咨询与建议

限定检索结果

文献类型

  • 1,550 篇 会议
  • 934 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 372 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 215 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 113 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 安全科学与工程
    • 61 篇 机械工程
    • 54 篇 化学工程与技术
    • 52 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 120 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 83 篇 基础医学(可授医学...
    • 81 篇 临床医学
    • 53 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 141 篇 accuracy
  • 118 篇 deep learning
  • 105 篇 feature extracti...
  • 103 篇 training
  • 94 篇 machine learning
  • 89 篇 security
  • 77 篇 computational mo...
  • 74 篇 real-time system...
  • 72 篇 internet of thin...
  • 72 篇 privacy
  • 60 篇 blockchain
  • 54 篇 support vector m...
  • 53 篇 predictive model...
  • 49 篇 data models
  • 46 篇 artificial intel...
  • 45 篇 semantics
  • 45 篇 cloud computing
  • 43 篇 convolutional ne...
  • 42 篇 data privacy
  • 40 篇 reliability

机构

  • 226 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 46 篇 college of cyber...
  • 45 篇 college of compu...
  • 44 篇 key laboratory o...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 school of cyber ...
  • 30 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 state key labora...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,245 篇 英文
  • 254 篇 其他
  • 14 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2506 条 记 录,以下是91-100 订阅
排序:
SGTP: A Spatiotemporal Generalized Trajectory Publishing Method With Differential Privacy
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2233-2247页
作者: Qiu, Shuyuan Pi, Dechang Wang, Yanxue Xu, Tongtong College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao266590 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
With the rapid development of location-based service technology, the leakage of trajectory privacy has become more and more serious. In order to solve the problems of insufficient privacy protection and low availabili... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论
A Literature Review on Predictive Classification of Major Depressive Disorder Using Advanced Data Analytics Techniques  5th
A Literature Review on Predictive Classification of Major De...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Mahender, Udutala Arivalagan, S. Sathiyasuntharam, V. Sudhakar, P. Annamalai University Tamilnadu Chidambaram India Department of Computer Science and Technology Annamalai University Tamilnadu Chidambaram India Department of Cyber Security CMR Engineering College Hyderabad India Department of Computer Science and Engineering Annamalai University Tamilnadu Chidambaram India
Major Depressive Disorder (MDD) is a significant global mental health concern predicted to become the leading mental health condition by 2030. It is characterised by persistent sadness, hopelessness, and a lack of int... 详细信息
来源: 评论
Fake News Detection on Social Media Using a Stacking Model  5th
Fake News Detection on Social Media Using a Stacking Model
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Ramesh, G.S. Supriya, K.H.S. Akash, P. Rukmananda Reddy, A. Tejaswini, V. Dharmireddi, Srinivasarao Department of Computer Science and Engineering VNR VJIET Telangana Hyderabad India Department of Cyber Security MasterCard St. LouisMO63304 United States
Fake news has existed since long before the Internet was invented. It can be defined as "fictitious articles deliberately fabricated to deceive readers". While some news may have a grain of truth, it frequen... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Deformable Dual Graph Aggregation Transformer Convolutional Networks with Spider Wasp Optimizer for Ovarian Tumor Classification Using Magnetic Resonance Imaging
收藏 引用
Biomedical Materials and Devices 2025年 1-19页
作者: Shanmugaveni, V. Jotheeswari, M. Abarnaswara, R. VijayaKumar, M. Manojanani, A. Department of Computer Science and Engineering (Cyber Security) Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering PSNA College of Engineering and Technology Tamil Nadu Dindigul India Department of Artificial Intelligence & Data Science Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering RVS Technical Campus Tamil Nadu Coimbatore India
The diagnosis of Ovarian Tumor (OT) remains a significant challenge as there is presently no practical non-invasive technique to determine true benign or malignant lesions before treatment. This study proposes a uniqu... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering Technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
HCL-Net: A Single Image Rain Removal Algorithm Based on Channel Attention and Multi-scale Feature Fusion  6
HCL-Net: A Single Image Rain Removal Algorithm Based on Chan...
收藏 引用
6th IEEE International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2023
作者: Huang, Jin He, Pei Guangzhou University School of Cyberspace Security Guangzhou China Guangzhou University School of Computer Science and Cyber Engineering Guangzhou China
The investigation of rain removal from pictures has always been a pivotal matter in the domain of computer vision. Nevertheless, the majority of existing algorithms employ encoder-decoder structures that have been tra... 详细信息
来源: 评论