咨询与建议

限定检索结果

文献类型

  • 22,603 篇 期刊文献
  • 1,943 篇 会议
  • 4 册 图书

馆藏范围

  • 24,550 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,102 篇 工学
    • 9,068 篇 计算机科学与技术...
    • 5,633 篇 材料科学与工程(可...
    • 4,715 篇 电气工程
    • 3,851 篇 电子科学与技术(可...
    • 3,753 篇 控制科学与工程
    • 3,459 篇 机械工程
    • 3,292 篇 信息与通信工程
    • 1,529 篇 仪器科学与技术
    • 1,361 篇 力学(可授工学、理...
    • 1,300 篇 生物医学工程(可授...
    • 1,281 篇 软件工程
    • 1,190 篇 网络空间安全
    • 965 篇 化学工程与技术
    • 902 篇 动力工程及工程热...
    • 855 篇 环境科学与工程(可...
    • 639 篇 光学工程
  • 13,808 篇 理学
    • 4,579 篇 数学
    • 4,202 篇 物理学
    • 2,699 篇 生物学
    • 2,058 篇 化学
    • 1,964 篇 天文学
    • 892 篇 系统科学
    • 806 篇 大气科学
    • 766 篇 地球物理学
    • 703 篇 海洋科学
  • 2,359 篇 医学
    • 1,761 篇 临床医学
    • 675 篇 基础医学(可授医学...
  • 1,569 篇 农学
    • 704 篇 作物学
  • 1,312 篇 管理学
    • 640 篇 图书情报与档案管...
  • 685 篇 经济学
    • 645 篇 应用经济学
  • 489 篇 教育学
  • 487 篇 法学
  • 397 篇 文学
  • 84 篇 艺术学
  • 53 篇 军事学
  • 26 篇 哲学
  • 23 篇 历史学

主题

  • 700 篇 deep learning
  • 333 篇 machine learning
  • 182 篇 internet of thin...
  • 170 篇 cloud computing
  • 115 篇 clustering
  • 114 篇 analysis
  • 106 篇 image
  • 98 篇 blockchain
  • 89 篇 network
  • 88 篇 security
  • 82 篇 model
  • 79 篇 optimization
  • 78 篇 artificial intel...
  • 77 篇 of
  • 76 篇 data
  • 69 篇 simulation
  • 64 篇 metaheuristics
  • 62 篇 classification
  • 61 篇 reinforcement le...
  • 60 篇 performance

机构

  • 186 篇 university of ch...
  • 98 篇 ieee
  • 90 篇 college of infor...
  • 83 篇 college of infor...
  • 70 篇 university of ch...
  • 68 篇 college of infor...
  • 50 篇 college of compu...
  • 43 篇 college of infor...
  • 40 篇 college of compu...
  • 37 篇 college of infor...
  • 37 篇 fujian science&t...
  • 35 篇 college of compu...
  • 33 篇 college of elect...
  • 31 篇 state key labora...
  • 27 篇 department of co...
  • 26 篇 school of comput...
  • 25 篇 beijing academy ...
  • 25 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 college of elect...

作者

  • 62 篇 abdelwahed motwa...
  • 53 篇 mehedi masud
  • 44 篇 jun wang
  • 42 篇 jing zhang
  • 40 篇 wei liu
  • 40 篇 yunyoung nam
  • 39 篇 jian wang
  • 32 篇 abu sarwar zaman...
  • 32 篇 xin liu
  • 32 篇 li zhang
  • 28 篇 rui wang
  • 27 篇 ming li
  • 26 篇 mohamed k.nour
  • 26 篇 imran khan
  • 26 篇 方卯发
  • 23 篇 chen chen
  • 21 篇 abdelaziz a.abde...
  • 21 篇 jun zhang
  • 21 篇 hong chen
  • 21 篇 qiang li

