咨询与建议

限定检索结果

文献类型

  • 28,551 篇 期刊文献
  • 2,243 篇 会议
  • 2 册 图书

馆藏范围

  • 30,796 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,769 篇 工学
    • 12,990 篇 计算机科学与技术...
    • 6,980 篇 电气工程
    • 6,760 篇 材料科学与工程(可...
    • 5,203 篇 控制科学与工程
    • 5,057 篇 电子科学与技术(可...
    • 4,788 篇 信息与通信工程
    • 4,617 篇 机械工程
    • 2,380 篇 软件工程
    • 1,990 篇 仪器科学与技术
    • 1,712 篇 生物医学工程(可授...
    • 1,666 篇 网络空间安全
    • 1,584 篇 力学(可授工学、理...
    • 1,059 篇 动力工程及工程热...
    • 1,059 篇 化学工程与技术
    • 891 篇 环境科学与工程(可...
  • 16,684 篇 理学
    • 6,366 篇 数学
    • 4,696 篇 物理学
    • 3,160 篇 生物学
    • 2,112 篇 天文学
    • 2,090 篇 化学
    • 1,136 篇 系统科学
    • 834 篇 地球物理学
    • 817 篇 大气科学
    • 721 篇 海洋科学
  • 2,772 篇 医学
    • 2,083 篇 临床医学
    • 841 篇 基础医学(可授医学...
  • 1,781 篇 管理学
    • 892 篇 图书情报与档案管...
    • 786 篇 管理科学与工程(可...
  • 1,644 篇 农学
    • 730 篇 作物学
  • 751 篇 经济学
    • 712 篇 应用经济学
  • 651 篇 法学
  • 629 篇 教育学
  • 444 篇 文学
  • 105 篇 艺术学
  • 62 篇 军事学
  • 30 篇 哲学
  • 29 篇 历史学

主题

  • 981 篇 deep learning
  • 514 篇 machine learning
  • 208 篇 internet of thin...
  • 178 篇 clustering
  • 153 篇 analysis
  • 150 篇 network
  • 138 篇 classification
  • 130 篇 blockchain
  • 129 篇 security
  • 127 篇 artificial intel...
  • 112 篇 simulation
  • 106 篇 cloud computing
  • 101 篇 optimization
  • 99 篇 convolutional ne...
  • 97 篇 model
  • 93 篇 image
  • 85 篇 data
  • 82 篇 computer
  • 80 篇 feature selectio...
  • 79 篇 reinforcement le...

机构

  • 203 篇 university of ch...
  • 164 篇 ieee
  • 120 篇 department of co...
  • 111 篇 college of infor...
  • 76 篇 college of infor...
  • 71 篇 college of compu...
  • 68 篇 college of infor...
  • 66 篇 school of comput...
  • 51 篇 university of ch...
  • 43 篇 college of infor...
  • 42 篇 college of compu...
  • 40 篇 fujian science&t...
  • 37 篇 college of infor...
  • 37 篇 department of co...
  • 35 篇 school of comput...
  • 31 篇 college of compu...
  • 31 篇 state key labora...
  • 26 篇 department of in...
  • 26 篇 college of elect...
  • 26 篇 school of comput...

作者

  • 76 篇 abdelwahed motwa...
  • 61 篇 jing zhang
  • 60 篇 yunyoung nam
  • 51 篇 jian wang
  • 51 篇 mehedi masud
  • 50 篇 jun wang
  • 43 篇 wei liu
  • 39 篇 abu sarwar zaman...
  • 39 篇 xin liu
  • 39 篇 li zhang
  • 35 篇 jun zhang
  • 31 篇 rui wang
  • 30 篇 anwer mustafa hi...
  • 29 篇 ming li
  • 28 篇 imran khan
  • 26 篇 mohamed k.nour
  • 26 篇 方卯发
  • 26 篇 wei sun
  • 25 篇 cheng-wei qiu
  • 24 篇 chen chen

