咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是91-100 订阅
排序:
Marine Life Ecosystem Analysis Based on Climate Change Detection Using Deep Learning Algorithms
收藏 引用
Remote Sensing in Earth Systems sciences 2025年 第2期8卷 545-554页
作者: Rebecca, B. Sandhya, A. Pokkuluri, Kiran Sree Kanishka, Gunipati Shaik, Khasimbee Krishna, B. Murali Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology and Management Telangana Dundigal 500043 India Department of CSE SRM Institute of Science and Technology Chennai Ramapuram India Department of Computer Science and Engineering Shri Vishnu Engineering College for Women Andhra Pradesh Bhimavaram India Computer Science and Engineering (Cyber Security) Madanapalle Institute of Technology & Science Madanapalle India Department of Computer Science and Engineering Aditya University Andhra Pradesh Surampalem India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
The surrounding environmental and climatic conditions have a significant impact on the utilisation of ecosystem services for recreational purposes. Climate change poses a threat to future natural leisure opportunities... 详细信息
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
security, Trust, and Privacy in cyber-physical Systems (CPS)  2
Security, Trust, and Privacy in Cyber-physical Systems (CPS)
收藏 引用
2nd International Conference on cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024
作者: Busari, Wareez A. Bello, Abeeb A. Department of Cyber Security Science Federal University of Technology Niger State Minna Nigeria Department of Electrical and Computer Engineering Mahindra University Hyderabad India
This paper explores the convergence of physical and computational components in cyber-Physical Systems (CPS). security, trust, and privacy are paramount for reliable and resilient operation of these interconnected sys... 详细信息
来源: 评论
Enhancing Computational Model for Human Motion Recognition Using Deep Learning
Enhancing Computational Model for Human Motion Recognition U...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Yadav, Ram Kumar Daniel, A. Kumar, Birendra Sakhare, Apeksha Moriwal, Rahul Pawar, Raju Amity university Gwalior Department of Computer Science and Engineering Gwalior India G H Raisoni college of engineering Department of Data Science Internet of Things and Cyber Security Nagpur India G H Raisoni college of engineering Department of Computer Science and Engineering Nagpur India
Human motion recognition (HMR) is a fundamental task in computer vision with applications in healthcare, surveillance, human-computer interaction, and intelligent environments. This paper proposes a better-performing ... 详细信息
来源: 评论
EG-Four: An Embedded GPU-Based Efficient ECC Cryptography Accelerator for Edge Computing
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第6期19卷 7291-7300页
作者: Dong, Jiankuo Zhang, Pinchang Sun, Kaisheng Xiao, Fu Zheng, Fangyu Lin, Jingqiang Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information Engineering Beijing100007 China University of Science and Technology of China School of Cyber Security Hefei123456 China
With the continuous development of Industry 4.0 technology, the embedded devices in Industrial Internet of Things (IIoT) are showing explosive growth, and large-scale cyber attacks or related security incidents contin... 详细信息
来源: 评论
Deployment of Co-operative Farming Ecosystems Using Blockchain  22nd
Deployment of Co-operative Farming Ecosystems Using Blockcha...
收藏 引用
22nd International Conference on Hybrid Intelligent Systems, HIS 2022 and the 18th International Conference on Information Assurance and security, IAS 2022
作者: Mahapatra, Aishwarya Gupta, Pranav Swarnkar, Latika Gupta, Deeya Kar, Jayaprakash Centre for Cryptography Cyber Security and Digital Forensics Department of Computer Science & Engineering Department of Communication & Computer Engineering The LNM Institute of Information Technology Jaipur India
Blockchain has helped us in designing and developing decentralised distributed systems. This, in turn, has proved to be quite beneficial for various industries grappling with problems regarding a centralised system. S... 详细信息
来源: 评论
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
A Novel Deep Learning Framework for Contraband Items Recognition in Smart City Applications  2nd
A Novel Deep Learning Framework for Contraband Items Recogni...
收藏 引用
2nd International Conference on Sustainability: Developments and Innovations, ICSDI 2024
作者: Khalid, Shehzad Ahmed, Zubair Noor, Ayesha Sedik, Ahmed Asif, Waqar Department of Computer Engineering Bahria University Islamabad Pakistan Smart Systems Engineering Laboratory College of Engineering Prince Sultan University Riyadh Saudi Arabia Computer Science and Cyber Security University of West London London United Kingdom
Ensuring safety and security is paramount in today’s complex environment, and the effective detection of contraband items plays a pivotal role in achieving this objective. Contraband items, ranging from illegal subst... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论