语言

  • 21,944 篇 英文
  • 2,606 篇 中文
检索条件"机构=College of Computing and Information Technology"
24550 条 记 录,以下是1-10 订阅
排序:
Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5809-5824页
作者: Fahad F.Alruwaili College of Computing and Information Technology Shaqra UniversitySharqaSaudi Arabia
Internet of Things(IoT)is one of the hottest research topics in recent years,thanks to its dynamic working mechanism that integrates physical and digital world into a single system.IoT technology,applied in industries... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques
收藏 引用
Computer Systems Science & Engineering 2023年 第9期46卷 2899-2915页
作者: Noura Alenezi Ahamed Aljuhani College of Computing and Information Technology University of TabukTabuk71491Saudi Arabia
The rapid growth of the Internet of Things(IoT)in the industrial sector has given rise to a new term:the Industrial Internet of Things(IIoT).The IIoT is a collection of devices,apps,and services that connect physical ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure Multifactor Remote Access User Authentication Framework for IoT Networks
收藏 引用
Computers, Materials & Continua 2021年 第9期68卷 3235-3254页
作者: Mohammed Mujib Alshahrani College of Computing and Information Technology The University of BishaSaudi Arabia
The term IoT refers to the interconnection and exchange of data among devices/sensors.IoT devices are often small,low cost,and have limited resources.The IoT issues and challenges are growing increasingly.Security and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum algorithm and experimental demonstration for the subset sum problem
收藏 引用
Science China(information Sciences) 2022年 第8期65卷 261-274页
作者: Qilin ZHENG Pingyu ZHU Shichuan XUE Yang WANG Chao WU Xinyao YU Miaomiao YU Yingwen LIU Mingtang DENG Junjie WU Ping XU Institute for Quantum information and State Key Laboratory of High Performance computing College of Computer Science and TechnologyNational University of Defense Technology
To solve the subset sum problem, a well-known nondeterministic polynomial-time complete problem that is widely used in encryption and resource scheduling, we propose a feasible quantum algorithm that utilizes fewer qu... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1173-1193页
作者: Daniyal M.Alghazzawi Osama Bassam J.Rabie Surbhi Bhatia Syed Hamid Hasan Faculty of computing and information technology King Abdulaziz UniversityJeddah21589Saudi Arabia Department of information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversitySaudi Arabia
The Deep Neural Networks(DNN)training process is widely affected by backdoor attacks.The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying maliciou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments
收藏 引用
Computers, Materials & Continua 2022年 第3期70卷 4307-4321页
作者: Insaf Ullah Hira Zahid Fahad Algarni Muhammad Asghar Khan Hamdard Institute of Engineering and technology Islamabad44000Pakistan Department of information technology Abbottabad University of Science and TechnologyAbbottabadPakistan College of Computing and Information Technology The University of BishaBishaSaudi Arabia
When the Wireless Sensor Network(WSN)is combined with the Internet of Things(IoT),it can be employed in a wide range of applications,such as agriculture,industry 4.0,health care,smart homes,among others.Accessing the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Double Edge Sword Based Distributed Executor Service
收藏 引用
Computer Systems Science & Engineering 2022年 第8期42卷 589-604页
作者: Faisal Bahadur Arif Iqbal Umar Insaf Ullah Fahad Algarni Muhammad Asghar Khan Department of information technology Hazara UniversityMansehra21300Pakistan Hamdard Institute of Engineering and technology Islamabad 44000Pakistan College of Computing and Information Technology The University of BishaBishaSaudi Arabia
Scalability is one of the most important quality attribute of softwareintensive systems,because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload.In order to ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid Algorithm-Driven Smart Logistics Optimization in IoT-Based Cyber-Physical Systems
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3921-3942页
作者: Abdulwahab Ali Almazroi Nasir Ayub College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddah21959Saudi Arabia Department of Creative Technologies Air University IslamabadIslamabad44000Pakistan
Effectively managing complex logistics data is essential for development sustainability and growth,especially in optimizing distribution routes.This article addresses the limitations of current logistics path optimiza... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Coach-assistedmulti-agent reinforcement learning framework for unexpected crashed agents
收藏 引用
Frontiers of information technology & Electronic Engineering 2022年 第7期23卷 1032-1042页
作者: Jian ZHAO Youpeng ZHAO Weixun WANG Mingyu YANG Xunhan HU Wengang ZHOU Jianye HAO Houqiang LI School of information Science and technology University of Science and Technology of ChinaHefei 230026China college of Intelligence and computing Tianjin UniversityTianjin 300072China
Multi-agent reinforcement learning is difficult to apply in practice,partially because of the gap between simulated and real-world scenarios.One reason for the gap is that simulated systems always assume that agents c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity:A Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第3期9卷 377-391页
作者: Jun Zhang Lei Pan Qing-Long Han Chao Chen Sheng Wen Yang Xiang IEEE the School of Science Computing and Engineering TechnologiesSwinburne University of Technology the School of information technology Deakin University the college of Science and Engineering James CookUniversity
With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opport... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论