咨询与建议

限定检索结果

文献类型

  • 34,955 篇 会议
  • 127 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 35,125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,235 篇 工学
    • 14,240 篇 计算机科学与技术...
    • 10,322 篇 控制科学与工程
    • 9,852 篇 软件工程
    • 5,641 篇 电气工程
    • 3,262 篇 信息与通信工程
    • 3,179 篇 机械工程
    • 2,079 篇 交通运输工程
    • 1,904 篇 电子科学与技术(可...
    • 1,557 篇 动力工程及工程热...
    • 1,500 篇 仪器科学与技术
    • 1,286 篇 生物工程
    • 1,151 篇 安全科学与工程
    • 1,055 篇 生物医学工程(可授...
    • 771 篇 力学(可授工学、理...
    • 755 篇 光学工程
    • 729 篇 石油与天然气工程
    • 671 篇 化学工程与技术
    • 652 篇 土木工程
    • 649 篇 建筑学
  • 7,916 篇 理学
    • 4,330 篇 数学
    • 1,879 篇 物理学
    • 1,574 篇 系统科学
    • 1,403 篇 生物学
    • 1,051 篇 统计学(可授理学、...
    • 630 篇 化学
  • 5,307 篇 管理学
    • 4,469 篇 管理科学与工程(可...
    • 1,545 篇 工商管理
    • 1,203 篇 图书情报与档案管...
  • 837 篇 医学
    • 771 篇 临床医学
    • 611 篇 基础医学(可授医学...
  • 703 篇 法学
  • 575 篇 经济学
  • 304 篇 农学
  • 210 篇 教育学
  • 128 篇 军事学
  • 46 篇 文学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 2,583 篇 control systems
  • 1,222 篇 robot sensing sy...
  • 1,047 篇 intelligent robo...
  • 889 篇 intelligent syst...
  • 832 篇 real-time system...
  • 825 篇 mobile robots
  • 618 篇 automation
  • 614 篇 robots
  • 589 篇 humans
  • 531 篇 internet of thin...
  • 520 篇 mathematical mod...
  • 512 篇 robot kinematics
  • 460 篇 cameras
  • 458 篇 trajectory
  • 447 篇 neural networks
  • 442 篇 legged locomotio...
  • 441 篇 vehicles
  • 411 篇 accuracy
  • 408 篇 intelligent sens...
  • 404 篇 safety

机构

  • 69 篇 hubei key labora...
  • 69 篇 chitkara univers...
  • 66 篇 university of ch...
  • 56 篇 ieee
  • 52 篇 lovely professio...
  • 42 篇 school of automa...
  • 39 篇 south china univ...
  • 39 篇 maharishi school...
  • 38 篇 institutes for r...
  • 37 篇 univ chinese aca...
  • 35 篇 school of automa...
  • 35 篇 school of cyber ...
  • 34 篇 qingdao academy ...
  • 34 篇 college of infor...
  • 32 篇 university of sc...
  • 32 篇 school of electr...
  • 28 篇 shenyang institu...
  • 27 篇 yeshwantrao chav...
  • 26 篇 dalian universit...
  • 26 篇 faculty of infor...

作者

  • 64 篇 wu xinyu
  • 47 篇 xiong gang
  • 42 篇 liu yang
  • 40 篇 wei li
  • 36 篇 zhang tao
  • 35 篇 christoph stille...
  • 34 篇 li li
  • 30 篇 jian wang
  • 30 篇 wang lei
  • 30 篇 xi ning
  • 27 篇 xinyu wu
  • 26 篇 wang jian
  • 25 篇 yu wang
  • 25 篇 fenghua zhu
  • 24 篇 wang jing
  • 22 篇 munsang kim
  • 22 篇 liu xin
  • 22 篇 heping chen
  • 21 篇 chen chen
  • 20 篇 liu dong

