咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是71-80 订阅
排序:
Efficient Publication of Distributed and Overlapping Graph Data Under Differential Privacy
收藏 引用
Tsinghua science and Technology 2022年 第2期27卷 235-243页
作者: Xu Zheng Lizong Zhang Kaiyang Li Xi Zeng the School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China China Electronics Technology Cyber Security Co.Ltd. Chengdu 610000China
Graph data publication has been considered as an important step for data analysis and *** data,which provide knowledge on interactions among entities,can be locally generated and held by distributed data *** data are ... 详细信息
来源: 评论
The Role of AI in Vehicle-to-Infrastructure Communication for Tolling Systems
The Role of AI in Vehicle-to-Infrastructure Communication fo...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Mahalakshmi, S. Baskaran, Nithiya Partheeban, Pachaivanna Krishnara, Kowsalyadevi Arjun, S. Chennai Institute of Technology Department of Computer Science and Engineering Kundrathur Chennai India Chennai Institute of Technology Department Cyber Security Kundrathur Chennai India Chennai Institute of Technology Department Civil EngDepartment Cyber Security Kundrathur Chennai India Sona Institute of Technology Department of Cyber Security Salem India
The number of vehicles people use is substantial;thus, surveillance must be accurate. License plates are detected and recognized by detecting static and real-time images captured by the camera using OCR technology, Co... 详细信息
来源: 评论
TU-IR Apple Image Dataset: Benchmarking, Challenges, and Asymmetric Characterization for Bruise Detection in Application of Automatic Harvesting
IEEE Transactions on AgriFood Electronics
收藏 引用
IEEE Transactions on AgriFood Electronics 2024年 第1期2卷 105-124页
作者: Das, Dipak Hrishi Roy, Sourav Dey Saha, Priya Bhowmik, Mrinal Kanti Government Degree College Department of Information Technology Santirbazar 799144 India Department of Computer Science and Engineering Suryamaninagar 799022 India Department of Cyber Security and Digital Forensics Agartala799001 India
With the blooming interest in computer vision-based technologies for future automation of food producers, there is a need for incorporating an automatic bruise detection module in robotic apple harvesting because of d... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security  3
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Johnson, Plezzant Columbus Kant, Shri Kumar, Sandeep Sharda University Department of Computer Science Engineering India Sharda University Center for Cyber Security and Cryptology India
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论
A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20787-20799页
作者: Xie, Ninghai Li, Jiguo Lin, Chao Zhang, Yichen Shen, Jian Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China School of Mathematics and Statistics Key Laboratory of Analytical Mathematics and Applications Ministry of Education Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Guangzhou University Guangdong Key Laboratory of Blockchain Security Guangzhou510006 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Decentralized payment systems, such as Bitcoin, enable immutable and transparent payments in a distributed manner. To address the issue of user privacy leakage due to transaction transparency, some efforts have enhanc... 详细信息
来源: 评论
A Review of Intrusion Detection for Internet of Things Using Machine Learning
A Review of Intrusion Detection for Internet of Things Using...
收藏 引用
2024 International Conference on cybernation and Computation, cyberCOM 2024
作者: Paul, Ekwueme Chika Amrita Sharda School of Engineering & Technology Sharda University Computer Science & Engineering UP Greater Noida India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University UP Greater Noida India
As Internet of Things (IoT) networks proliferate across consumer and industrial sectors, safeguarding these interconnected cyber-physical systems is imperative. IoT ecosystems present abundant targets for malicious in... 详细信息
来源: 评论
Enhanced Deep Learning Approaches for Robust Darknet Traffic Classification  3
Enhanced Deep Learning Approaches for Robust Darknet Traffic...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Etyang, Felix Pavithran, Pramod Mwendwa, Gideon Mandela, Ngaira Hillary, Musiime School of Engineering Cochin University of Science & Technology Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensics Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensics Sciences University Jinja Uganda
The classification of darknet traffic remains a pivotal task in modern cybersecurity efforts, necessitating advanced analytical techniques to address malicious activities pre-emptively. This study introduces and compa... 详细信息
来源: 评论
CNN Based Model for Underwater Image Classification and Enhancement
CNN Based Model for Underwater Image Classification and Enha...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Jamandlamudi, Sahit Isravel, Deva Priya Dhas, Julia Punitha Malar Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India
The challenge of enhancing underwater images is difficult because of several issues, including color distortion, inadequate illumination, and dispersion from suspended particles in the water. Conventional picture enha... 详细信息
来源: 评论
Anomaly-Based Detection of Log4j Attack in SDN
Anomaly-Based Detection of Log4j Attack in SDN
收藏 引用
International Conference on Smart Systems and Wireless Communication, SSWC 2024
作者: Deshmukh, Pruthviraj Nitin Harish, R. Sangeetha, V. Praveen, K. TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani India
The widely used Java library Log4j logging framework has lately come under attack from a major vulnerability known as CVE-2021–44228, also known as Log4Shell. Through the use of malicious log messages, the vulnerabil... 详细信息
来源: 评论