咨询与建议

限定检索结果

文献类型

  • 5,248 篇 会议
  • 4,361 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 9,630 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,770 篇 工学
    • 4,339 篇 计算机科学与技术...
    • 3,613 篇 软件工程
    • 1,484 篇 信息与通信工程
    • 857 篇 生物工程
    • 809 篇 控制科学与工程
    • 771 篇 电气工程
    • 649 篇 生物医学工程(可授...
    • 520 篇 光学工程
    • 446 篇 电子科学与技术(可...
    • 337 篇 机械工程
    • 335 篇 网络空间安全
    • 279 篇 化学工程与技术
    • 257 篇 仪器科学与技术
    • 257 篇 安全科学与工程
    • 235 篇 动力工程及工程热...
    • 227 篇 交通运输工程
  • 3,498 篇 理学
    • 1,628 篇 数学
    • 1,020 篇 生物学
    • 1,001 篇 物理学
    • 574 篇 统计学(可授理学、...
    • 391 篇 化学
    • 266 篇 系统科学
  • 1,758 篇 管理学
    • 999 篇 管理科学与工程(可...
    • 847 篇 图书情报与档案管...
    • 469 篇 工商管理
  • 721 篇 医学
    • 593 篇 临床医学
    • 531 篇 基础医学(可授医学...
    • 321 篇 公共卫生与预防医...
    • 294 篇 药学(可授医学、理...
  • 335 篇 法学
    • 268 篇 社会学
  • 178 篇 农学
  • 168 篇 经济学
  • 78 篇 教育学
  • 32 篇 文学
  • 18 篇 艺术学
  • 15 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 444 篇 accuracy
  • 410 篇 deep learning
  • 310 篇 feature extracti...
  • 280 篇 machine learning
  • 241 篇 computational mo...
  • 237 篇 training
  • 231 篇 real-time system...
  • 224 篇 predictive model...
  • 193 篇 convolutional ne...
  • 168 篇 internet of thin...
  • 166 篇 semantics
  • 163 篇 data models
  • 151 篇 optimization
  • 130 篇 artificial intel...
  • 129 篇 security
  • 128 篇 neural networks
  • 118 篇 support vector m...
  • 106 篇 federated learni...
  • 104 篇 cloud computing
  • 102 篇 reinforcement le...

机构

  • 427 篇 department of ph...
  • 401 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 384 篇 h.h. wills physi...
  • 376 篇 van swinderen in...
  • 348 篇 yandex school of...
  • 339 篇 college of compu...
  • 319 篇 cavendish labora...
  • 318 篇 school of physic...
  • 302 篇 university of ch...
  • 292 篇 nikhef national ...
  • 291 篇 imperial college...
  • 289 篇 department of ph...
  • 289 篇 center for high ...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 283 篇 physikalisches i...

作者

  • 251 篇 barter w.
  • 246 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 214 篇 borsato m.
  • 212 篇 betancourt c.
  • 209 篇 brundu d.
  • 198 篇 bediaga i.
  • 192 篇 amato s.
  • 187 篇 baryshnikov f.
  • 181 篇 boettcher t.
  • 164 篇 braun s.
  • 162 篇 borisyak m.
  • 159 篇 baker s.
  • 157 篇 bizzeti a.
  • 151 篇 bjørn m.
  • 149 篇 bencivenni g.
  • 143 篇 a. jawahery

