咨询与建议

限定检索结果

文献类型

  • 2,216 篇 期刊文献
  • 1,763 篇 会议
  • 88 册 图书

馆藏范围

  • 4,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,658 篇 工学
    • 2,084 篇 计算机科学与技术...
    • 1,695 篇 软件工程
    • 590 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 351 篇 电气工程
    • 351 篇 生物工程
    • 240 篇 生物医学工程(可授...
    • 202 篇 光学工程
    • 175 篇 机械工程
    • 169 篇 电子科学与技术(可...
    • 106 篇 网络空间安全
    • 101 篇 交通运输工程
    • 98 篇 动力工程及工程热...
    • 94 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 91 篇 仪器科学与技术
  • 1,343 篇 理学
    • 721 篇 数学
    • 386 篇 生物学
    • 293 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 818 篇 管理学
    • 477 篇 管理科学与工程(可...
    • 369 篇 图书情报与档案管...
    • 265 篇 工商管理
  • 304 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 143 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 155 篇 法学
    • 119 篇 社会学
  • 81 篇 经济学
  • 63 篇 教育学
  • 59 篇 农学
  • 9 篇 艺术学
  • 8 篇 文学
  • 4 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 137 篇 deep learning
  • 125 篇 machine learning
  • 93 篇 feature extracti...
  • 86 篇 artificial intel...
  • 84 篇 accuracy
  • 77 篇 semantics
  • 75 篇 computational mo...
  • 74 篇 training
  • 64 篇 predictive model...
  • 57 篇 internet of thin...
  • 56 篇 data models
  • 53 篇 data mining
  • 49 篇 federated learni...
  • 48 篇 optimization
  • 47 篇 cloud computing
  • 46 篇 reinforcement le...
  • 44 篇 computer science
  • 43 篇 convolutional ne...
  • 38 篇 security
  • 35 篇 visualization

机构

  • 175 篇 school of comput...
  • 77 篇 college of compu...
  • 72 篇 school of comput...
  • 46 篇 school of data a...
  • 45 篇 school of comput...
  • 43 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 college of compu...
  • 31 篇 nanyang technolo...
  • 30 篇 beijing advanced...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 school of comput...
  • 23 篇 school of comput...

作者

  • 98 篇 niyato dusit
  • 46 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 xiong zehui
  • 24 篇 jin hai
  • 22 篇 huang qingming
  • 21 篇 pardamean bens
  • 20 篇 yang yang
  • 20 篇 lo david
  • 18 篇 bens pardamean
  • 18 篇 wu jia
  • 17 篇 kang jiawen
  • 16 篇 zheng baihua
  • 16 篇 han zhu
  • 16 篇 shen linlin
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 tao dacheng
  • 14 篇 zheng wei-shi
  • 14 篇 ezugwu absalom e...

