咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是121-130 订阅
排序:
Panoptic Region Slicing Segmentation and Optimized Alexnet-Based CNN for Early Melanoma Diagnosis
收藏 引用
SN computer science 2024年 第6期5卷 1-9页
作者: Ganesh, V.N. Gulappagol, Laxmi Pushparani, M.K. Ganesh, K. Department of Electronics and Communication Engineering Alvas Institute of Engineering and Technology Department of Internet of Things and Cyber Security including Block chain Technology A J Institute of Engineering and Technology Department of Computer Science & amp Design Alvas Institute of Engineering and Technology
Early and accurate diagnosis of melanoma, a potentially life-threatening skin cancer, is crucial for improving patient outcomes. In this study, we propose a novel approach for melanoma detection, termed Panoptic Regio... 详细信息
来源: 评论
Ensuring Privacy and Integrity in IoT Supply Chains through Blockchain and Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25547-25558页
作者: Din, Ikram Ud Almogren, Ahmad Han, Zhu Guizani, Mohsen The University of Haripur Department of Information Technology Haripur22620 Pakistan King Saud University College of Computer and Information Sciences Department of Cyber Security Department of Computer Science Riyadh11633 Saudi Arabia University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
Ensuring data security and privacy in Internet of Things (IoT) is increasingly critical due to the growing interconnectedness of devices and the sensitivity of the data they handle. This paper presents a novel approac... 详细信息
来源: 评论
A Survey of Machine Learning Applications in Medical Imaging for Neurodegenerative Disease Diagnosis  2
A Survey of Machine Learning Applications in Medical Imaging...
收藏 引用
2nd International Conference on computer Vision and Internet of Things, ICCVIoT 2024
作者: Nandhashree, K.R. Senthil Kumar, M. Susee, S.K. Department of Cyber Security SRM Valliammai Engineering College India Department of Computer Science and Engineering SRM Valliammai Engineering College India Department of Electronics and Communication Mohamed Sathak A J College of Engineering India
The increasing prevalence of brain degenerative disorders particularly Alzheimer's and Parkinson's, have incurred a dire need for effective diagnostic methodologies. With advancements in medical imaging techni... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论
Vision transformer for contactless fingerprint classification
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Kaplesh, Pooja Gupta, Aastha Bansal, Divya Sofat, Sanjeev Mittal, Ajay Cyber Security Research Centre Punjab Engineering College Chandigarh160012 India STME SVKM’s NMIMS University Chandigarh160014 India Computer Science and Engineering Punjab Engineering College Chandigarh160012 India UIET Panjab University Chandigarh160014 India
Contactless fingerprint recognition has gained attention due to its data security and hygiene as compared to the contact-based counterpart. In the previous years, deep learning models, mainly Convolutional Neural Netw... 详细信息
来源: 评论
Vehicular Intrusion Detection System Based on Hybrid Quantum Neural Networks
Vehicular Intrusion Detection System Based on Hybrid Quantum...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhou, Jianhua Liu, Yueheng Li, Sifan Cao, Yue Chen, Wenkai Ahmed, Naveed Wuhan University School of Cyber Science and Engineering China Wuhan Cyber Security Association China Technology Co. Ltd China Prince Sultan University College of Computer and Information Sciences Riyadh Saudi Arabia
Traditional Deep Learning (DL) method is increasingly used in vehicular Intrusion Detection Systems (IDSs). However, there are still some limitations. It combines various models, resulting in a massive model size and ... 详细信息
来源: 评论
Personalized Educational Video Evaluation Combining Student's Cognitive and Teaching Style
Personalized Educational Video Evaluation Combining Student'...
收藏 引用
2023 IEEE International Conference on Systems, Man, and cybernetics, SMC 2023
作者: Weng, Jinta Dong, Haoyu Deng, Yifan Hu, Yue Wu, Hao Huang, Heyan School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Cyber Engineering Guangzhou University China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
AI-powered technologies, like ChatGPT and learning analytic technologies, have encouraged the sharing of online teaching resources and the transformation of teaching methods and learning pathways. However, the mixed r...
来源: 评论
IoT-Based Plant Health Monitor Using NodeMCU and ESP8266  5
IoT-Based Plant Health Monitor Using NodeMCU and ESP8266
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Tandel, Rajat Ebenezer, V. Santhiya, P. Edwin, Bijolin Stewart Kirubakaran, S. Thanka, Roshni Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Division of Data Sciences and Cyber Security Coimbatore India
Plant Monitor Using NodeMCU(ESP8266)is a technology that is advanced;it uses IoT-Internet of Things to measure and monitor different plant phenomena. This system, which is based on sensors that collect data on differe... 详细信息
来源: 评论
cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Kumar, Rajiv Rai, Vipin Joshi, Shivani Raj, Daksh Amrita Galgotias University Department of Computer Science & Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India Sharda University Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Greater Noida India
cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论