咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是101-110 订阅
排序:
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Fake News Detection on Social Media Using a Stacking Model  5th
Fake News Detection on Social Media Using a Stacking Model
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Ramesh, G.S. Supriya, K.H.S. Akash, P. Rukmananda Reddy, A. Tejaswini, V. Dharmireddi, Srinivasarao Department of Computer Science and Engineering VNR VJIET Telangana Hyderabad India Department of Cyber Security MasterCard St. LouisMO63304 United States
Fake news has existed since long before the Internet was invented. It can be defined as "fictitious articles deliberately fabricated to deceive readers". While some news may have a grain of truth, it frequen... 详细信息
来源: 评论
Coarse registration of color point clouds by combining color feature and geometric feature  12
Coarse registration of color point clouds by combining color...
收藏 引用
SPIE 12th International Symposium on Multispectral Image Processing and Pattern Recognition, MIPPR 2023
作者: Sun, Peng Jiang, Shuhang Luan, Haiyang Wang, Chen Wang, Wanqi Liu, Yu School of Opto-Electronic Engineering Changchun University of Science and Technology Jilin Changchun130022 China College of Computer Science and Cyber Security Chengdu University of Technology Chengdu Sichuan China
Coarse registration is the initial step of aligning a point clouds with other clouds, aiming to put two point clouds in the correct position. There are many coarse registration methods, and among them, the SAC-IA (Sam... 详细信息
来源: 评论
Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election
收藏 引用
science China(Information sciences) 2022年 第1期65卷 131-146页
作者: Xiaoqin FENG Jianfeng MA Shaobin LIU Yinbin MIAO Ximeng LIU School of Cyber Engineering Xidian University State Key Laboratory of Cryptology Shaanxi Key Laboratory of Network and System Security Xidian University College of Mathematics and Computer Science Fuzhou University
Load balancing mechanism in technologies such as cloud computing has provided a huge opportunity for the development of large-scale projects. Although the conventional view is to build mechanisms that adopt a dynamic ... 详细信息
来源: 评论
HCL-Net: A Single Image Rain Removal Algorithm Based on Channel Attention and Multi-scale Feature Fusion  6
HCL-Net: A Single Image Rain Removal Algorithm Based on Chan...
收藏 引用
6th IEEE International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2023
作者: Huang, Jin He, Pei Guangzhou University School of Cyberspace Security Guangzhou China Guangzhou University School of Computer Science and Cyber Engineering Guangzhou China
The investigation of rain removal from pictures has always been a pivotal matter in the domain of computer vision. Nevertheless, the majority of existing algorithms employ encoder-decoder structures that have been tra... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering Technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star Networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论