咨询与建议

限定检索结果

文献类型

  • 237 篇 期刊文献
  • 80 篇 会议

馆藏范围

  • 317 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 223 篇 工学
    • 135 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 59 篇 控制科学与工程
    • 41 篇 机械工程
    • 27 篇 电子科学与技术(可...
    • 23 篇 信息与通信工程
    • 17 篇 网络空间安全
    • 16 篇 仪器科学与技术
    • 9 篇 光学工程
    • 6 篇 电气工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
  • 74 篇 管理学
    • 72 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 33 篇 理学
    • 14 篇 数学
    • 8 篇 物理学
    • 7 篇 系统科学
    • 3 篇 生物学
    • 2 篇 统计学(可授理学、...
  • 33 篇 医学
    • 29 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 教育学
    • 3 篇 教育学
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 35 篇 deep learning
  • 24 篇 machine learning
  • 15 篇 cloud computing
  • 12 篇 classification
  • 10 篇 internet of thin...
  • 10 篇 accuracy
  • 9 篇 covid-19
  • 8 篇 feature extracti...
  • 6 篇 optimization
  • 6 篇 cnn
  • 5 篇 segmentation
  • 5 篇 clustering
  • 5 篇 ensemble learnin...
  • 5 篇 metaheuristics
  • 5 篇 support vector m...
  • 5 篇 data mining
  • 5 篇 wireless sensor ...
  • 5 篇 predictive model...
  • 5 篇 security
  • 5 篇 task scheduling

机构

  • 21 篇 school of comput...
  • 8 篇 department of co...
  • 6 篇 college of compu...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 pazhou lab
  • 4 篇 department of co...
  • 4 篇 dept. of compute...
  • 4 篇 department of in...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 centre for nonli...
  • 3 篇 faculty of infor...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 chitkara univers...
  • 3 篇 graduate school ...
  • 3 篇 department of in...
  • 3 篇 department of in...

作者

  • 9 篇 s.karthik
  • 8 篇 sheng bi
  • 6 篇 m.s.kavitha
  • 5 篇 min dong
  • 4 篇 tong zhang
  • 4 篇 mehedi masud
  • 4 篇 sachi nandan moh...
  • 4 篇 anand nayyar
  • 4 篇 surbhi bhatia
  • 4 篇 howon kim
  • 4 篇 pankaj dadheech
  • 4 篇 kim howon
  • 4 篇 e.laxmi lydia
  • 3 篇 muhammad waseem ...
  • 3 篇 pijush kanti dut...
  • 3 篇 abdullah s.alsha...
  • 3 篇 javed rashid
  • 3 篇 imran khan
  • 3 篇 himanshu sharma
  • 3 篇 k.periyakaruppan

语言

  • 296 篇 英文
  • 20 篇 中文
  • 1 篇 斯洛文尼亚文
  • 1 篇 其他
检索条件"机构=Computer Science&Engineering"
317 条 记 录,以下是1-10 订阅
A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 361-387页
作者: Hong Huang Yunfei Wang Guotao Yuan Xin Li School of Computer Science and Engineering Sichuan University of Science&EngineeringYibin644000China
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoo... 详细信息
来源: 评论
BSTFNet:An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3929-3951页
作者: Hong Huang Xingxing Zhang Ye Lu Ze Li Shaohua Zhou School of Computer Science and Engineering Sichuan University of Science&EngineeringYibin644002China School of Mathematics and Statistics Sichuan University of Science&EngineeringYibin644002China
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious *** address the issues of traditional machine learning methods re... 详细信息
来源: 评论
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 989-1000页
作者: Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita Department of Computer Science and Engineering Manipal Institute of Technology BengaluruManipal Academy of Higher EducationManipal576104KarnatakaIndia Department of Computer Science&Engineering ICFAI UniversityAgartala799210India Department of Computer Science&Engineering Central Institute of TechnologyKokrajhar783370India
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the... 详细信息
来源: 评论
Classification Model for IDS Using Auto Cryptographic Denoising Technique
收藏 引用
computer Systems science & engineering 2023年 第4期45卷 671-685页
作者: N.Karthikeyan P.Sivaprakash S.Karthik Department of Computer Science&Engineering PPG Institute of TechnologyCoimbatoreTamilnaduIndia Department of Computer Science&Engineering SNS College of TechnologyCoimbatoreTamilnaduIndia
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively un... 详细信息
来源: 评论
Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2269-2286页
作者: S.Abinaya K.Uttej Kumar School of Computer Science&Engineering Vellore Institute of TechnologyChennaiTamilnadu600127India
A Recommender System(RS)is a crucial part of several firms,particularly those involved in *** conventional RS,a user may only offer a single rating for an item-that is insufficient to perceive consumer ***,businesses ... 详细信息
来源: 评论
Traffic engineering and Quality of Service in Hybrid Software Defined Networks
收藏 引用
China Communications 2024年 第2期21卷 96-121页
作者: Samiullah Mehraban Rajesh Kumar Yadav IOT Lab Department of Computer Science&EngineeringDelhi Technological UniversityDelhi 110042India
For Future networks, many research projects have proposed different architectures around the globe;Software Defined Network(SDN) architectures, through separating Data and Control Layers, offer a crucial structure for... 详细信息
来源: 评论
Cloud-Based Software Development Lifecycle:A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis
收藏 引用
Big Data Mining and Analytics 2023年 第2期6卷 127-138页
作者: Santhosh S Narayana Swamy Ramaiah Computer Science&Engineering Jain(Deemed-to-be University)Bangalore 562112India
At present,hundreds of cloud vendors in the global market provide various services based on a customer’s *** cloud vendors are not the same in terms of the number of services,infrastructure availability,security stra... 详细信息
来源: 评论
Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1743-1758页
作者: G.Sharmila M.K.Kavitha Devi Department of Computer Science&Engineering Syed Ammal Engineering CollegeRamanathapuram623502India Department of Computer Science&Engineering Thiagarajar College of EngineeringMadurai625015India
Over the past era,subgraph mining from a large collection of graph database is a crucial *** addition,scalability is another big problem due to insufficient *** are several security challenges associated with subgraph... 详细信息
来源: 评论
Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET
收藏 引用
computer Systems science & engineering 2023年 第3期44卷 2619-2636页
作者: J.Shanthini P.Punitha S.Karthik Department of Computer Science&Engineering Dr.N.G.P.Institute of EngineeringCoimbatoreTamilnaduIndia Department of Computer Science&Engineering SNS College of TechnologyCoimbatoreTamilnaduIndia
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论