咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是51-60 订阅
排序:
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 106-122页
作者: Mohammad Hasan Mohammad Shahriar Rahman Helge Janicke Iqbal H.Sarker Department of Computer Science and Engineering Premier University4000 ChitagongBangladesh Department of Computer Science and Engineering United International University1212 DhakaBangladesh Cyber Security Cooperative Research Centre 6027 PerthAustralia Centre for Securing Digital Futures Edith Cowan University6027 PerthAustralia
As the use of blockchain for digital payments continues to rise,it becomes susceptible to various malicious *** detecting anomalies within blockchain transactions is essential for bolstering trust in digital ***,the t... 详细信息
来源: 评论
ZoomViT: an observation behavior-based fine-grained recognition scheme
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12775-12789页
作者: Ma, Zhipeng Yang, Yongquan Wang, Haicheng Huang, Lei Wei, Zhiqiang Faculty of Information Science and Engineering Ocean University of China Songling Road Shandong Qingdao266000 China College of Computer and Cyber Security Fujian Normal University Xuefu South Road Fuzhou350117 China
Fine-grained image recognition aims to distinguish many images with subtle differences and identify the sub-categories to which they belong. Recently, vision transformer (ViT) has achieved promising results in many co... 详细信息
来源: 评论
Tensor-Based Multi-Scale Correlation Anomaly Detection for AIoT-Enabled Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 2061-2071页
作者: Zeng, Jiuzhen Yang, Laurence T. Wang, Chao Deng, Xianjun Yang, Xiangli Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada University of South China School of Electrical Engineering Hengyang421001 China
Artificial Intelligence of Things (AIoT) is an innovative paradigm expected to enable various consumer applications that is transforming our lives. While enjoying benefits and services from these applications, we also... 详细信息
来源: 评论
Identifying The Coconut Leaf Disease Using Deep Transfer Learning Approach  4
Identifying The Coconut Leaf Disease Using Deep Transfer Lea...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Tuhin, Hemayet Hossain Kayum, Md Abdul Rahmatul Kabir Rasel Sarker, Md. Tanvir Siddiquee, Shah Md Pandey, Bishwajeet Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Intelligent System and Cyber Security Astana IT University Kazakhstan
Coconut is one of the main economic crops in Bangladesh. It is a tree whose every part is useful in one way or another in public life. The leaves, flowers, fruits, stems, and roots of this tree are used as raw materia... 详细信息
来源: 评论
Data Analytic for Healthcare cyber Physical System
收藏 引用
IEEE Transactions on Network science and engineering 2023年 第5期10卷 2490-2502页
作者: Gan, Wensheng Hu, Kaixia Huang, Gengsen Chien, Wei-Che Chao, Han-Chieh Meng, Weizhi Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur Malaysia Department of Applied Mathematics and Computer Science Cyber Security Section Lyngby2800 Denmark
Nowadays, a large number of AI-powered healthcare cyber-physical systems (CPSs) have been used in healthcare services. In order to provide better care, AI-powered healthcare CPSs analyze the data they collect using a ... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
science China(Information sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
Advancing Multiclass Emotion Recognition with CNN-RNN Architecture and Illuminating Module for Real-time Precision using Facial Expressions
Advancing Multiclass Emotion Recognition with CNN-RNN Archit...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Prince, Simrith C. Babu, Nirmal Varghese Computer Science And Engineering Karunya Institute Of Technology And Sciences Coimbatore India Data Science And Cyber Security Karunya Institute Of Technology And Sciences Coimbatore India
Emotions, intrinsic to the human experience, serve as the catalyst for a groundbreaking technological innovation in multiclass emotion recognition through facial expressions. This study introduces a revolutionary syst... 详细信息
来源: 评论
Detecting Deepfake Videos using Face Recognition and Neural Networks  1
Detecting Deepfake Videos using Face Recognition and Neural ...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Murugan, Muthu Aravind Mathu, T. Priya, S Jeba Karunya Institute of Technology and Sciences Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Data Science and Cyber Security Coimbatore India
Deepfake videos created using advanced artificial intelligence techniques, pose a significant threat to digital media credibility. This project introduces a holistic strategy for identifying these videos, incorporatin... 详细信息
来源: 评论