咨询与建议

限定检索结果

文献类型

  • 8,161 篇 期刊文献
  • 417 篇 会议

馆藏范围

  • 8,578 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,968 篇 工学
    • 4,061 篇 计算机科学与技术...
    • 2,048 篇 材料科学与工程(可...
    • 1,921 篇 电气工程
    • 1,882 篇 控制科学与工程
    • 1,671 篇 电子科学与技术(可...
    • 1,654 篇 软件工程
    • 1,476 篇 信息与通信工程
    • 1,341 篇 机械工程
    • 684 篇 力学(可授工学、理...
    • 669 篇 仪器科学与技术
    • 604 篇 生物医学工程(可授...
    • 532 篇 网络空间安全
    • 391 篇 化学工程与技术
    • 362 篇 动力工程及工程热...
    • 240 篇 光学工程
    • 180 篇 航空宇航科学与技...
    • 174 篇 环境科学与工程(可...
  • 4,770 篇 理学
    • 2,444 篇 数学
    • 1,276 篇 物理学
    • 689 篇 生物学
    • 506 篇 天文学
    • 477 篇 化学
    • 390 篇 系统科学
    • 237 篇 统计学(可授理学、...
    • 173 篇 地球物理学
  • 1,395 篇 管理学
    • 1,076 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
  • 1,047 篇 医学
    • 842 篇 临床医学
    • 284 篇 基础医学(可授医学...
  • 263 篇 经济学
    • 252 篇 应用经济学
  • 254 篇 农学
  • 184 篇 教育学
  • 179 篇 法学
  • 140 篇 文学
  • 107 篇 艺术学
  • 86 篇 军事学
  • 10 篇 哲学
  • 9 篇 历史学

主题

  • 323 篇 deep learning
  • 104 篇 machine learning
  • 86 篇 artificial intel...
  • 76 篇 internet of thin...
  • 76 篇 blockchain
  • 70 篇 network
  • 57 篇 optimization
  • 56 篇 convolutional ne...
  • 47 篇 covid-19
  • 46 篇 simulation
  • 45 篇 model
  • 42 篇 control
  • 41 篇 clustering
  • 38 篇 iot
  • 35 篇 computer
  • 35 篇 networks
  • 34 篇 reinforcement le...
  • 34 篇 cnn
  • 33 篇 image
  • 32 篇 analysis

机构

  • 110 篇 ieee
  • 68 篇 department of co...
  • 29 篇 department of co...
  • 24 篇 department of el...
  • 23 篇 school of comput...
  • 23 篇 school of comput...
  • 22 篇 department of co...
  • 22 篇 school of comput...
  • 22 篇 university of ch...
  • 22 篇 department of au...
  • 21 篇 department of co...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of softwa...
  • 17 篇 school of comput...
  • 16 篇 college of compu...
  • 15 篇 riphah school of...
  • 14 篇 school of contro...

作者

  • 36 篇 cheng-wei qiu
  • 27 篇 mehedi masud
  • 26 篇 muhammad adnan k...
  • 25 篇 sagheer abbas
  • 22 篇 jin wang
  • 19 篇 jun wang
  • 19 篇 mengchu zhou
  • 17 篇 jian wang
  • 17 篇 n.z.jhanjhi
  • 17 篇 yunyoung nam
  • 17 篇 zidong wang
  • 17 篇 fei-yue wang
  • 16 篇 jing zhang
  • 15 篇 jun zhang
  • 15 篇 imran khan
  • 15 篇 wei wang
  • 14 篇 chengkuo lee
  • 14 篇 wei liu
  • 14 篇 lu liu
  • 14 篇 osama alfarraj

语言

  • 8,396 篇 英文
  • 182 篇 中文
检索条件"机构=School of Law and Department of Computer Science"
8578 条 记 录,以下是1-10 订阅
排序:
What can we learn from quality assurance badges in open-source software?
收藏 引用
science China(Information sciences) 2024年 第4期67卷 146-163页
作者: Feng LI Yiling LOU Xin TAN Zhenpeng CHEN Jinhao DONG Yang LI Xuanzhi WANG Dan HAO Lu ZHANG MoE Key Lab of HCST School of Computer SciencePeking University department of computer science Purdue University school of computer science & Engineering Beihang University(BUAA) department of computer science University College London(UCL)
In the development of open-source software(OSS), many developers use badges to give an overview of the software and share some key features/metrics conveniently. Among various badges, quality assurance(QA) badges make... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(Information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA school of Cyber Engineering Xidian University school of computer science and Technology Xidian University department of computer and Information science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
SDCC: software-defined collective communication for distributed training
收藏 引用
science China(Information sciences) 2024年 第9期67卷 105-125页
作者: Xin JIN Zhen ZHANG Yunshan JIA Yun MA Xuanzhe LIU school of computer science Peking University department of computer science and Technology Johns Hopkins University
Communication is crucial to the performance of distributed training. Today's solutions tightly couple the control and data planes and lack flexibility, generality, and performance. In this study, we present SDCC, a so... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
On optimal streaming kernelization algorithms
收藏 引用
science China(Information sciences) 2024年 第8期67卷 337-338页
作者: Hao FENG Wei YANG Jianer CHEN school of computer science Guangzhou University department of computer science and Engineering Texas A&M University
The streaming model has been a popular model in big data computation. Streaming kernelization algorithms can be regarded as data compression processes on streaming data. In this study, we give a general method for dev...
来源: 同方期刊数据库 同方期刊数据库 评论
An Encoding-Decoding Framework Based on CNN for circ RNA-RBP Binding Sites Prediction
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 256-263页
作者: Yajing GUO Xiujuan LEI Yi PAN school of computer science Shaanxi Normal University Faculty of computer science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences department of computer science Georgia State University
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua science and Technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu school of computer science and Engineering Nanjing University of Science and TechnologyNanjing 210094China school of computer science Nanjing University of Posts and TelecommunicationsNanjing 210023China department of computer science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A privacy-preserving method for publishing data with multiple sensitive attributes
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 222-238页
作者: Tong Yi Minyong Shi Wenqian Shang Haibin Zhu school of computer science and Engineering Guangxi Normal UniversityGuilinChina school of computer science Communication University of ChinaBeijingChina department of computer science and Mathematics Nipissing UniversityNorth BayOntarioCanada
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Transfer Function Design for Medical Volume Data Using a Knowledge Database Based on Deep Image and Primitive Intensity Profile Features Retrieval
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 320-335页
作者: Younhyun Jung Jim Kong 盛斌 Jinman Kim school of Computing Gachon UniversitySeongnam 13120Korea school of computer science The University of SydneySydney 2006Australia department of computer science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China
Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman school of computer science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India department of computer science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information science and Engineering Hunan Normal University school of computer science Shaanxi Normal University Faculty of computer science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences computer science department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论