咨询与建议

限定检索结果

文献类型

  • 1,550 篇 会议
  • 934 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 372 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 215 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 113 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 安全科学与工程
    • 61 篇 机械工程
    • 54 篇 化学工程与技术
    • 52 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 120 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 83 篇 基础医学(可授医学...
    • 81 篇 临床医学
    • 53 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 141 篇 accuracy
  • 118 篇 deep learning
  • 105 篇 feature extracti...
  • 103 篇 training
  • 94 篇 machine learning
  • 89 篇 security
  • 77 篇 computational mo...
  • 74 篇 real-time system...
  • 72 篇 internet of thin...
  • 72 篇 privacy
  • 60 篇 blockchain
  • 54 篇 support vector m...
  • 53 篇 predictive model...
  • 49 篇 data models
  • 46 篇 artificial intel...
  • 45 篇 semantics
  • 45 篇 cloud computing
  • 43 篇 convolutional ne...
  • 42 篇 data privacy
  • 40 篇 reliability

机构

  • 226 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 46 篇 college of cyber...
  • 45 篇 college of compu...
  • 44 篇 key laboratory o...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 school of cyber ...
  • 30 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 state key labora...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,245 篇 英文
  • 254 篇 其他
  • 14 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2506 条 记 录,以下是11-20 订阅
排序:
security Flaw in TCP/IP and Proposed Measures  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Upadhyay, Sourav Kumar Kumar, Prakash Department of Computer Science and Engineering BIT Sindri Dhanbad India Department of Computer Science and Cyber Security JRSU Ranchi India
The whole Internet is based on TCP/IP protocol suite. The inherent flaw in the TCP/IP makes a cascading effect for other attacks like flooding, fingerprinting, and many more. All the switching and routing mechanisms a... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
Blockchain-Empowered Asynchronous Federated Reinforcement Learning for IoT-Based Traffic Trajectory Prediction
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17095-17109页
作者: Wang, Bin Tian, Zhao Tang, Fengxiao Pan, Heng She, Wei Liu, Wei Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450002 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450002 China Central South University School of Computer Science and Engineering Changsha410083 China Zhongyuan University of Technology School of Cyber Space Security Zhengzhou450007 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou Key Laboratory of Blockchain and Data Intelligence Zhengzhou450002 China
Vehicle trajectory prediction plays a crucial role in IoT-based intelligent transportation systems, which can effectively address key issues, such as driving safety and multivehicle collaboration. However, the sensiti... 详细信息
来源: 评论
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Point-of-Interest Recommendation  21
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Poi...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Yuwen, Zhang Shaobo, Ren School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu China
Next Point-of-Interest (POI) recommendation is a critical task in location-based services, aiming to predict the user's next POI based on historical check-in data. Existing approaches often rely on static graphs o... 详细信息
来源: 评论
Multi-Behavioral Recommender System with Heterogeneous Graph Learning  4
Multi-Behavioral Recommender System with Heterogeneous Graph...
收藏 引用
4th International Conference on Consumer Electronics and computer engineering, ICCECE 2024
作者: Feng, Jiaming Liu, Yang Zhang, Junjie School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu China
With the rapid development of online platforms and the explosive growth of user-generated data, personalized recommendation systems have become increasingly crucial in delivering relevant content to users. Traditional... 详细信息
来源: 评论
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论
Effectiveness of a touch-based hand therapeutic application for hand dexterity in children with handwriting difficulties-a pilot study
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Smitha, John Renumol, V.G. School of Computer Science and Technology Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India School of Engineering Cochin University of Science and Technology Kochi India
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of... 详细信息
来源: 评论
Advanced functional connectivity analysis with integrated EEG signal enhancement and GTW-EEG-GAN for emotion detection
收藏 引用
International Journal of computers and Applications 2024年 第12期46卷 1152-1165页
作者: Babu, Nirmal Varghese Kanaga, E. Grace Mary Division of Computer Science and Engineering School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Division of Data Science and Cyber Security School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India
Emotion recognition is crucial in human-computer interaction and psychological research, utilizing modalities such as facial expressions, voice intonations, and EEG signals. This research investigates AI-driven techni... 详细信息
来源: 评论
Brain Cancer Prediction Using EvoNet: A Modified Resnet Protocol
Brain Cancer Prediction Using EvoNet: A Modified Resnet Prot...
收藏 引用
2024 International Conference on Big Data Analytics in Bioinformatics, DABCon 2024
作者: Majumder, Sayan Das, Rohick Cyber Security the Heritage Academy Kolkata India Computer Science & Engineering Institute of Engineering & Management Kolkata India
Brain tumors are among the most common and malignant diseases. Prompt diagnosis makes a big difference in enhancing survival rates among brain tumor patients. The Magnetic Resonance Imaging, or MRI, is a technique for... 详细信息
来源: 评论
Real-time Autonomous Vehicle Maneuver Generation Algorithm Based on Hierarchical Planning  24
Real-time Autonomous Vehicle Maneuver Generation Algorithm B...
收藏 引用
2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence, DEAI 2024
作者: Zhai, WenHao School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Sichua Chengdu China
Global path planning, whether based on sampling-based algorithms or heuristic search algorithms, can search for a global path from the start point to the destination in a relatively short time. However, they often str... 详细信息
来源: 评论