咨询与建议

限定检索结果

文献类型

  • 17,344 篇 期刊文献
  • 1,664 篇 会议
  • 2 册 图书

馆藏范围

  • 19,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,894 篇 工学
    • 12,396 篇 计算机科学与技术...
    • 7,157 篇 电气工程
    • 5,891 篇 信息与通信工程
    • 5,609 篇 软件工程
    • 5,377 篇 控制科学与工程
    • 5,184 篇 电子科学与技术(可...
    • 3,605 篇 机械工程
    • 3,556 篇 材料科学与工程(可...
    • 2,390 篇 网络空间安全
    • 1,901 篇 生物医学工程(可授...
    • 1,833 篇 仪器科学与技术
    • 1,701 篇 力学(可授工学、理...
    • 607 篇 动力工程及工程热...
    • 548 篇 生物工程
    • 541 篇 化学工程与技术
    • 441 篇 光学工程
    • 409 篇 航空宇航科学与技...
  • 9,255 篇 理学
    • 6,085 篇 数学
    • 1,711 篇 物理学
    • 863 篇 生物学
    • 733 篇 系统科学
    • 707 篇 天文学
    • 517 篇 化学
    • 332 篇 地球物理学
  • 4,168 篇 管理学
    • 3,306 篇 管理科学与工程(可...
    • 992 篇 图书情报与档案管...
  • 1,259 篇 医学
    • 1,004 篇 临床医学
  • 418 篇 经济学
    • 409 篇 应用经济学
  • 408 篇 法学
    • 360 篇 社会学
  • 386 篇 农学
  • 356 篇 教育学
    • 320 篇 教育学
  • 355 篇 艺术学
  • 348 篇 文学
  • 333 篇 军事学
  • 21 篇 哲学
  • 11 篇 历史学

主题

  • 883 篇 deep learning
  • 436 篇 machine learning
  • 193 篇 network
  • 188 篇 internet of thin...
  • 177 篇 clustering
  • 163 篇 optimization
  • 152 篇 security
  • 125 篇 classification
  • 123 篇 image
  • 113 篇 blockchain
  • 111 篇 cloud computing
  • 102 篇 analysis
  • 84 篇 artificial intel...
  • 83 篇 simulation
  • 79 篇 iot
  • 77 篇 computer
  • 77 篇 reinforcement le...
  • 75 篇 metaheuristics
  • 75 篇 convolutional ne...
  • 66 篇 data

机构

  • 163 篇 department of co...
  • 120 篇 ieee
  • 81 篇 university of ch...
  • 69 篇 school of comput...
  • 65 篇 department of co...
  • 51 篇 college of compu...
  • 47 篇 college of infor...
  • 47 篇 college of compu...
  • 46 篇 university of ch...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 35 篇 school of comput...
  • 34 篇 department of co...
  • 32 篇 college of compu...
  • 31 篇 school of inform...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 school of comput...

作者

  • 81 篇 abdelwahed motwa...
  • 53 篇 mehedi masud
  • 42 篇 yunyoung nam
  • 39 篇 abu sarwar zaman...
  • 33 篇 ishfaq yaseen
  • 28 篇 jing zhang
  • 27 篇 anwer mustafa hi...
  • 26 篇 jian wang
  • 25 篇 mohamed k.nour
  • 25 篇 cheng-wei qiu
  • 25 篇 jin wang
  • 24 篇 mesfer al duhayy...
  • 23 篇 imran khan
  • 23 篇 wei sun
  • 22 篇 jun zhang
  • 22 篇 xin liu
  • 21 篇 abdelaziz a.abde...
  • 21 篇 mengchu zhou
  • 21 篇 jing wang
  • 19 篇 jun wang

语言

  • 17,890 篇 英文
  • 1,120 篇 中文
检索条件"机构=Dept. of Computer Science and Information Systems"
19010 条 记 录,以下是1-10 订阅
排序:
Social Media-Based Surveillance systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1167-1202页
作者: Samina Amin Muhammad Ali Zeb Hani Alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh Institute of Computing Kohat University of Science and TechnologyKohat26000Pakistan Department of computer science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of information System College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Categorizing methods for integrating machine learning with executable specifications
收藏 引用
science China(information sciences) 2024年 第1期67卷 5-19页
作者: David HAREL Raz YERUSHALMI Assaf MARRON Achiya ELYASAF Department of computer science and Applied Mathematics Weizmann Institute of Science Department of Software and information systems Engineering Ben-Gurion University of the Negev
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive r... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3469-3487页
作者: Sureka Sivavelu Venkatesh Palanisamy School of computer science Engineering and information systems Vellore Institute of TechnologyVellore632014India
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
computer Modeling in Engineering & sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri School of computer science Engineering and information systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2237-2258页
作者: Nisreen Innab Department of computer science and information systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information ***,IoHT is susceptible to cybersecur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Early Detection of Colletotrichum Kahawae Disease in Coffee Cherry Based on computer Vision Techniques
收藏 引用
computer Modeling in Engineering & sciences 2024年 第4期139卷 759-782页
作者: Raveena Selvanarayanan Surendran Rajendran Youseef Alotaibi Department of computer science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical ScienceChennai602105India Department of computer science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is har... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of computer information systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of information Technology and computer science Yarmouk UniversityIrbid21163Jordan computer information systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of computer science Alhamd Islamic UniversityIslamabad44000Pakistan Department of computer science and Technology University of Science and Technology BeijingBeijing100083China Department of computer science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of computer science and information systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of computer science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust video question answering via contrastive cross-modality representation learning
收藏 引用
science China(information sciences) 2024年 第10期67卷 211-226页
作者: Xun YANG Jianming ZENG Dan GUO Shanshan WANG Jianfeng DONG Meng WANG School of information science and Technology University of Science and Technology of China Institute of Artificial Intelligence Hefei Comprehensive National Science Center School of computer science and information Engineering Hefei University of Technology Institutes of Physical science and information Technology Anhui University School of computer science and Technology Zhejiang Gongshang University
Video question answering(VideoQA) is a challenging yet important task that requires a joint understanding of low-level video content and high-level textual semantics. Despite the promising progress of existing efforts... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of Cyber Engineering Xidian University School of computer science and Technology Xidian University Department of computer and information science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论