咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是211-220 订阅
排序:
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
收藏 引用
Alexandria engineering Journal 2025年 128卷 127-143页
作者: Islam, Shayla Topazal, S.M. Hasan, Mohammad Kamrul Kolandaisamy, Raenu AL Abbas, Huda Saleh Vo, Nguyen Thakkar, Rahul Khan, Muhammad Attique Gupta, Deepak AlHammadi, Dina Abdulaziz Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia Center for Cyber Security Faculty of Information Science and Technology the National University of Malaysia Selangor Bangi43600 Malaysia Department of computer science College of Computer Science and Engineering Taibah University Madina Saudi Arabia Victorian Institute of Technology Melbourne Australia Center of AI College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Maharaja Agrasen Institute of Technology Delhi India Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O.Box 84428 Riyadh11671 Saudi Arabia
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare device... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论
Automated Crop Growth Monitoring and Optimizing the Yield with Reinforcement Learning  3
Automated Crop Growth Monitoring and Optimizing the Yield wi...
收藏 引用
3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Gorantla, Snehitha Veluchamy, S. Amrita School of Computing Department of Computer Science and Engineering - Artificial Intelligence Amrita Vishwa Vidyapeetham Chennai601103 India Amrita School of Computing Department of Computer Science and Engineering - Cyber Security Amrita Vishwa Vidyapeetham Chennai601103 India
A reinforcement learning agent for optimal green-house management through Proximal Policy Optimisation is developed and evaluated in this work. With variable elements like lighting, irrigation, humidity, and temperatu... 详细信息
来源: 评论
Decrease the Prompt Uncertainty: Adversarial Prompt Learning for Few-shot Text Classification
Decrease the Prompt Uncertainty: Adversarial Prompt Learning...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Weng, Jinta Zhang, Zhaoguang Yaqi, Jing Niu, Chenxu Huang, Heyan Hu, Yue School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Computer Science and Cyber Engineering Guangzhou University China National Computer Network Emergency Response Technical Team Coordination Center of China China Beijing Institute of Technology School of Computer Science and Technology Beijing China Southeast Academy of Information Technology Putian China
With few-shot learning abilities, pre-trained language models (PLMs) have achieved remarkable success in classification tasks. However, recent studies have shown that the performance of PLM is vulnerable due to differ... 详细信息
来源: 评论
Comparison of Multiple Regression Particle Swarm Optimization Algorithms and Multiple Regression Multi-Objective Seven-Spot Ladybird Optimization for Host Overload / Under-Loaded Detection in Cloud Datacenter  3
Comparison of Multiple Regression Particle Swarm Optimizatio...
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Aqlan Alhammadi, Akram Saeed Raman, Jayakrishnan Anilakkad Mosleh, Mohammed A.S. Ali Abdullah, Hesham Mohammed It College Taiz University Aljanad University Alsaeed Faculty Engineering Engineering of Computer Networkand Cyber Security Department Taiz Yemen Cyber Forensic Consultant CyberSec Analytics Kerala India Al-Fayha College Jubail Industrial City Department of Computer Science and Engendering Saudi Arabia Jouf University Department of Computer Science and It Sakaka Saudi Arabia
Power consumption of the data centers in recent times is a big challenge presently. Virtualization plays a key role in improving efficacy. Virtual Machine consolidation (VMC) is a technique for efficient usage of a re... 详细信息
来源: 评论
An Integrated Platform for Virtual Ecosystems and Wireless Edge Computing for Web 3.0  3
An Integrated Platform for Virtual Ecosystems and Wireless E...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Garg, Khushi Jattu, Mahee Hariharasitaraman, S. Subramanian, R. Raja Division of Cyber Security and Digital Forensics VIT Bhopal University Madhya Pradesh India School of Computing Science and Engineering Vit Bhopal University Madhya Pradesh India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamil Nadu India
The emergence of Web 3.0 has paved the way for a new generation of the internet that enables users to view, publish, and own content independently. This innovation is being driven by a combination of blockchain, seman... 详细信息
来源: 评论
FTGraph: A Flexible Tree-Based Graph Store on Persistent Memory for Large-Scale Dynamic Graphs
FTGraph: A Flexible Tree-Based Graph Store on Persistent Mem...
收藏 引用
2024 IEEE International Conference on Cluster Computing, CLUSTER 2024
作者: Sun, Gan Zhou, Jiang Li, Bo Gu, Xiaoyan Wang, Weiping He, Shuibing Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China College of Computer Science and Technology Zhejiang University Hangzhou China
Traditional in-memory graph systems often suffer from scalability due to the limited capacity and volatility of DRAM. Emerging non-volatile memory (NVM) provides an opportunity to achieve highly scalable and high-perf... 详细信息
来源: 评论
Natural Language Interface for Data Visualization: Harnessing the Power of Large Language Models
Natural Language Interface for Data Visualization: Harnessin...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Buchepalli Praneeth Ashutosh Kumar Singh Jyothika K Raju Mohana B Suma Computer Science and Engineering RV College of Engineering Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering Bengaluru India
Democratizing data analysis is the need of the hour, empowering a wider range of users within corporations to engage with data and uncover valuable insights. Because of the inherent ambiguity of natural language and t... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an710049 China Air Force Engineering University Air Traffic Control and Navigation College Xi’an710051 China Air Force Engineering University Information and Navigation College Xi’an710043 China Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore Xidian University School of Computer Science and Technology Xi’an710126 China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
Senspy: An Integrated Network Monitoring and Anomaly Detection System Using Machine Learning
Senspy: An Integrated Network Monitoring and Anomaly Detecti...
收藏 引用
Space, Aerospace and Defence Conference (SPACE), IEEE
作者: Bandaru Jnyanadeep Nikunj Mittal Srivishnu P N Varshith Y Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India Computer Science and Engineering RV College of Engineering® Bengaluru India
In the evolving cybersecurity landscape, the surge in cyber threats necessitates innovative defence mechanisms. Proposed work explores the integration of ML methods into Intrusion Detection System (IDS) Senspy tool. S... 详细信息
来源: 评论