咨询与建议

限定检索结果

文献类型

  • 2,195 篇 期刊文献
  • 1,741 篇 会议
  • 88 册 图书

馆藏范围

  • 4,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,637 篇 工学
    • 2,081 篇 计算机科学与技术...
    • 1,692 篇 软件工程
    • 577 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 349 篇 生物工程
    • 340 篇 电气工程
    • 237 篇 生物医学工程(可授...
    • 200 篇 光学工程
    • 177 篇 机械工程
    • 172 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 99 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 95 篇 化学工程与技术
    • 89 篇 安全科学与工程
    • 88 篇 仪器科学与技术
  • 1,339 篇 理学
    • 720 篇 数学
    • 380 篇 生物学
    • 288 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 805 篇 管理学
    • 469 篇 管理科学与工程(可...
    • 360 篇 图书情报与档案管...
    • 262 篇 工商管理
  • 299 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 136 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 153 篇 法学
    • 117 篇 社会学
  • 80 篇 经济学
  • 57 篇 教育学
  • 57 篇 农学
  • 10 篇 文学
  • 10 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 133 篇 deep learning
  • 123 篇 machine learning
  • 90 篇 feature extracti...
  • 86 篇 artificial intel...
  • 76 篇 computational mo...
  • 76 篇 accuracy
  • 75 篇 semantics
  • 74 篇 training
  • 62 篇 predictive model...
  • 56 篇 data models
  • 53 篇 internet of thin...
  • 51 篇 data mining
  • 51 篇 federated learni...
  • 45 篇 cloud computing
  • 44 篇 computer science
  • 44 篇 reinforcement le...
  • 44 篇 convolutional ne...
  • 43 篇 optimization
  • 36 篇 visualization
  • 35 篇 security

机构

  • 171 篇 school of comput...
  • 72 篇 school of comput...
  • 71 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 school of data a...
  • 44 篇 school of comput...
  • 37 篇 school of comput...
  • 34 篇 nanyang technolo...
  • 32 篇 school of comput...
  • 32 篇 college of compu...
  • 31 篇 college of compu...
  • 30 篇 beijing advanced...
  • 29 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 24 篇 school of comput...
  • 21 篇 the school of co...

作者

  • 99 篇 niyato dusit
  • 47 篇 buyya rajkumar
  • 27 篇 rajkumar buyya
  • 26 篇 xiong zehui
  • 23 篇 jin hai
  • 21 篇 pardamean bens
  • 21 篇 huang qingming
  • 20 篇 yang yang
  • 20 篇 lo david
  • 19 篇 wu jia
  • 18 篇 bens pardamean
  • 17 篇 kang jiawen
  • 16 篇 tao dacheng
  • 16 篇 han zhu
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 zheng baihua
  • 15 篇 shen linlin
  • 14 篇 zheng wei-shi
  • 14 篇 bailey james