语言

  • 8,851 篇 英文
  • 726 篇 其他
  • 72 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=the College of Computer and Data Science"
9630 条 记 录,以下是51-60 订阅
排序:
Targeted Universal Adversarial Attack Based on Fourier Transform  2nd
Targeted Universal Adversarial Attack Based on Fourier Tran...
收藏 引用
2nd International Conference on data Security and Privacy Protection, DSPP 2024
作者: Sun, Yancheng Chen, Yuling Liu, Ziyang Dou, Hui Tan, Chaoyue The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
Chaotic Resilience: Enhancing IoT Security Through Dynamic data Encryption  8th
Chaotic Resilience: Enhancing IoT Security Through Dynamic D...
收藏 引用
8th International Symposium on Intelligent Informatics, ISI 2023
作者: Francis, E. Geo Sheeja, S. Depertment of Computer Science Karpagam Academy of Higher Education Coimbatore India Department of Data Science Sri Krishna Adithya College of Arts and Science Coimbatore India
In the ever-expanding landscape of the Internet of Things (IoT), safeguarding the security and privacy of data transmissions among IoT devices has become increasingly critical. This research introduces an innovative a... 详细信息
来源: 评论
FHO-based Hybrid Neural Networks for Short-Term Load Forecasting in Economic Dispatch of Power Systems
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 262-284页
作者: Wei, Yi Wang, Chia-Hung Suo, Yi-Fan Zhao, Qi-Gen Yuan, Jin-Chen Chen, Shu-Meng College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China
With the development of the smart grid era, the data volume of the power system on the user side is growing rapidly, and the dependence of citizens on electricity is increasing significantly. In this paper, we aim to ... 详细信息
来源: 评论
A Fine-Tuned DenseNet-Based Diagnosis Approach for Multi-Class Breast Cancer Classification  2
A Fine-Tuned DenseNet-Based Diagnosis Approach for Multi-Cla...
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Kansal, Kanika Kansal, Kajal Department of Computer Science and Engineering Data Science ABES Engineering College Uttar Pradesh Ghaziabad India School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India
Breast cancer is a prevalent tumor across women and is associated with a high mortality rate. Prompt diagnosis is one of the biggest challenges that needs to be addressed globally, as it can considerably improve survi... 详细信息
来源: 评论
Blockchain-Based Revocable Key-Aggregate Searchable Encryption for Group data Sharing in Cloud-Assisted Industrial IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16899-16911页
作者: Zhang, Kai Hu, Xinyi Zhao, Jian Wei, Lifei Ning, Jianting Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Shanghai University of Electric Power College of Electrical Engineering Shanghai China Shanghai Maritime University College of Information Engineering Shanghai China Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science China
In the cloud-assisted Industrial Internet of Things (IIoT), flexible and secure data sharing promotes industry processes optimization and new products-making. To enable selective data retrieval over categorized data c... 详细信息
来源: 评论
Thalaseemia Prediction Using Deep Neural Networks: A Step Towards Personalized Medicine  2
Thalaseemia Prediction Using Deep Neural Networks: A Step To...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Pream Sudha, V. Karpagavalli, S. Sathiyakumari, K. Sountharraj, A.C. Dr.N. G.P Arts and Science College Department of Computer Science with Data Analytics Coimbatore India PSGR Krishnammal College for Women Department of Computer Science Coimbatore India
Thalaseemia is a series of genetic hemolytic diseases brought on by defective hemoglobin synthesis. It is prevalent in many Asian, African, and Mediterranean nations. Four million Indians are Thalaseemia carriers, and... 详细信息
来源: 评论
Optimizing Coverage in Wireless Sensor Networks Using the Tumbleweed Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 250-261页
作者: Zhang, Mengfei Chu, Shu-Chuan Liu, Nengxian Huang, Kuan-Chun Pan, Jeng-Shyang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Department of Industrial and Systems Engineering Chung Yuan Christian University Taoyuan320314 Taiwan School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte... 详细信息
来源: 评论
DRL-Enabled Computation Offloading for AIGC Services in IIoT-Assisted Edge Computing Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12829-12844页
作者: Zhang, Xingxing Li, Shaobo Tang, Jianhang Zhu, Keyu Zhang, Yang Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China National University of Singapore Department of Electrical and Computer Engineering Queenstown Singapore Guizhou Institute of Technology School of Big Data Guiyang550003 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
The widespread application of AI-generated content (AIGC) services has driven demand for efficient computational resources, making effective task scheduling and computation offloading in edge computing (EC) environmen... 详细信息
来源: 评论
Intention Analysis Makes LLMs A Good Jailbreak Defender  31
Intention Analysis Makes LLMs A Good Jailbreak Defender
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Zhang, Yuqi Ding, Liang Zhang, Lefei Tao, Dacheng School of Computer Science Wuhan University China The University of Sydney Australia College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
Aligning large language models (LLMs) with human values, particularly when facing complex and stealthy jailbreak attacks, presents a formidable challenge. Unfortunately, existing methods often overlook this intrinsic ... 详细信息
来源: 评论