咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是291-300 订阅
排序:
security Encryption Algorithm of computer Terminal Information Based on Blockchain  2
Security Encryption Algorithm of Computer Terminal Informati...
收藏 引用
2nd International conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
作者: Cai, Min Guangzhou College of Technology and Business Guangzhou510850 China
With the rapid development of information technology, people have entered the era of information explosion. The cooperation, competition and trust between people are all based on information. Information resources are... 详细信息
来源: 评论
EEG-Based Emotion Recognition Using Deep Learning Models  2
EEG-Based Emotion Recognition Using Deep Learning Models
收藏 引用
2nd International conference on Recent Trends in Microelectronics, Automation, Computing, and communications Systems, ICMACC 2024
作者: Meghana, Alokam BilakantiVanshika, V. VedaSamhitha, Karnam Murali, Keerthana Singh, Rimjhim Padam Palaniswamy, Suja Amrita School of Computing Department of Computer Science & Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Emotion recognition is an emerging field of research and modalities like images, videos, speech, text, physiological signals, and EEG are used for the same. In this work, EEG based emotion recognition has been propose... 详细信息
来源: 评论
Real-Time Face Mask Detection using computer Vision and Machine Learning  2
Real-Time Face Mask Detection using Computer Vision and Mach...
收藏 引用
2nd International conference on Electronics and Renewable Systems, ICEARS 2023
作者: Kumar, Ch. Nanda Nithin, E. Sai Krishna, Ch. Bindhu Madhavi, Ch. Kluniversity Vijayawada Computer Science Engineering India
Face mask detection is the process of identifying whether a person is wearing a face mask or not in real-time through the use of computer vision and machine learning algorithms. This technology can be used in various ... 详细信息
来源: 评论
Enhancing Warehouse Inventory Management through IoT Tools for Monitoring Stock Items  2
Enhancing Warehouse Inventory Management through IoT Tools f...
收藏 引用
2nd International conference on Technology Innovation and Its Applications, ICTIIA 2024
作者: Winardi, Sunaryo Wong, Ng Poi Arifin Halim, Apriyanto Megawan, Sunario Universitas Mikroskil Undergraduate Program of Computer Science Medan Indonesia Universitas Mikroskil Undergraduate Program of Information Technology Medan Indonesia
The increasing demand for personalized products and a global presence complicates inventory management, requiring accurate and timely stock information. To address this, businesses must leverage Internet of Things (Io... 详细信息
来源: 评论
A Study and Analysis of Reversible Data Hiding Techniques  2
A Study and Analysis of Reversible Data Hiding Techniques
收藏 引用
2nd IEEE International conference on Advances in Information Technology, ICAIT 2024
作者: Naik, Yogish G.R. Shetty, Namitha R. Vidyasagar, K.B. Department of Computer Science Kuvempu University Shivamogga India
This overview paper explains several kinds of Reversible Data Hiding (RDH) methods. Reversible data hiding involves concealing data within host media, such as audio, video, and image files. RDH, or lossless data hidin... 详细信息
来源: 评论
Hidden Markov Model - Applications, Strengths, and Weaknesses  2
Hidden Markov Model - Applications, Strengths, and Weaknesse...
收藏 引用
2nd IEEE International conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Dimri, Sushil Chandra Indu, Richa Negi, Harendra Singh Panwar, Neeraj Sarda, Moksh Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India School of Computing Graphic Era Hill University Dehradun India
The Hidden Markov Model is widely used in weather forecasting, Bioinformatics, disease diagnosis, signal processing, stock market, interpretation of clinical results, etc. The model provides probabilistic information ... 详细信息
来源: 评论
FPGA Implementation of Biological Feature Based Steganography Method  2nd
FPGA Implementation of Biological Feature Based Steganograph...
收藏 引用
2nd International conference on Biomedical Engineering Science and Technology (ICBEST) - Roadway from Laboratory to Market
作者: Peroumal, Vijayakumar Harishankar, R. Ramesh, R. Rajashree, R. Vellore Inst Technol Sch Elect Engn Chennai 600127 Tamil Nadu India
Due to the fast development of information technology, secure communication is important. To ensure secure communication we need to send an encrypted message so that it can be read only by the expected recipient. Ther... 详细信息
来源: 评论
Voice Spoofing in the Era of Deepfakes: Machine Learning Challenges and Solutions  2
Voice Spoofing in the Era of Deepfakes: Machine Learning Cha...
收藏 引用
2nd International conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Rani, Rekha Kishan, Bal Rahul St. Andrews Institute of Technology & Management Gurugram India Maharshi Dayanand University Department of Computer Science Haryana Rohtak India
Voice spoofing has become a serious security concern due to advancements in voice cloning technologies. This review paper examines recent advances in machine learning, such as deep learning, adversarial approaches, an... 详细信息
来源: 评论
E-Certificate Verification Using Block Chain  2
E-Certificate Verification Using Block Chain
收藏 引用
2nd International conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Chitra, N. Thulasi Sreenivasulu, G. Subhashini, P. Mlr Institute of Technology Department of Computer Science and Information Technology India Vardhaman College of Engineering Department of Cse Shamshad India Mlr Institute of Technology Department of Csit Hyderabad India
This universe shows mood through facial expressions. Every expression conveys emotions. AI allows us differentiate different emotions, even though everyone has a unique face expression and emotional repertoire. Deep l... 详细信息
来源: 评论
An Internet of Things-Based Proxy Re- Encryption Method for Safe Data Sharing Based on Blockchain  2
An Internet of Things-Based Proxy Re- Encryption Method for ...
收藏 引用
2nd IEEE International conference on Advances in Information Technology, ICAIT 2024
作者: Shashikala, S.V. Amith, D. Disha, T.S. Lekhana, H.L. Likith, R. Department of Computer Science and Engineering BGS Institute of Technology Adichunchanagiri university India
Internet of Things has developed, one of its most beneficial uses in cloud computing has been data sharing. Even though this technology has attracted attention, one of its ongoing challenges is data security since imp... 详细信息
来源: 评论