咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是221-230 订阅
排序:
An Integrated Platform for Virtual Ecosystems and Wireless Edge Computing for Web 3.0  3
An Integrated Platform for Virtual Ecosystems and Wireless E...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Garg, Khushi Jattu, Mahee Hariharasitaraman, S. Subramanian, R. Raja Division of Cyber Security and Digital Forensics VIT Bhopal University Madhya Pradesh India School of Computing Science and Engineering Vit Bhopal University Madhya Pradesh India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamil Nadu India
The emergence of Web 3.0 has paved the way for a new generation of the internet that enables users to view, publish, and own content independently. This innovation is being driven by a combination of blockchain, seman... 详细信息
来源: 评论
FTGraph: A Flexible Tree-Based Graph Store on Persistent Memory for Large-Scale Dynamic Graphs
FTGraph: A Flexible Tree-Based Graph Store on Persistent Mem...
收藏 引用
2024 IEEE International Conference on Cluster Computing, CLUSTER 2024
作者: Sun, Gan Zhou, Jiang Li, Bo Gu, Xiaoyan Wang, Weiping He, Shuibing Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China College of Computer Science and Technology Zhejiang University Hangzhou China
Traditional in-memory graph systems often suffer from scalability due to the limited capacity and volatility of DRAM. Emerging non-volatile memory (NVM) provides an opportunity to achieve highly scalable and high-perf... 详细信息
来源: 评论
Natural Language Interface for Data Visualization: Harnessing the Power of Large Language Models
Natural Language Interface for Data Visualization: Harnessin...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Buchepalli Praneeth Ashutosh Kumar Singh Jyothika K Raju Mohana B Suma Computer Science and Engineering RV College of Engineering Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering Bengaluru India
Democratizing data analysis is the need of the hour, empowering a wider range of users within corporations to engage with data and uncover valuable insights. Because of the inherent ambiguity of natural language and t... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an710049 China Air Force Engineering University Air Traffic Control and Navigation College Xi’an710051 China Air Force Engineering University Information and Navigation College Xi’an710043 China Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore Xidian University School of Computer Science and Technology Xi’an710126 China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
Senspy: An Integrated Network Monitoring and Anomaly Detection System Using Machine Learning
Senspy: An Integrated Network Monitoring and Anomaly Detecti...
收藏 引用
Space, Aerospace and Defence Conference (SPACE), IEEE
作者: Bandaru Jnyanadeep Nikunj Mittal Srivishnu P N Varshith Y Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India Computer Science and Engineering RV College of Engineering® Bengaluru India
In the evolving cybersecurity landscape, the surge in cyber threats necessitates innovative defence mechanisms. Proposed work explores the integration of ML methods into Intrusion Detection System (IDS) Senspy tool. S... 详细信息
来源: 评论
Real Time Smart Forest Fire Detection and Monitoring System Using IoT and Machine Learning
Real Time Smart Forest Fire Detection and Monitoring System ...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Khushal A Kishore A Tejas Neswi Mohana K Badarinath Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India Computer Science and Engineering RV College of Engineering® Bengaluru India
According to the National Interagency Fire Center (NIFC) forest fires pose a major threat to our planet, causing severe ecological, economic, and human loss, with an estimated 7 million acres of forest burned annually... 详细信息
来源: 评论
A Novel Framework for Scalable Video Transmission Based on the Outage Probability Analysis of MIMO Coding  4
A Novel Framework for Scalable Video Transmission Based on t...
收藏 引用
4th Information Communication Technologies Conference, ICTC 2023
作者: Zhang, Yongjian Wang, Dongyu Zhang, Zhiqiang Wang, Shiguo University of International Relations School of Cyber Science and Engineering Beijing China North China University of Technology Department of Electronic Engineering Beijing China Shanxi Police College Department of Cyber Security Taiyuan China University of Science and Technology Computer and Communication Engineering Institute Changsha Changsha China
This work presents a radical approach for space-time codings, which could realize the goal of unequal error protection (UEP) transmitting for scalable video. This analysis leads us to develop a hybrid coding framework... 详细信息
来源: 评论
VHASR: A Multimodal Speech Recognition System With Vision Hotwords
VHASR: A Multimodal Speech Recognition System With Vision Ho...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Hu, Jiliang Li, Zuchao Wang, Ping Ai, Haojun Zhang, Lefei Zhao, Hai Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University China
The image-based multimodal automatic speech recognition (ASR) model enhances speech recognition performance by incorporating audio-related image. However, some works suggest that introducing image information to model... 详细信息
来源: 评论
Multiclass Brain Tumor Detection using Convolutional Neural Network and Conventional Machine Learning  2
Multiclass Brain Tumor Detection using Convolutional Neural ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Vidhya, K. Vamsi Krishna, B. Haritha, M. Rajasekaran, Arun Sekar Roopa Chandrika, R. Velusamy, Jayaraj Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security School of Computer Science and Technology Coimbatore India QIS College of Engineering and Technology Department of AIMLDS Andhra Pradesh India QIS College of Engineering and Technology Department of Mechanical Engineering Andhra Pradesh India SR University Department of Electronics and Communication Engineering Telangana India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Nehru Institute of Engineering and Technology Department of Electronics and Communication Engineering Coimbatore India
Brain tumor (BT) affect the brain and reduce the lifespan of humans. Therefore, diagnosis and treatment of illnesses in its early stage is required. The objective of this paper is to evaluate the effectiveness of the ... 详细信息
来源: 评论
Helping Language Models Learn More: Multi-Dimensional Task Prompt for Few-shot Tuning
Helping Language Models Learn More: Multi-Dimensional Task P...
收藏 引用
2023 IEEE International Conference on Systems, Man, and cybernetics, SMC 2023
作者: Weng, Jinta Zhang, Jiarui Hu, Yue Fa, Daidong Xu, Xiaofeng Huang, Heyan School of Cyber Security University of Chinese Academy of Sciences China School of Computer and Information Qiannan Normal University for Nationalities Duyun China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
Large language models (LLMs) can be used as accessible and intelligent chatbots by constructing natural language queries and directly inputting the prompt into the large language model. However, different prompt' ...
来源: 评论