threat Intelligence (CTI)  7
Analytical Study for Cyber Threat Intelligence (CTI)
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Alkhateeb, Ibrahim R. Al-Haija, Qasem Abu Abu-Soud, Saleh Dept. of Cybersecurity/ Data Science King Hussein School of Computing Sciences Prince Sumaya University for Technology P.O. Box 1438 Amman11941 Jordan Dept. of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology P.O. Box 3030 Irbid22110 Jordan
Cyber Threat Intelligence (CTI) involves collecting and analyzing cyber security data using advanced algorithms and rigorous techniques to identify and address potential threats, harmful incidents, and existing vulner... 详细信息
来源: 评论
Decision Systems in Cybersecurity: A Machine Learning Perspective  12th
Decision Systems in Cybersecurity: A Machine Learning Perspe...
收藏 引用
12th International Conference on Frontiers of Intelligent computing: Theory and Applications, FICTA 2024
作者: Dhablia, Anishkumar Ganesh, R. Senthil Rizvi, Nuzhat Arora, Himanshu Borade, Monali Ravindra Bhujbal, Pallavi Altimetrik India Pvt. Ltd Maharashtra Pune India Department of Electronics and Communication Engineering Sri Krishna College of Engineering and Technology Tamilnadu Coimbatore India Nagpur Campus Pune India Computer Science and Engineering Arya College of Engineering Jaipur India Artificial Intelligence and Data Science VIIT Pune India Department of Information Technology School of Computing MIT ADT University Loni Kalbhor Pune India
The evolving digital environment requires sophisticated decision systems to protect important information assets from the growing complexity and variety of cyber threats. This review paper examines the impact of machi... 详细信息
来源: 评论
Performance evaluation of conditional handover in 5G systems under fading scenario
arXiv
收藏 引用
arXiv 2024年
作者: Deb, Souvik Rathod, Megh Balamurugan, Rishi Ghosh, Shankar K. Singh, Rajeev K. Sanyal, Samriddha Department of Computer Science and Engineering Shiv Nadar Institution of Eminence Delhi NCR India Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata India School of Computing and Data Science FLAME University Pune India
To enhance the handover performance in fifth generation (5G) cellular systems, conditional handover (CHO) has been evolved as a promising solution. Unlike A3 based handover where handover execution is certain after re... 详细信息
来源: 评论
Efficient distributed algorithms for holistic aggregation functions on random regular graphs
收藏 引用
science China(information sciences) 2022年 第5期65卷 32-50页
作者: Lin JIA Qiang-Sheng HUA Haoqiang FAN Qiuping WANG Hai JIN National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology Institute for Interdisciplinary Information Science Tsinghua University
In this paper, we propose efficient distributed algorithms for three holistic aggregation functions on random regular graphs that are good candidates for network topology in next-generation data *** three holistic agg... 详细信息
来源: 评论