咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是121-130 订阅
排序:
Vision transformer for contactless fingerprint classification
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Kaplesh, Pooja Gupta, Aastha Bansal, Divya Sofat, Sanjeev Mittal, Ajay Cyber Security Research Centre Punjab Engineering College Chandigarh160012 India STME SVKM’s NMIMS University Chandigarh160014 India Computer Science and Engineering Punjab Engineering College Chandigarh160012 India UIET Panjab University Chandigarh160014 India
Contactless fingerprint recognition has gained attention due to its data security and hygiene as compared to the contact-based counterpart. In the previous years, deep learning models, mainly Convolutional Neural Netw... 详细信息
来源: 评论
Vehicular Intrusion Detection System Based on Hybrid Quantum Neural Networks
Vehicular Intrusion Detection System Based on Hybrid Quantum...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhou, Jianhua Liu, Yueheng Li, Sifan Cao, Yue Chen, Wenkai Ahmed, Naveed Wuhan University School of Cyber Science and Engineering China Wuhan Cyber Security Association China Technology Co. Ltd China Prince Sultan University College of Computer and Information Sciences Riyadh Saudi Arabia
Traditional Deep Learning (DL) method is increasingly used in vehicular Intrusion Detection Systems (IDSs). However, there are still some limitations. It combines various models, resulting in a massive model size and ... 详细信息
来源: 评论
Personalized Educational Video Evaluation Combining Student's Cognitive and Teaching Style
Personalized Educational Video Evaluation Combining Student'...
收藏 引用
2023 IEEE International Conference on Systems, Man, and cybernetics, SMC 2023
作者: Weng, Jinta Dong, Haoyu Deng, Yifan Hu, Yue Wu, Hao Huang, Heyan School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Cyber Engineering Guangzhou University China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
AI-powered technologies, like ChatGPT and learning analytic technologies, have encouraged the sharing of online teaching resources and the transformation of teaching methods and learning pathways. However, the mixed r...
来源: 评论
IoT-Based Plant Health Monitor Using NodeMCU and ESP8266  5
IoT-Based Plant Health Monitor Using NodeMCU and ESP8266
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Tandel, Rajat Ebenezer, V. Santhiya, P. Edwin, Bijolin Stewart Kirubakaran, S. Thanka, Roshni Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Division of Data Sciences and Cyber Security Coimbatore India
Plant Monitor Using NodeMCU(ESP8266)is a technology that is advanced;it uses IoT-Internet of Things to measure and monitor different plant phenomena. This system, which is based on sensors that collect data on differe... 详细信息
来源: 评论
cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Kumar, Rajiv Rai, Vipin Joshi, Shivani Raj, Daksh Amrita Galgotias University Department of Computer Science & Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India Sharda University Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Greater Noida India
cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论
Credit Card Fraud Detection using ML: A Survey
Credit Card Fraud Detection using ML: A Survey
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Batra, Usha Sharda University Department of Computer Science and Engineering India Center of Cyber Security and Cryptography Sharda University India MRIIRS Faridabad India
The popularity of credit card fraud is rising as the number of cashless transactions increases. Online transactions are expanding as more people use credit cards and mobile wallets. The growth of internet commerce has... 详细信息
来源: 评论
AI-Driven Solutions for Cloud security Implementing Intelligent Threat Detection and Mitigation Strategies
AI-Driven Solutions for Cloud Security Implementing Intellig...
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Yasani, Rajashekar Reddy Prasad, Putalpattu Muni Srinivas, Pattlola Reddy, N V Raja Sekhar Jawarkar, Parag Raghunath, Vedaprada Cloud Security Cloud Computing Cyber Security India University of Rome Tor Vergata Department of Industrial Engineering Italy Department of Computer Science and Engineering Telangana India Mlr Institute of Technology Department of It India Shri Ramdeobaba College of Engineering and Management Electronics Engineering Nagpur India Visveswaraya Technological University India
Adapting threat detection and response procedures is essential for businesses to stay ahead of the constantly developing cyberattack landscape. Researching cutting-edge tools like XDR, SIEM, SOAR, and NDR - which shed... 详细信息
来源: 评论
A Survey on Trustworthy Edge Intelligence: From security and Reliability To Transparency and Sustainability
收藏 引用
IEEE Communications Surveys and Tutorials 2024年 第3期27卷 1-1页
作者: Wang, Xiaojie Wang, Beibei Wu, Yu Ning, Zhaolong Guo, Song Yu, Fei Richard School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon Hong Kong China School of Information Technology Carleton University Ottawa ON Canada
Edge Intelligence (EI) integrates Edge Computing (EC) and Artificial Intelligence (AI) to push the capabilities of AI to the network edge for real-time, efficient and secure intelligent decision-making and computation... 详细信息
来源: 评论
Enhancing Wireless Sensor Network Data Collection through Aerial Unmanned Vehicles
Enhancing Wireless Sensor Network Data Collection through Ae...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Ali Alheeti, Khattab M. Najim, Ali Hamza Satar, Nurhizam Safie Mohd Aliesawi, Salah A. Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq Faculty of Engineering Department of Electrical and Computer Engineering International Islamic University Malaysia Selangor Malaysia
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have... 详细信息
来源: 评论
A novel coarse-grained knowledge graph embedding framework for platform risk identification from relational data
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Zhang, Qi Wang, Shicheng Wang, Lihong Sheng, Jiawei Guo, Shu Li, Chen He, Min Zhang, Renqiang School of Economics and Management Beihang University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China School of Computer Science and Engineering Beihang University Beijing China
Platform risk identification from relational data aims to determine whether the target platforms are risky or not. However, in such a scenario, the relation data involve massive types of relations and numerous numeric... 详细信息
来源: 评论