咨询与建议

限定检索结果

文献类型

  • 1,266 篇 会议
  • 618 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,066 篇 工学
    • 874 篇 计算机科学与技术...
    • 738 篇 软件工程
    • 278 篇 信息与通信工程
    • 173 篇 控制科学与工程
    • 135 篇 电气工程
    • 109 篇 生物工程
    • 100 篇 网络空间安全
    • 94 篇 电子科学与技术(可...
    • 68 篇 机械工程
    • 65 篇 安全科学与工程
    • 57 篇 化学工程与技术
    • 54 篇 交通运输工程
    • 50 篇 生物医学工程(可授...
    • 47 篇 仪器科学与技术
    • 44 篇 光学工程
    • 38 篇 建筑学
    • 35 篇 动力工程及工程热...
  • 440 篇 理学
    • 213 篇 数学
    • 115 篇 生物学
    • 97 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 62 篇 化学
    • 49 篇 系统科学
  • 283 篇 管理学
    • 169 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 法学
    • 64 篇 社会学
  • 52 篇 医学
    • 42 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 33 篇 经济学
    • 33 篇 应用经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 117 篇 accuracy
  • 93 篇 feature extracti...
  • 89 篇 deep learning
  • 82 篇 security
  • 77 篇 real-time system...
  • 70 篇 training
  • 66 篇 machine learning
  • 65 篇 computational mo...
  • 61 篇 internet of thin...
  • 51 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 47 篇 convolutional ne...
  • 39 篇 support vector m...
  • 37 篇 protocols
  • 37 篇 data models
  • 33 篇 neural networks
  • 33 篇 optimization
  • 31 篇 artificial intel...
  • 31 篇 adaptation model...

机构

  • 517 篇 school of cyber ...
  • 392 篇 institute of inf...
  • 67 篇 state key labora...
  • 52 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 37 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 cyberspace insti...
  • 30 篇 school of comput...
  • 28 篇 institute of inf...
  • 27 篇 university of ch...
  • 26 篇 institute of com...
  • 24 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 school of cyber ...
  • 19 篇 peng cheng labor...
  • 18 篇 department of cy...

作者

  • 54 篇 cao xiaochun
  • 29 篇 xu qianqian
  • 27 篇 huang qingming
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 20 篇 hu songlin
  • 19 篇 yang zhiyong
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,535 篇 英文
  • 348 篇 其他
  • 11 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1889 条 记 录,以下是1-10 订阅
排序:
Edge-based AI solution for enhancing urban safety: helmet compliance monitoring with YOLOv9 on Raspberry Pi
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-14页
作者: Tahilramani, Nikunj Ahir, Param Saxena, Shruti Talreja, Vandana P. Charanarur, Panem Adani Institute of Digital Technology Management Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India Electrical Engineering Department R.C. Technical Institute Ahmedabad India Department of Cyber Security and Digital Forensics National Forensic Sciences University Tripura India
This paper presents an automated helmet detection system leveraging Raspberry Pi and advanced deep learning techniques, specifically the YOLOv9 object detection model that focuses on real-time object detection. The sy... 详细信息
来源: 评论
In‑depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS‑Dilithium
收藏 引用
cybersecurity 2025年 第2期8卷 229-241页
作者: Huaxin Wang Yiwen Gao Yuejun Liu Qian Zhang Yongbin Zhou School of Cyber Science and Engineering Nanjing University of Science and TechnologyNanjingChina Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate *** the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented on hardw... 详细信息
来源: 评论
Enhanced Deep Learning Approaches for Robust Darknet Traffic Classification  3
Enhanced Deep Learning Approaches for Robust Darknet Traffic...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Etyang, Felix Pavithran, Pramod Mwendwa, Gideon Mandela, Ngaira Hillary, Musiime School of Engineering Cochin University of Science & Technology Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensics Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensics Sciences University Jinja Uganda
The classification of darknet traffic remains a pivotal task in modern cybersecurity efforts, necessitating advanced analytical techniques to address malicious activities pre-emptively. This study introduces and compa... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论
Cross-Cloud Associated Multi-Replica Auditing for Lightweight Devices in the IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23495-23509页
作者: Hou, Gaopan Liu, Zhiquan Guo, Jingjing Miao, Yinbin Ma, Jianfeng Gao, Dawei Liao, Guisheng Xidian University Hangzhou Institute of Technology Hangzhou311231 China Jinan University College of Cyber Security Guangzhou510632 China Xidian University School of Cyber Engineering Xi'an710071 China
Cloud storage has become prevalent in Internet of Things (IoT) systems, attributed to its robust storage capabilities and user convenience. However, the cloud-based storage model, which separates data ownership from m... 详细信息
来源: 评论
Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network
收藏 引用
Journal of Computer Science & technology 2024年 第1期39卷 227-242页
作者: 崔诗尧 郁博文 从鑫 柳厅文 谭庆丰 时金桥 Institute of Information Engineering Chinese Academy of SciencesBeijing 100190China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou 510006China School of Cyber Security Beijing University of Posts and TelecommunicationsBeijing 100088China
Event detection(ED)seeks to recognize event triggers and classify them into the predefined event *** ED is formulated as a character-level task owing to the uncertain word *** methods try to incorpo-rate word-level in... 详细信息
来源: 评论
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 1561-1576页
作者: Wen Deng Guangjun Liang Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Department of Public Security of Jiangsu Province Key Laboratory of Digital ForensicsNanjingChina
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... 详细信息
来源: 评论
Research on Metaverse security and forensics
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论
GuardGrid: A Queriable and Privacy-Preserving Aggregation Scheme for Smart Grid via Function Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17622-17633页
作者: Yu, Pengfei Huang, Weicong Zhang, Ran Qian, Xinyuan Li, Hongwei Chen, Hanxiao China Electric Power Research Institute State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing210003 China University of Electronic Science and Technology of China School of Computer Science and Engineering School of Cyber Security Chengdu611731 China
Smart grids have revolutionized electricity management by leveraging real-time consumption data, enabling more efficient power control through advanced algorithms. However, this transformation raises significant priva... 详细信息
来源: 评论
Combating Terrorism: Detecting and Analyzing Extremist Content on X (Formerly Twitter)  3
Combating Terrorism: Detecting and Analyzing Extremist Conte...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Mwendwa, Gideon Chouhan, Lokesh Etyang, Felix Mandela, Ngaira Gift, Uwineza School of Cyber Security and Digital Forensics National Forensic Sciences University Goa India Cochin University of Science and Technology School of Engineering Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Jinja Uganda
This study investigates the efficacy of machine learning algorithms in detecting and evaluating extremist content on social media platforms, and we employ X, formerly known as Twitter. We therefore utilize Kaggle'... 详细信息
来源: 评论