语言

  • 2,996 篇 英文
  • 1,044 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4067 条 记 录,以下是301-310 订阅
排序:
IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3085-3100页
作者: Saeed Masoud Alshahrani Fatma S.Alrayes Hamed Alqahtani Jaber S.Alzahrani Mohammed Maray Sana Alazwari Mohamed A.Shamseldin Mesfer Al Duhayyim Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Mechanical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Nowadays,Internet of Things(IoT)has penetrated all facets of human life while on the other hand,IoT devices are heavily prone to *** has become important to develop an accurate system that can detect malicious attacks... 详细信息
来源: 评论
User-Level Large Scale Load Forecasting Based on GPU  9
User-Level Large Scale Load Forecasting Based on GPU
收藏 引用
9th Annual International Conference on Network and information systems for computers, ICNISC 2023
作者: Qi, Jinshan Wang, Jiangtao Liang, Xun Xu, Zhiming Huaiyin Normal University Huai'an Key Laboratory of Big Data Intelligent Computing and Analysis School of Computer Science and Technology Huai'an China Renmin University of China School of Information Beijing China
Load forecasting is an essential part in power system management and planning. In recent years, more and more researchers started to focus on the behavior of terminal customers, trying to improve the accuracy of load ... 详细信息
来源: 评论
MLPFormer: MLP-integrated transformer for colorectal histopathology whole slide image segmentation
收藏 引用
Neural computing and Applications 2025年 第6期37卷 4651-4661页
作者: Wang, Yuxuan Li, Dan Li, Xuechen Guo, Yan Zuo, Yanfei Shen, Linlin Department of Computer Science Wenzhou-Kean University Wenzhou China School of Electronics and Information Engineering Wuyi University Jiangmen China Department of Histo Pathology Shanghai Histo Pathology Diagnostic Center Shanghai China College of Computer Sicence and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif... 详细信息
来源: 评论
DETECTING BACKDOOR SAMPLES IN CONTRASTIVE LANGUAGE IMAGE PRETRAINING
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Hanxun Erfani, Sarah Li, Yige Ma, Xingjun Bailey, James School of Computing and Information Systems The University of Melbourne Australia School of Computing and Information Systems Singapore Management University Singapore School of Computer Science Fudan University China
Contrastive language-image pretraining (CLIP) has been found to be vulnerable to poisoning backdoor attacks where the adversary can achieve an almost perfect attack success rate on CLIP models by poisoning only 0.01% ...
来源: 评论
CRNG-PBFT: An Efficient PBFT Algorithm Based on Comprehensive Reputation and Node Grouping for data Sharing in Digital Twins
CRNG-PBFT: An Efficient PBFT Algorithm Based on Comprehensiv...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Qihua Hu Hongju Cheng Yang Yang Jiale Zhang Longfei Guo College of Computer and Data Science Fuzhou University Fuzhou China School of Computing and Information Systems Singapore Management University Singapore
data sharing helps the digital twin builders obtain the necessary data to construct a virtual replica of the physical entity. The consortium blockchain is one of the effective ways to solve the lack of trust among the... 详细信息
来源: 评论
Type-Representation Enhanced Event Detection via Structure Encoder  1
Type-Representation Enhanced Event Detection via Structure E...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Feng, Yuming Huang, Linmeng Liang, Haozhe Jin, Xiaolong Guan, Saiping Guo, Jiafeng School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Computing Technology Chinese Academy of Sciences Key Lab of Network Data Science and Technology China Institute of Systems Engineering Academy of Military Science Beijing China
Event detection, aiming to detect whether a sentence contains the type of events of interest, is one of the important tasks in information Extraction. There exist many methods for event detection, which usually treat ... 详细信息
来源: 评论
Deep Learning Based Face Mask Detection in Religious Mass Gathering During COVID-19 Pandemic
收藏 引用
computer systems science & Engineering 2023年 第8期46卷 1863-1877页
作者: Abdullah S AL-Malaise AL-Ghamdi Sultanah MAlshammari Mahmoud Ragab Information Systems Department Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department HECI SchoolDar Alhekma UniversityJeddahSaudi Arabia Center of Excellence in Smart Environment Research King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceAl-Azhar UniversityNaser CityCairo11884Egypt
Notwithstanding the religious intention of billions of devotees,the religious mass gathering increased major public health concerns since it likely became a huge super spreading event for the severe acute respiratory ... 详细信息
来源: 评论
ASCM: Analysis of a Sequential and Collaborative Model for Recommendations
收藏 引用
SN computer science 2024年 第6期5卷 788页
作者: Tandon, Righa Verma, Ajay Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan 173 234 India Department of Data Science and Engineering School of Computing Mohan Babu University AP Tirupati 517 102 India
The recommender system can predict future lists of items based on the user’s sentiments and interactions. As the data is ubiquitous, we have a number of options available to make a selection. This is the scenario whe... 详细信息
来源: 评论
Thematic Event Extraction Based on Event-Related Sentence Detection  1
Thematic Event Extraction Based on Event-Related Sentence De...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Zhang, Xing Guo, Yucan Jin, Xiaolong Liang, Haozhe Guan, Saiping School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Computing Technology Chinese Academy of Sciences Cas Key Laboratory of Network Data Science and Technology China Institute of Systems Engineering Academy of Military Science Australia
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event... 详细信息
来源: 评论
Fuzzy-Based Weighted Federated Machine Learning Approach for Sustainable Energy Management with IoE Integration
Fuzzy-Based Weighted Federated Machine Learning Approach for...
收藏 引用
2024 systems and information Engineering Design Symposium, SIEDS 2024
作者: Ghazal, Taher M. Iqbal Janjua, Jamshaid Abbas, Sagheer Fatima, Areej Saleem, Muhammad Khan, Muhammad Adnan Alqarafi, Abdulrahman Khalifa University Centre for Cyber Physical Systems Computer Science Department Abu Dhabi United Arab Emirates Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia National College of Business Administration and Economics School of Computer Sciences Lahore Pakistan Al-Khawarizmi Institute of Computer Science Lahore Pakistan Bahria University Department of Computer Science Lahore Pakistan LGU Department of Computer Science Lahore Pakistan Minhaj University School of Computer Science Lahore Pakistan Skyline University College School of Computing Sharjah United Arab Emirates Riphah International University Riphah School of Computing and Innovation Lahore Pakistan Taibah University College of Computer Science and Engineering Medina42353 Saudi Arabia
The considerable surge in energy consumption due to population growth and the use of new technology has posed significant challenges to energy security and the environment. Managing energy consumption on the consumer ... 详细信息
来源: 评论