咨询与建议

限定检索结果

文献类型

  • 415 篇 会议
  • 17 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 202 篇 工学
    • 187 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 62 篇 电气工程
    • 33 篇 控制科学与工程
    • 31 篇 信息与通信工程
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 12 篇 交通运输工程
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 石油与天然气工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
  • 45 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 40 篇 理学
    • 24 篇 数学
    • 9 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 化学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 2 篇 军事学

主题

  • 81 篇 security
  • 62 篇 computational in...
  • 57 篇 computational mo...
  • 27 篇 artificial intel...
  • 27 篇 training
  • 21 篇 data security
  • 20 篇 intrusion detect...
  • 18 篇 computer securit...
  • 18 篇 data models
  • 17 篇 deep learning
  • 17 篇 feature extracti...
  • 17 篇 network security
  • 16 篇 information secu...
  • 16 篇 testing
  • 15 篇 data mining
  • 15 篇 machine learning
  • 14 篇 internet of thin...
  • 14 篇 military computi...
  • 14 篇 neural networks
  • 14 篇 protocols

机构

  • 6 篇 university of ch...
  • 4 篇 doctoral school ...
  • 4 篇 chinese academy ...
  • 4 篇 keleti károly fa...
  • 3 篇 college of compu...
  • 3 篇 beijing electron...
  • 3 篇 department of co...
  • 3 篇 peng cheng labor...
  • 3 篇 institute of inf...
  • 3 篇 dalhousie univer...
  • 3 篇 doctoral school ...
  • 3 篇 department of co...
  • 3 篇 national univers...
  • 3 篇 obuda univ docto...
  • 2 篇 university of ot...
  • 2 篇 department of co...
  • 2 篇 virginia tech bl...
  • 2 篇 sama partners tu...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...

作者

  • 5 篇 a. nur zincir-he...
  • 5 篇 dipankar dasgupt...
  • 4 篇 dasgupta dipanka...
  • 4 篇 nur zincir-heywo...
  • 4 篇 abielmona rami
  • 3 篇 tick andrea
  • 3 篇 andrea tick
  • 3 篇 malcolm i. heywo...
  • 3 篇 kadena esmeralda
  • 3 篇 alexander h. lev...
  • 3 篇 banati anna
  • 2 篇 kail eszter
  • 2 篇 gilles duc
  • 2 篇 siket mate
  • 2 篇 jean berger
  • 2 篇 denes-fazakas le...
  • 2 篇 jia yan
  • 2 篇 rajnai zoltan
  • 2 篇 levente kovács
  • 2 篇 michael barlow

语言

  • 426 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications"
434 条 记 录,以下是1-10 订阅
排序:
ieee symposium on computational intelligence in security and defense applications (CISDA 2007)
IEEE Symposium on Computational Intelligence in Security and...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, CISDA
The following topics are dealt with: computational intelligence; security of data; defense application; military computing; image processing and evolutionary computation
来源: 评论
Proceedings of the 2013 ieee symposium on computational intelligence for security and defense applications, CISDA 2013 - 2013 ieee symposium Series on computational intelligence, SSCI 2013
Proceedings of the 2013 IEEE Symposium on Computational Inte...
收藏 引用
2013 ieee symposium on computational intelligence for security and defense applications, CISDA 2013 - 2013 ieee symposium Series on computational intelligence, SSCI 2013
The proceedings contain 15 papers. The topics discussed include: comparing heuristic search methods for finding effective real-time strategy game plans;evolving team tactics using potential fields;positioning of milit...
来源: 评论
ieee SSCI 2011 - symposium Series on computational intelligence - CISDA 2011: 2011 ieee symposium on computational intelligence for security and defense applications
IEEE SSCI 2011 - Symposium Series on Computational Intellige...
收藏 引用
symposium Series on computational intelligence, ieee SSCI 2011 - 2011 ieee symposium on computational intelligence for security and defense applications, CISDA 2011
The proceedings contain 17 papers. The topics discussed include: optimising multistatic sensor locations using path planning and game theory;rapid prototyping of high performance fuzzy computing applications using hig...
来源: 评论
Proceeding of the 2007 ieee symposium on computational intelligence in security and defense applications, CISDA 2007
Proceeding of the 2007 IEEE Symposium on Computational Intel...
收藏 引用
2007 ieee symposium on computational intelligence in security and defense applications, CISDA 2007
The proceedings contain 29 papers. The topics discussed include: toward open-set text-independent speaker identification in tactical communications;the PSO-based adaptive window for people tracking;ATR applications in... 详细信息
来源: 评论
ieee symposium on computational intelligence for security and defense applications, CISDA 2009
IEEE Symposium on Computational Intelligence for Security an...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, CISDA 2009
The proceedings contain 48 papers. The topics discussed include: a framework for the design of a military operational supply network;local feature analysis for robust face recognition;minimizing risk on a fleet mix pr...
来源: 评论
2015 ieee symposium on computational intelligence for security and defense applications, CISDA 2015 - Proceedings
2015 IEEE Symposium on Computational Intelligence for Securi...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, CISDA 2015
The proceedings contain 28 papers. The topics discussed include: using computational swarm intelligence for real-time asset allocation;rigorous sensor resource management: methodology and evolutionary optimization;dyn...
来源: 评论
Proceedings of the 2014 7th ieee symposium on computational intelligence for security and defense applications, CISDA 2014
Proceedings of the 2014 7th IEEE Symposium on Computational ...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications, CISDA 2014
The proceedings contain 24 papers. The topics discussed include: effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness;malware detection using genetic programming;intrusion de...
来源: 评论
symposium on computational intelligence for security and defense applications (ieee CISDA 2011)
Symposium on Computational Intelligence for Security and Def...
收藏 引用
ieee symposium on computational intelligence in security and defense applications, CISDA
The 2011 ieee symposium on computational intelligence for security and defense applications will present a wide range of applications to very challenging problems in the security and defense domains. ieee CISDA 2011, ...
来源: 评论
Efficient defense Against Adversarial Attacks on Multimodal Emotion AI Models
收藏 引用
ieee TRANSACTIONS ON computational SOCIAL SYSTEMS 2025年
作者: Cho, Hsin-Hung Zeng, Jiang-Yi Tsai, Min-Yan Natl Ilan Univ Dept Comp Sci & Informat Engn Ilan 26047 Taiwan Natl Yang Ming Chiao Tung Univ Dept Informat Management & Finance Hsinchu 30010 Taiwan
Among these applications, emotion AI has emerged as a transformative tool in the educational sector, enabling personalized learning experiences by adapting content and teaching methods based on students' emotional... 详细信息
来源: 评论
Generative Adversarial Network Based Image-Scaling Attack and defense Modeling
收藏 引用
ieee TRANSACTIONS ON EMERGING TOPICS IN computational intelligence 2025年 第1期9卷 861-873页
作者: Li, Junjian Chen, Honglong Li, Zhe Zhang, Anqing Wang, Xiaomeng Wang, Xingang Xia, Feng China Univ Petr East China Coll Control Sci & Engn Qingdao 266580 Peoples R China Radboud Univ Nijmegen Fac Sci NL-6500 HC Nijmegen Netherlands Qilu Univ Technol Shandong Acad Sci Shandong Comp Sci Ctr Key Lab Comp Power Network & Informat SecurMinist Jinan 250353 Peoples R China RMIT Univ Sch Comp Technol Melbourne Vic 3000 Australia
Deep learning has achieved remarkable performance in computer vision applications, and gradually becomes one of the mainstream technologies. Image scaling, as an indispensable data pre-processing procedure for most of... 详细信息
来源: 评论