语言

  • 28,315 篇 英文
  • 2,481 篇 中文
检索条件"机构=College of Computer Science and Information Technology"
30796 条 记 录,以下是51-60 订阅
排序:
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3397-3416页
作者: Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany computer science and information technology Jazan UniversityJazanSaudi Arabia CSE Eudoxia Research UniversityNew CastleUSA Department of information technology College of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in Software Sangmyung UniversitySeoulKorea Department of computer science and Engineering Lovely Professional UniversityPhagwaraPunjabIndia
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2087-2110页
作者: Shahriar Md Arman Tao Yang Shahadat Shahed Alanoud AlMazroa Afraa Attiah Linda Mohaisen School of computer science and technology Zhejiang Gongshang UniversityHangzhou310018China School of computer science and technology Hangzhou Dianzi UniversityHangzhou310018China college of computer and information sciences Princess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia Faculty of Computing and information technology King Abdulaziz UniversityJeddah21589Saudi Arabia
The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation techniques.Biometric credentials are increasingly being used for verification due to their advant... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Deep3DSketch-im:rapid high-fidelity AI 3D model generation by single freehand sketches
收藏 引用
Frontiers of information technology & Electronic Engineering 2024年 第1期25卷 149-159页
作者: Tianrun CHEN Runlong CAO Zejian LI Ying ZANG Lingyun SUN college of computer science and technology Zhejiang UniversityHangzhou 310027China School of Software technology Zhejiang UniversityHangzhou 310027China School of information Engineering Huzhou UniversityHuzhou 313000China
The rise of artificial intelligence generated content(AIGC)has been remarkable in the language and image fields,but artificial intelligence(AI)generated three-dimensional(3D)models are still under-explored due to thei... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
ASTSDL:predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model
收藏 引用
science China(information sciences) 2024年 第1期67卷 86-104页
作者: Yaoshen YU Zhiqiu HUANG Guohua SHEN Weiwei LI Yichao SHAO college of computer science and technology Nanjing University of Aeronautics and Astronautics Collaborative Innovation Center of Novel Software technology and Industrialization Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology
Code recommendation systems have been widely used in helping developers implement unfamiliar programming tasks.Many existing code recommenders or code search engines can retrieve relevant code rapidly with high accura... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SDGNN: Symmetry-Preserving Dual-Stream Graph Neural Networks
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1717-1719页
作者: Jiufang Chen Ye Yuan Xin Luo the college of computer science and technology Chongqing University of Posts and TelecommunicationsChongqing 400065 the Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent TechnologyChinese Academy of SciencesChongqing 400714China the college of computer and information science Southwest UniversityChongqing 400715China IEEE
Dear Editor,This letter proposes a symmetry-preserving dual-stream graph neural network(SDGNN) for precise representation learning to an undirected weighted graph(UWG). Although existing graph neural networks(GNNs) ar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 博看期刊 评论
Design of a Lightweight Compressed Video Stream-Based Patient Activity Monitoring System
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1253-1274页
作者: Sangeeta Yadav Preeti Gulia Nasib Singh Gill Piyush Kumar Shukla Arfat Ahmad Khan Sultan Alharby Ahmed Alhussen Mohd Anul Haq Department of computer science&Applications Maharshi Dayanand UniversityRohtak124001India University Institute of technology Rajiv Gandhi Proudyogiki VishwavidyalayaBhopal462033India Department of computer science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand Department of computer science College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Kingdom of Saudi Arabia Department of computer Engineering College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Kingdom of Saudi Arabia
Inpatient falls from beds in hospitals are a common problem.Such falls may result in severe injuries.This problem can be addressed by continuous monitoring of patients using cameras.Recent advancements in deep learnin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3469-3487页
作者: Sureka Sivavelu Venkatesh Palanisamy School of computer science Engineering and information Systems Vellore Institute of TechnologyVellore632014India
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
computer Modeling in Engineering & sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri School of computer science Engineering and information Systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Facial Image-Based Autism Detection:A Comparative Study of Deep Neural Network Classifiers
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 105-126页
作者: Tayyaba Farhat Sheeraz Akram Hatoon SAlSagri Zulfiqar Ali Awais Ahmad Arfan Jaffar Faculty of computer science and information technology The Superior UniversityLahore54600Pakistan Intelligent Data Visual Computing Research(IDVCR) Faculty of Computer Science and Information TechnologyThe Superior UniversityLahore54600Pakistan information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh12571Saudi Arabia School of computer science and Electronic Engineering(CSEE) University of EssexWivenhoe ParkColchesterCO43SQUK
Autism Spectrum Disorder(ASD)is a neurodevelopmental condition characterized by significant challenges in social interaction,communication,and repetitive behaviors.Timely and precise ASD detection is crucial,particula... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of computer science and technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论