语言

  • 33,360 篇 英文
  • 1,467 篇 其他
  • 366 篇 中文
  • 3 篇 俄文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Cyber Technology in Automation,Control,and Intelligent Systems"
35125 条 记 录,以下是561-570 订阅
排序:
AI-Driven Healthcare cyber-security: Protecting Patient Data and Medical Devices  2
AI-Driven Healthcare Cyber-security: Protecting Patient Data...
收藏 引用
2nd international conference on intelligent cyber Physical systems and Internet of Things (ICoICI)
作者: Bonagiri, Krishna Marx, V. S. Nici Gopalsamy, Mani Iyswariya, A. Helan, R. Reni Hena Sultanuddin, S. J. Quadrant Technol Redmond WA 98052 USA Saveetha Engn Coll Dept CSE Chennai Tamil Nadu India Coolsoft 3240 Off Pointe Pl Suite 200 Louisville KY 40220 USA RMK Engn Coll Dept ECE Chennai Tamil Nadu India Dhanalakshmi Coll Engn Dept Comp Sci & Engn Chennai Tamil Nadu India Dhanalakshmi Coll Engn Dept Cyber Secur Chennai Tamil Nadu India
The use of artificial intelligence (AI) in healthcare has transformed both operational and patient outcomes in the contemporary period. But with these developments comes the crucial problem of cybersecurity. This stud... 详细信息
来源: 评论
Research on a Identifying Maliciously Manipulated Measurement Data Based on Characteristics of cyber-Physical System  12
Research on a Identifying Maliciously Manipulated Measuremen...
收藏 引用
12th ieee international conference on Information and Communication Networks, ICICN 2024
作者: Kim, Ka-Kyung Kim, Joon-Seok Euom, Ieck-Chae System Security Research Center Chonnam National University Gwangju Korea Republic of
intelligent attackers targeting critical infrastructure frequently conceal their attack strategies until their objectives are accomplished. Despite extensive research on detecting manipulated data, much of this resear... 详细信息
来源: 评论
A Roadside Unit Software Platform for intelligent Transportation System Applications  11
A Roadside Unit Software Platform for Intelligent Transporta...
收藏 引用
11th ieee international conference on Consumer Electronics - Taiwan (ICCE-Taiwan) - Empower of Innovative Consumer technology
作者: Su, Chih-Han Cheng, Xue-Yang Wang, Shao-Hua Hsu, Yung-Jen Chang, Da-Wei Tu, Chia-Heng Lee, Wei-Hsun Natl Cheng Kung Univ Tainan Taiwan
intelligent transportation systems (ITS) play a critical role in modern urban transportation by improving traffic management and enhancing safety. The emergence of various ITS applications demands that roadside units ... 详细信息
来源: 评论
Data processing technology of distribution station area combined with convolutional neural network  12
Data processing technology of distribution station area comb...
收藏 引用
12th international conference on cyber technology in automation, control, and intelligent systems, cyber 2022
作者: Zhang, Kexin Dou, Xiaobo Yu, Hang Hu, Yongming School of Electrical Engineering Southeast University Nanjing China
As the end of the distribution network closest to the user, the station area is very important to ensure the stability and safety of the station area. But now the station area has more problems in data collection and ... 详细信息
来源: 评论
A State Partition Particle Filter based Approach for Detection of Switching Attack
A State Partition Particle Filter based Approach for Detecti...
收藏 引用
2024 international conference on Communications control and Computing Technologies for Smart Grids
作者: Yadav, Seema Kishor, Nand Purwar, Shubhi Rajkumar, Vetrivel Subramaniam Stefanov, Alexandru Motilal Nehru Natl Inst Technol Dept Elect Engn Prayagraj India Osold Univ Coll Dept Engn Fredrikstad Norway Delft Univ Technol Dept Elect Sustainable Energy Delft Netherlands
The increasing risk of cyber-physical attacks (CPAs) on power infrastructure has led to need for reliable detection technologies. As the landscape of cyber threats evolves, it becomes imperative to continually update ... 详细信息
来源: 评论
Exact Reachability of Linear Stochastic System with Partial Information
Exact Reachability of Linear Stochastic System with Partial ...
收藏 引用
ieee international conference on cyber technology in automation, control, and intelligent systems
作者: Jiaye Yao Wei Wang Juanjuan Xu School of Control Science and Engineering Shandong University Jinan China
In this paper, we study the exact reachability of a kind of linear stochastic systems with partial information. The system is described by a class of Itô stochastic differential equation that includes a controlle... 详细信息
来源: 评论
Improved YOLOv5-based Method for Recognition of Insulator String Pins  12
Improved YOLOv5-based Method for Recognition of Insulator St...
收藏 引用
12th international conference on cyber technology in automation, control, and intelligent systems, cyber 2022
作者: Du, Jingbo Jiang, Yong Shenyang Ligong University Shenyang110158 China Shenyang Institute of Automation Chinese Academy of Sciences Shenyang110016 China Key Laboratory of Networked Control Systems Chinese Academy of Sciences Shenyang110016 China Institutes for Robotics and Intelligent Manufacturing Chinese Academy of Sciences Shenyang110169 China
Aiming at the problem that the substation insulator replacement robot cannot accurately identify insulator pins in the complex outdoor light environment, an improved YOLOv5-based insulator pin identification method YO... 详细信息
来源: 评论
Advancing Intrusion Detection with Machine Learning: Insights from the UNSW-NB15 Dataset
Advancing Intrusion Detection with Machine Learning: Insight...
收藏 引用
2024 ieee international conference on Information technology, Electronics and intelligent Communication systems, ICITEICS 2024
作者: Kumar, Atul Guleria, Kalpna Chauhan, Rahul Upadhyay, Deepak Chitkara University Chitkara University Institute of Engineering and Technology Punjab India Graphic Era Hill University Computer Science & Engineering Uttarakhand Dehradun248002 India
This research undertakes a comparative examination of the recall performance of Logistic Regression (LR), Random Forest (RF), and Decision Tree (DT) models for intrusion detection systems (IDS). The analysis is conduc... 详细信息
来源: 评论
A Foot-based Wearable Assist Mechanism Based on Tensegrity Structure  12
A Foot-based Wearable Assist Mechanism Based on Tensegrity S...
收藏 引用
12th international conference on cyber technology in automation, control, and intelligent systems, cyber 2022
作者: Sun, Jianwei Wang, Zhenyu School of Mechanical Engineering Changchun University of Technology Changchun China Jilin University Key Laboratory of Bionic Engineering Changchun China
Assist mechanism applied to the lower limbs is an important requirement in the field of sports research and medical rehabilitation. In this paper, we propose a foot-based wearing assist mechanism with metatarsophalang... 详细信息
来源: 评论
Advancing Security in 5G Core Networks through Unsupervised Federated Time Series Modeling
Advancing Security in 5G Core Networks through Unsupervised ...
收藏 引用
4th ieee Annual international conference on cyber Security and Resilience (ieee CSR)
作者: Sheikhi, Saeid Kostakos, Panos Univ Oulu Fac Informat Technol & Elect Engn Ctr Ubiquitous Comp Oulu 90014 Finland
The rapid development of fifth-generation (5G) mobile communication technology poses fresh challenges for cyber-security defense systems. Current intrusion detection mechanisms in 5G networks have shortcomings, partic... 详细信息
来源: 评论