咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是41-50 订阅
排序:
Adapting to Evasive Tactics through Resilient Adversarial Machine Learning for Malware Detection  18
Adapting to Evasive Tactics through Resilient Adversarial Ma...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Krishna, G. Bala Sravan Kumar, G. Ramachandra, Mummadi Sampurnima Pattem, K. Rani, D. Sandhya Kakarla, Geeta Cvr College of Engineering Department of Computer Science Engg. Rangareddy Ibrahimpatnam India Cvr College of Engineering Department of Computer Science Engg.-Cyber Security Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Hyderabad India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Cyber Security Hyderabad India
This paper presents the Adaptive Resilience-based Convolutional Network (ARCNet), a sophisticated machine learning framework specifically designed to detect advanced, evasive malware. ARCNet combines convolutional and... 详细信息
来源: 评论
Framework for Cloud-Based Data Management in Autonomous Vehicles
Framework for Cloud-Based Data Management in Autonomous Vehi...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Pallapothu, Harshith Gopi Krishna, G. Sunil, Digvijay Teja Yadav, S. Nagasundari, S. Pes University Dept. of Computer Science & Engineering Bengaluru India Research Center for Information Security Forensics and Cyber Resilience Pes University Dept. of Computer Science & Engineering Bengaluru India
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr... 详细信息
来源: 评论
Credit Card Fraud Detection Using ML Techniques  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Junior Mishra, Alpna Department of Computer Science and Engineering Sharda University Noida India Center of Cyber Security and Cryptology Sharda University Noida India
With the increasing use of Internet, online banking transactions have also increased. Everyday more and more users are being added to the cyberspace, which has also attracted cybercriminals. These scammers use stolen ... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
RCDS:a right-confirmable data-sharing model based on symbol mapping coding and blockchain
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1194-1213页
作者: Liang WANG Shunjiu HUANG Lina ZUO Jun LI Wenyuan LIU School of Cyber Security and Computer Hebei UniversityBaoding071000China Xiong’an Intelligent City Innovation Federation Xiong’an071700China School of Information Science and Engineering Yanshan UniversityQinhuangdao066000China
The problem of data right confirmation is a long-term bottleneck in data *** methods for confirming data rights lack credibility owing to poor supervision,and work only with specific data types because of their techni... 详细信息
来源: 评论
Enhancing the security of SDN in 5G: A Hybrid Feature Selection Based Ensemble Machine Learning Framework for Classification of cyber-Attacks
收藏 引用
SN computer science 2025年 第3期6卷 1-16页
作者: Singh, Mahendra Pratap Haimashreelakshmi Singh, Virendra Pratap Gupta, Maanak Cyber Security Research Lab (CSRL) Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal Mangaluru 575025 India Department of Computer Science Tennessee Technological University Cookeville TN United States
In recent years, the adoption of 5G has significantly increased due to its numerous benefits, including high availability, lower latency, improved reliability, and high performance. To manage packet flow, 5G relies on... 详细信息
来源: 评论
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system
收藏 引用
Digital Communications and Networks 2022年 第2期8卷 174-185页
作者: Linbo Deng Jinsong Gui Tian Wang Jiawei Tan Xiong Li School of Computer Science and Engineering Central South UniversityChangSha410083China College of Computer Science and Technology Huaqiao UniversityXiamen361021China Institute for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengdu611731China
Sensors based on personalized healthcare systems have been widely used in the medical ***,energy limitations have greatly hindered the further development of medical *** the traditional Medium Access Control(MAC)proto... 详细信息
来源: 评论
Research on Lightweight Sensing Technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20678-20694页
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Scienc and Engineering Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering Nanjing210096 China Southeast University State Key Laboratory of Mobile Communication Nanjing210096 China
Channel State Information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
Blockchain-Assisted Fine-Grained Deduplication and Integrity Auditing for Outsourced Large-Scale Data in Cloud Storage
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21662-21678页
作者: Liu, Bingyun Zhang, Xiaojun Yang, Xingchun Zhang, Yuan Xue, Jingting Zhou, Rang Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China Sichuan Police College Intelligent Policing Key Laboratory of SichuanProvince Luzhou646000 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Chengdu University of Technology School of Computer Science and Cyber Security Chengdu610059 China
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing. In ... 详细信息
来源: 评论