语言

  • 3,533 篇 英文
  • 460 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4024 条 记 录,以下是131-140 订阅
排序:
Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4322-4343页
作者: Al-Maliki, Shawqi Qayyum, Adnan Ali, Hassan Abdallah, Mohamed Qadir, Junaid Hoang, Dinh Thai Niyato, Dusit Al-Fuqaha, Ala Division College of Science and Engineering Doha34110 Qatar Information Technology University Lahore54000 Pakistan University of New South Wales Sydney Sydney2052 Australia Qatar University Department of Computer Science and Engineering College of Engineering Doha34110 Qatar University of Technology Sydney School of Electrical and Data Engineering Sydney2052 Australia Nanyang Technological University College of Computing and Data Science 639798 Singapore
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have be... 详细信息
来源: 评论
MLSTM: A Novel Modified Long Short-Term Memory Networks for Melody Synthesis Melody Generation
MLSTM: A Novel Modified Long Short-Term Memory Networks for ...
收藏 引用
International Conference on Advanced Communications and Machine Intelligence, MICA 2023
作者: Ganguly, Tanudeep Sharma, Sushmita Deb, Suman Ezugwu, Absalom El-Shamir Saha, Apu Kumar Department of Computer Science and Engineering National Institute of Technology Agartala Tripura Agartala India Department of Computer Science and Engineering Indian Institute of Information Technology Agartala Tripura Agartala India Unit for Data Science and Computing North-West University Potchefstroom2520 South Africa
This research elaborates a melody synthesis model utilizing a Modified Long Short-Term Memory (mLSTM) neural network, trained on Kern dataset, preprocessed into Musical Instrument Digital Interface (MIDI) files. After... 详细信息
来源: 评论
Sublinear-Space Streaming Algorithms for Estimating Graph Parameters on Sparse Graphs  1
收藏 引用
18th International Symposium on Algorithms and data Structures, WADS 2023
作者: Chen, Xiuge Chitnis, Rajesh Eades, Patrick Wirth, Anthony School of Computing and Information Systems The University of Melbourne ParkvilleVIC Australia School of Computer Science University of Birmingham Birmingham United Kingdom
In this paper, we design sub-linear space streaming algorithms for estimating three fundamental parameters – maximum independent set, minimum dominating set and maximum matching – on sparse graph classes, i.e., grap... 详细信息
来源: 评论
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid systems Using PUF
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 3568-3580页
作者: Zahoor, Amina Mahmood, Khalid Saleem, Muhammad Asad Badar, Hafiz Muhammad Sanaullah Le, Tuan-Vinh Das, Ashok Kumar Department of Computer Science Sahiwal57000 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Emerson University Multan Department of Emerging Computing Technologies Multan61000 Pakistan Fu Jen Catholic University Bachelor's Program of Artificial Intelligence and Information Security New Taipei City24206 Taiwan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of information and Communication Technologies (ICTs). Within the immersive SPG e... 详细信息
来源: 评论
Plausible Heterogeneous Graph k-Anonymization for Social Networks
收藏 引用
Tsinghua science and Technology 2022年 第6期27卷 912-924页
作者: Kaiyang Li Ling Tian Xu Zheng Bei Hui School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu 610000China
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra... 详细信息
来源: 评论
Fuzz-classification(p,l)-Angel:An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1131-1140页
作者: Tehsin Kanwal Hasina Attaullah Adeel Anjum Abid Khan Gwanggil Jeon Department of Computer Science COMSATS University IslamabadPakistan Department of Information Technology Quaid-e-Azam University IslamabadPakistan College of Science and Engineering School of Computing and MathsUniversity of DerbyDE221GBUK Department of Embedded Systems Engineering Incheon National UniversitySouth Korea
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio... 详细信息
来源: 评论
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
IEEE Open Journal of the Computer Society
收藏 引用
IEEE Open Journal of the computer Society 2024年 5卷 83-94页
作者: Huang, Yongrong Wang, Huiqing Chen, Zhide Feng, Chen Zhu, Kexin Yang, Xu Yang, Wencheng Fujian Normal University School of Computer and Cyberspace Security Fuzhou350117 China Department of Information Engineering Fuzhou Polytechnic Fuzhou350108 China Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan College of Computer and Data Science Minjiang University Fuzhou350108 China School of Mathematics Physics and Computing University of Southern Queensland ToowoombaQLD4350 Australia
Cryptocurrency, a novel digital asset within the blockchain technology ecosystem, has recently garnered significant attention in the investment world. Despite its growing popularity, the inherent volatility and instab... 详细信息
来源: 评论
MeHyper: Accelerating Hypergraph Neural Networks by Exploring Implicit dataflows  31
MeHyper: Accelerating Hypergraph Neural Networks by Explorin...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Zhao, Wenju Yao, Pengcheng Chen, Dan Zheng, Long Liao, Xiaofei Wang, Qinggang Ma, Shaobo Li, Yu Liu, Haifeng Xiao, Wenjing Sun, Yufei Zhu, Bing Jin, Hai Xue, Jingling Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China National University of Singapore School of Computing 119077 Singapore Guangxi University School of Computer Electronics and Information NanNing530004 China University of New South Wales School of Computer Science and Engineering SydneyNSW2052 Australia
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task... 详细信息
来源: 评论
Who Responded to Whom: The Joint Effects of Latent Topics and Discourse in Conversation Structure  10
Who Responded to Whom: The Joint Effects of Latent Topics an...
收藏 引用
10th SIGHAN Workshop on Chinese Language Processing, SIGHAN 2024
作者: Ji, Lu Chen, Lei Li, Jing Wei, Zhongyu Zhang, Qi Huang, Xuanjing School of Computer Science Fudan University China School of Data Science Fudan University China Department of Computing The Hong Kong Polytechnic University Hong Kong Research Institute of Intelligent and Complex Systems Fudan University China
Vast amount of online conversations are produced on a daily basis, resulting in a pressing need to automatic conversation understanding. As a basis to structure a discussion, we identify the responding relations in th... 详细信息
来源: 评论
Cloud Intrusion Detection System Based on Honeynet, Honeywell, Honeypot, and Honeytoken Strategies
Cloud Intrusion Detection System Based on Honeynet, Honeywel...
收藏 引用
International Conference on data science and Network Engineering, ICDSNE 2023
作者: Yasotha, B. Arthy, M. Shoba, L.K. Loganathan, Muralidaran Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Tamil Nadu India Computer Science and Information Systems Engineering St. Joseph University Dares Salaam Tanzania United Republic of
The security aspect of cloud computing is much more challenging for researchers. Preventing the attack requires knowledge about the type of attack, its origin, and how vulnerabilities and tools are used for the attack... 详细信息
来源: 评论