咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是11-20 订阅
排序:
Effective Tool Augmented Multi-Agent Framework for Data Analysis
收藏 引用
Data Intelligence 2024年 第4期6卷 923-945页
作者: Xilin Zhang Zhixin Mao Ziwen Chen Shen Gao School of Automation Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of ChinaChengdu 611731China
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(L... 详细信息
来源: 评论
3GPP Edge–Fog federation: Transparent 3rd-party authentication and application mobility
收藏 引用
computer Communications 2024年 222卷 220-229页
作者: Ali, Asad Islam, Minhajul Mallick, Tushin Islam, Mohammad Sakibul Sakib, Sadman Shohrab Hossain, Md. Lin, Ying-Dar National Institute of Cyber Security Ministry of Digital Affairs Taiwan Department of Computer Science National Yang Ming Chiao Tung University Hsinchu Taiwan Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Bangladesh
3GPP edge and fog computing paradigms provide computational services to users at low latency. These paradigms alone are not enough to fulfill the users’ requirements completely. Therefore, a federation among these co... 详细信息
来源: 评论
security Flaw in TCP/IP and Proposed Measures  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Upadhyay, Sourav Kumar Kumar, Prakash Department of Computer Science and Engineering BIT Sindri Dhanbad India Department of Computer Science and Cyber Security JRSU Ranchi India
The whole Internet is based on TCP/IP protocol suite. The inherent flaw in the TCP/IP makes a cascading effect for other attacks like flooding, fingerprinting, and many more. All the switching and routing mechanisms a... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Point-of-Interest Recommendation  21
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Poi...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Yuwen, Zhang Shaobo, Ren School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu China
Next Point-of-Interest (POI) recommendation is a critical task in location-based services, aiming to predict the user's next POI based on historical check-in data. Existing approaches often rely on static graphs o... 详细信息
来源: 评论
Multi-Behavioral Recommender System with Heterogeneous Graph Learning  4
Multi-Behavioral Recommender System with Heterogeneous Graph...
收藏 引用
4th International Conference on Consumer Electronics and computer engineering, ICCECE 2024
作者: Feng, Jiaming Liu, Yang Zhang, Junjie School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu China
With the rapid development of online platforms and the explosive growth of user-generated data, personalized recommendation systems have become increasingly crucial in delivering relevant content to users. Traditional... 详细信息
来源: 评论
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论
Advanced functional connectivity analysis with integrated EEG signal enhancement and GTW-EEG-GAN for emotion detection
收藏 引用
International Journal of computers and Applications 2024年 第12期46卷 1152-1165页
作者: Babu, Nirmal Varghese Kanaga, E. Grace Mary Division of Computer Science and Engineering School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Division of Data Science and Cyber Security School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India
Emotion recognition is crucial in human-computer interaction and psychological research, utilizing modalities such as facial expressions, voice intonations, and EEG signals. This research investigates AI-driven techni... 详细信息
来源: 评论
Effectiveness of a touch-based hand therapeutic application for hand dexterity in children with handwriting difficulties-a pilot study
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Smitha, John Renumol, V.G. School of Computer Science and Technology Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India School of Engineering Cochin University of Science and Technology Kochi India
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of... 详细信息
来源: 评论
Brain Cancer Prediction Using EvoNet: A Modified Resnet Protocol
Brain Cancer Prediction Using EvoNet: A Modified Resnet Prot...
收藏 引用
2024 International Conference on Big Data Analytics in Bioinformatics, DABCon 2024
作者: Majumder, Sayan Das, Rohick Cyber Security the Heritage Academy Kolkata India Computer Science & Engineering Institute of Engineering & Management Kolkata India
Brain tumors are among the most common and malignant diseases. Prompt diagnosis makes a big difference in enhancing survival rates among brain tumor patients. The Magnetic Resonance Imaging, or MRI, is a technique for... 详细信息
来源: 评论