咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是101-110 订阅
排序:
A Literature Review on Predictive Classification of Major Depressive Disorder Using Advanced Data Analytics Techniques  5th
A Literature Review on Predictive Classification of Major De...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Mahender, Udutala Arivalagan, S. Sathiyasuntharam, V. Sudhakar, P. Annamalai University Tamilnadu Chidambaram India Department of Computer Science and Technology Annamalai University Tamilnadu Chidambaram India Department of Cyber Security CMR Engineering College Hyderabad India Department of Computer Science and Engineering Annamalai University Tamilnadu Chidambaram India
Major Depressive Disorder (MDD) is a significant global mental health concern predicted to become the leading mental health condition by 2030. It is characterised by persistent sadness, hopelessness, and a lack of int... 详细信息
来源: 评论
Fake News Detection on Social Media Using a Stacking Model  5th
Fake News Detection on Social Media Using a Stacking Model
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Ramesh, G.S. Supriya, K.H.S. Akash, P. Rukmananda Reddy, A. Tejaswini, V. Dharmireddi, Srinivasarao Department of Computer Science and Engineering VNR VJIET Telangana Hyderabad India Department of Cyber Security MasterCard St. LouisMO63304 United States
Fake news has existed since long before the Internet was invented. It can be defined as "fictitious articles deliberately fabricated to deceive readers". While some news may have a grain of truth, it frequen... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Deformable Dual Graph Aggregation Transformer Convolutional Networks with Spider Wasp Optimizer for Ovarian Tumor Classification Using Magnetic Resonance Imaging
Biomedical Materials and Devices
收藏 引用
Biomedical Materials and Devices 2025年 1-19页
作者: Shanmugaveni, V. Jotheeswari, M. Abarnaswara, R. VijayaKumar, M. Manojanani, A. Department of Computer Science and Engineering (Cyber Security) Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering PSNA College of Engineering and Technology Tamil Nadu Dindigul India Department of Artificial Intelligence & Data Science Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering RVS Technical Campus Tamil Nadu Coimbatore India
The diagnosis of Ovarian Tumor (OT) remains a significant challenge as there is presently no practical non-invasive technique to determine true benign or malignant lesions before treatment. This study proposes a uniqu... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering Technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
收藏 引用
science China(Information sciences) 2023年 第3期66卷 273-286页
作者: Weixuan TANG Bin LI Weixiang LI Yuangen WANG Jiwu HUANG Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society School of Computer Science and Cyber Engineering Guangzhou University
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the ... 详细信息
来源: 评论
Literature Review on Packet Sniffing: Essential for cybersecurity & Network security
Literature Review on Packet Sniffing: Essential for Cybersec...
收藏 引用
Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), International Conference on
作者: Ranju Shaw Suraiya Parveen Department of Computer Science Engineering with specialization in Cyber Forensic & Information Security Jamia Hamdard University Delhi India Department of Computer Science Engineering Faculty at Jamia Hamdard University SEST Delhi
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t...
来源: 评论
Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election
收藏 引用
science China(Information sciences) 2022年 第1期65卷 131-146页
作者: Xiaoqin FENG Jianfeng MA Shaobin LIU Yinbin MIAO Ximeng LIU School of Cyber Engineering Xidian University State Key Laboratory of Cryptology Shaanxi Key Laboratory of Network and System Security Xidian University College of Mathematics and Computer Science Fuzhou University
Load balancing mechanism in technologies such as cloud computing has provided a huge opportunity for the development of large-scale projects. Although the conventional view is to build mechanisms that adopt a dynamic ... 详细信息
来源: 评论
HCL-Net: A Single Image Rain Removal Algorithm Based on Channel Attention and Multi-scale Feature Fusion  6
HCL-Net: A Single Image Rain Removal Algorithm Based on Chan...
收藏 引用
6th IEEE International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2023
作者: Huang, Jin He, Pei Guangzhou University School of Cyberspace Security Guangzhou China Guangzhou University School of Computer Science and Cyber Engineering Guangzhou China
The investigation of rain removal from pictures has always been a pivotal matter in the domain of computer vision. Nevertheless, the majority of existing algorithms employ encoder-decoder structures that have been tra... 详细信息
来源: 评论