咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是261-270 订阅
排序:
Comparative Analysis of Machine Learning Algorithms and Datasets for Detecting cyberbullying on Social Media Platforms
Comparative Analysis of Machine Learning Algorithms and Data...
收藏 引用
2024 International Conference on Computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Palagati, Anusha Balan, Santhosh Kumar Arun Joe Babulo, S. Raja, Laxmi Natarajan, K.K. Kalimuthu, Rajkumar Dept. of Computer Science and Engineering Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Department of Computer Applications K.S.R College of Arts and Science for Women Tamilnadu Tiruchengode India Department of Cyber Security Karpagam Academy of Higher Education Tamilnadu Coimbatore India College of Engineering and Technology University of Technology and Applied Sciences Al Mussanah Oman Department of Cyber Security Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India
cyberbullying is defined as sharing of undesirable material in the cyberspace, primarily- the use of the social sites that instigate hostility and create feelings of hatred among the individuals. Another increasing th... 详细信息
来源: 评论
Efficient Convolutional Neural Network Based Side Channel Attacks Based on AES Cryptography  21
Efficient Convolutional Neural Network Based Side Channel At...
收藏 引用
21st IEEE Student Conference on Research and Development, SCOReD 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Aman, Azana Hafizah Abdulkadir, Rabiu Aliyu Islam, Shayla Farhan, Basim Abdulkareem Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
In recent years, profiled side-channel attacks have emerged as a particularly potent kind of side-channel attack that can circumvent cryptographic equipment's security. Convolutional neural networks (CNNs) have be... 详细信息
来源: 评论
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
Advance Public Bus Transport Management System: An Innovative Smart Bus Concept
Advance Public Bus Transport Management System: An Innovativ...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Patel, Keyurkumar Patel, Divya Chaudhary, Nishit Thakkar, Darsh Savaliya, Pratham Mistry, Armaan Rashtriya Raksha University Artificial Intelligence and Cyber Security Department of IT Gujarat Gandhinagar382305 India Karnavati University Unitedworld School of Computational Intelligence Department of Computer Science and Engineering Gujarat Gandhinagar382422 India
In the present era, public bus transportation services often lag behind in adopting modern technologies, resulting in numerous operational complexities. These issues encompass challenges such as poor passenger density... 详细信息
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis  8
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Raj Kumar, V.S. Kumaresan, T. Kanna, P. Rajesh Jagadeesan, S. Showmiya, P. Nithin, P. Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India Bannari Amman Institute of Technology Department of Computer Science and Engineering Erode India Nandha Engineering College Department of Computer Science and Engineering Erode India Nehru Institute of Technology Department of Computer Science - Cyber Security Coimbatore India Bannari Amman Institute of Technology Department of Artificial Intelligence and Machine Learning Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论
Enhancing the Power of Advanced Arnold Cat Map for Secure Quantum Image Cryptography
收藏 引用
SN computer science 2025年 第5期6卷 1-14页
作者: Satre, Shilpa M. Joshi, Bharti Department of Computer Engineering Ramrao Adik Institute of Technology D. Y. Patil Deemed to be University Nerul Maharashtra Navi Mumbai 400 706 India Computer Science and Engineering (IOT and Cyber Security With Block Chain Technology) Department Dwarkadas J. Sanghvi College of Engineering Vile Parle (West) Mumbai 400 056 India
Image encryption is critical for maintaining the security and integrity of digital images, as well as preventing illegal access and changes. However, present encryption techniques frequently entail difficult mathemati... 详细信息
来源: 评论
Automated AI System for Online Phishing Detection and Mitigation
Automated AI System for Online Phishing Detection and Mitiga...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Raj, Daksh Kumar, Rajiv Joshi, Shivani Amrita Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India Galgotias University Department of Computer Scienceand Engineering U.P. Greater Noida India Sharda University Center for Cyber Security and Cryptology Computer Scienceand Engineering Sharda School of Engineeringand Technology Greater Noida India
This paper presents the critical challenge of phishing attacks by using advanced machine learning (ML) approaches to efficiently identify and mitigate malicious websites. Phishing websites betray users by impersonatin... 详细信息
来源: 评论
Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5
Empowering Intelligent Home Safety: Indoor Family Fall Detec...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on cyber science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2023
作者: Ke, Yaojie Yao, Yinan Xie, Zhengye Xie, Hepeng Lin, Hui Dong, Chen College of Computer and Data Science Fuzhou University Fuzhou China Maynooth International Engineering College Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
As we all know, population aging is a significant challenge faced by Chinese society, and ensuring the health and safety of elderly individuals has become an urgent topic of concern. Within the context of family safet... 详细信息
来源: 评论
cybersecurity Revolution via Large Language Models and Explainable AI  17
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
17th International Conference on security of Information and Networks, SIN 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Ihsan, Anuam Al-Dmour, Nidal A. College of Arts & Science Applied Science University Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of College of Engineering Mutah University Department of Computer Engineering Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论
An Effective Span-based Multimodal Named Entity Recognition with Consistent Cross-Modal Alignment  30
An Effective Span-based Multimodal Named Entity Recognition ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Xu, Yongxiu Xu, Hao Huang, Heyan Cui, Shiyao Tang, Minghao Wang, Longzheng Xu, Hongbo Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
With the increasing availability of multimodal content on social media, consisting primarily of text and images, multimodal named entity recognition (MNER) has gained a wide-spread attention. A fundamental challenge o... 详细信息
来源: 评论