咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是41-50 订阅
排序:
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
Exploring the landscape of network security: a comparative analysis of attack detection strategies
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3211-3228页
作者: Rajesh Kanna, P. Santhi, P. Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamil Nadu Erode India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the prim... 详细信息
来源: 评论
Panoptic Region Slicing Segmentation and Optimized Alexnet-Based CNN for Early Melanoma Diagnosis
收藏 引用
SN Computer Science 2024年 第6期5卷 756页
作者: Ganesh, V.N. Gulappagol, Laxmi Pushparani, M.K. Ganesh, K. Department of Electronics and Communication Engineering Alvas Institute of Engineering and Technology Department of Internet of Things and Cyber Security including Block chain Technology A J Institute of Engineering and Technology Department of Computer Science & amp Design Alvas Institute of Engineering and Technology
Early and accurate diagnosis of melanoma, a potentially life-threatening skin cancer, is crucial for improving patient outcomes. In this study, we propose a novel approach for melanoma detection, termed Panoptic Regio... 详细信息
来源: 评论
Secure EEG: Secure Seizure Prediction using Encryption and Machine Learning  5
Secure EEG: Secure Seizure Prediction using Encryption and M...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Blessy Sumam, G.G. Gayathri, S. Gopika, S. Er&dci Institute of Technology Cdac Cyber Forensics and Information Security Thiruvananthapuram India Cdac Thiruvananthapuram India Kristu Jayanti College Department of Computer Science Bengaluru India
This research work introduces a pioneering methodology for predicting seizures by leveraging Electroencephalography (EEG) data in individuals diagnosed with epilepsy. The proposed system combines machine learning algo... 详细信息
来源: 评论
SOPA-GA-CNN: Synchronous optimisation of parameters and architectures by genetic algorithms with convolutional neural network blocks for securing Industrial Internet-of-Things
收藏 引用
IET cyber-Systems and Robotics 2023年 第1期5卷 51-66页
作者: Jia-Cheng Huang Guo-Qiang Zeng Guang-Gang Geng Jian Weng Kang-Di Lu College of Cyber Security and the National Joint Engineering Research Center of Network Security Detection and Protection Technology Jinan UniversityGuangzhouChina National-Local Joint Engineering Research Center of Digitalize Electrical Design Technology Wenzhou UniversityWenzhouChina National Laboratory of Industrial Control Technology Institute of Cyber-Systems and ControlZhejiang UniversityHangzhouChina
In recent years,deep learning has been applied to a variety of scenarios in Industrial Internet of Things(IIoT),including enhancing the security of ***,the existing deep learning methods utilised in IIoT security are ... 详细信息
来源: 评论
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM
收藏 引用
Journal of cyber security and Mobility 2023年 第5期12卷 629-652页
作者: Kan, Xiaopeng Zhou, Zhihong Yao, Lihong Zuo, Yuxin School of Cyber Science and Engineering Shanghai Jiao Tong University Shanghai China Institute of Cyber Science and Technology Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China
Controller Area Network (CAN) is one of the most widely used in-vehicle networks in modern vehicles. Due to the lack of security mechanisms such as encryption and authentication, CAN is vulnerable to external hackers ... 详细信息
来源: 评论
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论
Detecting Deepfake Videos using Face Recognition and Neural Networks  1
Detecting Deepfake Videos using Face Recognition and Neural ...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Murugan, Muthu Aravind Mathu, T. Priya, S Jeba Karunya Institute of Technology and Sciences Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Data Science and Cyber Security Coimbatore India
Deepfake videos created using advanced artificial intelligence techniques, pose a significant threat to digital media credibility. This project introduces a holistic strategy for identifying these videos, incorporatin... 详细信息
来源: 评论
Advancing Multiclass Emotion Recognition with CNN-RNN Architecture and Illuminating Module for Real-time Precision using Facial Expressions
Advancing Multiclass Emotion Recognition with CNN-RNN Archit...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering Science, AMATHE 2024
作者: Prince, Simrith C. Babu, Nirmal Varghese Computer Science And Engineering Karunya Institute Of Technology And Sciences Coimbatore India Data Science And Cyber Security Karunya Institute Of Technology And Sciences Coimbatore India
Emotions, intrinsic to the human experience, serve as the catalyst for a groundbreaking technological innovation in multiclass emotion recognition through facial expressions. This study introduces a revolutionary syst... 详细信息
来源: 评论
Generic,efficient and isochronous Gaussian sampling over the integers
收藏 引用
cybersecurity 2022年 第3期5卷 52-73页
作者: Shuo Sun Yongbin Zhou Yunfeng Ji Rui Zhang Yang Tao Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Cyber Science and Engineering Nanjing University of Science and TechnologyNanjingChina
Gaussian sampling over the integers is one of the fundamental building blocks of lattice-based *** the extensively used trapdoor sampling algorithms,it is ineluctable until *** the influence of numerous side-channel a... 详细信息
来源: 评论