咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是111-120 订阅
排序:
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 237-247页
作者: Jiajie Guo Muhammad Bilal Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Engineering Hankuk University of Foreign StudiesGyeonggi-do17035South Korea Jiangsu Hydraulic Research Institute Nanjing210044China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem... 详细信息
来源: 评论
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
收藏 引用
science China(Information sciences) 2023年 第3期66卷 273-286页
作者: Weixuan TANG Bin LI Weixiang LI Yuangen WANG Jiwu HUANG Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society School of Computer Science and Cyber Engineering Guangzhou University
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the ... 详细信息
来源: 评论
Oral Cancer Using Deep Learning and Auto-Fluorescence Image Analysis
Oral Cancer Using Deep Learning and Auto-Fluorescence Image ...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Muhammed Yaseer, P. Arul Xavier, V.M. Shyni, S.S. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Tamilnadu Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Tamilnadu Coimbatore India
Poor treatment outcomes result from the fact that oral cancer is frequently identified at an advanced stage, making it a serious and sometimes lethal disease. Thus, it is essential to develop quick and accurate proced... 详细信息
来源: 评论
Vision-based UAV Detection in Complex Backgrounds and Rainy Conditions  2
Vision-based UAV Detection in Complex Backgrounds and Rainy ...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Singh, Pranita Gupta, Keshav Jain, Amit Kumar Vishakha Jain, Abhishek Jain, Arpit Roorkee Institute of Technology Department of Computer Science and Engineering Roorkee India Grd Institute of Management and Technology Department of Computer Science and Engineering Dehradun India Coer University Department of Cyber Security Roorkee India Uttaranchal University Department of Computer Science and Engineering Dehradun India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaddeswaram India
Studies aimed at detecting UAVs in real time using processer vision and deep learning are in their infancy. Although there are many possible advantages to using unmanned aerial vehicles (UAVs), some people are concern... 详细信息
来源: 评论
Deep Learning based Intelligent System for Skin Disease Detection  10
Deep Learning based Intelligent System for Skin Disease Dete...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Dhanush, K.B. Arul Xavier, V.M. Shyni, S.S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamilnadu Coimbatore India Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Tamilnadu Coimbatore India
Malignant and benign skin diseases significantly impact public health and personal well-being. Traditional machine learning models encounter difficulties in processing image datasets, which is crucial for early and ac... 详细信息
来源: 评论
Panoptic Region Slicing Segmentation and Optimized Alexnet-Based CNN for Early Melanoma Diagnosis
收藏 引用
SN computer science 2024年 第6期5卷 1-9页
作者: Ganesh, V.N. Gulappagol, Laxmi Pushparani, M.K. Ganesh, K. Department of Electronics and Communication Engineering Alvas Institute of Engineering and Technology Department of Internet of Things and Cyber Security including Block chain Technology A J Institute of Engineering and Technology Department of Computer Science & amp Design Alvas Institute of Engineering and Technology
Early and accurate diagnosis of melanoma, a potentially life-threatening skin cancer, is crucial for improving patient outcomes. In this study, we propose a novel approach for melanoma detection, termed Panoptic Regio... 详细信息
来源: 评论
Ensuring Privacy and Integrity in IoT Supply Chains through Blockchain and Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25547-25558页
作者: Din, Ikram Ud Almogren, Ahmad Han, Zhu Guizani, Mohsen The University of Haripur Department of Information Technology Haripur22620 Pakistan King Saud University College of Computer and Information Sciences Department of Cyber Security Department of Computer Science Riyadh11633 Saudi Arabia University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
Ensuring data security and privacy in Internet of Things (IoT) is increasingly critical due to the growing interconnectedness of devices and the sensitivity of the data they handle. This paper presents a novel approac... 详细信息
来源: 评论
A Survey of Machine Learning Applications in Medical Imaging for Neurodegenerative Disease Diagnosis  2
A Survey of Machine Learning Applications in Medical Imaging...
收藏 引用
2nd International Conference on computer Vision and Internet of Things, ICCVIoT 2024
作者: Nandhashree, K.R. Senthil Kumar, M. Susee, S.K. Department of Cyber Security SRM Valliammai Engineering College India Department of Computer Science and Engineering SRM Valliammai Engineering College India Department of Electronics and Communication Mohamed Sathak A J College of Engineering India
The increasing prevalence of brain degenerative disorders particularly Alzheimer's and Parkinson's, have incurred a dire need for effective diagnostic methodologies. With advancements in medical imaging techni... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论