咨询与建议

限定检索结果

文献类型

  • 2,216 篇 期刊文献
  • 1,763 篇 会议
  • 88 册 图书

馆藏范围

  • 4,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,658 篇 工学
    • 2,084 篇 计算机科学与技术...
    • 1,695 篇 软件工程
    • 590 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 351 篇 电气工程
    • 351 篇 生物工程
    • 240 篇 生物医学工程(可授...
    • 202 篇 光学工程
    • 175 篇 机械工程
    • 169 篇 电子科学与技术(可...
    • 106 篇 网络空间安全
    • 101 篇 交通运输工程
    • 98 篇 动力工程及工程热...
    • 94 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 91 篇 仪器科学与技术
  • 1,343 篇 理学
    • 721 篇 数学
    • 386 篇 生物学
    • 293 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 818 篇 管理学
    • 477 篇 管理科学与工程(可...
    • 369 篇 图书情报与档案管...
    • 265 篇 工商管理
  • 304 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 143 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 155 篇 法学
    • 119 篇 社会学
  • 81 篇 经济学
  • 63 篇 教育学
  • 59 篇 农学
  • 9 篇 艺术学
  • 8 篇 文学
  • 4 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 137 篇 deep learning
  • 125 篇 machine learning
  • 93 篇 feature extracti...
  • 86 篇 artificial intel...
  • 84 篇 accuracy
  • 77 篇 semantics
  • 75 篇 computational mo...
  • 74 篇 training
  • 64 篇 predictive model...
  • 57 篇 internet of thin...
  • 56 篇 data models
  • 53 篇 data mining
  • 49 篇 federated learni...
  • 48 篇 optimization
  • 47 篇 cloud computing
  • 46 篇 reinforcement le...
  • 44 篇 computer science
  • 43 篇 convolutional ne...
  • 38 篇 security
  • 35 篇 visualization

机构

  • 175 篇 school of comput...
  • 77 篇 college of compu...
  • 72 篇 school of comput...
  • 46 篇 school of data a...
  • 45 篇 school of comput...
  • 43 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 college of compu...
  • 31 篇 nanyang technolo...
  • 30 篇 beijing advanced...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 national enginee...
  • 23 篇 school of comput...
  • 23 篇 school of comput...

作者

  • 98 篇 niyato dusit
  • 46 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 xiong zehui
  • 24 篇 jin hai
  • 22 篇 huang qingming
  • 21 篇 pardamean bens
  • 20 篇 yang yang
  • 20 篇 lo david
  • 18 篇 bens pardamean
  • 18 篇 wu jia
  • 17 篇 kang jiawen
  • 16 篇 zheng baihua
  • 16 篇 han zhu
  • 16 篇 shen linlin
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 tao dacheng
  • 14 篇 zheng wei-shi
  • 14 篇 ezugwu absalom e...

