咨询与建议

限定检索结果

文献类型

  • 34,257 篇 期刊文献
  • 2,666 篇 会议
  • 2 册 图书

馆藏范围

  • 36,925 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26,982 篇 工学
    • 11,791 篇 计算机科学与技术...
    • 6,047 篇 软件工程
    • 4,298 篇 控制科学与工程
    • 4,279 篇 机械工程
    • 4,152 篇 电子科学与技术(可...
    • 2,999 篇 仪器科学与技术
    • 2,380 篇 信息与通信工程
    • 1,695 篇 网络空间安全
    • 1,542 篇 材料科学与工程(可...
    • 939 篇 光学工程
    • 728 篇 电气工程
    • 647 篇 化学工程与技术
    • 441 篇 动力工程及工程热...
    • 428 篇 航空宇航科学与技...
    • 387 篇 交通运输工程
    • 385 篇 力学(可授工学、理...
    • 322 篇 生物医学工程(可授...
  • 8,913 篇 理学
    • 4,598 篇 数学
    • 1,715 篇 物理学
    • 1,141 篇 系统科学
    • 486 篇 生物学
    • 424 篇 化学
  • 5,667 篇 管理学
    • 5,363 篇 管理科学与工程(可...
  • 2,625 篇 医学
    • 2,192 篇 临床医学
  • 781 篇 经济学
    • 767 篇 应用经济学
  • 612 篇 农学
  • 603 篇 艺术学
    • 552 篇 设计学(可授艺术学...
  • 544 篇 教育学
    • 477 篇 教育学
  • 513 篇 文学
    • 378 篇 外国语言文学
  • 429 篇 军事学
    • 416 篇 军队指挥学
  • 386 篇 法学
    • 315 篇 社会学
  • 52 篇 哲学
  • 22 篇 历史学

主题

  • 1,268 篇 deep learning
  • 804 篇 machine learning
  • 309 篇 network
  • 290 篇 classification
  • 275 篇 security
  • 273 篇 clustering
  • 272 篇 internet of thin...
  • 257 篇 optimization
  • 242 篇 simulation
  • 239 篇 analysis
  • 211 篇 model
  • 206 篇 artificial intel...
  • 198 篇 cloud computing
  • 191 篇 data
  • 189 篇 blockchain
  • 182 篇 computer
  • 182 篇 system
  • 164 篇 algorithm
  • 146 篇 of
  • 144 篇 learning

机构

  • 251 篇 ieee
  • 191 篇 department of co...
  • 160 篇 university of ch...
  • 94 篇 school of comput...
  • 92 篇 department of co...
  • 74 篇 college of compu...
  • 69 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 school of comput...
  • 47 篇 college of infor...
  • 42 篇 school of comput...
  • 41 篇 department of el...
  • 41 篇 college of compu...
  • 39 篇 department of co...
  • 38 篇 school of comput...
  • 37 篇 college of compu...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 32 篇 school of comput...
  • 28 篇 department of co...

作者

  • 84 篇 yunyoung nam
  • 80 篇 abdelwahed motwa...
  • 54 篇 cheng-wei qiu
  • 51 篇 jian wang
  • 51 篇 mehedi masud
  • 42 篇 jun zhang
  • 42 篇 jing zhang
  • 40 篇 abu sarwar zaman...
  • 36 篇 jun wang
  • 34 篇 rui wang
  • 33 篇 xin liu
  • 32 篇 mengchu zhou
  • 30 篇 imran khan
  • 30 篇 ge yu
  • 30 篇 li zhang
  • 30 篇 anwer mustafa hi...
  • 28 篇 wei liu
  • 26 篇 mohamed k.nour
  • 26 篇 chen chen
  • 24 篇 minghui hong

语言

  • 34,367 篇 英文
  • 2,558 篇 中文
检索条件"机构=partment of Computer Science"
36925 条 记 录,以下是71-80 订阅
排序:
A disk I/O optimized system for concurrent graph processing jobs
收藏 引用
Frontiers of computer science 2024年 第3期18卷 13-29页
作者: Xianghao XU Fang WANG Hong JIANG Yongli CHENG Dan FENG Peng FANG School of computer science and Engineering Nanjing University of Science and TechnologyNanjing 210094China Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China Department of computer science&Engineering University of Texas at ArlingtonArlingtonTX 76019USA College of computer and Data science Fuzhou UniversityFuzhou 350108China Zhejiang Lab Hangzhou 311121China
In order to analyze and process the large graphs with high cost efficiency,researchers have developed a number of out-of-core graph processing systems in recent years based on just one commodity *** the other hand,wit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3333-3353页
作者: Aiman Muhammad Arshad Bilal Khan Sadique Ahmad Muhammad Asim Department of computer science City University of Science and Information TechnologyPeshawar25000Pakistan EIAS:Data science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia School of computer science and Technology Guangdong University of TechnologyGuangzhou510006China
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 979-988页
作者: Yunyi ZHOU Haichang GAO Jianping HE Shudong ZHANG Zihui WU School of computer science and Technology Xidian University
Adversarial examples(AEs) are an additive amalgamation of clean examples and artificially malicious perturbations. Attackers often leverage random noise and multiple random restarts to initialize perturbation starting... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1167-1202页
作者: Samina Amin Muhammad Ali Zeb Hani Alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh Institute of Computing Kohat University of Science and TechnologyKohat26000Pakistan Department of computer science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information System College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Squeeze & Excitation Normalization Based nnU-Net for Segmenting Head & Neck Tumors
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 766-775页
作者: Juanying XIE Ying PENG Mingzhao WANG School of computer science Shaanxi Normal University
Head and neck cancer is one of the most common malignancies in the *** propose SE-nnU-Net by adapting SE(squeeze and excitation) normalization into nnU-Net,so as to segment head and neck tumors in PET/CT images by com... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4021-4044页
作者: Zhenjiang Dong Xin Ge Yuehua Huang Jiankuo Dong Jiang Xu School of computer science Nanjing University of Posts and TelecommunicationsNanjing210023China School of computer Nanjing University of Information Science and TechnologyNanjing210044China
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of *** delve into... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 329-349页
作者: Qiang Fu JunWang Changfu Si Jiawei Liu College of computer science and Technology Shenyang University of Chemical TechnologyShenyang110142China College of computer science and Engineering Northeastern UniversityShenyang110169China
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2647-2672页
作者: Muchang Rao Hang Qin School of computer science Yangtze UniversityJingzhou434000China
More devices in the Intelligent Internet of Things(AIoT)result in an increased number of tasks that require low latency and real-time responsiveness,leading to an increased demand for computational *** computing’s lo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Deep Guided Attention Network for Joint Denoising and Demosaicing in Real Image
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 303-312页
作者: Tao ZHANG Ying FU Jun ZHANG School of computer science and Technology Beijing Institute of Technology Advanced Reasearch Institute of Multidisciplinary science Beijing Institute of Technology
Denoising(DN) and demosaicing(DM) are the first crucial stages in the image signal processing pipeline. Recently, researches pay more attention to solve DN and DM in a joint manner, which is an extremely undetermined ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Machine Learning Security Defense Algorithms Based on Metadata Correlation Features
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2391-2418页
作者: Ruchun Jia Jianwei Zhang Yi Lin College of computer science Sichuan UniversityChengdu610065China
With the popularization of the Internet and the development of technology,cyber threats are increasing day by *** such as malware,hacking,and data breaches have had a serious impact on *** network security environment... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论