咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是81-90 订阅
排序:
Data Aegis Using Chebyshev Chaotic Map-Based Key Authentication Protocol  1
收藏 引用
International Conference on Intelligent Manufacturing and Energy Sustainability, ICIMES 2022
作者: Lateef, Mohammed Abdul Atheeq, C. Rahman, Mohd Abdul Faizan, Mohammed Abdul Deccan College of Engineering and Technology Hyderabad India Computer Science Deccan College of Engineering and Technology Hyderabad India Hyderabad India Cyber Forensics and Information Security Jawaharlal Nehru Technological University Hyderabad Hyderabad India
Networks with wireless connection between nodes are far more convenient than a wired connection and are under rapid development. One major factor that ensures a truly significant network is the security features it po... 详细信息
来源: 评论
Deep Learning based Intelligent System for Skin Disease Detection  10
Deep Learning based Intelligent System for Skin Disease Dete...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Dhanush, K.B. Arul Xavier, V.M. Shyni, S.S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamilnadu Coimbatore India Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Tamilnadu Coimbatore India
Malignant and benign skin diseases significantly impact public health and personal well-being. Traditional machine learning models encounter difficulties in processing image datasets, which is crucial for early and ac... 详细信息
来源: 评论
Task-level Distributionally Robust Optimization for Large Language Model-based Dense Retrieval  39
Task-level Distributionally Robust Optimization for Large La...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ma, Guangyuan Ma, Yongliang Wu, Xing Su, Zhenpeng Zhou, Ming Hu, Songlin Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Langboat Technology Beijing China
Large Language Model-based Dense Retrieval (LLM-DR) optimizes over numerous heterogeneous fine-tuning collections from different domains. However, the discussion about its training data distribution is still minimal. ... 详细信息
来源: 评论
Blockchain-Enabled DNS: Enhancing security and Mitigating Attacks in Domain Name Systems  6
Blockchain-Enabled DNS: Enhancing Security and Mitigating At...
收藏 引用
6th International Conference on Signal Processing and Information security, ICSPIS 2023
作者: Shah, Kaushal Padhya, Mukti Sharma, Sachin Pandit DeenDayal Energy University School of Technology Department of Computer Science and Engineering Gandhinagar India National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India
The importance of Internet security is increasing as businesses expand through digitalization. Like in the physical world, data transmitted over the Internet must be safeguarded to ensure confidentiality, integrity, a... 详细信息
来源: 评论
Oral Cancer Using Deep Learning and Auto-Fluorescence Image Analysis
Oral Cancer Using Deep Learning and Auto-Fluorescence Image ...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering Science, AMATHE 2024
作者: Muhammed Yaseer, P. Arul Xavier, V.M. Shyni, S.S. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Tamilnadu Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Tamilnadu Coimbatore India
Poor treatment outcomes result from the fact that oral cancer is frequently identified at an advanced stage, making it a serious and sometimes lethal disease. Thus, it is essential to develop quick and accurate proced... 详细信息
来源: 评论
forensics Analysis of TOR Browser
Forensics Analysis of TOR Browser
收藏 引用
International Conference on Information security, Privacy, and Digital forensics, 2022
作者: Kumar, Adarsh Sondarva, Kumar Gohil, Bhavesh N. Patel, Sankita J. Shah, Ramya Rajvansh, Sarang Sanghvi, H.P. Computer Engineering Department Sardar Vallabhbhai National Institute of Technology Gujarat Surat395-007 India School of Cyber Security and Digital Forensics National Forensic Sciences University Gujarat Gandhinagar382007 India Directorate of Forensic Science Gujarat Gandhinagar India
The Onion Router is a web browser that uses the Tor network to anonymize web traffic by making it simple to conceal one’s identity on social media. It uses the onion routing technology to access the multiple-level en... 详细信息
来源: 评论
Detecting compromised email accounts via login behavior characterization
收藏 引用
cybersecurity 2024年 第1期7卷 16-36页
作者: Jianjun Zhao Can Yang Di Wu Yaqin Cao Yuling Liu Xiang Cui Qixu Liu Institute of Information Engineering Chinese Academy of SciencesBeijing100085China School of Cyber Security University of Chinese Academy of SciencesBeijing100049China China Cybersecurity Review Technology and Certification Center Beijing100013China Zhongguancun Laboratory Beijing100089China
The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and *** compromised email accounts is more challenging than in the social network field,where email accounts ha... 详细信息
来源: 评论
Bridging the Gap: Aligning Language Model Generation with Structured Information Extraction via Controllable State Transition  25
Bridging the Gap: Aligning Language Model Generation with St...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Hao Ren, Yubing Cao, Yanan Li, Yingjie Fang, Fang Lin, Zheng Wang, Shi Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China
Large language models (LLMs) achieve superior performance in generative tasks. However, due to the natural gap between language model generation and structured information extraction in three dimensions: task type, ou... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Reinforcement Learning-based security Enhancement for Controlled Optimization of Phases in Intelligent Traffic Signal System
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial cyber-Physical Systems 2024年 2卷 575-587页
作者: Qiao, Ziyan Xiang, Yingxiao Baker, Thar Li, Gang Wu, Yalun Tong, Endong Peng, Shuanghe Zhu, Ye Xu, Dongwei Niu, Wenjia Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Brighton School of Architecture Technology and Engineering Brighton United Kingdom Deakin University Centre for Cyber Security Research and Innovation Geelong Australia Deakin University Australia Tangshan Research Institute of Beijing Jiaotong University Tangshan063000 China Deakin University Centre for Cyber Resilience and Trust Burwood3125 Australia Zhejiang University of Technology College of Information Engineering Institute of Cyberspace Security Hangzhou311121 China
With the rise of intelligent devices within Industrial cyber-Physical Systems (ICPS), encompassing applications in traffic signal control, the vulnerability of devices such as On-Board Units and Roadside Units to atta... 详细信息
来源: 评论