语言

  • 2,996 篇 英文
  • 1,044 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4067 条 记 录,以下是311-320 订阅
排序:
An Advanced Intrusion Detection Solution for Networks based on Honeypot Servers  6
An Advanced Intrusion Detection Solution for Networks based ...
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Veena, K. Meena, K. Mercy Theresa, M. Hemalatha, C. Rajalakshmi, D. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai600119 India Department of Computer Science and Engineering GITAM School of Technology GITAM Bangalore561203 India Department of Data Science and Business Systems School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai603203 India Computer Science and Engineering Sri Sairam Institute of Technology Chennai India
Network security is a critical issue in modern technology. Honey pot-based intrusion detection methods provide an additional layer of security and enhance network performance by analyzing hacker behaviour and detectin... 详细信息
来源: 评论
Do we need watchful eyes on our workers? Ethics of using computer vision for workplace surveillance
AI and Ethics
收藏 引用
AI and Ethics 2025年 1-21页
作者: Sebastian, Rinu Ann Ehinger, Kris Miller, Tim School of Computing and Information Systems The University of Melbourne Carlton Australia School of Electrical Engineering and Computer Science The University of Queensland St Lucia Australia
In this paper, we critically examine the relevant ethical concerns of using computer vision-based surveillance in workplaces and propose an intent—and priority-based ethical framework for such systems. With the growi...
来源: 评论
CeTrivium:A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission
收藏 引用
computer systems science & Engineering 2023年 第12期47卷 2895-2920页
作者: Osama S.Younes Abdulmohsen Alharbi Ali Yasseen Faisal Alshareef Faisal Albalawi Umar A.Albalawi Faculty of Computer and Information Technology University of TabukTabuk71491Saudi Arabia Faculty of Computers and Information Menoufia UniversityMenoufia13829Egypt School of Computing&Data Science Wentworth Institute of TechnologyBoston02115USA
Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia *** based onCellularAutomata(CA)can provide amore effective *** CA have recently ga... 详细信息
来源: 评论
Hash Table Notional Machines: A Comparison of 2D and 3D Representations  2024
Hash Table Notional Machines: A Comparison of 2D and 3D Repr...
收藏 引用
1st ACM Virtual Global computing Education Conference V. 1, SIGCSE Virtual 2024
作者: Lewis, Colleen M. Miller, Craig S. Jeuring, Johan Pearce, Janice L. Petersen, Andrew Siebel School of Computing and Data Science University of Illinois Urbana-Champaign UrbanaIL United States School of Computing DePaul University ChicagoIL United States Department of Information and Computing Sciences Utrecht University Utrecht Netherlands Department of Computer Science Berea College BereaKY United States Department of Mathematical and Computational Sciences University of Toronto Mississauga MississaugaON Canada
Background: Notional machines appear to be an essential aspect of computing education, but there are few papers that identify strengths and weaknesses of particular notional machines. Purpose: This article fills a gap... 详细信息
来源: 评论
Automatic Unusual Activities Recognition Using Deep Learning in Academia
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1829-1844页
作者: Muhammad Ramzan Adnan Abid Shahid Mahmood Awan School of Systems and Technology University of Management and TechnologyLahore54782Pakistan Department of Computer Science and Information Technology University of SargodhaSargodha40100Pakistan School of Electronics Computing and MathematicsUniversity of DerbyDerbyUnited Kingdom
In the current era,automatic surveillance has become an active research problem due to its vast real-world applications,particularly for maintaining law and order.A continuous manual monitoring of human activities is ... 详细信息
来源: 评论
DeepCNN:Spectro-temporal feature representation for speech emotion recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 401-417页
作者: Nasir Saleem Jiechao Gao Rizwana Irfan Ahmad Almadhor Hafiz Tayyab Rauf Yudong Zhang Seifedine Kadry Department of Electrical Engineering Faculty of Engineering and TechnologyGomal UniversityD.I.KhanPakistan Department of Computer Science University of VirginiaCharlottesvilleVirginiaUSA Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySkaka AljoufSaudi Arabia Centre for Smart Systems AI and CybersecurityStaffordshire UniversityStoke‐on‐TrentUK School of Computing and Mathematical Sciences University of LeicesterLeicesterUK Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjmanUnited Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies... 详细信息
来源: 评论
Sanitizable Cross-domain Access Control with Policy-driven Dynamic Authorization
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Sun, Jianfei Xu, Guowen Li, Hongwei Zhang, Tianwei Wu, Cong Yang, Xuehuan Deng, Robert H. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering Nanyang Technological University Singapore School of Computing and Information Systems Singapore Management University Singapore
The increasing demand for secure and efficient data sharing has underscored the importance of developing robust cryptographic schemes. However, many existing endeavors have overlooked the following critical issues: (1... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Incentivizing Crowdsensing for DT-Enabled Metaverse  20th
Incentivizing Crowdsensing for DT-Enabled Metaverse
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2024
作者: Ye, Dongdong Huang, Xumin Wu, Yuan Kang, Jiawen Zhong, Weifeng Niyato, Dusit School of Automation Guangdong University of Technology Guangzhou China State Key Laboratory of Internet of Things for Smart City University of Macau Taipa China Department of Computer and Information Science University of Macau Taipa China Collge of Computing and Data Science Nanyang Technological University Singapore Singapore
Digital Twin (DT) has been proposed as a key enabling technology to produce a digital clone of the physical world and facilitate the convergence of the physical and virtual worlds for building a real-world Metaverse. ... 详细信息
来源: 评论
Model of Visualization and Analytics for Open data (Case: Election Voters & Kids Disability Category)  1
Model of Visualization and Analytics for Open Data (Case: El...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Wibowo, Ripto Mukti Fakieh, Bahjat Ramzan, Muhammad Sher Alzahrani, Ahmed Saeed Siddiqui, Muazzam Alzahrani, Bander King Abdulaziz University Faculty of Computing and Information Technology Department of Information Systems Saudi Arabia King Abdulaziz University Faculty of Computing and Information Technology Department of Computer Science Saudi Arabia Indiana University Luddy School of Informatics Computing and Engineering Bloomington United States
Several regional head elections had to be postponed due to the pandemic, including in Indonesia because of the COVID-19 pandemic. Several big cities in Indonesia are of concern because of their large population and GD... 详细信息
来源: 评论