咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是151-160 订阅
排序:
GPS Based Efficient Real Time Vehicle Tracking and Monitoring System Using Two Factor Authentication and Internet of Things (IoT)
GPS Based Efficient Real Time Vehicle Tracking and Monitorin...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: S Jeevan Kishan Karthik S Jayanth Sharma Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Vehicle tracking systems have evolved significantly over the years, transitioning from simple passive tracking devices to real-time monitoring systems that utilize global positioning system (GPS) and global system for... 详细信息
来源: 评论
An Urban Electric Vehicle Charging System via Hybrid Heterogeneous Modes
An Urban Electric Vehicle Charging System via Hybrid Heterog...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Zhang, Keyang Liu, Yueheng Liu, Shuohan Gao, Junqiao Cao, Yue Ahmad, Naveed Zhang, Xu School of Cyber Science and Engineering Wuhan University China Wuhan Cyber Security Association China Qilu University of Technology China College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Norwich United Kingdom
Electric Vehicle (EV) is regarded as the optimal alternative to traditional fuel-powered vehicles. However, the exponential surge in EV charging demand poses challenges in charging infrastructure planning and charging... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction Key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论
Smart Health Monitoring and Anomaly Detection Using Internet of Things (IoT) and Artificial Intelligence (AI)
Smart Health Monitoring and Anomaly Detection Using Internet...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Prabu Jayant Elvis Vincent Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Smart health monitoring systems, powered by AI and IoT, are transforming healthcare by enabling continuous, real-time patient monitoring. In India, where lapses in health monitoring contribute to 20% of premature deat... 详细信息
来源: 评论
Facial Expressions and EEG Signals for Emotion Recognition Using Deep2 Face Algorithm  10
Facial Expressions and EEG Signals for Emotion Recognition U...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Swetha, S. Babu, Nirmal Varghese Karunya Institute of Technology and Science Division of Computer Science and Engineering Karunya Nagar Tamil Nadu Coimbatore India Karunya Institute of Technology and Science Division of Data Science and Cyber Security Karunya Nagar Tamil Nadu Coimbatore India
Emotions, the essence of human connection and understanding, take center stage in this pioneering research on emotion recognition. We look at identifying common emotions including joy, sorrow, neutral, anger, fear, an... 详细信息
来源: 评论
Intrusion Detection in Network Traffic Using LSTM and Deep Learning
Intrusion Detection in Network Traffic Using LSTM and Deep L...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Prabu Jayant M Prathica Shetty S Jeevan Mohana Minal Moharir A R Ashok Kumar Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Network Intrusion Detection system (NIDS) helps in detecting the traffic and avoids any potential harm to the system. LSTM is a deep learning model architecture that uses recurrent neural networks (RNN) for handling s... 详细信息
来源: 评论
Secure and efficient covert communication for blockchain-integrated SAGINs
收藏 引用
security and Safety 2024年 第2期3卷 25-42页
作者: Weijia Li Yuan Zhang Xinyu He Yaqing Song School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of ChinaChengdu 611731China
Blockchain has brought great potential in improving Space-Air-Ground Integrated Networks(SAGINs)in terms of security and *** blockchain-integrated SAGINs,many applications and services inherently require both the comm... 详细信息
来源: 评论
Tracking Objects and Activities with Attention for Temporal Sentence Grounding  48
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xiong, Zeyu Liu, Daizong Zhou, Pan Zhu, Jiahao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Peking University Wangxuan Institute of Computer Technology China
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论
IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6867-6878页
作者: Waleed T.Al-Sit Nidal A.Al-Dmour Taher M.Ghazal Ghassan F.Issa Department of Computer Engineering Mutah UniversityAl-KarakJordanHigher Colleges of TechnologyDubaiUAE Department of Computer Engineering College of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKM43600BangiSelangorMalaysia
In the age of universal computing,human life is becoming smarter owing to the recent developments in the Internet of Medical Things(IoMT),wearable sensors,and telecommunication innovations,which provide more effective... 详细信息
来源: 评论
Advancements in Operational Transconductance Amplifiers (OTAs) for Design, Applications & Performance Optimization Techniques with Hardware Implementation  3
Advancements in Operational Transconductance Amplifiers (OTA...
收藏 引用
3rd IEEE International Conference of Electron Devices Society Kolkata Chapter, EDKCON 2024
作者: Pramath, V. Pavithra, G. Ninawe, Swapnil S. Manjunath, T.C. Bengaluru India Dayananda Sagar College of Engineering Department of Electronics & Communication Engineering Karnataka Bangalore India Rajarajeswari College of Engineering Department of Computer Science & Engineering IoT Cyber Security & Block Chain Technology Karnataka Bangalore India
This research paper presents the design and simulation of a novel architecture for Multiple Path Fully Differential Operational Transconductance Amplifiers (OTAs) with a Dual Flipped Voltage Follower, specifically dev... 详细信息
来源: 评论