咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是141-150 订阅
排序:
A Review Paper on Designing Intelligent Intrusion Detection System Using Deep Learning  11
A Review Paper on Designing Intelligent Intrusion Detection ...
收藏 引用
11th International Conference on Emerging Trends in engineering and Technology - Signal and Information Processing, ICETET - SIP 2023
作者: Wasnik, Priyanka Chavhan, Nekita G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India G H Raisoni College of Engineering IoT and Cyber Security Department of Data Science Nagpur India
Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify c... 详细信息
来源: 评论
Designing Intelligent Intrusion Detection System Using Deep Learning  14
Designing Intelligent Intrusion Detection System Using Deep ...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Wasnik, Priyanka Chavhan, Nekita G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India G H Raisoni College of Engineering Department of Data Science IoT and Cyber Security Nagpur India
In order to increase the effectiveness and precision of cyber threat detection in computer networks, deep learning techniques are being applied in the construction of intelligent intrusion detection systems (IDS). The... 详细信息
来源: 评论
Lung Cancer Image Identify and Categorization using Artificial Neural Networks
Lung Cancer Image Identify and Categorization using Artifici...
收藏 引用
2024 International Conference on Computational Intelligence for Green and Sustainable Technologies, ICCIGST 2024
作者: Lingappa, Ediga Begum, D Jareena Pachouri, Priya Rashmi, Kuderu Varalakshmi, Thokala Tharuna Kumar, Anoop Mallareddy College of Engineering Maisammaguda Dept of Computer Science and Engineering TS Secunderabad500100 India CMR Institute of Technology Dept. of Artificial Intelligence and Data Science Bengaluru560037 India Malla Reddy University Dept of Cyber Security Hyderabad India
Lung cancer that is made up of small cells is called small cell lung cancer (SCLC). Smoking tobacco in any form-cigarettes, cigars, or pipes-is by far the most significant risk factor for developing lung cancer, thoug... 详细信息
来源: 评论
Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24644-24655页
作者: Liu, Shuying Xie, Rongpeng Miao, Yinbin Peng, Jinye Leng, Tao Liu, Zhiquan Choo, Kim-Kwang Raymond Northwest University School of Information Science and Technology Xi’an710119 China Xian Yang Normal University Department of Computer Xian Yang712000 China Xidian University School of Cyber Engineering Xi’an710071 China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province Luzhou646000 China Jinan University College of Cyber Security Guangzhou510632 China Technology Ltd Beijing100020 China The University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
In the era of Internet of Things (IoT) and Federated Learning (FL), where distributed training models are essential, the FL paradigm has come into the spotlight for researchers. However, the inconsistency in the sourc... 详细信息
来源: 评论
A Real-Time IoT-Enabled Biometric Attendance System
A Real-Time IoT-Enabled Biometric Attendance System
收藏 引用
International Conference on. Cryptology and Network security with Machine Learning, ICCNSML 2023
作者: Tripathi, Ashish Choudhary, Arjun Srivastava, Arun Kumar Kharbas, Vikash Kumar Shukla, Varun Department of CSE SCSE Galgotias University Greater Noida India Centre for Cyber Security Sardar Patel University of Police Security and Criminal Justice Jodhpur India Department of Computer Science and Engineering Lloyd Institute of Engineering & Technology Greater Noida India Department of Computer Science and Engineering Vivekananda Global University Jaipur India Kanpur India
Nowadays, biometric attendance system is applicable in various organizations to ensure the person's identity. The system takes parameters such as person's voice, fingerprint, retina, and face to authenticate t... 详细信息
来源: 评论
Blockchain-Based Cognitive Computing Model for Data security on a Cloud Platform
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论
A Comparative Market Research and Trend Analysis of Volatility in Decentralized and Regulated Markets  3
A Comparative Market Research and Trend Analysis of Volatili...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Mittal, Anamika Hariharasitaraman, S. Subramanian, R. Raja School of Computing Science and Engineering Vit Bhopal University Division of Cyber Security and Digital Forensics Madhya Pradesh India School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu India
Decentralized markets like Bitcoin and Ethereum, which utilize blockchain technology, offer advantages such as increased transparency, lower transaction costs, and quicker settlement times when compared to regulated m... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
收藏 引用
Chinese Physics B 2023年 第2期32卷 136-149页
作者: 王兴元 王哓丽 滕琳 蒋东华 咸永锦 School of Information Science and Technology Dalian Maritime UniversityDalian 116026China Guangxi Key Laboratory of Multi-source Information Mining&Security Guangxi Normal UniversityGuilin 541004China School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 511400China School of Cyber Security Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论